A Model for Technology Acceptance in Law Enforcement A Case Study involving Lawful Intercept Technology at a Prosecutor's Office By Vincent Gisonti May.

Slides:



Advertisements
Similar presentations
Human Resource Management Strategy
Advertisements

Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Copyright © 2004 Sherif Kamel Technology Acceptance Model Sherif Kamel The American University in Cairo.
IT Project Management AN INTRODUCTION TO ETHICS
Lesson 1: Introduction to IT Business and Careers
Robin L. Donaldson May 5, 2010 Prospectus Defense Florida State University College of Communication and Information.
Performance Management and Appraisal
Criminal Justice Organizations: Administration and Management
Learning new uses of technology: Situational goal orientation matters Presenter: Che-Yu Lin Advisor: Min-Puu Chen Date: 03/09/2009 Loraas, T., & Diaz,
How does a web-service’s apparent trustworthiness affect people’s intention to adopt? a.k.a. “Seal of Approval and Multidimensionality of Perceived Trustworthiness.
Human Resource Management Strategy
Chapter 7: Performance Management Learning Objectives Understand the concept of performance management. Understand how performance appraisal contributes.
THE COURTROOM WORK GROUP
Why don’t innovation models help with informatics implementations? Rod Ward University of the West of England Medinfo 2010.
Performance Management and Employee Development: Overview Personal Developmental Plans Personal Developmental Plans Direct Supervisor’s Role Direct Supervisor’s.
SECURITY CONSIDERATIONS FOR COMPUTER PERSONNEL Tom Richards, Steve Guynes and Wayne Spence April 12, 2010.
Herman Aguinis, University of Colorado at Denver Prentice Hall, Inc. © 2006 Performance Management and Employee Development: Overview Personal Developmental.
1. Quick Review Case Study in Textbook  Research Methodology  Objectives and Benefits of SISP  “Concerns” or Unsuccessful Features of SISP  Shift.
STAFF APPRAISAL PROGRAMS
Chapter 13: Descriptive and Exploratory Research
Chapter 3 Preparing and Evaluating a Research Plan Gay and Airasian
What are competencies – some definitions ……… Competencies are the characteristics of an employee that lead to the demonstration of skills & abilities,
Introducing the Computer Self-Efficacy to the Expectation-Confirmation Model: In Virtual Learning Environments 授課老師:游佳萍 老師 學 生:吳雅真 學 號:
Diffusion of Innovations Theory Tyra JanssonTyra Jansson H571 Principles of Health BehaviorH571 Principles of Health Behavior.
© Prentice Hall, © Prentice Hall, ObjectivesObjectives 1.An understanding of employee workplace attitudes 2.Insights into how to.
1.
Chapter 4 Analyzing Jobs.
Advisor: 謝焸君 教授 Student: 賴千惠
Franklin University Dr. Lewis Chongwony, Instructional Designer
A Framework for Understanding Ethical Decision Making in Business
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved Marketing Research, Primary Data, Secondary Data, Qualitative Research, Quantitative.
University of Regensburg Institute for Educational Science Older workers´ workplace learning – Toward the construction of a theoretical framework on basis.
© Prentice Hall, Modern Management 9 th edition.
Maria R. Zuniga California State University Long Beach May, 2012.
A COMPETENCY APPROACH TO HUMAN RESOURCE MANAGEMENT
Copyright  1999 Houghton Mifflin Company. All rights reserved Chapter 11 Performance Appraisal Cynthia D. Fisher Lyle F. Schoenfeldt James B. Shaw.
Steven Matthew Brown Valdosta State University September 16, 2013.
BCCO PCT #4 PowerPoint Texas Commission On Law Enforcement ADVANCED INSTRUCTOR COURSE # 1017 UNIT THREE.
Is research in education important?. What is the difference between Qualitative and Quantitative Research Methods?
Ethical Challenge & Solution in Social Behavioral Research Melody Lin December 2012.
Quantitative and Qualitative Approaches
Principals as people managers Vasanthi Srinivasan.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
Information commitments, evaluative standards and information searching strategies in web-based learning evnironments Ying-Tien Wu & Chin-Chung Tsai Institute.
Ethics & Research Dr. Guerette. Defining Ethics Deal with matters of right and wrong. Deal with matters of right and wrong. May be defined as behavior.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Travelers and location-information in the mobile environment – consumer attitudes and a prototype of a service for early adopters of mobile Internet service.
Advanced Instructor Course. Task Analysis Presented By.
Surveying instructor and learner attitudes toward e-learning Presenter: Jenny Tseng Professor: Ming-Puu Chen Date: April 12, 2008 Liaw, S., Huang, H.,
Theories of Health Behaviors Gero 302. Health Belief Model Has intuitive Logic and clearly stated central tenents Behind the HBM values and expectancy.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
Students Beliefs and Attitudes toward Information Technology Douglas Havelka, Miami University.
Unit 7—Promoting Growth and Development CJ422: Human Resource Development for the Criminal Justice Professional.
AUTHOR: NADIRAN TANYELI PRESENTER: SAMANTHA INSTRUCTOR: KATE CHEN DATE: MARCH 10, 2010 The Efficiency of Online English Language Instruction on Students’
WORKPLACE READINESS SKILLS FOR THE COMMONWEALTH OF VIRGINIA.
CJA 304 OUTLET Peer Educator/cja304outlet.com FOR MORE CLASSES VISIT
CJA 304 Entire Course FOR MORE CLASSES VISIT CJA 304 Week 1 Discussion Question 1 CJA 304 Week 1 Discussion Question 2 CJA 304 Week.
For more course tutorials visit
CJA 334 Week 2 Individual Gathering Research Data Paper To purchase this material click below link Week-2-Individual-Gathering-Research-Data-Paper.
CJA 484 Week 2 Individual Ethics in Criminal Justice Administration Analysis Write an 800- to 1,000-word paper in which you analyze the relationship between.
Lecture 10: User Acceptance
CompTIA Security+ Study Guide (SY0-401)
COMPLIANCE Challenges and opportunities for the legal profession
The University of Adelaide, School of Computer Science
Chapter 8 Performance Management and Employee Development
Chapter 8 Performance Management and Employee Development
Objective Proposed Model Results Contributions
Lecture 10: User Acceptance
Performance Monitoring and Feedback
Presentation transcript:

A Model for Technology Acceptance in Law Enforcement A Case Study involving Lawful Intercept Technology at a Prosecutor's Office By Vincent Gisonti May 4, 2012

What is technology acceptance? Gattiker (1984) defined technology acceptance as “an individual’s psychological state with regard to his or her voluntary or intended use of a particular technology.” Morris (1996) defined technology acceptance as “the degree to which an individual decides to use a technology.”

Why study technology acceptance? An important area of research Many technology acceptance models User population, technology and context

What is a Mandatory Use Environment Sørebø & Eikebrokk (2008) defined this term as an environment “consisting of an information system that users have to use in order to fulfill tasks that are required for their job assignments.” Brown et al, (2002) defined a mandatory use environment as “one in which employees must use a specific system in order to perform their work tasks and to keep their jobs.”

Why study technology acceptance in a law enforcement? Lack of research in technology acceptance Bias in law enforcement research

Criminal Justice System

Why study technology acceptance in a prosecutor’s office? Technology acceptance is dependent on user population, technology and the context in which the technology is used. Distinct role and responsibilities Distinct mission

Why study technology acceptance in a prosecutor’s office? To date there has been no technology acceptance research involving prosecutor’s offices.

What are Law Enforcement Technologies? Police Technologies Legal Technologies

What is Lawful Intercept Technology? Court-ordered electronic eavesdropping A potent but controversial tool

Why Study Lawful Intercept Technology?

Challenges and Criticism –Network security –Vulnerability –Privacy –Minimization, Professional Hearing, and Entextualization –Statistics –Advances in telecommunications

Why Study Lawful Intercept Technology? To date there has been no technology acceptance research of lawful intercept technology.

5/21/ Law Enforcement Technology Acceptance Model (LEM) Intention Attitude Subjective Norm Perceived Behavioral Control Relative Advantage Compatibility Complexity Observability Peer Influence Subordinate Influence Superior Influence Computer Self-Efficacy Top Mgmt Support User Support IS Professionalism User Training Availability

5/21/ Research Questions What factors influence technology acceptance of lawful intercept technology in a law enforcement setting? How do these technology acceptance factors influence each other? Do the values of these factors differ between and among investigators and attorneys in the law enforcement domain?

5/21/ Method Combination of qualitative and quantitative methods has been found to provide a fuller understanding of the research questions being investigated. (Akbulut, 2003; Lapczynski, 2004; Saviak, 2007) Qualitative method will involve interviews of six investigators and two attorneys Quantitative method will involve a survey of 150 investigators and 25 attorneys Analysis using standard techniques

5/21/ Research Contributions Theoretical Contributions This study responds to the need for and improves the understanding of technology acceptance, in general, and mandatory-use environments, specifically. This study responds to the need for and improves the understanding of technology acceptance in a previously unstudied domain, prosecutor's offices, a vital and distinct component of the criminal justice system. This study responds to the need for and improves the understanding of technology acceptance of a previously unstudied technology, lawful intercept technology, one of the most potent and controversial technologies used by law enforcement.

5/21/ Research Contributions Practical Contributions The literature asserts that awareness of technology acceptance factors will help aid in the development of policies, guide the implementation of technology, and improve the productivity and efficiency of users. (Mullen, 1996; Akbulut, 2003; Colvin and Goh, 2005; Hu, Lin, and Chen, 2005; Scott, 2006; Tosun, 2006; Saviak, 2007; Yalcinkaya, 2007; Lai, 2008) This study supports the work of information technology administrators, in general, by identifying factors that influence a user's acceptance of technology. This study supports the work of information technology administrators in law enforcement, specifically, by identifying factors that influence an investigator's and attorney's acceptance of technology.

A Model for Technology Acceptance in Law Enforcement Remaining tasks: Survey and Analysis