Measuring the Success of Adoption and Acceptance of Technology in the Risky Environment: An Instrument Design


  • Munadil Khaleel Faaeq Al-Sammarraie
  • Alaa K. Faieq
  • Khaled Al-Qasa



Electronic Government, Conflict, Success, Questionnaire, Technology and Iraq.


Electronic Government (eG) has become a very important tool to serve the beneficiaries; therefore, it has received the attention of many Information System (IS) researchers.  Due to the importance of the IS successes, this paper identifies the emergence of a clear gap to measure the success of adoption and the acceptance of technology in unstable circumstances such as wars, conflicts and violence. Nowadays, the unsuitability issue is increasing remarkably. This paper expands on previous studies whose focus was on investigating the success of adopting electronic services in dangerous and unsecured countries in the world. Consequently, a need for a specific tool to measure the success of technology adoption and acceptance among the users in unstable and risky conditions has become urgent. Based on the findings, it can be confirmed that this instrument is reliable to measure the success of adoption and the acceptance of technology in risky environments.




[1] S. Brunel, "Mubarak Alruwaie," A framework for evaluating citizens outcome expectations and satisfactions toward continued intention to use eGovernment services Paper presented at the Doctoral School London United Kingdom, (2012).

[2] N. Khan and N. A. Khan, "A prospective study of outcome from rubber band ligation in third degree haemorrhoids," JPMA. The Journal of the Pakistan Medical Association, vol. 60, (2010) 952-5.

[3] Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM., “Maintaining security and privacy in health care system using learning based Deep-Q-Networksâ€, Journal of medical systems, 2018 Oct 1;42(10):186.

[4] U. P. T. Maldonado, G. F. Khan, J. Moon, and J. J. Rho, "E-learning motivation and educational portal acceptance in developing countries," Online Information Review, vol. 35, (2011) 66-85.

[5] G. F. Khan, J. Moon, B. Swar, H. Zo, and J. J. Rho, "E-government service use intentions in Afghanistan: Technology adoption and the digital divide in a war-torn country, Information Development," vol. 28, (2012) 281-299.

[6] V. Cosgun and O. Dogerlioglu, "Critical Success Factors Affecting e-commerce Activities of Small and Medium Enterprises," Information Technology Journal, vol. 11 SRC - GoogleScholar,(2012) 1664-1676.

[7] Bhattacherjee and M. I. S., "Understanding Information Systems Continuance: An Expectation-Confirmation Model," doi 1023073250921, vol. 25, (2001) 351-370.

[8] S. Wangpipatwong, W. Chutimaskul, and B. Papasratorn, "Understanding Citizen’s Continuance Intention to Use e-Government Website: a Composite View of Technology Acceptance Model and Computer Self-Efficacy The Electronic Journal of e-Government," vol. 6, (2008) 55-64.

[9] Shakeel PM, Baskar S, Dhulipala VS, Jaber MM., “Cloud based framework for diagnosis of diabetes mellitus using K-means clusteringâ€, Health information science and systems, 2018 Dec 1;6(1):16.

[10] D. A. DeVaus and U. C. L., Surveys in Social Research 4 Ed, (1986.)

[11] C. L. Taylor, W. R. Summerhill, and D. Florida, Formatting a Mail Questionnaire, (1992).

[12] S. Sudman, N. M. Bradburn, and A., Asking Questions: Guide to Questionnaire Design (Social & Behavioral Science Series) (1 edition)(1982).

[13] M. Al-Majali, "The Antecedents Of Internet Banking Service Adoption In Jordan: Using Decomposed Theory of Planned Behaviour Universiti Ut Ara Malaysia Doctor Of Philosophy," (2011).

[14] Selvakumar S, Inbarani H, Shakeel PM. A Hybrid Personalized Tag Recommendations for Social E-Learning System. International Journal of Control Theory and Applications. 2016;9(2):1187-99.

[15] J. Sauro. (2010). Should You Use 5 Or 7 Point Scales?

[16] H. Cordesman, Iraqi Perceptions of the War: Public Opinion by City and Region, (2007).

[17] Top 10 Most Dangerous Countries in the World vol. 4 SRC - GoogleScholar, (2013).

[18] M. Hsueh, Interactive Text Recognition and Translation on a Mobile Device, (2011).

[19] Y. Malhotra, D. Galletta, and A., "Commitment Model of Volitional Systems Adoption and Usage Behavior," Journal of Management Information Systems, vol. 22, (2005) 117-151.

[20] V. Venkatesh, M. G. Morris, G. B. Davis, F. D. Davis, and M. I. S., "User acceptance of information technology: Toward a unified view1," vol. 27, (2003) 425-478.

[21] E. Karahanna, D. W. Straub, N. L. Chervany, A., and M. I. S., "Information Technology Adoption Across Time: Comparison of Pre-Adoption and Post-Adoption Beliefs,"vol. 23, (1999) 183-213.

[22] V. Venkatesh, V. Ponnusamy, J. Anandaraj, R. Chaudhary, M. Malviya, P. Clarke, et al., "Endotracheal intubation in a neonatal population remains associated with a high risk of adverse events," European journal of pediatrics, vol. 170, (2011) 223-7.

[23] V. Venkatesh, J. Y. L. Thong, X. Xu, and M. I. S., "Consumer Acceptance And Use Of Information Technology: Extending The Unified Theory Of Acceptance And Use Of Technology," vol. 36, (2012) 157-178.

[24] Y.-J. Moon and Y.-H. Hwang, "A Study of Effects of UTAUT-Based Factors on Acceptance of Smart Health Care Services," in Advanced Multimedia and Ubiquitous Engineering: Future Information Technology Volume 2, H. J. J. Park, H.-C. Chao, H. Arabnia, and Y. N. Yen, Eds., ed Berlin, (2016) 317-324; Heidelberg: Springer Berlin Heidelberg.

[25] Portal Iraq. (2011). Portal Iraq.

[26] P. Mohamed Shakeel; Tarek E. El. Tobely; Haytham Al-Feel; Gunasekaran Manogaran; S. Baskar., “Neural Network Based Brain Tumor Detection Using Wireless Infrared Imaging Sensorâ€, IEEE Access, 2019, Page(s): 1

[27] T. Alrawashdeh, "The Extended Utaut Acceptance Model Of Computer Based Distance Training System Among Public Sector's In Jordan," Doctor of Philosoph, UUM, Kedah, (2011).

[28] Ajzen, "The Theory of Planned Behavior," Organizational Behavior And Human Decision Processes, vol. 50, (1991) 179-211.

[29] K. Al-Basri, The costs of the standard of living in Iraq vol. 2012 SRC - GoogleScholar, 1807.

[30] K. Hussein, Widespread use of the Internet in Iraq, (1854).

[31] S. AlAwadhi and A. Morris, "The Use of the UTAUT Model in the Adoption of E-government Services in Kuwait," in Hawaii International Conference on System Sciences, (2008) 219-219.

[32] W. G. Zikmund, B. J. Badin, J. C. Carr, and M. Griffin, Business research methods (8 Ed,( 2010).

[33] U. Sekaran, R. Bougie, and H. East, Research Methods for Buisness (5 ed, (2010).

[34] M. Alvesson and D. Karreman, "Constructing mystery: Empirical matters in theory development," Academy of Management Review, vol. 32, (2007) 1265-1281.

[35] Shakeel PM. Neural Networks Based Prediction Of Wind Energy Using Pitch Angle Control. International Journal of Innovations in Scientific and Engineering Research (IJISER). 2014;1(1):33-7.

[36] S. Sudman and N. M. Bradburn, Asking Questions: A Practical Guide to Questionnaire Design (Social & Behavioral Science Series, (1982).

[37] J. C. Nunnally, "Psychometric theory," New York McGraw Hill, (1978).

[38] P. T. Davis and C. D. Cunningham, "Adjunctive procedures in surgery of the aging face," Journal of the South Carolina Medical Association (1975), vol. 85 (1989) 429-33.

View Full Article: