are

PersistF: A Transparent Persistence Framework with Architecture Applying Design Patterns




are

Uniting Idaho:  A Small Newspaper Serves Hispanic Populations in Distributed Rural Areas




are

An Exploratory Survey in Collaborative Software in a Graduate Course in Automatic Identification and Data Capture




are

Introducing Students to Business Intelligence: Acceptance and Perceptions of OLAP Software




are

Accreditation of Monash University Software Engineering (MUSE) Program




are

Emotion-Aware Education and Research Systems




are

Evaluation of a Suite of Metrics for Component Based Software Engineering (CBSE)




are

Informing Clients through Information Communication Technology in Health Care Systems




are

Innovation and Scaling up Agile Software Engineering Projects




are

IT Systems Development: An IS Curricula Course that Combines Best Practices of Project Management and Software Engineering




are

Animated Courseware Support for Teaching Database Design




are

Cross-Departmental Collaboration for the Community: Technical Communicators in a Service-Learning Software Engineering Course




are

Student Marketability: Enhancing Software Skills




are

Collaboration of Two Service-Learning Courses: Software Development and Technical Communication




are

Demographic Factors Affecting Freshman Students' Attitudes towards Software Piracy: An Empirical Study




are

Virtual Campuses, Groupware and University Evolution




are

E-Textbooks Are Coming: Are We Ready?




are

Playing it Safe: Approaching Science Safety Awareness through Computer Game-Based Training




are

A Framework for Using Cost-Benefit Analysis in Making the Case for Software Upgrade




are

A Research Study for the Development of a SOA Middleware Prototype that used Web Services to Bridge the LMS to LOR Data Movement Interoperability Gap for Education




are

Software Engineering Frameworks: Perceptions of Second-Semester Students




are

Cross-Platform Mobile App Software Development in the Curriculum




are

Teaching Undergraduate Software Engineering Using Open Source Development Tools




are

Securing the Information and Communications Technology Global Supply Chain from Exploitation: Developing a Strategy for Education, Training, and Awareness




are

Exploring the Addition of Mobile Access to a Healthcare Services Website




are

An Effective Development Environment Setup for System and Application Software




are

Software Development Using C++: Beauty-and-the-Beast




are

Can E-Portfolio Improve Students’ Readiness to Find an IT Career?

An E-Portfolio Assessment Management System (EAMS) can be an innovative tool that provides students with flexible opportunities to demonstrate the acquisition of skills and abilities in an outcome-based institution. The system has been developed and used for the past ten years to create, reflect, revise, and structure students’ work. It is a repository management system that facilitates collecting, sharing, and presenting artifacts of student learning outcomes via a digital medium. Therefore, it provides students with flexible opportunities to demonstrate the acquisition of skills and abilities to demonstrate growth of achieving learning outcomes. The rationale of the EAMS is to allow students to demonstrate competences and reflect upon experiences to improve their learning and career readiness; hence, they are accountable for their learning. The system was built around two defined set of learning outcomes: institutionally agreed upon set of learning outcomes, and learning objectives that are related to major requirements. The purpose of this study is to analyze students’ perceptions and attitudes when using an e-portfolio to support their employment opportunities. The participants were 217 students in the College of Technological Innovation. The students reported that the developing of e-portfolios was extremely helpful. The results showed that students have positive opinions about using e-portfolios as a beneficial tool to support their readiness for employment; they believe an e-portfolio increases their confidence to find a job in the IT field because it can allow them to showcase artifacts that demonstrate competencies and reflect upon experiences, and they can provide their supervisors during their industrial training with an e-resume that includes views of their actual work of what they have learned and are able to do when they complete their degree. Employers then can review e-portfolios to select prospective employees work readiness skills; hence, graduates are more likely to obtain a job in their workplaces. In conclusion, students do like the idea of e-portfolios when it is presented to them as a career showcase rather than a process for documenting learning. A career center can use e-portfolios as a tool to help students find a job. Furthermore, our analysis and evaluation uncovered learning issues involved in moving from the traditional approach of learning toward an integrated learning system that can be used after graduation.




are

The Use of Computer Simulation to Compare Student performance in Traditional versus Distance Learning Environments

Simulations have been shown to be an effective tool in traditional learning environments; however, as distance learning grows in popularity, the need to examine simulation effectiveness in this environment has become paramount. A casual-comparative design was chosen for this study to determine whether students using a computer-based instructional simulation in hybrid and fully online environments learned better than traditional classroom learners. The study spans a period of 6 years beginning fall 2008 through spring 2014. The population studied was 281 undergraduate business students self-enrolled in a 200-level microcomputer application course. The overall results support previous studies in that computer simulations are most effective when used as a supplement to face-to-face lectures and in hybrid environments.




are

Information Security in Education: Are We Continually Improving?

This paper will shed light on the lack of the development of appropriate monitoring systems in the field of education. Test banks can be easily purchased. Smart phones can take and share pictures of exams. A video of an exam given through Blackboard can easily be made. A survey to determine the extent of cheating using technology was given to several university students. Evidence is provided that shows security is lacking as evidenced by the number of students who have made use of technological advances to cheat on exams. The findings and conclusion may serve as evidence for administrators and policy makers to re-assess efforts being made to increase security in online testing.




are

Are We Ready to Go Live with Our Team Projects?

Project work forms a large part in work undertaken by graduates when they enter the workforce, so projects are used in higher education to prepare students for their working lives and to enable students to apply creativity in their studies as they present a solution to a problem, using technical skills they have learned in different units of study. Projects, both at work and in higher education, may be completed in teams, thus providing experience and the opportunity to develop team working skills. The team projects presented in this paper have been provided by external organisations, so that students work in a team on a real life problem, but with the support of their tutors, in the university setting. In this way the projects more closely resemble the sorts of problems they might encounter in the workplace, giving an experience that cannot be gained by working on tutor devised problems, because the teams have to communicate with an external client to analyse and solve an authentic problem. Over the three years that the Live Projects have been running, feedback indicates that the students gain employability skills from the projects, and the organisations involved develop links with the university and benefit from output from the projects. A number of suggestions for improving the administration of the Live Projects were suggested, such as providing clients with information on timescales and providing students with more guidance on managing the projects.




are

Cloud Computing as an Enabler of Agile Global Software Development

Agile global software development (AGSD) is an increasingly prevalent software development strategy, as organizations hope to realize the benefits of accessing a larger resource pool of skilled labor, at a potentially reduced cost, while at the same time delivering value incrementally and iteratively. However, the distributed nature of AGSD creates geographic, temporal, socio-cultural distances that challenge collaboration between project stakeholders. The Cloud Computing (CC) service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) are similar to the aspirant qualities of AGSD as they provide services that are globally accessible, efficient, and stable, with lower predictable operating costs that scale to meet the computational demand. This study focused on the 12 agile principles upon which all agile methodologies are based, therein potentially increasing the potential for the findings to be generalized. Domestication Theory was used to assist in understanding how cloud technologies were appropriated in support of AGSD. The research strategy took the form of case study research. The findings suggest that some of the challenges in applying the agile principles in AGSD may be overcome by using CC.




are

Economic Upliftment and Social Development through the Development of Digital Astuteness in Rural Areas

One of the key attempts towards a collective African vision is the New Economic Partnership for African Development (NEPAD). Barnard and Vonk (2003) report that “53 countries have been urged to implement ICTs in three crucial development arenas: education, health and trade”. While NEPAD and other initiatives have contributed to the provision of ICT infrastructure with positive results as seen in the growth of Internet uses, the disparities in development across Africa are enormous. The challenge to Higher Education Institutions in Africa has been summarised by Colle (2005): “central to creating digital resources and academic infrastructure is the question of universities’ relevance to the world around them, and especially to the challenge of being an active player – ‘an anchor of a broad-based poverty alleviation strategy’ in an increasingly knowledge-based economy”. It can be inferred from Colle that the activities of HEIs in Africa ought to be geared towards contributing to the realisation of the Millennium development goals.




are

Using Office Simulation Software in Teaching Computer Literacy Using Three Sets of Teaching/Learning Activities

The most common course delivery model is based on teacher (knowledge provider) - student (knowledge receiver) relationship. The most visible symptom of this situation is over-reliance on textbook’s tutorials. This traditional model of delivery reduces teacher flexibility, causes lack of interest among students, and often makes classes boring. Especially this is visible when teaching Computer Literacy courses. Instead, authors of this paper suggest a new active model which is based on MS Office simulation. The proposed model was discussed within the framework of three activities: guided software simulation, instructor-led activities, and self-directed learning activities. The model proposed in the paper of active teaching based on software simulation was proven as more effective than traditional.




are

The Use of Kanban to Alleviate Collaboration and Communication Challenges of Global Software Development

Aim/Purpose: This paper aims to describe how various Kanban elements can help alleviate two prominent types of challenges, communication and collaboration in Global Software Development (GSD). Background: Iterative and Lean development methodologies like Kanban have gained significance in the software development industry, both in the co-located and globally distributed contexts. However, little is known on how such methodologies can help mitigate various challenges in that occur in a globally distributed software development context. Methodology: The study was conducted using a single-case study based on a general inductive approach to analysis and theory development. Through the literature review, collaboration and communication challenges that GSD teams face were identified. Data collected through semi-structured interviews was then inductively analyzed to describe how the case-study teams employed various Kanban elements to mitigate communication and collaboration challenges they face during GSD. Findings: The study found that some Kanban elements, when properly employed, can help alleviate collaboration and communication challenges that occur within GSD teams. These relate to Inclusion Criteria, Reverse Items, Kanban Board, Policies, Avatars, and Backlog. Contribution: The paper contributes to knowledge by proposing two simple concept maps that detail the specific types of communication and collaboration challenges which can be alleviated by the aforementioned Kanban elements in GSD. Recommendations for Practitioners: This paper is relevant to GSD teams who are seeking ways to enhance their team collaboration and communication as these are the most important elements that contribute to GSD project success. It is recommended that relevant Kanban elements be used to that effect, depending on the challenges that they aim to alleviate. Future Research: Future research can investigate the same research questions (or similar ones) using a quantitative approach.




are

The Elements Way: Empowering Parents, Educators, and Mentors in the Age of New Media

Aim/Purpose: This study was designed to examine the effectiveness of mentor’s work with immigrant children and adolescents at risk, using the Elements Way. Background: The New Media offers our “screen kids” a lot of information, many behavioral models, and a new type of social communication. The Elements Way is an educational method designed to enhance openness, development, breakthroughs, goal achievement, and transformation in the age of media and social networks. Methodology: The Elements Way was developed following research on communication in the diversified media, especially new media such as Facebook, WhatsApp, and television reality shows, and the study is an examination of the effectiveness of mentors’ work with immigrant children and adolescents at risk, using the Elements Way. All mentors had been trained in the Elements Way. The study population included 640 mentors working with immigrants’ children in Israel. The work was conducted in 2010-2013. The mixed-methods approach was selected to validate findings. Contribution: Empowering children and enhancing their ability to cope; Creating openness and sharing, making children more attentive to the significant adults in their lives; Supporting children who face the complex reality that characterizes our age. Findings: Significant differences were found in the mentors’ conduct with the children. Work programs were designed and implemented with care and consistency, and mentors succeeded in generating change within the children and achieving desired goals. Of the 640 participating mentors, 62 were not able to promote the child, and interviews with them revealed that their work with the children was not consistent with the Elements Way and began from a different vantage point. Recommendations for Practitioners: Success factors: Self-awareness and awareness of one’s surroundings. Empathy. Willingness to engage in significant interactions. Self-cleansing and self-reflection. Ability to engage in a personal and interpersonal dialogue. Ability to accept and contain the child. Cooperation with the child in creating a work program and assisting the child to achieve the goals that were set in the program. Recommendation for Researchers: Future studies should focus on analyzing the discussions of children and adolescents, to add depth to our insights regarding children and adolescents’ perception of the mentors’ work from their perspective. Impact on Society: Finding the “keys” to openness, development, goal achievement, and transformation in our work with “screen kids.” Future Research: Studies that are designed to examine the effectiveness of mentor’s work with immigrant children and adolescents at risk, using the Elements Way.




are

Ransomware: A Research and a Personal Case Study of Dealing with this Nasty Malware

Aim/Purpose : Share research finding about ransomware, depict the ransomware work in a format that commonly used by researchers and practitioners and illustrate personal case experience in dealing with ransomware. Background: Author was hit with Ransomware, suffered a lot from it, and did a lot of research about this topic. Author wants to share findings in his research and his experience in dealing with the aftermath of being hit with ransomware. Methodology: Case study. Applying the literature review for a personal case study. Contribution: More knowledge and awareness about ransomware, how it attacks peoples’ computers, and how well informed users can be hit with this malware. Findings: Even advanced computer users can be hit and suffer from Ransomware attacks. Awareness is very helpful. In addition, this study drew in chart format what is termed “The Ransomware Process”, depicting in chart format the steps that ransomware hits users and collects ransom. Recommendations for Practitioners : Study reiterates other recommendations made for dealing with ransomware attacks but puts them in personal context for more effective awareness about this malware. Recommendation for Researchers: This study lays the foundation for additional research to find solutions to the ransomware problem. IT researchers are aware of chart representations to depict cycles (like SDLC). This paper puts the problem in similar representation to show the work of ransomware. Impact on Society: Society will be better informed about ransomware. Through combining research, illustrating personal experience, and graphically representing the work of ransomware, society at large will be better informed about the risk of this malware. Future Research: Research into solutions for this problem and how to apply them to personal cases.




are

Predicting Suitable Areas for Growing Cassava Using Remote Sensing and Machine Learning Techniques: A Study in Nakhon-Phanom Thailand

Aim/Purpose: Although cassava is one of the crops that can be grown during the dry season in Northeastern Thailand, most farmers in the region do not know whether the crop can grow in their specific areas because the available agriculture planning guideline provides only a generic list of dry-season crops that can be grown in the whole region. The purpose of this research is to develop a predictive model that can be used to predict suitable areas for growing cassava in Northeastern Thailand during the dry season. Background: This paper develops a decision support system that can be used by farmers to assist them determine if cassava can be successfully grown in their specific areas. Methodology: This study uses satellite imagery and data on land characteristics to develop a machine learning model for predicting suitable areas for growing cassava in Thailand’s Nakhon-Phanom province. Contribution: This research contributes to the body of knowledge by developing a novel model for predicting suitable areas for growing cassava. Findings: This study identified elevation and Ferric Acrisols (Af) soil as the two most important features for predicting the best-suited areas for growing cassava in Nakhon-Phanom province, Thailand. The two-class boosted decision tree algorithm performs best when compared with other algorithms. The model achieved an accuracy of .886, and .746 F1-score. Recommendations for Practitioners: Farmers and agricultural extension agents will use the decision support system developed in this study to identify specific areas that are suitable for growing cassava in Nakhon-Phanom province, Thailand Recommendation for Researchers: To improve the predictive accuracy of the model developed in this study, more land and crop characteristics data should be incorporated during model development. The ground truth data for areas growing cassava should also be collected for a longer period to provide a more accurate sample of the areas that are suitable for cassava growing. Impact on Society: The use of machine learning for the development of new farming systems will enable farmers to produce more food throughout the year to feed the world’s growing population. Future Research: Further studies should be carried out to map other suitable areas for growing dry-season crops and to develop decision support systems for those crops.




are

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




are

Information and Communications Technology and Resilience of First-Generation Students Compared to Students with Educated Parents

Aim/Purpose. In this study, we examined, from the perspective of the participants, aspects of information and communications technology (ICT) and resilience, comparing first-generation students in higher education with students whose parents had higher education. Methodology. We examined self-image, motivation, happiness, and the use of ICT. This was a quantitative study. Respondents answered a questionnaire that contained open and closed questions. The sample included 307 students from academic institutions in Israel between the ages of 18 and 64. Findings. The findings were grouped into four clusters: (a) second-generation students under the age of 25 years, members of Generation Z; (b) second-generation students over the age of 25; (c) first-generation students over the age of 25 years (the largest group in the sample), mostly members of the Generation Y; and (d) first-generation students under the age of 25. We found consistent differences on all scales between the group of first-generation students over the age of 25 years and those in the other groups. The research findings indicate that the group with the highest resilience was students who were the first generation acquiring higher education and were over 25, mostly members of the Y generation. Impact on Society. This research allows an instructive look at Generation Y and Generation Z and the academic abilities of this generation. Future Research. Future studies should examine the correlation between a sense of resilience (which was examined in this study) and academic achievement (which was not).




are

How Different Are Johnson and Wang? Documenting Discrepancies in the Records of Ethnic Scholars in Scopus

Aim/Purpose. This study captures and describes the discrepancies in the performance matrices of comparable Chinese and American scholars as recorded by Scopus. Background. The contributions of Chinese scholars to the global knowledge enterprise are increasing, whereas indexing bibliometric databases (e.g., Scopus) are not optimally designed to track their names and record their work precisely. Methodology. Coarsened exact matching was employed to construct two samples of comparable Chinese and American scholars in terms of gender, fields of work, educational backgrounds, experience, and workplace. Under 200 scholars, around a third being Chinese and the rest American scholars, were selected through this data construction method. Statistical tests, including logit regressions, Poisson regression, and fractional response models, were applied to both samples to measure and verify the discrepancies stored within their Scopus accounts. Contribution. This study complicates the theory of academic identity development, especially on the intellectual strand, as it shows ethnic scholars may face more errors in how their track records are stored and presented. This study also provides inputs for the discussion of algorithmic discrimination from the academic context and to the scientific community. Findings. This paper finds that Chinese scholars are more prone to imprecise records in Scopus (i.e., more duplicate accounts, a higher gap between the best-statistic accounts, and the total numbers of publications and citations) than their American counterparts. These findings are consistent across two samples and with different statistical tests. Recommendations for Practitioners. This paper suggests practitioners and administrators at research institutions treat scholars’ metrics presented in Scopus or other bibliometric databases with caution while evaluating ethnic scholars’ contributions. Recommendations for Researchers. Scholars and researchers are suggested to dedicate efforts to monitoring their accounts on indexing bibliometric platforms. Impact on Society. This paper raises awareness of the barriers that ethnic scholars face in participating in the scientific community and being recognized for their contributions. Future Research. Future research can be built on this paper by expanding the size of the analytical samples and extending similar analyses on comparable data harvested from other bibliometric platforms.




are

Information Technology in Healthcare: A Systematic Literature Review

Aim/Purpose. The aim of this study is to recognize the factors that contributed to the development of IT in the healthcare industry. Background. The healthcare Information Technology (IT) solutions market has experienced remarkable growth, with the healthcare sector emerging as a $303 billion industry. However, despite its substantial size, the healthcare industry has faced criticism for its slow adoption of innovative technologies. This study aims to explore factors driving the evolution of IT in the healthcare sector. Methodology. The researchers conducted a systematic literature review, searching the PubMed and Emerald databases for relevant peer-reviewed articles. After filtering based on defined criteria, 433 articles were included for analysis. Thematic analysis was applied to the abstract of articles which spanned the period of 1997 to 2023. Contribution. This study provides a conceptual framework elucidating the key factors driving the evolution of IT in the healthcare industry. By systematically analyzing the existing literature, the research identifies four overarching themes – government policies, technological potentials, healthcare delivery needs, and organizational motivations – that have propelled the development and adoption of healthcare IT solutions. Provide a conceptual model for understanding, and design of the healthcare it solutions. Findings. Based on the analysis in this paper, four themes emerged: government policies promoting IT adoption through initiatives like incentives for electronic health records; technological breakthroughs enabling new healthcare IT capabilities; healthcare delivery needs to drive IT integration for improved quality and safety; and patient experience and organizational motivations to leverage IT for streamlining processes and knowledge management. Recommendations for Practitioners. The conceptual model can guide practitioners in developing IT solutions aligned with policy drivers, technological capabilities, care delivery needs, and organizational imperatives. Recommendations for Researchers. The conceptual framework developed in this study offers a lens for researchers across disciplines to continue investigating the role of information technology in the healthcare industry. Impact on Society. Examining the evolution of IT in the healthcare industry revealed the importance of information technology in enhancing the delivery and affordability of healthcare services and addressing issues of accessibility and inequality. Future Research. Future research will explore global perspectives showcasing the successful impact of IT on healthcare, as emerging technologies impact healthcare delivery and patient outcomes.




are

TQM for Information Systems: Are Indian Organizations Ready?




are

An Improved Assessment of Personality Traits in Software Engineering




are

A Generic Agent Framework to Support the Various Software Project Management Processes




are

An Evolutionary Software Project Management Maturity Model for Mauritius




are

Interest in ICT Studies and Careers: Perspectives of Secondary School Female Students from Low Socioeconomic Backgrounds




are

Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK




are

The Impact of Business Intelligence on Healthcare Delivery in the USA




are

An Empirical Examination of Customers’ Mobile Phone Experience and Awareness of Mobile Banking Services in Mobile Banking in Saudi Arabia

Aim/Purpose: This work aims to understand why a disparity between the popularity of smart phones and the limited adoption of m-banking exists. Accordingly, this study investigates factors that affect a person’s decision to adopt m-banking services. Such an investigation seeks to determine if and to what extent customers’ mobile phone experience as well as their awareness of m-banking services influence their intention to use such services? Background: This study developed a conceptual model to determine the influence that users’ mobile phone experience as well as users’ awareness of m-banking services had on users’ behavioral intention to use m-banking in Saudi Arabia. Methodology: The quantitative method used to collect data was a survey questionnaire tech-nique. A questionnaire with non-structured (close-ended) questions was formulated. A random sample, targeting banking customers in Saudi Arabia, was selected. This study collected data using a cross-sectional survey. Of those surveyed, 389 provided valid responses eligible for data analysis. SPSS v.22 was used to analyze the data. Contribution: This study produced helpful results and a new m-banking conceptual model. The developed conceptual model focused integrally on users’ awareness and experience as antecedents of m-banking adoption and highlighted the im-portance of differentiating between measuring the users’ characteristics in adopting e-banking in general and m-banking services in particular. In addition, this type of model has the ability to synthesize new control variables as well as to study technology acceptance in developing countries. This study, based on an extended UTAUT model, set out to discover what factors might affect customers’ intentions to use m-banking in Saudi Arabia. Findings: The results show that service awareness has a direct effect on performance and effort expectancy, but not on perceived risk. Moreover, mobile phone experience fails to impact the relationships in the same hypothesized direction. As anticipated, performance expectancy, effort expectancy, and perceived risk have direct and significant effects on behavioral intentions to use m-banking. However, customer awareness fails to impact the relationships of performance expectancy, effort expectancy, and perceived risk on behavioral intentions to use m-banking. Recommendations for Practitioners: Banks should target customers by distributing useful information and applying measures to increase acceptance. Banks need to introduce something imaginative to convince bank customers to abandon existing service channels and adopt m-banking services. Banks should make m-banking services the easiest service for conducting bank transactions and/or help customers conduct transactions that they cannot do any other way. Recommendation for Researchers: Other factors, such as trust, culture, and/or credibility should be investigated along with user’s awareness and experience factors in m-banking services. There is a need to focus on a specific type of m-banking. Thus, it may be fruitful to study the adoption of different systems of m-banking services. Impact on Society: This study suggests that m-banking services should be designed and built based on a deep understanding of customers’ needs using extensive testing to assure that applications and sites function well in a mobile setting. Future Research: Future researchers should apply the conceptual model developed in this study in different settings, different countries, and to different technologies.