Acheampong Owusu holds a PhD in Information Systems from Limkokwing University of Creative Technology, Cyberjaya, Malaysia. He is a Lecturer at the Operations and Management Information Systems (OMIS) Department at the University of Ghana Business School. His research interests include Business Intelligence (BI) Systems and Analytics, Technology Diffusion, Cloud Computing, and Ecommerce. Acheampong has published several research articles in peer-reviewed journals. He can be reached at aowusu@ug.edu.gh
International Journal of E-Entrepreneurship and Innovation
This explorative study uses the affordance theory to offer an in-depth understanding of how mobil... more This explorative study uses the affordance theory to offer an in-depth understanding of how mobile payment affordances are unconventionally facilitating the rise of end-user entrepreneurs, and to explore why these end-user entrepreneurs expand and commercialize their creative ideas. Qualitatively, the researchers interviewed 20 end-user entrepreneurs in eight merchant firms. The data suggest that six significant affordances may serve as motivating factors for the merchant to switch to end-user entrepreneurship. These affordances are the following: i) incorporating informal peer-to-peer business approach; ii) frequent and small transactions settling; iii) greater flexibility in service delivery; iv) new business model development; v) informal finance networks; and vi) financial affordance. Employing a developing economy perspective with a particular focus on Ghana, this paper contributes to both the mobile payment research and end-user entrepreneurial studies, extending the existing ...
International Journal of Cyber Warfare and Terrorism
Perception has been found to influence thought patterns and human behavior in other academic sphe... more Perception has been found to influence thought patterns and human behavior in other academic spheres. However, the impact of perception on technology adoption and use in the field of Information Systems is virtually nonexistent. This study sought to examine the internet security perception of internet users and consequential effect on their online behavior. The study used language (French vs English), as a differentiation tool for the respondents. 101 nationals from different African countries who reside in Ghana were sampled to participate in the study. The study found strong negative security perception, low level of knowledge regarding cyber awareness and a lax attitude in cyber hygiene practices to ensure personal safety when online. Impact of culture on online security perception was not identified, and also respondents were not collectivist in their cultural orientation, a marked shift from long held opinion of strong collectivism in Africa. Implications are also discussed.
This research aims to examine the impact of celebrity endorsement on Political Parties and its in... more This research aims to examine the impact of celebrity endorsement on Political Parties and its influence on electorates to vote for a particular Party’s candidate. The mediating role of Political Brand Credibility (PBC) and Political Brand Equity (PBE) towards Voting Intention (VI) relationships were also examined. The study’s conceptual framework was developed using The Source Credibility, The Associative Network Memory Model, and the Brand Signalling Theory. Primary survey data was collected online and analysed through Structural Equation Modelling. Findings suggest that Endorser Credibility has a direct positive significant relationship with Political Brand Credibility. However, there is no significant direct correlation between Endorser Credibility and Political Brand Equity and Voting Intention. Nevertheless, indirect relationship was established. Findings from the study has proven that the endorsement of celebrities alone does not necessarily influence electorates to vote for political candidates, rather the Credibility of the Party and its Equity play a pivotal role with regards to the Voting Intention of voters. Practically, this study has given us insights into the endorsement of celebrities of political candidates, which the Political Party leaders should consider before bringing on board any celebrity to endorse their candidates. Future research opportunity and limitations were also discussed.
The main objective of the study was to examine the impact of cyberslacking on graduate students’ ... more The main objective of the study was to examine the impact of cyberslacking on graduate students’ academic performance at a Business School in Ghana. The study was descriptive and was purely quantitative. The target population of this study comprised all graduate students at the School. Out of the entire population, three hundred (300) students were sampled for the study through convenience sampling. Questionnaires were used as the data collection tool. Findings from the analysis indicate that Cyberslacking correlates with students’ academic performance. Students who are addicted to cyberslacking have difficulties in paying attention in class in comparison to those who do not cyberslack. The study, therefore, concludes that though cyberslacking has a negative effect on the attention of graduate students in the lecture room, it could not find a significant relationship between cyberslacking and academic performance. It is however recommended that instructors should integrate technolog...
This paper seeks to contribute to research work done on applications of information technologies ... more This paper seeks to contribute to research work done on applications of information technologies (IT) for solving problems in Africa. This was achieved via a systematic literature review on extant literature on IT use in Africa. Relevant articles with how IT are applied to the work activities of users in Africa are retrieved from various databases and analyzed to reveal the role IT plays in the African user's information journey. The results show that healthcare, agriculture, education, and banking and finance sectors have received considerable attention from researchers. Regarding methodologies adopted, most of the papers used a quantitative approach as compared to qualitative. Considering the limited literature reviews on scholarly technology adoption studies more especially in Africa where people are still yet to appreciate the use and impact of technology in their life, this paper makes significant contributions to the few scholarly studies that have been done in this regard.
International Journal of Electronic Government Research, 2022
The adoption and implantation of electronic government service are on the rise as government serv... more The adoption and implantation of electronic government service are on the rise as government services to citizens through electronic means has increased. However, assessing the effectiveness of e-government systems is still limited in the literature. This study sort to evaluate the effectiveness and benefits of information systems (E-registrar) at the Registrar General Department (RGD) in Ghana, using the updated DeLone and McLean IS Success Model. Via the purposive sampling technique, data for the study were collected from 102 staff of RGD and analyzed following the Partial Least Squares Structural Equation Modelling (PLS-SEM) technique. The results of the study indicate that Service Quality, System Quality, and Information Quality positively influence System Usage and User Satisfaction. Also, System Usage and User Satisfaction positively influence the Net Benefits derived from the E-Registrar system. The findings provide a relevant recommendation to policymakers and management of ...
Handbook of Research on Managing Information Systems in Developing Economies, 2020
The purpose of this chapter is to explore the nature of SISP implementation and also determine th... more The purpose of this chapter is to explore the nature of SISP implementation and also determine the factors that influence as enablers or inhibitors to the implementation and use of SISP in Ghanaian organizations. The methodology adopted was the qualitative method and underpinned by Earl and Lederer and Sethi's approaches to SISP development. The results indicated that many firms have applied Earl's approaches in their SISP implementation. The findings also revealed that factors such as IS alignment, awareness, environmental assessment, budget, and top management involvement are the critical success factors enabling the use of SISP in the organizations studied. Inhibitors to SISP implementation include budget constraint, regulatory requirements, absence of IT/IS steering committee, among others. The study highly recommends that the inhibiting factors are given the necessary attention by the government to enable firms to implement SISP with ease. The originality of this study ...
Encyclopedia of Criminal Activities and the Deep Web, 2020
The purpose of this study is to explore the determinants of bitcoin adoption among individuals an... more The purpose of this study is to explore the determinants of bitcoin adoption among individuals and also to assess whether the usage of the bitcoin technology for payment of transactions is preferable to other modes of payment. The study proposed a conceptual model analyzing the driving factors that influence a behavior towards the utilization of bitcoins in a developing economy, Ghana, through the lens of the unified theory of acceptance and use of technology model. A qualitative method which employed a purposive sampling technique in the selection of twelve respondents who understand and utilize the bitcoin technology was used. The findings showed that majority of the respondents were exceptionally positive about the idea of bitcoin and had the goal to keep utilizing it, on conditions with respect to the usefulness, the ease of use, the secureness, and the price value of bitcoin. The study offers practitioners with a framework based on theory that goes beyond not only investigating...
There has been a proliferation of Mobile Phones Applications commonly referred to as Mobile Apps ... more There has been a proliferation of Mobile Phones Applications commonly referred to as Mobile Apps lately due to the advancement of technology. These Mobile Apps are used for a myriad of tasks ranging from Mobile Commerce (m-commerce), healthcare, learning, social media, among others. However, with this spread of the Mobile Apps comes the issues of privacy concerns. This study, therefore, seeks to investigate why users continue to use the Mobile Apps despite the privacy concerns and what measures they have put in place to mitigate this menace. Through the Antecedents, Privacy, Concerns, and Outcome (APCO) model, the study developed a research model that was hypothesized and evaluated with 316 respondents from a tertiary institution. The data was analyzed through the partial least squares structural equation model (PLS-SEM). The results indicate that whilst antecedent variable Gender influences Privacy Concern, Experience on the other hand does not. Also, Enjoyment, Privacy Risk, and T...
Electronic Journal of Information Systems Evaluation, 2020
Higher learning institutions (HLIs) are implementing enterprise content management (ECM) systems ... more Higher learning institutions (HLIs) are implementing enterprise content management (ECM) systems as web portals that are helping them interact with and serve their students better. However, there is a paucity of research that has evaluated the factors that account for students using their university’s portals. As a case study and using the D&M IS Success Model as a guiding lens, this paper explored the factors that influence Limkokwing University of Creative Technology (LUCT) Students to use the university’s portal through a survey. Data was collected from 134 students through Stratified Random Sampling technique that was analysed through Partial Least Square ‑ Structural Equation Modelling (PLS‑SEM). Results obtained show clearly that LUCT students are using the university’s portal as a result of the System Quality and Information Quality which gives them Satisfaction. However, the findings reveal no significant correlation between Service Quality and Satisfaction of the students a...
International Journal of E-Entrepreneurship and Innovation
This explorative study uses the affordance theory to offer an in-depth understanding of how mobil... more This explorative study uses the affordance theory to offer an in-depth understanding of how mobile payment affordances are unconventionally facilitating the rise of end-user entrepreneurs, and to explore why these end-user entrepreneurs expand and commercialize their creative ideas. Qualitatively, the researchers interviewed 20 end-user entrepreneurs in eight merchant firms. The data suggest that six significant affordances may serve as motivating factors for the merchant to switch to end-user entrepreneurship. These affordances are the following: i) incorporating informal peer-to-peer business approach; ii) frequent and small transactions settling; iii) greater flexibility in service delivery; iv) new business model development; v) informal finance networks; and vi) financial affordance. Employing a developing economy perspective with a particular focus on Ghana, this paper contributes to both the mobile payment research and end-user entrepreneurial studies, extending the existing ...
International Journal of Cyber Warfare and Terrorism
Perception has been found to influence thought patterns and human behavior in other academic sphe... more Perception has been found to influence thought patterns and human behavior in other academic spheres. However, the impact of perception on technology adoption and use in the field of Information Systems is virtually nonexistent. This study sought to examine the internet security perception of internet users and consequential effect on their online behavior. The study used language (French vs English), as a differentiation tool for the respondents. 101 nationals from different African countries who reside in Ghana were sampled to participate in the study. The study found strong negative security perception, low level of knowledge regarding cyber awareness and a lax attitude in cyber hygiene practices to ensure personal safety when online. Impact of culture on online security perception was not identified, and also respondents were not collectivist in their cultural orientation, a marked shift from long held opinion of strong collectivism in Africa. Implications are also discussed.
This research aims to examine the impact of celebrity endorsement on Political Parties and its in... more This research aims to examine the impact of celebrity endorsement on Political Parties and its influence on electorates to vote for a particular Party’s candidate. The mediating role of Political Brand Credibility (PBC) and Political Brand Equity (PBE) towards Voting Intention (VI) relationships were also examined. The study’s conceptual framework was developed using The Source Credibility, The Associative Network Memory Model, and the Brand Signalling Theory. Primary survey data was collected online and analysed through Structural Equation Modelling. Findings suggest that Endorser Credibility has a direct positive significant relationship with Political Brand Credibility. However, there is no significant direct correlation between Endorser Credibility and Political Brand Equity and Voting Intention. Nevertheless, indirect relationship was established. Findings from the study has proven that the endorsement of celebrities alone does not necessarily influence electorates to vote for political candidates, rather the Credibility of the Party and its Equity play a pivotal role with regards to the Voting Intention of voters. Practically, this study has given us insights into the endorsement of celebrities of political candidates, which the Political Party leaders should consider before bringing on board any celebrity to endorse their candidates. Future research opportunity and limitations were also discussed.
The main objective of the study was to examine the impact of cyberslacking on graduate students’ ... more The main objective of the study was to examine the impact of cyberslacking on graduate students’ academic performance at a Business School in Ghana. The study was descriptive and was purely quantitative. The target population of this study comprised all graduate students at the School. Out of the entire population, three hundred (300) students were sampled for the study through convenience sampling. Questionnaires were used as the data collection tool. Findings from the analysis indicate that Cyberslacking correlates with students’ academic performance. Students who are addicted to cyberslacking have difficulties in paying attention in class in comparison to those who do not cyberslack. The study, therefore, concludes that though cyberslacking has a negative effect on the attention of graduate students in the lecture room, it could not find a significant relationship between cyberslacking and academic performance. It is however recommended that instructors should integrate technolog...
This paper seeks to contribute to research work done on applications of information technologies ... more This paper seeks to contribute to research work done on applications of information technologies (IT) for solving problems in Africa. This was achieved via a systematic literature review on extant literature on IT use in Africa. Relevant articles with how IT are applied to the work activities of users in Africa are retrieved from various databases and analyzed to reveal the role IT plays in the African user's information journey. The results show that healthcare, agriculture, education, and banking and finance sectors have received considerable attention from researchers. Regarding methodologies adopted, most of the papers used a quantitative approach as compared to qualitative. Considering the limited literature reviews on scholarly technology adoption studies more especially in Africa where people are still yet to appreciate the use and impact of technology in their life, this paper makes significant contributions to the few scholarly studies that have been done in this regard.
International Journal of Electronic Government Research, 2022
The adoption and implantation of electronic government service are on the rise as government serv... more The adoption and implantation of electronic government service are on the rise as government services to citizens through electronic means has increased. However, assessing the effectiveness of e-government systems is still limited in the literature. This study sort to evaluate the effectiveness and benefits of information systems (E-registrar) at the Registrar General Department (RGD) in Ghana, using the updated DeLone and McLean IS Success Model. Via the purposive sampling technique, data for the study were collected from 102 staff of RGD and analyzed following the Partial Least Squares Structural Equation Modelling (PLS-SEM) technique. The results of the study indicate that Service Quality, System Quality, and Information Quality positively influence System Usage and User Satisfaction. Also, System Usage and User Satisfaction positively influence the Net Benefits derived from the E-Registrar system. The findings provide a relevant recommendation to policymakers and management of ...
Handbook of Research on Managing Information Systems in Developing Economies, 2020
The purpose of this chapter is to explore the nature of SISP implementation and also determine th... more The purpose of this chapter is to explore the nature of SISP implementation and also determine the factors that influence as enablers or inhibitors to the implementation and use of SISP in Ghanaian organizations. The methodology adopted was the qualitative method and underpinned by Earl and Lederer and Sethi's approaches to SISP development. The results indicated that many firms have applied Earl's approaches in their SISP implementation. The findings also revealed that factors such as IS alignment, awareness, environmental assessment, budget, and top management involvement are the critical success factors enabling the use of SISP in the organizations studied. Inhibitors to SISP implementation include budget constraint, regulatory requirements, absence of IT/IS steering committee, among others. The study highly recommends that the inhibiting factors are given the necessary attention by the government to enable firms to implement SISP with ease. The originality of this study ...
Encyclopedia of Criminal Activities and the Deep Web, 2020
The purpose of this study is to explore the determinants of bitcoin adoption among individuals an... more The purpose of this study is to explore the determinants of bitcoin adoption among individuals and also to assess whether the usage of the bitcoin technology for payment of transactions is preferable to other modes of payment. The study proposed a conceptual model analyzing the driving factors that influence a behavior towards the utilization of bitcoins in a developing economy, Ghana, through the lens of the unified theory of acceptance and use of technology model. A qualitative method which employed a purposive sampling technique in the selection of twelve respondents who understand and utilize the bitcoin technology was used. The findings showed that majority of the respondents were exceptionally positive about the idea of bitcoin and had the goal to keep utilizing it, on conditions with respect to the usefulness, the ease of use, the secureness, and the price value of bitcoin. The study offers practitioners with a framework based on theory that goes beyond not only investigating...
There has been a proliferation of Mobile Phones Applications commonly referred to as Mobile Apps ... more There has been a proliferation of Mobile Phones Applications commonly referred to as Mobile Apps lately due to the advancement of technology. These Mobile Apps are used for a myriad of tasks ranging from Mobile Commerce (m-commerce), healthcare, learning, social media, among others. However, with this spread of the Mobile Apps comes the issues of privacy concerns. This study, therefore, seeks to investigate why users continue to use the Mobile Apps despite the privacy concerns and what measures they have put in place to mitigate this menace. Through the Antecedents, Privacy, Concerns, and Outcome (APCO) model, the study developed a research model that was hypothesized and evaluated with 316 respondents from a tertiary institution. The data was analyzed through the partial least squares structural equation model (PLS-SEM). The results indicate that whilst antecedent variable Gender influences Privacy Concern, Experience on the other hand does not. Also, Enjoyment, Privacy Risk, and T...
Electronic Journal of Information Systems Evaluation, 2020
Higher learning institutions (HLIs) are implementing enterprise content management (ECM) systems ... more Higher learning institutions (HLIs) are implementing enterprise content management (ECM) systems as web portals that are helping them interact with and serve their students better. However, there is a paucity of research that has evaluated the factors that account for students using their university’s portals. As a case study and using the D&M IS Success Model as a guiding lens, this paper explored the factors that influence Limkokwing University of Creative Technology (LUCT) Students to use the university’s portal through a survey. Data was collected from 134 students through Stratified Random Sampling technique that was analysed through Partial Least Square ‑ Structural Equation Modelling (PLS‑SEM). Results obtained show clearly that LUCT students are using the university’s portal as a result of the System Quality and Information Quality which gives them Satisfaction. However, the findings reveal no significant correlation between Service Quality and Satisfaction of the students a...
This study explores the critical success factors (CSFs) influencing Ghanaian Small and Medium Ent... more This study explores the critical success factors (CSFs) influencing Ghanaian Small and Medium Enterprises (SMEs) to adopt Cloud Business Intelligence (BI) through the lens of the critical success factors theory. Through a qualitative study of 17 respondents from various SMEs, the findings show that in Ghana, SMEs adoption of cloud-BI is identified as a result of top management support under the strategic factors and, skilled human resource and availability of technological resources under the tactical factors. The outcomes revealed that SMEs nature of the use of Cloud BI is predominantly for communication and data storage purposes. Cloud BI by way of benefits enables firms to operate using the same data from multiple branches and it is secured and affordable to use.
Twenty-fifth Americas Conference on Information Systems, Cancun, 2019
This paper investigates virtual platforms (VPs) and how they are used for e-learning. It assesses... more This paper investigates virtual platforms (VPs) and how they are used for e-learning. It assesses the challenges students face when they use VPs for e-learning from the perspectives of student capacity, institutional perspectives, and external factors, such as the environment or context. Students in Ghana who are engaged in e-learning through external universities outside Ghana were targeted as respondents for this study. It is generally established that different types of computer systems have been adopted by students engaged in e-learning. Two types of computer systems were adopted by the respondents in this study: Open edX and Latitude Learning systems. Three sets of challenges are identified: 1) institutional challenges (ineffective orientation of students by service providers, systems failures, and speaking patterns); 2) student-technological challenges (poor computer skills and self-efficacy, inadequate knowledge and skills in the use of online handles, and poor time management by students); and 3) environmental factors (poor Internet connections, lack of advanced ICT technologies to support e-learning.
Twenty-fifth Americas Conference on Information Systems, Cancun, 2019
The growth of internet usage is a global phenomenon with Africa not being left out. The continent... more The growth of internet usage is a global phenomenon with Africa not being left out. The continents access and use of the internet over the past two decades has been growing although the pace is below the global average. As the global cyberspace, if faced with the challenge of security, the African terrain is also faced with a similar challenge of ensuring safety for it increasing internet users. Internet user's perception of security has been found to influence the behaviors of users among Chinese and Americans. This study sought to replicate Chen and Zehadis (2016) in the context of two West African countries, thus, Ghana and Nigeria. Four themes were adopted to examine internet security perceptions of thirty Ghanaian and Nigerian respondents. Findings proved there are minimal differences between Ghanaians and Nigerians in terms of the perception of threat, susceptibility to threat, self-efficacy in the face threats and taken actions.
Handbook of Research on Managing Information Systems in Developing Economies, 2020
Blockchain technology is an emerging innovation, and it is viewed as a better approach to help th... more Blockchain technology is an emerging innovation, and it is viewed as a better approach to help the necessities of people and institutions in terms of record management. Using the Delphi technique and the PERM model, this chapter seeks to present the perspectives of experts in the field of blockchain on the readiness of the institutions in developing economies to adopt and implement it. The findings suggest that the understanding of the technology, knowledge on how to use it, availability of skilled personnel, availability of technical components, risk, capital, management support, business process, policies and regulations, and government initiatives on technology are key influencing factors assessing the readiness to adopt blockchain in a developing economy. It is expected that these findings will enlighten practitioners on the prospects of the application of blockchain in all sectors. The originality of this study lies in the fact that it is a maiden exploratory study that examines the factors that influence the readiness to adopt and implement blockchain technology in a developing economy.
Handbook of Research on Managing Information Systems in Developing Economies, 2020
Globalizing businesses from developing countries require a thoughtful strategy and adoption of st... more Globalizing businesses from developing countries require a thoughtful strategy and adoption of state-of-the-art technologies to meet up with the rapidly changing society. Mobile money payment service is a growing service that provides opportunities for both the formal and informal sectors in Ghana. Despite its importance, fraudsters have capitalized on the vulnerabilities of users to defraud them. In this chapter, the authors have reviewed existing data mining techniques for exploring the detection of mobile payment fraud. With this technique, a hybrid-based machine learning framework for mobile money fraud detection is proposed. With the use of the machine learning technique, an avalanche of fraud-related cases is leveraged, as a corpus, for fraud detection. The implementation of the framework hinges on the formulation of policies and regulations that will guide the adoption and enforcement by Telcos and governmental agencies with oversight responsibilities in the telecommunication space. The authors, therefore, envision the implementation of the proposed framework by practitioners.
Handbook of Research on Managing Information Systems in Developing Economies, 2020
The purpose of this chapter is to explore the nature of SISP implementation and also determine th... more The purpose of this chapter is to explore the nature of SISP implementation and also determine the factors that influence as enablers or inhibitors to the implementation and use of SISP in Ghanaian organizations. The methodology adopted was the qualitative method and underpinned by Earl and Lederer and Sethi's approaches to SISP development. The results indicated that many firms have applied Earl's approaches in their SISP implementation. The findings also revealed that factors such as IS alignment, awareness, environmental assessment, budget, and top management involvement are the critical success factors enabling the use of SISP in the organizations studied. Inhibitors to SISP implementation include budget constraint, regulatory requirements, absence of IT/IS steering committee, among others. The study highly recommends that the inhibiting factors are given the necessary attention by the government to enable firms to implement SISP with ease. The originality of this study lies in the dearth of literature about SISP implementation in sub-Saharan economies.
The purpose of this study is to explore the determinants of bitcoin adoption among individuals an... more The purpose of this study is to explore the determinants of bitcoin adoption among individuals and also to assess whether the usage of the bitcoin technology for payment of transactions is preferable to other modes of payment. The study proposed a conceptual model analyzing the driving factors that influence a behavior towards the utilization of bitcoins in a developing economy, Ghana, through the lens of the unified theory of acceptance and use of technology model. A qualitative method which employed a purposive sampling technique in the selection of twelve respondents who understand and utilize the bitcoin technology was used. The findings showed that majority of the respondents were exceptionally positive about the idea of bitcoin and had the goal to keep utilizing it, on conditions with respect to the usefulness, the ease of use, the secureness, and the price value of bitcoin. The study offers practitioners with a framework based on theory that goes beyond not only investigating the adoption but also to assess the impact in utilizing bitcoin for organizational benefits.
Uploads