فهم دوافع نية تبني التحقق من الشهادات القائم على تقنية Blockchain: تحليل PLS-SEM
DOI:
https://doi.org/10.54153/sjpas.2026.v8i1.1428الكلمات المفتاحية:
BBCV adoption, technology readiness index, Diffusion of Innovation, Behavioural Resistance Theoryالملخص
لا تزال مؤسسات التعليم العالي في الدول النامية تواجه صعوبات في التحقق من صحة الشهادات بسبب قصور أنظمة التحقق المركزية. ورغم أن التحقق من الشهادات باستخدام تقنية البلوكشين يوفر بديلاً آمناً وشفافاً، إلا أن نية تبني هذه التقنية لا تزال منخفضة لعدم فهم العوامل السلوكية المؤثرة فيها بشكل كافٍ. تهدف هذه الدراسة إلى تطوير واختبار نموذج متكامل يجمع بين أبعاد مؤشر الجاهزية التكنولوجية، وعوامل انتشار الابتكار، والتعقيد المُدرك، والتوافق، ومقاومة التغيير، وذلك لتفسير نية تبني التحقق من الشهادات باستخدام تقنية البلوكشين. جُمعت بيانات استبيان من 586 مسؤولاً عن سجلات الطلاب في 64 جامعة عراقية، وحُللت باستخدام نمذجة المعادلات الهيكلية الجزئية (PLS-SEM). تشير النتائج إلى أن الابتكار والتفاؤل وعدم الارتياح وانعدام الأمان والتوافق المُدرك تؤثر بشكل كبير على نية التبني، بينما لا يُعد التعقيد المُدرك عاملاً مؤثراً. وتُعد مقاومة التغيير عاملاً مُعدِّلاً بشكل انتقائي لتأثير الابتكار وعدم الارتياح دون غيرهما من العوامل المؤثرة. يُظهر النموذج قدرة تفسيرية عالية، مؤكداً على الدور المهيمن للجاهزية النفسية ومقاومة التغيير على حساب الاعتبارات التقنية البحتة. تُوسّع هذه الدراسة نطاق الأدبيات المتعلقة بتبني تقنية البلوكشين من خلال دمج وجهات نظر نظرية متعددة في سياق تعليمي، وتقدم إرشادات عملية لبناء القدرات والتدريب وإدارة التغيير لدعم تطبيق تقنية البلوكشين في تطوير أنظمة التعليم العالي
المراجع
[1] N. Bakhmat, “On the role of digitalization and globalization for the development of mobile video games in the education of the future: trends, models, cases,” Futur. Educ., vol. 2, pp. 63–74, 2022, doi: 10.57125/fed.2022.25.12.07.
[2] M. Al-Bassam and S. Meiklejohn, “Contour: A Practical System for Binary Transparency,” 2017.
[3] M. Caramihai and I. Severin, “A Blockchain-Based Solution for Diploma Management in Universities,” Sustainability, vol. 15, no. 20, p. 15169, 2023, doi: 10.3390/su152015169.
[4] A. Kamiˇ, “A Preliminary Review of Blockchain-based Solutions in Higher Education,” no. 1, 2000.
[5] M. Li, L. Zhu, Z. Zhang, C. Lal, M. Conti, and M. Alazab, “Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain,” IEEE Transactions on Network and Service Management, vol. 18, no. 4. pp. 4434–4449, 2021. doi: 10.1109/TNSM.2021.3098439.
[6] O. S. Saleh, O. Ghazali, and N. B. Idris, “A Privacy-Centered Protocol for Enhancing Security and Authentication of Academic Certificates,” Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 2, pp. 442–453, 2023.
[7] A. Alhasan, M. H. Hussein, L. Audah, A. Al-Sharaa, I. Ibrahim, and M. A. Mahmoud, “A case study to examine undergraduate students’ intention to use internet of things (IoT) services in the smart classroom,” Educ. Inf. Technol., no. January, 2023, doi: 10.1007/s10639-022-11537-z.
[8] A. H. Alghushami, N. H. Zakaria, and Z. M. Aji, “Factors influencing cloud computing adoption in higher education institutions of least developed countries: Evidence from Republic of Yemen,” Appl. Sci., vol. 10, no. 22, pp. 1–27, 2020, doi: 10.3390/app10228098.
[9] T. Casey and E. Wilson-Evered, “Predicting uptake of technology innovations in online family dispute resolution services: An application and extension of the UTAUT,” Comput. Human Behav., vol. 28, no. 6, pp. 2034–2045, 2012, doi: 10.1016/j.chb.2012.05.022.
[10] A. Al-Adaileh, M. Al-Kfairy, M. Khasawneh, and N. El Moutawakil El Alami, “Exploring Sentiment and Topic Patterns in Metaverse Marketplace-Related Tweets,” Proc. - 2023 10th Int. Conf. Soc. Networks Anal. Manag. Secur. SNAMS 2023, pp. 1–7, 2023, doi: 10.1109/SNAMS60348.2023.10375460.
[11] A. Alharbi and O. Sohaib, “Technology Readiness and Cryptocurrency Adoption: PLS-SEM and Deep Learning Neural Network Analysis,” IEEE Access, vol. 9, pp. 21388–21394, 2021, doi: 10.1109/ACCESS.2021.3055785.
[12] H. J. Park and Y. Zhang, “Technology readiness and technology paradox of unmanned convenience store users,” J. Retail. Consum. Serv., vol. 65, no. February 2021, p. 102523, 2022, doi: 10.1016/j.jretconser.2021.102523.
[13] A. Barua and R. Mukherjee, “The incumbency protection power of network effects: Hype or reality?,” Icis, pp. 1–17, 2011.
[14] Z. Selamat, N. Jaffar, and H. A. Kadir, “Information Technology Adoption in Malaysian SMEs,” Int. J. Econ. Perspect. Int. J. Econ. Perspect. ISSN, vol. 7, no. 4, pp. 81–93, 2013.
[15] M. Mustafa, M. Alshare, D. Bhargava, R. Neware, B. Singh, and P. Ngulube, “Perceived Security Risk Based on Moderating Factors for Blockchain Technology Applications in Cloud Storage to Achieve Secure Healthcare Systems,” Comput. Math. Methods Med., vol. 2022, 2022, doi: 10.1155/2022/6112815.
[16] T. Zarraonandia, P. Díaz, I. Aedo, and A. Bellucci, “Engaging educators in the ideation of scenarios for cross-reality game-based learning experiences,” Multimed. Tools Appl., vol. 83, no. 15, pp. 46507–46529, 2024, doi: 10.1007/s11042-022-13632-2.
[17] X. Li, S. Moreschini, Z. Zhang, and D. Taibi, “Exploring factors and metrics to select open source software components for integration: An empirical study,” J. Syst. Softw., vol. 188, p. 111255, 2022, doi: 10.1016/j.jss.2022.111255.
[18] M. G. Nejad, Research on financial innovations: an interdisciplinary review. 2022. doi: 10.1108/IJBM-07-2021-0305.
[19] Y. Wang, Z. Song, and Y. Lu, “How do the Chinese Gaokao tests narrate the history of other countries? A textual analysis of ‘the other’ in official representations of history,” Theory Res. Soc. Educ., vol. 52, no. 2, pp. 245–272, 2024, doi: 10.1080/00933104.2023.2224248.
[20] Cailing Feng china, A. Brian Cooper, and Cherrie Jiuhua Zhu, “How and When job Security Reduces Resistance to Change in the Context of Organizational Change,” J. Appl. Behav. Sci., vol. 5, no. 2, pp. 1–16, 2021.
[21] H. A. Altememy et al., “Factors Effecting in the Adoption of Block Chain in Supply Chain Management: A Quantitative Study on Iraq Companies,” Int. J. Oper. Quant. Manag., vol. 29, no. 3, pp. 21–43, 2023, doi: 10.46970/2023.29.3.02.
[22] B. O. Ahubele and O. E. Ndukwe, “A Verified Ethereum-Based Smart Contract Model to Detect Counterfeit Educational Certificate,” J. Adv. Math. Comput. Sci., vol. 9, no. 2, pp. 51–60, 2021, doi: 10.22624/AIMS/MATHS/V9N2P4.
[23] A. N. Turi, Technologies for Modern Digital Entrepreneurship: Understanding Emerging Tech at the Cutting-Edge of the Web 3.0 Economy. 2020. doi: 10.1007/978-1-4842-6005-0.
[24] W. Li, H. Guo, M. Nejad, and C. C. Shen, “Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach,” IEEE Access, vol. 8, pp. 181733–181743, 2020, doi: 10.1109/ACCESS.2020.3028189.
[25] O. D. Lee, “AI-Based Voice Assistant Systems : Evaluating from the Interaction and Trust Perspectives,” pp. 1–10, 2017.
[26] M. Ali, J. Nelson, R. Shea, and M. J. Freedman, “Blockstack: A global naming and storage system secured by blockchains,” Proc. 2016 USENIX Annu. Tech. Conf. USENIX ATC 2016, pp. 181–194, 2016.
[27] F. Huang, T. Teo, and R. Scherer, “Investigating the antecedents of university students’ perceived ease of using the Internet for learning,” Interact. Learn. Environ., vol. 30, no. 6, pp. 1060–1076, 2022, doi: 10.1080/10494820.2019.1710540.
[28] M. A. Lieta, O. Sehume, and T. Zuva, Software engineering application in informatics, vol. 232 LNNS. 2021. doi: 10.1007/978-3-030-90318-3_69.
[29] A. Almarzouqi, A. Aburayya, and S. A. Salloum, “Prediction of user’s intention to use metaverse system in medical education: A hybrid SEM-ML learning approach,” IEEE Access, vol. 10, pp. 43421–43434, 2022, doi: 10.1109/ACCESS.2022.3169285.
[30] A. A. Wahab, Huda H. Ibrahim, and Shehu M. SarkinTudu, “Comparative Performance of Machine Learning Algorithms for Predicting Future Committer in Blockchain Projects,” 3rd Int. Conf. Comput. Inf. Sci. Eng. 2023, vol. 2, no. 2, pp. 72–87, 2023.
[31] Y. Liang, X. Zhang, H. Wang, and M. Liu, “Users’ willingness to adopt metaverse drawing on flow theory: An empirical study using PLS-SEM and FsQCA,” Heliyon, vol. 10, no. 13, p. e33394, 2024, doi: 10.1016/j.heliyon.2024.e33394.
[32] J. V. Andersen and C. I. Bogusz, “Patterns of Self-Organising in the Bitcoin Online Community : Code Forking as Organising in Digital Infrastructure,” Icis, no. Nakamoto 2008, pp. 1–20, 2017.
[33] W. Ali, R. Kumar, X. Zhou, and J. Shao, “Responsible Recommendation Services with Blockchain Empowered Asynchronous Federated Learning,” ACM Trans. Intell. Syst. Technol., vol. 15, no. 4, 2024, doi: 10.1145/3633520.
[34] A. Mikroyannidis, “Blockchain Applications in Education : A Case Study in,” 2020.
[35] M. Naz et al., “A Secure Data Sharing Platform Using Blockchain and Interplanetary File System,” Sustain., vol. 11, no. 24, pp. 1–24, 2019, doi: 10.3390/su11247054.
[36] G. Srilatha and M. Narendra, “The Applications and Effect of Block Chain on E-Commerce Industry,” 2nd Int. Conf. Intell. Cyber Phys. Syst. Internet Things, ICoICI 2024 - Proc., no. ICoICI, pp. 55–58, 2024, doi: 10.1109/ICoICI62503.2024.10696069.
[37] S. Leewis, K. Smit, and J. van Meerten, “An explorative dive into decision rights and governance of blockchain: A literature review and empirical study,” Pacific Asia J. Assoc. Inf. Syst., vol. 13, no. 3, pp. 25–56, 2021, doi: 10.17705/1pais.13302.
[38] P. K. Singh, R. Singh, S. K. Nandi, K. Z. Ghafoor, D. B. Rawat, and S. Nandi, “An efficient blockchain-based approach for cooperative decision making in swarm robotics,” Internet Technol. Lett. 2020 Jan, vol. 3, no. 1, pp. 1–7, 2020, doi: 10.1002/itl2.140.
[39] S. Tahora, B. Saha, N. Sakib, H. Shahriar, and H. Haddad, “Blockchain Technology in Higher Education Ecosystem : Unraveling the Good , Bad , and Ugly”.
[40] R. J. Maestre, J. Bermejo Higuera, N. Gámez Gómez, J. R. Bermejo Higuera, J. A. Sicilia Montalvo, and L. Orcos Palma, “The application of blockchain algorithms to the management of education certificates,” Evol. Intell., vol. 3, no. 0123456789, pp. 1–20, 2022, doi: 10.1007/s12065-022-00812-0.
[41] “The Application of Blockchain in Higher Education,” vol. 246, no. Icpel, pp. 310–313, 2018.
[42] R. Awad, A. Aljaafreh, and A. Salameh, “Factors Affecting Students’ Continued Usage Intention of E-Learning During COVID-19 Pandemic: Extending Delone & Mclean IS Success Model,” Int. J. Emerg. Technol. Learn., vol. 17, no. 10, pp. 120–144, 2022, doi: 10.3991/ijet.v17i10.30545.
[43] C. M. Leong, K. L. Tan, C. H. Puah, and S. M. Chong, “Predicting mobile network operators users m-payment intention,” Eur. Bus. Rev., vol. 33, no. 1, 2021, doi: 10.1108/EBR-10-2019-0263.
[44] M. Williams and S. Biggemann, “Corporate Art Collections in Australia: The Influence of Aboriginal Art on Corporate Identity,” Int. J. Bus. Commun., vol. 60, no. 2, pp. 656–677, 2023, doi: 10.1177/2329488420958112.
[45] A. Y. Alsabawy, “Organizational Readiness for Change and its Role in Enhancing Personal Innovativeness within the Framework of E-Learning System : An Analytical Study at the University of Nineveh Abdelbaset Elias Ali,” vol. 2, no. 1, 2023.
[46] M. F. Ahmad Zaidi and H. . Belal, “A preliminary study to understand the SMEs’ readiness on IoT in Malaysia,” Int. J. Accounting, Financ. Bus., vol. 4, no. 19, pp. 01–12, 2019.
[47] J. Bohr and M. Bashir, “Who Uses Bitcoin?,” 2014 Twelfth Annu. Conf. Privacy, Secur. Trust, pp. 94–101, 2014.
[48] A. Raes, L. Detienne, I. Windey, F. Depaepe, and A. Raes, “A systematic literature review on synchronous hybrid learning : gaps identified,” Learn. Environ. Res., vol. 23, pp. 269–290, 2020.
[49] A. Haddad, A. Ameen, O. Isaac, I. Alrajawy, A. Al-Shbami, and D. Midhun Chakkaravarthy, “The Impact of Technology Readiness on the Big Data Adoption Among UAE Organisations,” Adv. Intell. Syst. Comput., vol. 1016, no. September, pp. 249–264, 2020, doi: 10.1007/978-981-13-9364-8_19.
[50] S. Neethirajan, “The role of sensors, big data and machine learning in modern animal farming,” Sens. Bio-Sensing Res., vol. 29, no. July, p. 100367, 2020, doi: 10.1016/j.sbsr.2020.100367.
[51] J. Paul, I. Alhassan, N. Binsaif, and P. Singh, “Digital entrepreneurship research: A systematic review,” J. Bus. Res., vol. 156, no. November 2022, p. 113507, 2023, doi: 10.1016/j.jbusres.2022.113507.
[52] R. V. Turcan and B. Deák, “Fintech – stick or carrot – in innovating and transforming a financial ecosystem: toward a typology of comfort zoning,” Foresight, vol. 24, no. 1, pp. 126–139, 2021, doi: 10.1108/FS-02-2021-0052.
[53] M. Al-Emran, I. Arpaci, and S. A. Salloum, “An empirical examination of continuous intention to use m-learning: An integrated model,” Educ. Inf. Technol., vol. 25, no. 4, pp. 2899–2918, 2020, doi: 10.1007/s10639-019-10094-2.
[54] C. Yang, S. Yan, J. Wang, and Y. Xue, “Flow Experiences and Virtual Tourism: The Role of Technological Acceptance and Technological Readiness,” Sustain., vol. 14, no. 9, pp. 1–17, 2022, doi: 10.3390/su14095361.
[55] F. Grigorio, D. Brito, E. Anjos, and M. Zenha-Rela, “On systems project abandonment: An analysis of complexity during development and evolution of FLOSS systems,” IEEE Int. Conf. Adapt. Sci. Technol. ICAST, vol. 2015-Janua, no. October, 2015, doi: 10.1109/ICASTECH.2014.7068139.
[56] Y. W. Sullivan and D. J. Kim, “Assessing the effects of consumers’ product evaluations and trust on repurchase intention in e-commerce environments,” Int. J. Inf. Manage., vol. 39, no. July 2017, pp. 199–219, 2018, doi: 10.1016/j.ijinfomgt.2017.12.008.
[57] A. Al-Azawei, P. Parslow, and K. Lundqvist, “Barriers and opportunities of e-learning implementation in Iraq: A case of public universities,” Int. Rev. Res. Open Distance Learn., vol. 17, no. 5, pp. 126–146, 2018, doi: 10.19173/irrodl.v17i5.2501.
[58] U. Zaman, H. Zahid, M. S. Habibullah, and B. H. Din, “Adoption of Big Data Analytics (BDA) Technologies in Disaster Management: A Decomposed Theory of Planned Behavior (DTPB) Approach,” Cogent Bus. Manag., vol. 8, no. 1, 2021, doi: 10.1080/23311975.2021.1880253.
[59] B. Y. M. Soat, “Mobile Payments, Global Adoption,” Mark. News, vol. 48, no. November, pp. 14–16, 2014.
[60] M. Li, L. Wang, and L. Li, “Research on narrative design of handicraft intangible cultural heritage creative products based on AHP-TOPSIS method,” Heliyon, vol. 10, no. 12, pp. 65–73, 2024, doi: 10.1016/j.heliyon.2024.e33027.
[61] P. K. Senyo and E. L. C. Osabutey, “Unearthing antecedents to financial inclusion through FinTech innovations,” Technovation, vol. 98, no. March, p. 102155, 2020, doi: 10.1016/j.technovation.2020.102155.
[62] Y. Bian, M. Wu, and J. L. Zhao, “Online leadership for open source project success: Evidence from the gitHub blockchain process,” Proc. 22nd Pacific Asia Conf. Inf. Syst., vol. 6–26, no. PACIS 2018, pp. 2265–2272, 2018.
[63] M. A. Nadeem, Z. Liu, A. H. Pitafi, A. Younis, and Y. Xu, “Investigating the Adoption Factors of Cryptocurrencies—A Case of Bitcoin: Empirical Evidence From China,” SAGE Open, vol. 11, no. 1, 2021, doi: 10.1177/2158244021998704.
[64] Y. Ding, L. A. I. Zhihui, P. Y. Mok, and T. S. Chua, “Computational Technologies for Fashion Recommendation: A Survey,” ACM Comput. Surv., vol. 56, no. 5, pp. 1–43, 2023, doi: 10.1145/3627100.
[65] M. Shahbaz, C. Gao, L. Zhai, F. Shahzad, and M. R. Arshad, “Moderating Effects of Gender and Resistance to Change on the Adoption of Big Data Analytics in Healthcare,” Complexity, vol. 2020, 2020, doi: 10.1155/2020/2173765.
[66] K. Alhammadi, H. Marashdeh, and M. Hussain, “Assessing the effect of innovation diffusion and technology readiness theories on attitude, behavioral intention and implementation of smart learning,” Cross Cult. Strateg. Manag., vol. 3, no. 1, pp. 1–19, 2023, doi: 10.1108/CCSM-12-2022-0213.
[67] I. Hussain, S. Sultan, F. Kanwal, and S. H. Rahmani, “Intrinsic Motivation and Academic Self-Efficacy as Mediation between Parental Involvement and Academic Achievement of Elementary Students,” J. Elem. Educ., vol. 30, no. 1, 2020.
[68] N. Setiyawati, H. D. Purnomo, and E. Mailoa, “User Experience Design on Visualization of Mobile-Based Land Monitoring System Using a User-Centered Design Approach,” Int. J. Interact. Mob. Technol., vol. 16, no. 3, pp. 47–65, 2022, doi: 10.3991/IJIM.V16I03.28499.
[69] M. A. Efuetlateh, “Factors Affecting Adoption of Mobile Applications in the Gig-Economy,” ProQuest Diss. Theses, no. March, p. 143, 2020.
[70] G. Ali, A. Id, L. Y. Tiew, J. Tang, Y. Goh, and R. T. Id, “The adoption of cryptocurrency as a disruptive force : Deep learning-based dual stage structural equation modelling and artificial neural network analysis,” pp. 1–26, 2021, doi: 10.1371/journal.pone.0247582.
[71] J. C. Mendoza-Tello, H. Mora, F. A. Pujol-López, and M. D. Lytras, “Disruptive innovation of cryptocurrencies in consumer acceptance and trust,” Inf. Syst. E-bus. Manag., vol. 17, no. 2–4, pp. 195–222, 2019, doi: 10.1007/s10257-019-00415-w.
[72] T. Roh, Y. S. Yang, S. Xiao, and B. Il Park, “What makes consumers trust and adopt fintech? An empirical investigation in China,” Electron. Commer. Res., no. 0123456789, Jan. 2022, doi: 10.1007/s10660-021-09527-3.
[73] I. Gruzdo, I. Kyrychenko, G. Tereshchenko, and N. Shanidze, “Metrics applicable for evaluating software at the design stage,” CEUR Workshop Proc., vol. 2870, pp. 916–936, 2021.
[74] N. Reichelt and R. Nettle, “Practice insights for the responsible adoption of smart farming technologies using a participatory technology assessment approach: The case of virtual herding technology in Australia,” Agric. Syst., vol. 206, no. January, p. 103592, 2023, doi: 10.1016/j.agsy.2022.103592.
[75] O. Mosweu, K. Bwalya, and A. Mutshewa, “Examining factors affecting the adoption and usage of document workflow management system (DWMS) using the UTAUT model: Case of Botswana,” Rec. Manag. J., vol. 26, no. 1, pp. 38–67, 2016, doi: 10.1108/RMJ-03-2015-0012.
[76] F. Shahzad, G. Y. Xiu, J. Wang, and M. Shahbaz, “An empirical investigation on the adoption of cryptocurrencies among the people of mainland China,” Technol. Soc., vol. 55, no. January, pp. 33–40, 2018, doi: 10.1016/j.techsoc.2018.05.006.
[77] M. I. Khan, S. Khalid, U. Zaman, A. E. José, and P. Ferreira, “Green paradox in emerging tourism supply chains: Achieving green consumption behavior through strategic green marketing orientation, brand social responsibility, and green image,” Int. J. Environ. Res. Public Health, vol. 18, no. 18, 2021, doi: 10.3390/ijerph18189626.
[78] A. Baquero, “Job Insecurity and Intention to Quit: The Role of Psychological Distress and Resistance to Change in the UAE Hotel Industry,” Int. J. Environ. Res. Public Health, vol. 19, no. 20, 2022, doi: 10.3390/ijerph192013629.
[79] D. Brougham and J. Haar, “Technological disruption and employment: The influence on job insecurity and turnover intentions: A multi-country study,” Technol. Forecast. Soc. Change, vol. 161, no. May, 2020, doi: 10.1016/j.techfore.2020.120276.
[80] D. A. Al Shikhy, P. Z. M. Makhbul, Z. A. Rawshdeh, R. Arshad, and K. Anuar, “Dispositional Resistance to Change and User Resistance Behaviour to Use Human Resources Information Systems in the Healthcare Sector: The Moderating Role of Conscientiousness,” Int. J. Recent Technol. Eng., vol. 8, no. 4, pp. 565–572, 2019, doi: 10.35940/ijrte.d7305.118419.
[81] M. O. Gani, N. Bhuiya, A. A. Swarna, M. I. Alam, and M. O. Faruq, “Determinants of adopting eCourier services: the moderating role of resistance to change,” Digit. Transform. Soc., 2023, doi: 10.1108/dts-07-2023-0053.
[82] P. Acheampong et al., “Hybridizing an Extended Technology Readiness Index with Technology Acceptance Model (TAM) to Predict E-Payment Adoption in Ghana,” Am. J. Multidiscip. Res. © 2017 Am. |, vol. 2, no. 5, pp. 172–184, 2017.
[83] S. R. Carter, A. M. Ahmed, and C. R. Schneider, “The role of perceived service quality and price competitiveness on consumer patronage of and intentions towards community pharmacies,” Res. Soc. Adm. Pharm., vol. 19, no. 5, pp. 717–727, 2023, doi: 10.1016/j.sapharm.2023.02.002.
[84] L. Beal, J. M. Stavros, and M. L. Cole, “Effect of psychological capital and resistance to change on organisational citizenship behaviour,” SA J. Ind. Psychol., vol. 39, no. 2 SPL, pp. 1–11, 2013, doi: 10.4102/sajip.v39i2.1136.
[85] J. F. Hair, C. M. Ringle, and M. Sarstedt, “Partial Least Squares Structural Equation Modeling: Rigorous Applications, Better Results and Higher Acceptance,” Long Range Planning, vol. 46, no. 1–2, pp. 1–12, 2013. doi: 10.1016/j.lrp.2013.01.001.
[86] C. Fornell and D. F. Larcker, “Evaluating structural equation models with unobservable variables and measurement error,” J. Mark. Res., vol. 18, no. 1, pp. 39–50, 1981.
[87] J. F. Hair, W. C. Black, B. J. Babin, and R. E. Anderson, “Dependence techniques – Metric outcomes,” Multivar. Data Anal., 2019.
[88] T. K. Dijkstra and J. Henseler, “Consistent partial least squares path modeling,” MIS Q., vol. 39, no. 2, pp. 297–316, 2015.
[89] J. M. Becker, J. H. Cheah, R. Gholamzade, C. M. Ringle, and M. Sarstedt, “PLS-SEM’s most wanted guidance,” Int. J. Contemp. Hosp. Manag., vol. 35, no. 1, pp. 321–346, 2023, doi: 10.1108/IJCHM-04-2022-0474.
[90] P. O. Duarte, H. B. Alves, and M. B. Raposo, “Understanding university image: A structural equation model approach,” Int. Rev. Public Nonprofit Mark., vol. 7, no. 1, pp. 21–36, 2010, doi: 10.1007/s12208-009-0042-9.
[91] W. W. Chin, “Issues and opinion on structural equation modeling,” MIS Q. Manag. Inf. Syst., vol. 22, no. 1, p. vii-xvi CR-Copyright © 1998 Management Inf, 1998.
[92] J. Henseler, C. M. Ringle, and M. Sarstedt, “A new criterion for assessing discriminant validity in variance-based structural equation modeling,” J. Acad. Mark. Sci., vol. 43, pp. 115–135, 2015.
[93] D. Gefen, E. Karahanna, and D. W. Straub, “Trust and TAM in online shopping : An integrated model,” 2003.
[94] M. Tenenhaus, J. Pagès, L. Ambroisine, and C. Guinot, “PLS methodology to study relationships between hedonic judgements and product characteristics,” Food Qual. Prefer., vol. 16, no. 4, pp. 315–325, 2005, doi: 10.1016/j.foodqual.2004.05.013.
[95] D. K. Agrawal and S. Gupta, “A new theoretical framework of shopping motives and channel preference behaviour in the digital era,” Int. J. Consum. Stud., vol. 47, no. 1, pp. 400–418, 2023, doi: 10.1111/ijcs.12818.
[96] W. K. Yan Ho et al., “Towards developing and validating Quality Physical Education in schools—The Asian physical education professionals’ voice,” PLoS One, vol. 14, no. 8, pp. 1–19, 2019, doi: 10.1371/journal.pone.0218158.
[97] J. Hair and A. Alamer, “Partial Least Squares Structural Equation Modeling (PLS-SEM) in second language and education research: Guidelines using an applied example,” Res. Methods Appl. Linguist., vol. 1, no. 3, p. 100027, 2022.
[98] S. Wang, J. H. Cheah, C. Y. Wong, and T. Ramayah, “Progress in partial least squares structural equation modeling use in logistics and supply chain management in the last decade: a structured literature review,” Int. J. Phys. Distrib. Logist. Manag., 2023, doi: 10.1108/IJPDLM-06-2023-0200.
التنزيلات
منشور
إصدار
القسم
الرخصة

هذا العمل مرخص بموجب Creative Commons Attribution 4.0 International License.
Copyright Notice
Authors retain copyright and grant the SJPAS journal right of first publication, with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in Samarra Journal of Pure and Applied Science.
The Samarra Journal of Pure and Applied Science permits and encourages authors to archive Pre-print and Post-print items submitted to the journal on personal websites or institutional repositories per the author's choice while providing bibliographic details that credit their submission, and publication in this journal. This includes the archiving of a submitted version, an accepted version, or a published version without any Risks.



