The Technology/Cyber Information Acceptance Model

The Technology/Cyber Information Acceptance ModelThe Technology/Cyber Information Acceptance ModelThe Technology/Cyber Information Acceptance Model

Our Cutting Edge Research

Our Cutting Edge ResearchOur Cutting Edge ResearchOur Cutting Edge Research
Contact Us

OUR MISSION: Making A Difference By Delivering Great Content

The Scientific Goal

  

There is no doubt that the world of Cybersecurity is changing on an everyday basis.  This is especially true when it comes to the information and data that is being released, whether it is to the IT Security teams or from the CISOs themselves.  


But no matter where it comes from, the need for reliable, believable, and useful information is now a must. 


Therefore, at AST Cybersecurity, we have a proposed a new model called the “Cyber Information Acceptance Model”, where the acceptability of Cyber information is dependent upon two key variables: 


*The Perceived Believability of the Cyber Information and Data.


*The Perceived Usefulness of the Cyber Information and Data.


Our model is deeply rooted in the Technology Acceptance Model. In this eBook, we go more into the theoretical constructs of our new model and propose a new type of research methodology. Specifically, the following topics are covered: 


*An Introduction to the Technology Acceptance Model


*The Definition of Technological Acceptance


*The Theoretical Formulations For the Technology Acceptance Model


*The Technology Acceptance Models 


*A Cross Comparison Of The Models


*The Measurement Scales For The Technology Acceptance Model 


*The Scientific Limitations Presented By The Technology Acceptance Model


*The Cybersecurity Information Acceptance Model


*A Tentative Survey


*The Next Steps


Click here to get this eBook!!!


In terms if using the TAM model, there are not a lot of studies that have been done in Cybersecurity, thus giving scientific merit to what we are proposing here. Here is a sampling of the current research using TAM in Information Security::


TAM & Biometric Technology


TAM & Information Security In Malaysia


TAM & Information Security Strategies


TAM & Information Security Measures


TAM & Investments In Information Security


Contact Us

REACH OUT TO US ANYTIME!!!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.


Copyright © 2025 AST Cyber, Inc. - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept