Recent orders

To Examine The Critical Principles Of Tourism Sustainability And Access The Perceived Challenges Of The Tourists In China

To Examine The Critical Principles Of Tourism Sustainability And Access The Perceived Challenges Of The Tourists In China

centercenter100000100000Table of Contents

TOC o “1-3” h z u HYPERLINK l “_Toc349307189″Introduction PAGEREF _Toc349307189 h 3

HYPERLINK l “_Toc349307190″Research Problem PAGEREF _Toc349307190 h 3

HYPERLINK l “_Toc349307191″Rationale of the Research PAGEREF _Toc349307191 h 4

HYPERLINK l “_Toc349307192″Research Objectives PAGEREF _Toc349307192 h 4

HYPERLINK l “_Toc349307193″Literature Review PAGEREF _Toc349307193 h 5

HYPERLINK l “_Toc349307194″Research Methodology PAGEREF _Toc349307194 h 8

HYPERLINK l “_Toc349307195″Justification of Methods PAGEREF _Toc349307195 h 8

HYPERLINK l “_Toc349307196″Data Collection PAGEREF _Toc349307196 h 9

HYPERLINK l “_Toc349307197″Data Analysis PAGEREF _Toc349307197 h 9

HYPERLINK l “_Toc349307198″References PAGEREF _Toc349307198 h 10

HYPERLINK l “_Toc349307199″Appendix A Time Frame PAGEREF _Toc349307199 h 12

IntroductionThere have been continuous economic challenges in the rural areas of the world mostly in developing countries and it can’t be measured with the GDP growth rate due to growing gap between rich urban population and poor rural population. The rural areas are facing problems like migration of rural population to urban areas, environmental degradation, lack of infrastructure, financial resources, traditional style of agriculture and this is reflected in countries like China. (Buckley,2009) On the other hand Jian from Barclays capital comments that Urbanization is the driver behind China’s economic growth and it is the first time the urban population has surpassed the rural population and their income has increased by 8.9% (Hirschberg, 2012)

Chinese government has been continuously working to alleviate rural poverty by develop sustainable strategies and ecotourism has gained lot of attention as a potential and fashionable economic model to meet the government objectives like diversifying traditional mode of agricultural practices, utilizing the surplus workforce due to increased jobs in the hospitality and tourism sector and enhancement of industrial structure of the rural areas. (Buckley, 2012)

Research ProblemEcotourism is relatively new approach adopted by the government to improve and diversity the rural economy and not a dominant strategy but the local government is giving significant support and professing it as a sustainable development tool. (Harris,Williams,Griffin, 2012) According to Yuan, Dai and Wang (2008) funding for the ecotourism is the major challenge for the nation and government is spending only around $52 per sq km compared to $157 in other developing nations and $2058 in developed nations. So 41.5% of the natural reserves are not able to manage even routine operational expenses. Honey and Martha (2008) comments that as opposed to the claims of ecotourism there has been many evidences that due to the rapid development of protected areas many local people have received no compensation or living in unsafe conditions. Bendell & Font(2004) also suggests that sustainability can be considered ideal for ecotourism but the objectives, principles are quite vogue and insufficient to provide a tourism model which is applicable and practical for implementation.

Figure 1. Longji Terraces (Jiang, 2012)

The ecotourism development in China has many cases with positive and negative impacts like the development at Shangri-La has caused community development, heritage protection but at the same time destroyed the destroyed the potential agricultural terrain as show in figure 1. (Jigang, 2012)

Rationale of the ResearchThe aim of this research is to examine the critical principles of tourism sustainability and access the perceived challenges of the tourists in China. This conceptual model will be used to deduce the challenges faced by the government in China and recommendation will be made to improve the current ecotourism in China. (Harris,Williams,Griffin, 2012)

Research ObjectivesOn the basis of the above research problem the thesis will aim to meet the following research objectives:

a) Critically evaluate the principle sustainability principles of Ecotourism.

b) To identify the barriers of implementing ecotourism in China.

b) Summarise the best practices from other nations which can be helpful in improving the current practices in China.

(Cooper, 2005)

Literature ReviewSustainable tourism means the usage of sustainable principles to meet the tourism goals and it can be defined as, “the meeting the exact needs of the host communities, tourists by managing the balance between economic, environmental, social and cultural interests to create opportunities for the future” (Toth, 2002; Bendell and Font, 2004) There are basically three different dimensions- Economic efficiency, Social Equity and Environmental conservation, which are illustrated by Swarbrooke (1999) as shown in figure 2. Hobson & Essex (2001) has observed four important features of sustainable tourism and they are:

a) Development of system to maintain the economic, cultural, social and environmental interest of the host nation.

b) Improvement in the local environment to regenerate itself.

c) Policies and procedures to minimize the impact of tourist activities to cause depletion and pollution in the host nation.

d) Enhancement of the tourism related services (accommodation, food, transport, interpreters, guides etc.) to enhance the experience of tourists.

Despite varying perception among scholars about ecotourism most of the researchers agree that the three pillars of ecotourism are, “nature based, sustainably managed and environmentally educated”. (Blamey, 2001)

Figure 2. Dimensions of Ecotourism (Swarbrooke, 1999)

According to Diamantis (2004), there has been considerable difference between the sustainable tourism and ecotourism as the former is a broader concept as it encompasses tourism industry as a whole while the latter is a part of it. So it requires proper planning and need of monitoring system to meet the corporate or country objectives.

Figure 3. Sustainable Tourism and Ecotourism (Diamantis, 2004)

Sustainable tourism includes urban and rural areas with need to develop an attitude of care at their home place and also in places of travelling interests while ecotourism is related with experiencing the natural environment and requires the participation of tourists to conserve the nature and participate in socio-economic welfare of the rural community. Although the negative impacts can’t be ignored but small-scale ecotourism is considered to avoid most of the negative effects only when carefully planned and developed in phases. (Cooper, 2005)

Stewart (2002), Cooper (2005) have evaluated that certification is an important tool to enhance the standards of ecotourism as in this process the 3rd party assessment is taken where there is a written confirmation/assurance that the available product, business processes, services are of desired levels and conform to the industry standards. Through this scheme the tourism industry can reduce the control of government through self-regulation and the tourists are able to get detailed information about the products/places/services before they decide to travel. This process is an interesting opportunity to development sustainable ecotourism but it has poor uptake in the tourism industry as it requires support from government related to recognition, funding and assessment.

The literature review will also discuss the historical stages of development theory to highlight the relationship between tourism and development, strategies for sustainable development, benefits of ecotourism and the operational problems.

Research MethodologyResearch is a systematic procedure where the researcher can adopt a qualitative or quantitative approach to meet the research objectives in a controlled and ethical manner with high validity and reliability. (Yin, 2010) It has also been recommended by Singh (2011) to use mix of both methods as it helps to reduce the attached bias of each approach and helps to make use of numbers and views of respondents for conclusion and recommendation. So this thesis will use both approaches and will be conducted in 7-8 weeks (Appendix A) in the following manner.

a) Qualitative Approach: In this approach the ideas, pattern are analysed and data from interviews will be interpreted. This method helps to gain primary (fresh data) data for the research and helps in developing more insight about the research problems like ecotourism challenges and barriers in implementing in China. (Yin, 2010)

b) Quantitative Approach: In this approach the researcher uses the numbers from primary or secondary data to analyse and interpret to develop insight and make deductions. But the results are objective in nature as opposed to subjective in qualitative approach. (Yin, 2010)

Justification of MethodsThis research will use primary data through interviews from tour operators of China and secondary data from industry reports, statistical data from government division and other sources. (Yin, 2010) In this research we will use questionnaire and interview method because:

i) Questionnaire Method: With the help of this method data can be collected even from remote location without influencing the respondents answer. The collected data can be quantified and can be presented using graphs, charts and the relationships between variables can be verified using Chi-Square test. The questions will be close ended based on 5 point likert scale which will help in reducing the bias attached with answer of respondents. (Saunders, 2012)

ii) Interview Method: This method will help to generate primary data through open ended questions as it will help in getting the actual perception of the respondents which is not possible with close ended questions like questionnaire. (Singh, 2011)

Data Collection

Questionnaire will be distributed to over 125 residents (convenient sampling method) from Tengtou in China after the ethical consent form has been received from the respondents. The researcher will use the manager of one hostel called Zhanshen Hostel (based in Tengtou) to distribute the questionnaire. No critical information about the respondents will be stored and no discrimination will be done on the basis of gender, religion or age so no attached risk in this thesis. All the objectives of the research will be shared with the respondents and won’t be shared with third party (data protection). Telephonic interview will be done with at least 5 tour operators using random sampling method and semi-structured interview. (Yin, 2010)

Data AnalysisThis thesis will use Excel software to verify the hypothesis using Chi Square test and Pearson correlation between variables and the answers will be presented using graphs and charts. (Yin, 2010).

ReferencesBendell, J. & Font, X. (2004). Which Tourism Rules? Green Standards and GATS. Annals of Tourism Research, Vol. 31, No. 1, pp. 139–156.

Blamey, R. K. (2001). Principles of Ecotourism. In D. B. Weaver (Ed.), The Encyclopedia of Ecotourism (pp. 5-22). Oxon and Cambridge: CABI.

Buckley,R.,2009,Ecotourism: Principles and Practices, CABI publication

Buckley, R. (2011). “Tourism and Environment”. Annual Review of Environment and Resources 36: 397–416.

Cooper,C., 2005,Tourism, Pearson Education Canada Publication

Diamantis, D., 2004,Ecotourism Management: An Overview. In D. Diamantis (Ed.), Ecotourism – Management and Assessment (pp. 3-26). London: Thomson.

Harris,Williams,Griffin, 2012,Sustainable Tourism, Routledge publication

Hirschberg,P., 2012,China’s Urban Population Exceeds Countryside for First Time [Available at] HYPERLINK “http://www.bloomberg.com/news/2012-01-17/china-urban-population-exceeds-rural.html”http://www.bloomberg.com/news/2012-01-17/china-urban-population-exceeds-rural.html [Accessed on 18 Feb 2013]

Hobson, K. & Essex, S., 2001,Sustainable Tourism: a View from Accommodation Businesses. The Service Industries Journal, Vol. 21, No. 4, pp. 133-146.

Honey, Martha, 2008,Ecotourism and Sustainable Development: Who Owns Paradise? (Second ed.). Washington, DC: Island Press.

Jigang,B. 2012,Sustainable Tourism Observatories and Cases in China [Available at] asiapacific.unwto.org/sites/all/files/pdf/prof.bao_pptfinal.pdf [Accessed on 18 Feb 2013]

Saunders, 2012, Research Methods for Business Students, Prentice Hall Publication

Singh,Y.K. (2011), Research Methodology, APH Publishing

Swarbrooke, J. (1999). Sustainable Tourism Management. Oxon and New York: CABI.

Toth, R., 2002,Exploring the Concepts Underlying Certification. In M. Honey (Ed.), Ecotourism & Certification – Setting Standards in Practice (pp. 73-101). Washington-Covelo-London: Island Press

Yin, R.K., 2010, Case study research – Design and methods. 4th Edition. London: SAGE Publication

Yuan, J., L. Dai, and Q. Wang, 2008,State-led ecotourism development and nature conservation: a case study of the Changbai Mountain Biosphere Reserve, China. Ecology and Society 13(2): 55. [Available at] HYPERLINK “http://www.ecologyandsociety.org/vol13/iss2/art55/”http://www.ecologyandsociety.org/vol13/iss2/art55/ [Accessed on 15 Feb 2013]

Appendix A Time Frame

to estimate the profitability of companies

Financial Analysis paper

Name

Affiliation

Year 2014 2013 2012

Current ratio

82 72 80

Fixed Assets Turnover ratio

6.19 6.60 6.32

Profit Margin on Sales

2 2 1

Price-earnings ratio 22.05 21.55 20.10

Current ratio

In order to estimate the profitability of companies, several measures have been worked out which can lead investors to right decisions. Liquidity analysis ratios include current ratio, quick ratio and net working capital ratio and they reflect the current or short-term situation within company finances. Current ratio when translating the current ratio of Drake & Scull International, I can see that Kroger had $2 in current assets for each Dollar it owed in current liabilities. The current assets enhanced in 2014 to 82% that of 2013 is 72% and that of 2012 is 80%. 1.276. Along these lines, The Kroger would be advised to cash related position on 2013 than 2012 (Vogel, 2010).

Profit Margin on Sales

As indicated on the ratios figured over the net profit margin demonstrates how quite a bit of every deal USD appears as net salary after all costs are paid. For year 2012 the net revenue is 1 that implies that the organization created 1 fils for each one USD of offers after all costs were represented. For year 2013 the net revenue is 2 that implies that 2 fils of each USD and that of 2014 is 2 is benefit so the organization make a decent net overall revenue in 2013 than 2012.

Fixed Assets Turnover ratio

To think about money related execution of both organizations and accordingly reach determinations which of them builds the shareholders’ profits that ought to be the principle objective for them two, we might survey the accompanying monetary productivity proportions. The primary proportion is the receivable turnover which equivalents to yearly credit deals isolated by normal records receivables and in this manner mirrors the organization capacity to utilize credits as a part of advancing their deals furthermore the organization capacity to gather obligations. The receivable turnovers proportion for 2013 is 6.60 while it is 6.32 for 2012 and that of 2014 is 6.19. High receivable turnover degree suggests a tight organization credit approach and therefore less credit frameworks offered, prevalence of money operation by organization or great effective obligation administration arrangement and few terrible obligations, transient obligations or positive credit conditions which permit clients to pay out their obligations in shorter periods. In opposite, low receivable turnovers degree is suggestive of poor credit accumulation strategy, consequently the measure of merchandise sold in credit to the clients surpasses a few times the normal receivable trust from them (Gertler & Kiyotaki, 2010). Normally corporate money related articulations report just on the aggregate sums of offers not recognizing money and credit deals. This can misdirect not capable in fund customers and little financial specialists as the aggregate deals volume must be contrasted and measure of merchandise sold in trade and in for spendable dough credit and much all the more vitally the recuperation of these credits from the customers. Not utilizing acknowledge instruments as a part of offers advancement is not most proficient utilization of corporate open doors

P/E Analysis

In general, a high P/E suggests that investors are expecting higher earnings growth in the future compared to companies with a lower P/E.

Summary

It is evident that the company is expecting better productivity in 2015 as compared to other years. However, based on the results. It is clear that its ability to pay debts or liabilities is low. The company has great potentials for growth as it assets are diverse.

Part 2

Annuity, Ordinary annuity and annuity due

Annuity

A financial product sold by monetary organizations that is intended to acknowledge and develop reserves from an individual and afterward, upon annuitization, pay out a surge of installments to the single person at a later point in time. Annuities are principally utilized as a method for securing a consistent income for a single person amid their retirement years.

Ordinary annuity

A progression of equivalent installments made toward the end of every period over a settled measure of time. While the installments in an annuity can be made as regularly as consistently, by and by, customary annuity installments are made month to month, quarterly, semi-yearly or every year. The inverse of a customary annuity is an annuity due, where installments are made toward the start of every period.

Annuity due

An annuity whose installment is to be made quickly, as opposed to toward the end of the period. An annuity due obliges installments to be made toward the start of the period. Case in point, in numerous lease game plans, the first installment is expected instantly and every progressive installment must be made toward the start of the month.

Nominal rate and Effective Annual Rate

Nominal Rate

To abstain from acquiring force disintegration through expansion, financial specialists consider the genuine investment rate, instead of the ostensible rate. One approach to gauge the genuine rate of return in the U.S. is to watch the premium rates on Treasury Inflation-Protected Securities (TIPS). The contrast between the yield on a Treasury security and the yield on TIPS of the same development gives an evaluation of expansion desires in the economy.

Case in point, if the ostensible premium rate offered on a three-year store is 4% and the swelling rate over this period is 3%, the speculator’s genuine rate of return would be 1%. While the genuine rate is low, in any event it will safeguard the speculator’s obtaining force

Effective Annual Rate

The effective interest rate, effective annual interest rate, annual equivalent rate (AER) or is the premium rate on an advance or money related item restated from the ostensible premium rate as a premium rate with yearly self-multiplying dividends payable needing to take care of overdue business. Yearly rate yield or viable yearly yield is the similar to idea utilized for reserve funds or speculation items, for example, a declaration of store. Since any advance is a venture item for the moneylender, the terms may be utilized to apply to the same exchange, contingent upon the perspective (Johnson et al,. 2005).

Capital gains yield, Dividend yield and expected total return

Capital gains yield

Alludes to the benefits or misfortunes a speculator procures on a monetary instrument that acknowledges or deteriorates in cost amid the time the financial specialist has it. As it were, CGY shows the rate of progress of the cost of the budgetary instrument. Numerous financial specialists decide to figure the CGY of a venture apparatus in light of the fact that the recipe typically gives a decent evidence of how much the cost of the device vacillates; this helps the speculator figure out which devices are great speculation decisions. Capital additions yield is generally communicated as a rate.

Dividend yield

The profit yield or profit value proportion of an offer is the profit every offer, isolated by the value every offer. It is likewise an organization’s aggregate yearly profit installments separated by its market promotion, accepting the quantity of shares is steady. It is frequently communicated as a rate. Profit yield is utilized to compute the procuring on venture (shares) considering just the profits as aggregate profits proclaimed by the organization amid the year Expected total return

The sum one would envision accepting on a venture that has different known or expected rates of return. Case in point, if one put resources into a stock that had a half risk of creating a 10% benefit and a half risk of delivering a 5% misfortune, the normal return would be 2.5% (0.5 * 0.1 + 0.5 * -0.05). It is essential to note, in any case, that the normal profit is typically based for verifiable information and is not ensured.

Systematic and Unsystematic risk

Systematic Risk

The risk inherent inalienable to the whole market or a whole market fragment. Efficient danger, otherwise called “undiversifiable danger,” “unpredictability” or “business danger,” influences the general business sector, not simply a specific stock or industry. This kind of danger is both eccentric and difficult to totally maintain a strategic distance from. It can’t be relieved through expansion, just through supporting or by utilizing the right resource allotment procedure.

Unsystematic risk

Organization or industry-particular peril that is characteristic in every speculation. Unsystematic danger, otherwise called “nonsystematic danger,” “particular danger,” “diversifiable danger” or “lingering danger,” can be diminished through expansion. By owning stocks in diverse organizations and in distinctive businesses, and in addition by owning different sorts of securities, for example, Treasuries and metropolitan securities, speculators will be less influenced by an occasion.

CAPM and SML

CAPM

The capital asset pricing model (CAPM) is utilized to figure the obliged rate of return for any unsafe resource. Your obliged rate of return is the increment in quality you ought to hope to see taking into account the natural danger level of the benefit.

SML

A line that diagrams the efficient, or business, hazard versus return of the entire business sector at a certain time and demonstrates all unsafe attractive securities.

Beta

A measure of the instability, or methodical danger, of a security or a portfolio in correlation to the business in general. Beta is utilized as a part of the capital resource valuing model (CAPM), a model that ascertains the normal return of an advantage taking into account its beta and expected business sector returns.

References

Gertler, M., & Kiyotaki, N. (2010). Financial intermediation and credit policy in business cycle analysis. Handbook of monetary economics, 3(3), 547-599.

Revsine, L., Collins, D. W., Johnson, W. B., Collins, D. W., & Johnson, W. B. (2005). Financial reporting and analysis. New York, NY: Pearson/Prentice Hall.

Vogel, H. L. (2010). Entertainment industry economics: A guide for financial analysis. Cambridge University Press.

To establish the relationship between independent factors, and the user behaviors regarding information systems security meas

To establish the relationship between independent factors, and the user behaviors regarding information systems security measures under the Theory of Planned Behavior

Change Matrix for Revisions made as per comments

Comment Change

A1 Issue of Study Scope corrected

A2 Phrasing done correctly

A3 Exact problem specified

A4 Grammar corrected

A5 Word written correctly

A6 Redundant removed

A7 Grammar corrected

A8 Corrected according to importance

A9 Previous usage of theory rectified

A10 Grammar corrected

A11 Another possibility specified

A12 Anthropomorphism removed

A13 Anthropomorphism removed

A14 Grammar corrected

A15 Grammar corrected

A16 Anthropomorphism issue solved

A17 Grammar corrected

A18 Phrasing issue rectified

A19 Grammar corrected

A20 Grammar corrected

A21 Grammar corrected

A22 Grammar corrected

A23 More Research Questions added

A24 Research Sub-questions included

A25 Grammar corrected

A26 Grammar corrected

A27 Research design discussed in details

A28 Issue of IV and DV solved

A29 Abbreviations written in capital letters

A30 Grammar corrected

A31 Substantive response done

A32 Corrected as per comments A23 and A24

A33 Pilot testing described

A34 The use of IVs and DV in regression testing corrected

Section 1. Research Problem, Significance, Question(s), Title

Research Study State the research problem your study will investigate, including its background. See Instructions.

There have been significant developments in understanding IT security measures in systems (Kim, Tao, Shin, & Kim, 2010; Liang & Xue, 2010). Although there has been increased investment in technology to increase system security whose lack is the main problem being addressed, there have been striking failures that constitute much of the problem being addressed including security breach in using information systems withinin leading organizations like HP. The same issue exists in the mobile technology (Subashini & Kavitha, 2011; Weber, 2010). Concerns over the issue have increased over time, and more specifically during the digital age (Bélanger & Crossler, 2011). Nevertheless, increased investment in security has not contributed much in stopping security breaches as seen in previous studies and surveys (Subashini & Kavitha, 2011). Thus, the problem to be addressed is the ability to adopt information security systems measures as an aspect of end-user behavior when using information security system. Armerding (2012), on worst data breaches, indicates that incidence and severity of data breaches are related to the size of organization and industry, with large organizations and those operating in the financial sector most affected. Human factors pose the greatest threat to security issues. This is typically a major challenge to organizations since human conduct contribute to most system vulnerabilities as well as security breaches (Chiu, Lin, & Tang, 2005; Jones, McCarthy, & Halawi, 2010). This aspect raises major security concerns (Alice, 2010; D’Arcy, Hovav, & Galletta, 2009; PEW, 2013).

Bélanger and Crossler (2011) have conducted a study on security issues in the digital age. They indicated that information systems have a significant weakness. It is typically difficult to determine whether participants provide the desirable answers expected of them or not especially with self-reported data. A major problem could be in adhering to information security policies as studied by Bulgurcu, Cavusoglu, and Benbasat (2010). Further in developing the sampling procedures, Jones et al. (2010) intended to determine the study coverage. There are also no insights or empirical studies on employee adoption of information systems security measures based on specific industries, with studies assuming that adoption is similar across all sectors (Chuttur, 2009; Jones et al., 2010).

1.2 Purpose of the Research

State the purpose of the study. Typically, the purpose is to contribute to knowledge and solve the research problem. See Instructions. The purpose of this quantitative study will be to establish the relationship between independent factors, like employee perception, attitudes, and management support, and the user behaviors regarding information systems security measures under the Theory of Planned Behavior. The independent variables, which include employees’ perceptions, attitudes, and management support, determine the change in the dependent variable; in this case, behavior in using information security system measures (Trochim, 2006; Vogt, 2007). The factors considered in this case, would be evaluated according to the way they affects the user behavior when using information system. Factors like employees’ perceptions, attitudes, and management support have the potential of influencing employee adoption regarding the use of information system security measures for a specific industry. The industry of concern is the manufacturing industry, which could be found to have vast differences or no differences between organizations and employees when it comes to observing information security measures. There could also be differences among employees within a given company. The industry has reported high incidences of security breaches, due to unobserved security protocols (Rieback, Crispo, & Tanenbaum, 2007).This research uses a non-experimental study with the original TAM, as an outgrowth of the Theory of planned Behavior (TPB), which will be extended to be comparable to the one used in Jones et al. (2010).

This research aims at extending the original TAM model to be comparable to Jones et al (2010) in order to take into account the attitudes of the employees with regards to their peers, managers, and supervisors, or the job with respect to the same model according to Kozar, Larsen, and Lee (2003). This is because their attitudes may affect the intention of the employees to adopt and follow information systems security measures (Phelps, Nowak, & Ferrell, 2000). This would be done, through an empirical research, sing a theoretical framework with respect to the Theory of Planned Behavior, in which TAM is based. The Theory of Planned Behavior considers attitude and subjective norm as important constructs. In fact, the study by Jones et al. (2010) also showed that subjective norms highly influenced employees’ intention to adopt and use system security measures. The model by Jones et al. (2010) is applied by considering companies operating in the US in a specific industry, and by incorporating the variable of management support. This marks one of the gaps to be addressed. Further, by determining the influence generated by the attitudes of the employees with regards to their peers, managers, and supervisors, or the job, this research extends the use of Jones et al. (2010) extended TAM model which incorporates management support as the intervening variable on subjective norms according to Jones, McCarthy, Halawi, and Mujtaba (2010).

In this study, management support is incorporated as an independent variable alongside employees’ attitudes and perceptions, while factors such as age and management level are used as intervening variables. Therefore, the research provides new insight into ways of promoting employee acceptance of technology as well as assist in the development of appropriate security measures through the analysis of employee attitudes, management support and external controls on technology acceptance levels. An empirical study of the management support would validate the development of intervention measures relating to employee support.

1.3 Significance of the Study.

Describe the significance of your study’s investigation of the research problem. Include a statement of the study’s particular significance to the field of Organization and Management. See Instructions. This study is significant because it shows the usefulness of the study of the research problem to all stakeholders: system developers, policy makers, entrepreneurs, and managers, and information system users since it will offer additional insights with regards to promoting employee adoption and acceptance, as well as use of computer information system security measures. By using the findings of the study, managers can gain new insight into ways that promote employee acceptance and use of security systems policies, particularly for large corporations. The empirical study will also help in determining the major factors that influence employees’ adoption of information systems security measures.

Therefore, the research will contribute to new knowledge about the adoption information system and the respective security measures within a specific industry such as manufacturing, which may contribute to reducing system security measures adoption failures in organizations. Important information and insight is also provided, which security professionals and management can use in designing information security measures that promote usage by employees, and communicating them to the employees (Jones et al., 2010). Its significance to the academic field of study is that students, using future researcher, can gain an insight of the problem from a broader perspective since the study would bring together various aspects from previous studies and include some aspects that have never been tackled in such studies. Researchers would also gain a basis of arguing for the need to focus on information security measures even at an individual level (Chin, Felt, Sekar, & Wagner, 2012).

1.4 Research Question

Write out your research question. If there are sub-questions or more than one, number them accordingly. See Instructions. Using information system is a sensitive practice, but some employees within some organizations may not observe the necessary security measures adequately. The failure in this aspect could be associated with a number of factors which are the variables to be used for the research. The statistical model used to test the omnibus/overall hypothesis is TAM, which is a modification from Jones et al. (2013) using a probability sample obtained using the random sampling method.

These variables then leads to the following research questions:

Main RQ: To what extent do employees’ perceptions, attitudes, and management support predict end-user behavior in adopting information security systems based on the theory of planned behavior?

Sub-Questions

RQ1: To what extent do employees’ perceptions predict end-user behavior in adopting information security systems, based on the theory of planned behavior?

RQ2: To what extent do employees’ attitudes predict end-user behavior in adopting information security systems, based on the theory of planned behavior?

RQ3: To what extent does management support predict end-user behavior in adopting information security systems, based on the theory of planned behavior?

1.5 HypothesesFor each quantitative question and sub-question (sub-Q), list hypotheses for their investigation. Give nulls and alternates for each sub-Q. See Instructions. Ho1: There is no significant relationship between employees’ perceptions in predicting end-user behavior when using Information Systems

Ha1: There is a significant relationship between employees’ perceptions in predicting end-user behavior when using Information Systems

Ho2: There is no significant relationship between employee attitudes in predicting end-user behavior when using Information Systems

Ha2: There is a significant relationship between employees’ attitudes in predicting end-user behavior when using Information Systems

Ho3: There is no significant relationship between management support influence to employees’ behavioral intentions when using Information Systems

Ha3: There is a significant relationship between management support influences to employees’ behavioral intentions when using Information Systems.

1.6 Method overview Briefly describe the methodologies and methods (data collection, statistical models, and analysis) that will be used to conduct the study. The proposed method is a quantitative study that is non-experimental. As a quantitative study, quantifiable data is used to derive a solution to the research problem. A meaningful research design would be considered for the quantitative study. The design is based on targeting major corporations in the manufacturing industry approach on a sample of 2*102 respondents from 10 leading major corporations in the manufacturing sector, specifically those operating in the US. This implies that from each corporation, 20 respondents would be selected from 1o corporations through random sampling and the final list maintained for the research. Permission would be obtained from the responsible management. This sample size would be large enough to minimize biasness of the research results. Only the corporations having information systems security measures in place would be considered. Online survey tool, Survey Monkey, will be used and the link for the survey will be distributed via e-mail to potential respondents. Questionnaires will be used for the survey. Each of the respondents would be chosen randomly and completely by chance. All the respondents would have an equal probability of being selected from any of the 10 corporations during the sampling process. The technique would be a surveying technique that is hardly biased (Yates, David, Daren, 2008).

Partial Least Squares (PLS), which is an element-based structural equation modeling method, will be used to analyze the data collected. PLS graph, build 1126, version 3 will be used for data analysis. The guidelines specified in Chin et al. (2003) shall be followed while analyzing the data; additionally, other exemplars in Information Systems research will also be followed. Modeling of the constructs will be done using reflective indicators. Employee attitude will be coded as per the score of each participant, while perception will be coded as an ordinal variable; this will be consistent with Davis (2000).

Ordinal data would be tested for normality in order to be used for parametric testing with respect to the numerical scores placed on the variable (Sheskin, 2007). Prior to indicating the terms of interaction, the variables will be mean-centered at the indicator level. This will help limit certain multicollinearity. To test the various PLS models, bootstrapping method will be employed.

1.7 Dissertation Title

Do not write the title until Items 1.1-1.6 are complete. See Instructions. Employee adoption of information security measures in the manufacturing sector using extended TAM under a quantitative study.

DISSERTATION RESEARCHERS: STOP!!!

If this RP is for your dissertation (after comps), forward completed Section 1 plus your references gathered so far (section 8) to your Mentor for review and for Specialization Chair’s Approval. (Work on your full Literature Review while waiting for topic approval)

Section 2. Overall Methodology and Approach

2.1 Research Design

Describe your research design in words. See Instructions. The study would be based on a quantitative research methodology which focuses on gathering data, usually in numerical form. The data would then be generalized across large groups of people, especially employees within similar organizations. A non-experimental approach shall be used on a sample of 200 respondents from 10 leading major corporations in the manufacturing sector, specifically those operating in the US. From each corporation, 20 respondents shall be considered for the research. Each of the companies must have information systems security measures in place. Since the research is quantitative in nature, quantitative methods of data collection and analysis shall be used for the survey. An online survey tool and a Survey Monkey will be used since the data will be collected through online means. To make the online survey possible online questionnaires will be distributed via e-mail to potential respondents, which would be done through the Survey Monkey audience service. Typically, the potential respondents will be selected using a random sampling technique. Each of the 10 organizations will offer an opportunity for testing the research model in real world settings. The potential respondents will be derived from the ten different organizations offering different functional areas. In all the ten organizations, data will be collected over a period of five months with four measurement points. The data shall then be compiled for analysis. The analysis will also be quantitative.

2.2 Approach

Quantitative approaches include experimental, quasi-experimental, or non-experimental. Please state the approach, then how it is consistent with your research problem/question. See Instructions for details. The approach that shall be utilized for this study, as has already been mentioned, shall be a non-experimental approach, which either describes something that has happened or evaluates the relationships between variables. This approach is selected since this study has a number of independent variables that are to be studied against a dependent variable, which cannot be manipulated; the research question is what drives this study. Non-experimental research approach is used in determining the nature of a given situation as it is at the time of a given study. With this kind of approach, no control or administration of treatment is required as is the case with experimental approach. Despite the fact that non-experimental is not usually meant to test hypothesis, a casual comparative approach, which is directed towards hypothesis testing is used. This hypothesis testing is used because it can provide a good description of the relationship between perceptions, attitudes, and management support influence when using Information Systems.

2.3 Methodological Model

Describe the statistical model. If using a particular quantitative model (e.g., structural equation modeling or a specific kind of regression analysis), describe it here. The model must align with the research question. If not, type N/A. See Instructions for details. PLS, Partial Least Squares, which is an element-based structural equation modeling method, will be used to analyze the data collected. PLS graph, build 1126, version 3 will be used for data analysis. According to Chin, Marcolin, and Newsted (2003), PLS have very minimal restrictions with regards to the sample size used as well as the distributional assumptions. The guidelines specified in Chin et al. (2003) shall be followed while analyzing the data; additionally, other exemplars in Information Systems research will also be followed such as Structured Equation Modeling (SEM). Modeling of the constructs will be done using reflective indicators. Employee attitude will be coded as per the score of each participant, while perception will be coded as an ordinal variable; this will be consistent with Davis (2000). Prior to indicating the terms of interaction, the variables will be mean-centered at the indicator level. This will help limit certain multicollinearity. To test the various PLS models, bootstrapping method will be employed.

2.4 Rationale

Discuss how your design is suited to answering your research question(s). See Instructions for details. The 10 organizations will offer an opportunity for testing the research model in real world settings. This design will enable hypothesis testing, specifically allow for the description of the relationship between perceptions, attitudes, and management support influence when using Information Systems. The use of a large sample would provide results that reflect close to the actual population being studied due to lack of biasness.

Section 3. Framework, Constructs, Variables, Operational Definitions

3.1 Theoretical Framework

Describe the business theory base that guides or focuses this study or defines the constructs it will investigate. See Instructions. Previous studies using TAM such as Jones et al. (2010) have focused more on three wide areas including some of them replicating TAM and focusing on psychometric features of TAM constructs; other have offered theoretical underpinning of great importance for TAM constructs, specifically with regards to perceived ease of use and perceived usefulness; others have sought to extended the TAM model by adding some more constructs as determinants of the original TAM constructs. The behavioral theory also explains two of the three constructs, attitude and perception in terms of cognitive dissonance theory and the self-perception theory respectively.

These theories explain how these variables relate to one another and the way they can influence the adoption of information security measures by employees. Motivation theory of management could be used for management support construct to strengthen the moderation aspect of the variable as discussed further in the paper. Further, studies into employee adoption of information system security measures that have been carried out using the extended TAM such as that of Jones et al. (2010), have focused on self-reported data, which are usually considered to cause a lot of concern since it is difficult to accurately rate their behavior. In fact, with self-reported data, it is difficult to determine whether participants’ gives expected desirable answers or the most truthful answers.

There are also no insights or empirical studies on employee adoption based on specific industries, with studies assuming that adoption is similar across all sectors (Chuttur, 2009; Jones et al., 2010). With this in mind, this research develops a theoretical framework which incorporates and somewhat extends TAM with the aim of assessing the factors that influence employee adoption and use of information system security measures for a specific industry, the manufacturing industry, which has reported high incidences of security breaches.

The TAM model proposed is comparable to that used in Jones et al. (2010) but takes into account additional constructs including the attitudes of the employees with regards to their peers, managers, and supervisors, or the job. This is because employees’ attitudes may affect the intention of the employees to adopt and follow information systems security measures. Thus, this theoretical framework is based on the Theory of Planned behavior. This is because the Theory of Planned behavior considers attitude and subjective norm as important constructs. In fact, the study by Jones et al. (2010) also showed that subjective norm had the largest effect on employees’ intention to adopt and use system security measures. Further, by determining the effect of the attitudes of the employees with regards to their peers, managers, and supervisors, or the job, this research extends the use of Jones et al (2010) extended TAM model which incorporates management support as the intervening variable on subjective norms. However, in this study management support is incorporated as the intervening variable on employees’ attitudes to use.

Therefore, the research provides new insight into ways of promoting employee acceptance of technology as well as assist in the development of appropriate security measures through the analysis of employee attitudes, management support and external controls on technology acceptance levels. An empirical study into the management support would validate the development of intervention measures relating to employee support.

3.2 Unit(s) of Analysis

Describe the unit(s) of analysis for this study. Typically, the unit of analysis will be individual or group. Multiple research questions may require different units of analysis. See Instructions. This study focuses on analyzing employee behavior and adoption of information security systems. In order to analyze employee adoption of security systems, data regarding employee perceptions, attitudes, and management support will be collected, and will be used to determine whether these variables influence employee adoption of security systems. Therefore, in this study, the unit of analysis is an individual from the sample versus a behavior portrayed by the individual, particularly, employee attitudes and perception with regards to adoption of information security systems. In this regard, to determine and accept whether the hypothesis is probably true or false, certain steps are taken. The research questions and the related hypothesess being addressed are:

Main RQ: To what extent do employees’ perceptions, attitudes, and management support predict end-user behavior in adopting information security systems based on the theory of planned behavior?

Sub-Question and Respective Hypotheses

RQ1: To what extent do employees’ perceptions predict end-user behavior in adopting information security systems, based on the theory of planned behavior?

Ho1: There is no significant relationship between employees’ perceptions in predicting end-user behavior when using Information Systems

Ha1: There is a significant relationship between employees’ perceptions in predicting end-user behavior when using Information Systems

RQ2: To what extent do employees’ attitudes predict end-user behavior in adopting information security systems, based on the theory of planned behavior?

Ho2: There is no significant relationship between employee attitudes in predicting end-user behavior when using Information Systems

Ha2: There is a significant relationship between employees’ attitudes in predicting end-user behavior when using Information Systems

RQ3: To what extent does management support predict end-user behavior in adopting information security systems, based on the theory of planned behavior?

Ho3: There is no significant relationship between management support influence to employees’ behavioral intentions when using Information Systems

Ha3: There is a significant relationship between management support influences to employees’ behavioral intentions when using Information Systems.

3.3 Constructs

Define each construct required by the research question and title. Provide citations showing your theoretical framework. Number each construct. See Instructions. Various constructs are required by the research questions and title in this study. A construct refers to a conceptual term that describes a scenario that cannot be directly observed; it is basically an abstract idea or image meant for a given study. The constructs are defined as follows:

Employees’ Attitudes

The study evaluates employee behavior particularly, employee attitudes and perception with regards to adoption of information security systems. Attitude and perception are mainly attributed to lack of experience among people. Attitudes and perception can be explained through the Cognitive Dissonance Theory, which allows the action of dissonance between the factors causing levels of uncomfortable feeling and a determination wavering thereby reflecting the need to change due to this. This aspect could ultimately generate some variation in the way employees respond to the use of information systems (Jeffrey, 2005).

Employees’ Perception

The study also evaluates employees’ perceptions towards the use of information security measures. Perception is essentially the way an individual perceives something in terms of the benefits or issues associated with it (Ion & Langheinrich et al., 2010). The theory of Self-perception can explain this construct and accounts for attitude formation among people. According to the theory, individuals develop their attitudes due to lack of experience (Laird, 2007). The lack of experience determines the way people would perceive something such as using information security measures in the case of this study.

Management Support

The research investigates employees’ behavioral intention to adopt and use information security measures and its relationship to management support, employee attitudes and employee perception. Management happens within an organizational setting that is well structured with prescribed roles, and it is set to achieve aims and objectives by influencing employees’ efforts. Management support can be achieved through the Theory of Motivation, in which the management provides the best motivational support possible to its employees (Kautish & Thapliyal, 2012).

The IVs (Independent Variables) in this study are employee’s perception and employee’s attitudes while the dependent variable is the employees’ behavioral intention to adopt and use information security systems. Management support, on the other hand, acts as an MV, Moderating Variable. There are other MV, Moderating that are related to the research question and the hypothesis; they include: (i) age, (ii) level of management or work, and (iii) years of employment. Age is a demographic variable used as an MV. It has some impact on internet usage, besides haltering the attitude and perception of people towards the use of information security measures (Teo, 2001; Zukowski & Brown, 2007).

3.4 Variables (Definitions of Constructs as variables)

Define each construct (in Item 3.3) as a variable. Provide citations to theoretical framework or previous research supporting the selection of variable type. See Instructions. Employee’s Perception: Perception refers to people’s sensory experience of their environment. It involves both recognition and actions in response to environmental stimuli. It contributes to the way one perceives something in real life (Goldstein & Cialdini, 2009). In this study, employee perceptions are considered as being reality; it is what the employees perceive or consider about security measures regardless of the management’s intent about security measures (Sandhu & Samarati, 1994).

Employee’s Attitude: Attitude can be defined as being an investigative and evaluative judgment either unfavorable or favorable that is directed or is possessed by an individual towards an object, attitude object according to Laird (2007) An object or attitude object can either be concrete, such as the internet, or abstract, such as information technology security measures. The attitude could be depicted by an individual or a group (Sarker, Valacich, & Sarker, 2005). Usually, employees are typically somewhat biased towards those objects, in which their examination is positive; they are also against those attitude objects in which their evaluation is negative.

Management Support: Management support is a moderating variable. Management support entails the use of prescribed roles to assist employees in their activities by enhancing their efforts. The support can be offered through employee motivation, through guidance, leading by example, as well as through encouragement (Kautish & Thapliyal, 2012). The theory of motivation can be useful in this case such as in security protection motivation (Herath & Rao, 2009). In their study, Kautish and Thapliyal (2012) investigated decision support system and established that it is highly related to knowledge management, which is an aspect of management support.

3.5 Operational Definitions

Present an operational definitio