Next Article in Journal
Machine Vision-Based Method for Estimating Lateral Slope of Structured Roads
Previous Article in Journal
HSDDD: A Hybrid Scheme for the Detection of Distracted Driving through Fusion of Deep Learning and Handcrafted Features
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers

1
Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India
2
College of Technological Innovation, Zayed University, Dubai 4783, United Arab Emirates
3
Department of Software, Sejong University, Seoul 05006, Korea
4
School of Computer Science and Technology, Kean University, Union, NJ 07083, USA
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2022, 22(5), 1866; https://doi.org/10.3390/s22051866
Submission received: 13 December 2021 / Revised: 18 February 2022 / Accepted: 24 February 2022 / Published: 26 February 2022
(This article belongs to the Section Internet of Things)

Abstract

:
Advancements in IoT technology have been instrumental in the design and implementation of various ubiquitous services. One such design activity was carried out by the authors of this paper, who proposed a novel cloud-centric IoT-based disaster management framework and developed a multimedia-based prototype that employed real-time geographical maps. The multimedia-based system can provide vital information on maps that can improve the planning and execution of evacuation tasks. This study was intended to explore the acceptance of the proposed technology by the specific set of users that could potentially lead to its adoption by rescue agencies for carrying out indoor rescue and evacuation operations. The novelty of this study lies in the concept that the acceptability of the proposed system was ascertained before the complete implementation of the system, which prevented potential losses of time and other resources. Based on the extended Technology Acceptance Model (TAM), we proposed a model included factors such as perceived usefulness, perceived ease of use, attitude, and behavioural intention. Other factors include trust in the proposed system, job relevance, and information requirement characteristics. Online survey data collected from the respondents were analyzed using structural equation modelling (SEM) revealed that although perceived ease of use and job relevance had significant impacts on perceived usefulness, trust had a somewhat milder impact on the same. The model also demonstrated a statistically moderate impact of trust and perceived ease of use on behavioural intention. All other relationships were statistically strong. Overall, all proposed relationships were supported, with the research model providing a better understanding of the perceptions of users towards the adoption of the proposed technology. This would be particularly useful while making decisions regarding the inclusion of various features during the industrial production of the proposed system.

1. Introduction

Earthquakes and other environmental hazards have remained the causes of numerous disaster events. Most of these disasters cause grave damage to life and property. A significant number of such disasters comprise building fires and building collapses.
In the past century, there have been tremendous enhancements in different specializations of engineering such as civil and structural engineering, electronics, and allied fields, and computer science engineering which has led to humans finding newer and better ways to tackle disaster situations. Buildings now offer better safety due to the use of earthquake-resistant structures and the deployment of fire-fighting equipment inside. However, disasters still strike at unexpected times, and damage to life and property continues to happen. In 2018, India alone witnessed 7887 incidents of building fires, both residential and commercial, that resulted in 7779 fatalities [1]. Similarly, there were 1953 cases of building/structure collapses in 2018 that claimed 2017 deaths [2]. In most cases, the loss of life can be attributed to the fact that the emergency response teams are mobilized after a considerable time lag due to the largely manual incident reporting systems
The availability of Internet of Things (IoT) devices and low-cost sensors for measuring different parameters such as humidity, temperature, pressure, and smoke density has paved the way for generating ubiquitous applications for a varied set of requirements. The market for the IoT has witnessed a sea-change in the last few years. In 2018, the global IoT market was valued at USD 190 billion. With the rapid adoption of IoT technology for various projects, it is projected that by 2026, the IoT market will be valued at USD 1102.6 billion [3]. The IoT-based applications have attracted voluminous attention and researchers, as well as engineers, have been exploring the possibility of using IoT for every possible scenario including disaster management [4,5,6,7,8].
In recent years, IoT technologies have drawn the attention of the Government of India (GoI). The GoI launched the National Smart Cities Mission with the intention to develop sustainable and resident-friendly smart cities throughout the country [9] by integrating a wide range of services into a single Information and Communication Technology (ICT) [10]. The benefits of the integrated services are more pronounced if they are automated through the implementation of IoT infrastructures [11]. IoT implementation in smart cities can provide an automatic rendering of services, such as vehicle parking, monitoring and rerouting of vehicular traffic, weather services, surveillance systems, and environmental pollution monitoring, thereby decreasing the time and human effort spent on those activities.
Emergency and rescue services are considered amongst the most important services provided by city administrations besides health care, public security, public works, etc. Efficient communication holds the key to the successful management and execution of disaster rescue operations [12]. Rescue teams need critical data regarding incidents for the better planning of rescue missions. However, since such data are often not available, rescuers are forced to rely on unstructured, ambiguous information that is received from different persons and is usually marred by uncertainty.
With the IoT, it is possible to implement regular monitoring of buildings and to generate warnings or alerts at an early stage of any disaster-like situation. A cloud-centric IoT-based disaster management framework for indoor rescue operations was proposed by the authors in a previous study and is depicted in Figure 1 [13]. This framework allows for the automatic reporting of indoor disaster situations to emergency response teams without any human intervention. The reporting is done within a few seconds to all the stakeholders who are mapped to the disaster-struck building. The details of the exact location of the disaster (fire/building collapse) within the building are also reported. The framework also has provisions for reporting the count of probable victims inside the disaster-struck building, thereby allowing rescue/evacuation teams to effectively plan the evacuation operations en route to the site of the disaster. However, since such IoT-based systems are not reportedly deployed at present, most emergency and rescue team members are not aware of the benefits of systems based on such frameworks. Therefore, it is imperative that rescue team members become acquainted with this innovative technology to enable them to its adoption. We developed a prototype of the system to inform rescue team members about the proposed system. The prototype comprises the integration of Google Maps with locations of various sensors installed within a building. The count of persons at any location and the detection of disaster-like situations are depicted using heat maps. These details are dynamically fetched from a cloud database.
Various sensors such as fire sensors, smoke sensors, accelerometers, and person counters are installed at specific locations in large buildings. These sensors collect and supply necessary data to a specialized subsystem called a data aggregator (DA) that consolidates them into data packets, each bearing a unique timestamp. The data packets are transmitted over the cloud where the data are stored in an online repository called the cloud datastore (CD). This process is performed on a continuous basis for each set of sensor values received from different commercial facilities, and the data packets are stored in appropriate data buckets in the CD.
A module called the disaster-sensing unit (DSU) is installed as a service on the cloud. The data collected by DA are analyzed by the DSU to ascertain whether the disaster-like situation has arisen inside any of the buildings that are listed in the system’s database. In the event of an affirmative outcome, the DSU immediately activates the push notification (PN) module, which then sends alert messages to all stakeholders, including the floor supervisor and the response teams (RTs) that are stationed in the affected area, through SMS/email. All stakeholders are provided the necessary data by the victim localization service (VLS) via the user interface (UI).
The VLS module presents important data to the RTs through the UI, which displays real-time information via pre-configured indoor building maps. The heat maps are superimposed onto floor maps to show the count of victims trapped inside disaster-struck buildings. This information can prove helpful in launching rescue operations in areas where victims are present. The UI can be accessed by the RTs with any internet-enabled device. However, in the event of the internet connection between the sensors and the DA or the connection between the DA and the MB becoming non-functional, the VLS presents the most recent snapshot of the available data.

2. Methodology

2.1. Tools and Techniques Employed

The authors of this study employed the Technology Acceptance Model (TAM) to establish the willingness of rescue team members to adopt the proposed systems. Proposed by Davis in 1986 as an outcome of his research work [14], TAM is extensively used to generate models to reflect the intentions of the intended users to accept and use the new technology [15,16,17]. An extended version of the technique was later proposed in 2000 and is known as TAM2 [15].
This study intends to ascertain the level of acceptability of the proposed IoT-based indoor disaster management software tool by rescue workers. Since this system is not available commercially and is not yet deployed in any building, therefore a custom-built simulator was deployed to imitate the flow of persons in the indoor environment of any large commercial complex by synthetically modulating the virtual sensor values. The simulator was developed using the Java programming language and was deployed on Google Cloud as a service. A web-based user interface (UI) was also developed using the Google Maps API and the simulated situational data was displayed by overlaying the heat maps on Google Maps. The UI provided ready reference to the rescue teams and could be accessed using any smart device.
This study employed structural equation modelling (SEM) for analysis because of its capability to test the hypothesized relationships established in a research model with multiple constructs. It also considers analysis error terms that cannot be uncovered using other prominent techniques such as multiple regression [18]. Data were collected with a structured questionnaire, the collected responses of which were analyzed using IBM AMOS 20.

2.2. Literature Collection

A manual search was performed in the Google Scholar database to access the literature related to TAM. Initially, an attempt was made to look out for the articles published in the recent past between 2011 and 2020. Since the TAM is implemented and evaluated through the SEM technique, articles related to SEM were also queried. The keywords used to search the articles were “Technology Acceptance Model” OR “Acceptance of New Technology” OR “Technology Acceptance Framework” OR “Technology Acceptance in Disaster Management” OR “Adoption of Emergency Rescue Technology using TAM” OR “Structural Equation Modelling in Technology Acceptance Model”. A total of 892 articles were shortlisted in the first phase. The Mendeley desktop application was used to maintain the repository of downloaded articles. Then, a manual screening process was initiated for the selection of relevant literature. It was observed that the literature cited by most of the articles pointed to the articles published from the late 1980s to the early 2000s. This was the period in which the TAM was proposed and evolved into TAM2. Therefore, the articles by the original proposers and the early implementors of the TAM were also included in the search. In addition to the TAM, articles on SEM were also queried. The absolute number of records after this step was 912 articles.
Having formed a repository, we initiated the screening phase using Mendeley, wherein we attempted to remove any duplicate records. This was followed by the manual examination of the titles and abstracts of the articles with the intent to determine relevance to the present study. This step removed most irrelevant articles, and only 187 records were found suitable for the study.
Since the TAM is extensively used by the researchers working in the domain of technology acceptance, in this study, only the articles that received significant recognition by subsequent research (with some articles having more than 8000 citations according to Google Scholar) were considered. Finally, 91 articles were shortlisted for inclusion in the article.

3. Literature Review and Development of Research Model

Models that have been employed in research on technology adoption have considered people’s ideas, considerations, and attitudes regarding certain technologies. One of the most prominent models is the TAM, which mainly considers two constructs: perceived usefulness (PU) and perceived ease of use (PEU) [14]. Various studies have extended the Technology Acceptance Model to validate respective research models [15,19,20]. The authors of this research work considered prominent constructs of the TAM, namely PU, PEU, attitude towards adoption (ATA), and behavioural intention to use (BI). Additionally, some new constructs were introduced in the extended version of the TAM, and since the proposed system is to be used during emergency situations, it is imperative that the factors of trust (TR), job relevance (JR) and information requirement characteristics (IRC) regarding the acceptance of the proposed system be evaluated in conjunction with the conventional constructs.
The study of related literature revealed that the use of IoT in disaster management has been suggested previously. However, a study related to acceptance of a complete IoT-based framework for disaster management thorough advanced statistical techniques had not been conducted. Figure 2 depicts the advancements in research trends in this domain.

3.1. Perceived Ease of Use

Studies on the original and extended TAM have revealed that users perceive a technology to be useful if it is user-friendly and easy to use. The ease of use refers to how easy the technology is to use/how much effort is required. Thus, the ease of use has a strong bearing on perceptions of usefulness [14,15,16,21,22,23,24]. Furthermore, TAM depends on the perception that ease of use influences the intended user’s intention to use a technology [14,15,16,23,24,25,26,27,28]. Therefore, the following hypotheses were derived.
Hypothesis 1 (H1).
A significant relationship exists between the PEU and the PU.
Hypothesis 2 (H2).
A significant relationship exists between the PEU and BI.

3.2. Perceived Ease of Use

Perceived usefulness is the user’s perception of the ability of the new technology to improve job performance. A statistically significant relationship between the perceived usefulness and attitude towards adoption of technology has been reported in previous studies [29,30]. On the same lines, the authors of this study perceived that a positive attitude towards the proposed technology may be reflected by the intended users if they find it useful. Thus, the following hypothesis was derived.
Hypothesis 3 (H3).
A significant relationship exists between PU and ATA.

3.3. Attitude towards Adoption

Previous studies have shown that a user’s attitude towards a technology affects their intention to use it [31,32,33,34]. It has also been shown that even if the use of an innovative technology is mandatory, there may be certain users who do not wholeheartedly accept it, which may hamper implementation [35,36].
Hypothesis 4 (H4).
A significant relationship exists between ATA and BI.

3.4. Job Relevance

The proposed system is intended to be primarily used by rescue workers who specialize in such operations [37] and can relate the usefulness of the proposed system in executing their job-related activities.
In this regard, Venkatesh [15,27] considered job relevance as a cognitive factor in the extended TAM. This allowed them to measure the perception of the individuals regarding the usage of technology in their jobs. Other studies have also been carried out to ascertain the effect of job relevance on perceived usefulness [16,38]. The following hypotheses were accordingly derived.
Hypothesis 5 (H5).
A significant relationship exists between JR and PU.
Hypothesis 6 (H6).
A significant relationship exists between JR and BI.

3.5. Trust in Proposed System

As new technologies are introduced in any domain, users may experience some uncertainty. Accordingly, the authors of some studies have considered trust in technology as an important factor [39,40,41,42]. Since the proposed system in this study is a disaster management tool for obtaining important data to enable effective evacuation in case of an indoor emergency, we also considered trust in the proposed system because it could have a direct bearing on the perceptions of rescue team members towards the system. It has been shown in previous research that trust has an impact on perceived usefulness and behavioural intention to use new technologies [17,42]. Thus, for this study, it was hypothesized that:
Hypothesis 7 (H7).
A significant relationship exists between TR and PU.
Hypothesis 8 (H8).
A significant relationship exists between TR and BI.

3.6. Information Requirement Characteristics

Any rescue operation requires good planning and appropriate resource allocation. Since the proposed system was designed to be mainly used in life-threatening conditions, it is expected that it should be able to provide correct and relevant information to rescue team members to enable them to act accordingly. In this regard, it is considered that if correct and relevant information is available, then the users will believe that the system is relevant to their job and will develop trust in the system. Therefore, the following hypotheses were derived.
Hypothesis 9 (H9).
A significant relationship exists between IRC and JR.
Hypothesis 10 (H10).
A significant relationship exists between IRC and TR.
Figure 3 depicts the extended TAM research model based on the hypotheses defined above.

4. Research Methodology

4.1. Measurement Scales

The authors of this study used an online structured questionnaire to collect data. The various indicators were based on extended TAM constructs, as shown in Figure 3. The questionnaire adapted the scale items for different constructs from measures that were previously validated in earlier studies. The indicators for each measurement model were then restated to align with the characteristics of proposed indoor disaster management system. The scales for PEU, PU, JR, and BI were adapted from [15]. Items relating to attitude towards adoption (ATA) were adapted from [22]. The items for trust (TR) were adapted from [17], and the items for information requirement characteristics (IRC) were adapted from [43].

4.2. Content Validity

The online questionnaire carried 24 indicators conforming to the Technology Acceptance Model, as well as 9 demographic questions. The questionnaire was shared with experts to validate that the various indicators represent the specific latent variables. On the recommendation of the experts, one indicator that was considered redundant was dropped from the questionnaire. This resulted in 23 indicators remaining in the questionnaire. All indicators were designed to be answered on a seven-point Likert scale in which a value of 1 indicated “strongly disagree” and a value of 7 indicated “strongly agree”.
In order to ensure the easy access and submission of replies by users, we initiated a pilot study wherein 30 security staff members were sent a link to the questionnaire. The pilot study did not yield any negative issues except for requests to reframe one question for better understandability and to provide all questions in Devanagari (Hindi) script in addition to English. The feedback was duly acknowledged, and the questionnaire was set as a bilingual instrument. The English version of the questionnaire is presented in Table 1. The responses recorded during the pilot study were subjected to Cronbach’s alpha using SPSS 21 to measure internal consistency. With Cronbach’s alpha coefficients being computed above 0.70 for each of the constructs, all initial scales employed in the research model were found to be reliable measures for their respective constructs.

4.3. Data Collection

The link of the online questionnaire was shared with two different categories of respondents. The first category comprised the full-time fire fighters deployed in the three different cities of the state of Punjab (India)—SAS Nagar, Zirakpur and Derabassi—and three fire stations of Chandigarh. This category of respondents is extensively trained to perform evacuation operations in case of indoor fire or building collapse. The second category of respondents comprised the security staff of large shopping malls and buildings with various corporate offices. The respondents belonging to this category are also trained to respond to the disaster-like situations within the building and are usually the first to respond to any mishap. However, those of category 1 are equipped with specialized equipment for fire-fighting operations and evacuation. Police personnel are also trained for carrying out rescue and evacuation operations, though they are not directly involved. Therefore, police personnel were also included in the scope of the study and were placed in category 2.
To allow the respondents a better understanding of the proposed IoT-based system for disaster management, we felt the need to provide a demonstration of the system to rescue staff. Therefore, we contacted fire station officers, who facilitated meetings between the authors and the category 1 respondents. Similarly, the security and safety supervisors of the commercial complexes facilitated meetings with the category 2 respondents. The demonstration of the system was followed by the sharing of the link to the online questionnaire.
Having received 270 responses, a data pre-processing was initiated to remove duplicate responses. Only one response sheet from each respondent was used for analysis, and the duplicate responses were considered invalid. No case of incomplete data was observed because all questions in the online questionnaire were mandatory. Finally, only 257 responses were treated as valid. From about 180 fire fighters deployed in the fire stations visited by the authors, only 106 participated in the survey. All other 151 responses were filled by the second category of respondents.
The demographic characteristics of the respondents are shown in Figure 4. As shown in Figure 4a, a major percentage of responders were male, which can be attributed to the hazardous nature of the job. As shown in Figure 4b, 33.07% of overall respondents were younger than 30 years old and 36.97% belonged to age group of 30–39 years. Only 10.12% of the respondents were older than 50 years old.

5. Data Analysis and Results

5.1. Descriptive Statistics

In order to determine the mean and standard deviation (SD) for the various responses recorded, descriptive statistical tests were conducted. The results of descriptive statistics are presented in Table 2. All mean values were found to be more than 5.90, which indicated that the respondents had positive perceptions for the proposed system. Table 3 depicts the correlation matrix for all constructs defined in the research model. All constructs were found to be positively correlated.

5.2. Measurement Model Analysis

The causal paths defined with the various hypotheses were tested using the SEM technique, which has become popular in the research community for estimating causal relations via amalgamations of statistical data with qualitative causal assumptions. In this study, SEM was conducted using AMOS 20.

5.2.1. Confirmatory Factor Analysis

Confirmatory factor analysis (CFA) is a multivariate statistical technique that is popular among researchers for measuring the reliability and validity of constructs. The overall goodness-of-fit indices of this study supported an acceptable overall model fit, with χ2/df = 1.555; GFI = 0.905; CFI = 0.961; AGFI = 0.875; IFI = 0.961; TLI = 0.952; NFI = 0.898; and RMSEA = 0.047. Therefore, the measurement model matched the structure of the proposed research model.

5.2.2. Convergent Validity

Factor loading implies the correlation between an original variable and a derived factor. If all standardized item factor loadings are found to be more than 0.70, then convergent validity is confirmed. The factor loadings of various latent variables with their respective indicators and the other computed measures for the assessment of convergent and discriminant reliability in this study are shown in Table 4. All factor loadings (standardized) in CFA were observed to be more than 0.70. Additionally, the average variance extracted (AVE) values were computed and found to be more than 0.50 [44,45]. The composite reliability (CR) of all constructs was computed and found to be above 0.767 (the recommended cut-off is 0.70) [44,45,46]. Finally, the minimum value of the Cronbach’s alpha was found to be 0.765 (the recommended cut-off is 0.70) [44]. These results clearly support the convergent validity.

5.2.3. Discriminant Validity

The extent to which a construct is truly distinct from the other constructs of the structural model is called discriminant validity. A model is said to conform to discriminant validity if (i) the maximum shared variance (MSV) is less than average shared variance (ASV) and (ii) the ASV is less than the AVE. Both of these conditions were met by the proposed model, as is shown in Table 4. Other than this, the square root values of all AVE were computed and observed to be higher than the inter-construct correlations [47], thereby confirming the good discriminant validity.

6. Results—Hypothesis Testing

The structural model helped explain the relationship amongst the constructs defined in the research model with sound theoretical background. The various hypotheses, as depicted in the research model shown in Figure 3, were tested using the SEM technique. The results of hypotheses testing are demonstrated in Table 5. The fit indices—χ2/df = 2.078; GFI = 0.870; AGFI = 0.837; CFI = 0.920; TLI = 0.907; IFI = 0.920; NFI = 0.857; and RMSEA = 0.065—indicated that the dataset was acceptable [48].
The H1, H3, H4, H5, H6, H9 and H10 hypotheses were found to be highly significant. As also reported in previous research, this study recorded the significant impact of perceived ease of use on perceived usefulness (β = 0.265; t = 4.329; p < 0.001). Therefore, hypothesis H1 was supported. The perceived ease of use was also found to have an impact on behavioural intention (β = 0.183; t = 2.784; p < 0.010), thereby confirming hypothesis H2.
The perceived usefulness had a significant impact on attitude towards adoption (β = 0.612; t = 5.671; p < 0.001), thus confirming hypothesis H3. The attitude towards adoption was further found to have a significant impact on behavioural intention (β = 0.191; t = 3.717; p < 0.001), so hypothesis H4 was supported.
Job relevance was found to have significant relationship with perceived usefulness (β = 0.295; t = 5.148; p < 0.001) and behavioural intention (β = 0.381; t = 5.717; p < 0.001), thus supporting hypotheses H5 and H6. Hypotheses H9 and H10 examined the effect of information requirement characteristics on job relevance and trust in the proposed system. The information requirement characteristics was found to have a significant relationship with job relevance (β = 0.683; t = 8.078; p < 0.001) and trust (β = 0.464; t = 6.272; p < 0.001). Therefore, hypotheses H9 and H10 were supported at the 0.001 level of significance.
Trust was observed to be related to perceived usefulness (β = 0.164; t = 2.548; p < 0.05) and behavioural intention (β = 0.179; t = 2.492; p < 0.05), thus supporting hypotheses H7 and H8.
Thus, this study revealed support for all hypotheses H1–H10.

7. Discussion and Implications

This study was intended to find if rescue and emergency workers had any inclination towards using the proposed technology for disaster management. Based on previous studies, some additional construct—namely, job relevance, trust in proposed system and information requirement characteristics—were used to form the research model.
We developed a prototype of the proposed system that provided a first-hand experience of the final system. The weblink of the prototype deployed on the cloud was shared with respondents who were able to use it on their internet-enabled smartphones to experience the system in use.
Since the proposed disaster management system is intended to be used by rescue workers, it is important that they perceive the system to be job-relevant and trust-worthy. These factors were found to have a direct impact on perceived usefulness and behavioural intention to use the system. The information requirement characteristics also reflected a significant relationship with job relevance and trust in proposed system. This implies that if the important situational information inside an affected building is available, then a sense of trust in the system is developed by users. This further leads to better perceived usefulness and behavioural intention. Providing situational information using IoT devices can enable users to plan and initiate rescue operations from a point within the building where the probability of finding victims is high, thereby improving the chances of saving more lives in the event of an indoor disasters such as building fire or partial collapse. With the clear establishment of relationships between the vital constructs, it is expected that the final version of the system, with the implementation of actual sensors, will find better acceptability among rescue teams. Furthermore, the authors of this study were able to establish a clear understanding regarding whether the proposed system can be commercially produced. In view of the positive responses of the intended users towards the proposed system, it is inferred that systems based on the framework can be manufactured at the commercial level and be implemented in various large commercial establishments.

8. Limitations of the Study

This was a cross-sectional study based on a convenient sampling method that was conducted in selected fire stations and commercial facilities of a particular region. According, our results may not be generalized. Furthermore, the amount of responses received from female respondents was quite low since there are very few women in the region who seek employment in rescue and security services. Additionally, the proposed IoT-based disaster management system is dependent on internet. In the event of the internet becoming unavailable during the disaster situation, the live situational data inside the buildings cannot be made available to rescue teams. However, the system can still provide the most recent snapshot of the situational data that can enable rescue teams to plan rescue operations.

Author Contributions

Conceptualization, P.S.B. and J.S.; methodology, P.S.B., F.A. and J.S.; in-vestigation, P.S.B.; supervision, J.S.; writing of the original draft, P.S.B. and F.A.; review, J.S, B.S. and D.K.; validation, J.S. and D.K.; formal analysis, P.S.B., F.A. and D.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not Applicable.

Acknowledgments

This work was supported in part by the Office of Research and Sponsored Programs (ORSP) at Kean University, NJ, USA. This research work was also supported by the Research Incentive fund R20129 of Zayed University, United Arab Emirates.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Indiastat. Cause-Wise Number of Persons Injured and Killed by Fire Accidents in India. 2018. Available online: https://www.indiastat.com/table/crime-and-law-data/6/total-fire-accidents/475553/1311004/data.aspx (accessed on 15 September 2020).
  2. Indiastat. State-Wise Number of Persons Injured and Killed (Total Collapse) in India. 2018. Available online: https://www.indiastat.com/table/crime-and-law-data/6/total-collapse/475075/1310256/data.aspx (accessed on 15 September 2020).
  3. IoT Industry Report 2026. Internet of Things (IoT) Market. 2019. Available online: https://www.fortunebusinessinsights.com/industry-reports/internet-of-things-iot-market-100307 (accessed on 8 July 2020).
  4. Mitra, P.; Ray, R.; Chatterjee, R.; Basu, R.; Saha, P.; Raha, S.; Barman, R.; Patra, S.; Biswas, S.S.; Saha, S. Flood forecasting using Internet of things and artificial neural networks. In Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 13–15 October 2016; pp. 1–5. [Google Scholar] [CrossRef]
  5. Fang, S.; Xu, L.; Zhu, Y.; Liu, Y.; Liu, Z.; Pei, H.; Yan, J.; Zhang, H. An integrated information system for snowmelt flood early-warning based on internet of things. Inf. Syst. Front. 2015, 17, 321–335. [Google Scholar] [CrossRef]
  6. Saha, H.N.; Auddy, S.; Pal, S.; Kumar, S.; Pandey, S.; Singh, R.; Singh, A.K.; Banerjee, S.; Ghosh, D.; Saha, S. Disaster management using Internet of Things. In Proceedings of the 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, Thailand, 16–18 August 2017; IEEE: Piscataway, NJ, USA; pp. 81–85. [Google Scholar] [CrossRef]
  7. Li, N.; Sun, M.; Bi, Z.; Su, Z.; Wang, C. A new methodology to support group decision-making for IoT-based emergency response systems. Inf. Syst. Front. 2014, 16, 953–977. [Google Scholar] [CrossRef]
  8. Paul, P.; Dutta, N.; Biswas, B.A.; Das, M.; Biswas, S.; Khalid, Z.; Saha, H.N. An Internet of Things (IoT) Based System to Analyze Real-time Collapsing Probability of Structures. In Proceedings of the 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 1–3 November 2018; pp. 1070–1075. [Google Scholar] [CrossRef]
  9. Smart Cities Mission, Government of India. 2015. Available online: http://smartcities.gov.in/content/ (accessed on 9 July 2020).
  10. Tryfonas, T.; Kiountouzis, E.; Poulymenakou, A. Embedding security practices in contemporary information systems development approaches. Inf. Manag. Comput. Secur. 2001, 9, 183–197. [Google Scholar] [CrossRef]
  11. Arasteh, H.; Hosseinnezhad, V.; Loia, V.; Tommasetti, A.; Troisi, O.; Shafie-Khah, M.; Siano, P. Iot-based smart cities: A survey. In Proceedings of the EEEIC 2016—International Conference on Environment and Electrical Engineering, Florence, Italy, 7–10 June 2016; pp. 1–6. [Google Scholar] [CrossRef]
  12. van Asselt, M.B.; Renn, O. Risk governance. J. Risk Res. 2011, 14, 431–449. [Google Scholar] [CrossRef]
  13. Brar, P.S.; Singh, J. A Novel IoT-based Framework for Indoor Rescue Operations. In Proceedings of the 2020 Indo-Taiwan 2nd International Conference on Computing, Analytics and Networks (Indo-Taiwan ICAN), Rajpura, Punjab, India, 7–15 February 2020; pp. 330–334. [Google Scholar] [CrossRef]
  14. Davis, F.D. A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results; MIT: Cambridge, MA, USA, 1986. [Google Scholar]
  15. Venkatesh, V.; Davis, F.D. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Manag. Sci. 2000, 46, 186–204. [Google Scholar] [CrossRef] [Green Version]
  16. Hart, M.; Porter, G. The impact of cognitive and other factors on the perceived usefulness of OLAP. J. Comput. Inf. Syst. 2004, 45, 47–56. [Google Scholar] [CrossRef]
  17. Gao, L.; Bai, X. A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pac. J. Mark. Logist. 2014, 26, 211–231. [Google Scholar] [CrossRef]
  18. MacCallum, R.C.; Austin, J.T. Applications of Structural Equation Modeling in Psychological Research. Annu. Rev. Psychol. 2000, 51, 201–226. [Google Scholar] [CrossRef]
  19. Mathieson, K. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior. Inf. Syst. Res. 1991, 2, 173–191. [Google Scholar] [CrossRef]
  20. Taylor, S.; Todd, P.A. Understanding Information Technology Usage: A Test of Competing Models. Inf. Syst. Res. 1995, 6, 144–176. [Google Scholar] [CrossRef]
  21. Davis, F.D. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Q. 1989, 13, 319–340. [Google Scholar] [CrossRef] [Green Version]
  22. Cheong, J.H.; Park, M.-C. Mobile internet acceptance in Korea. Internet Res. 2005, 15, 125–140. [Google Scholar] [CrossRef]
  23. Castañeda, J.A.; Muñoz-Leiva, F.; Luque, T. Web Acceptance Model (WAM): Moderating effects of user experience. Inf. Manag. 2007, 44, 384–396. [Google Scholar] [CrossRef]
  24. Alenazy, W.M.; Al-Rahmi, W.M.; Khan, M.S. Validation of TAM Model on Social Media Use for Collaborative Learning to Enhance Collaborative Authoring. IEEE Access 2019, 7, 71550–71562. [Google Scholar] [CrossRef]
  25. Wu, J.-H.; Wang, S.-C. What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model. Inf. Manag. 2005, 42, 719–729. [Google Scholar] [CrossRef]
  26. Zafar, U.; Shah, M.A.; Wahid, A.; Akhunzada, A.; Arif, S. Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions. In Recent Trends and Advances in Wireless and IoT-Enabled Networks; Jan, M.A., Khan, F., Alam, M., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 291–309. [Google Scholar]
  27. Venkatesh, V.; Bala, H. Technology Acceptance Model 3 and a Research Agenda on Interventions. Decis. Sci. 2008, 39, 273–315. [Google Scholar] [CrossRef] [Green Version]
  28. Venkatesh, V. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model. Inf. Syst. Res. 2000, 11, 342–365. [Google Scholar] [CrossRef] [Green Version]
  29. Hu, P.J.; Chau, P.Y.; Sheng, O.R.L.; Tam, K.Y. Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology. J. Manag. Inf. Syst. 1999, 16, 91–112. [Google Scholar] [CrossRef]
  30. Paré, G.; Sicotte, C.; Jacques, H. The Effects of Creating Psychological Ownership on Physicians’ Acceptance of Clinical Information Systems. J. Am. Med. Inform. Assoc. 2006, 13, 197–205. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  31. Shin, D.-H.; Choo, H. Modeling the acceptance of socially interactive robotics: Social presence in human-robot interaction. Interact. Stud. 2011, 12, 430–460. [Google Scholar] [CrossRef]
  32. Gagnon, M.P.; Orruño, E.; Asua, J.; Ben Abdeljelil, A.; Emparanza, J. Using a Modified Technology Acceptance Model to Evaluate Healthcare Professionals’ Adoption of a New Telemonitoring System. Telemed. e-Health 2012, 18, 54–59. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  33. Park, E.; Kim, K.J. User acceptance of long-term evolution (LTE) services: An application of extended technology acceptance model. Progr. Electron. Libr. Inf. Syst. 2013, 47, 188–205. [Google Scholar] [CrossRef]
  34. Chen, H.; Rong, W.; Ma, X.; Qu, Y.; Xiong, Z. An Extended Technology Acceptance Model for Mobile Social Gaming Service Popularity Analysis. Mob. Inf. Syst. 2017, 2017, 1–12. [Google Scholar] [CrossRef]
  35. Ard-Barton, D.L. Implementation Characteristics of Organizational Innovations: Limits and Opportunities for Management Strategies. Commun. Res. 1988, 15, 603–631. [Google Scholar] [CrossRef]
  36. Markus, M.L. Power, politics, and MIS implementation. Commun. ACM 1983, 26, 430–444. [Google Scholar] [CrossRef]
  37. Kieras, D.; Polson, P.G. An approach to the formal analysis of user complexity. Int. J. Man-Mach. Stud. 1985, 22, 365–394. [Google Scholar] [CrossRef]
  38. Holden, R.J.; Karsh, B.-T. The Technology Acceptance Model: Its past and its future in health care. J. Biomed. Inform. 2010, 43, 159–172. [Google Scholar] [CrossRef] [Green Version]
  39. Gefen, D.; Karahanna, E.; Straub, D.W. Trust and TAM in Online Shopping: An Integrated Model. MIS Q. 2003, 27, 51–90. Available online: https://dl.acm.org/doi/abs/10.5555/2017181.2017185 (accessed on 7 July 2020). [CrossRef]
  40. Al-Gahtani, S.S. Modeling the electronic transactions acceptance using an extended technology acceptance model. Appl. Comput. Inform. 2011, 9, 47–77. [Google Scholar] [CrossRef] [Green Version]
  41. Kesharwani, A.; Bisht, S.S. The impact of trust and perceived risk on internet banking adoption in India: An extension of technology acceptance model. Int. J. Bank Mark. 2012, 30, 303–322. [Google Scholar] [CrossRef]
  42. Bahmanziari, T.; Pearson, J.M.; Crosby, L. Is trust important in technology adoption? A policy capturing approach. J. Comput. Inf. Syst. 2003, 43, 46–54. [Google Scholar] [CrossRef]
  43. Yang, L.; Yang, S.; Plotnick, L. How the internet of things technology enhances emergency response operations. Technol. Forecast. Soc. Chang. 2013, 80, 1854–1867. [Google Scholar] [CrossRef] [Green Version]
  44. Hair, J.F.; Howard, M.C.; Nitzl, C. Assessing measurement model quality in PLS-SEM using confirmatory composite analysis. J. Bus. Res. 2020, 109, 101–110. [Google Scholar] [CrossRef]
  45. Bagozzi, R.P.; Yi, Y. On the evaluation of structural equation models. J. Acad. Mark. Sci. 1988, 16, 74–94. [Google Scholar] [CrossRef]
  46. Gefen, D.; Straub, D.; Boudreau, M. Structural equation modeling and regression: Guidelines for research practice. Commun. Assoc. Inf. Syst. 2000, 4, 7. [Google Scholar] [CrossRef] [Green Version]
  47. Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
  48. Schumacker, R.E. A Beginner’s Guide to Structural Equation Modeling, 3rd ed.; Routledge: London, UK, 2012. [Google Scholar]
Figure 1. Proposed framework based on cloud-centric IoT-based for locating victims in indoor disasters.
Figure 1. Proposed framework based on cloud-centric IoT-based for locating victims in indoor disasters.
Sensors 22 01866 g001
Figure 2. Alluvial diagram depicting the trend of research using TAM.
Figure 2. Alluvial diagram depicting the trend of research using TAM.
Sensors 22 01866 g002
Figure 3. Research model for the proposed indoor disaster management system.
Figure 3. Research model for the proposed indoor disaster management system.
Sensors 22 01866 g003
Figure 4. Demographic characteristics of rescue team members.
Figure 4. Demographic characteristics of rescue team members.
Sensors 22 01866 g004
Table 1. Measurement scales.
Table 1. Measurement scales.
TAM Latent
Variable
Indicator
Perceived
Usefulness
(PU)
[PU01]—The proposed system can improve the performance of rescue teams.
[PU02]—The proposed system can improve the effectiveness of rescue operations.
[PU03]—The proposed system will be useful to you as a rescue worker.
[PU04]—The proposed system can improve the productivity of rescue operations.
Perceived
Ease of Use
(PEU)
[PEU01]—The proposed system can be used in easy manner.
[PEU02]—The data provided by the proposed system do not require a much effort to understand.
[PEU03]—Your communications with the proposed system will be simple and understandable.
Attitude towards Adoption
(ATA)
[ATA01]—Adopting the proposed system for indoor rescue operations is a good idea.
[ATA02]—The proposed system may be beneficial to you.
[ATA03]—You have positive opinion about using the proposed system.
Behavioural
Intention to Use
(BI)
[BI01]—You are willing to voluntarily use the proposed system.
[BI02]—If you get the proposed system, you will to use it during rescue operations.
[BI03]—You would make full use of the proposed system.
Trust in
Proposed System
(TR)
[TR01]—The proposed system can provide trustworthy information for rescue operations.
[TR02]—You think that the information will be more reliable if it is collected by the proposed system than if it is collected manually.
[TR03]—As a rescue team member, you can trust the information provided by the proposed sensor-based system.
Job Relevance
(JR)
[JR01]—The proposed system is relevant to your job involving rescue operations.
[JR02]—The proposed system is important for your job as a rescue team member.
[JR03]—The proposed system is appropriate for your job due to its occupational hazards.
Information
Requirement Characteristics
(IRC)
[IRC01]—Rescue teams do not get appropriate situational information from inside the disaster-struck building.
[IRC02]—Rescue teams are generally unaware of the count of people stuck in disaster-struck building.
[IRC03]—Better decisions can be made if accurate situational awareness exists.
[IRC04]—The resource allocation for disaster response is usually not optimal since situational information inside a building is not available.
Table 2. Descriptive statistics.
Table 2. Descriptive statistics.
Construct MeanStd. Deviation
PEU6.0100.831
PU6.1010.793
ATA5.9010.905
BI6.0420.818
TR5.9440.824
JR6.0430.851
IRC6.3310.772
Note: N = 257.
Table 3. Correlation matrix.
Table 3. Correlation matrix.
1234567
1PEU1
2PU0.396 **1
3ATA0.262 **0.353 **1
4BI0.360 **0.372 **0.417 **1
5TR0.319 **0.377 **0.399 **0.442 **1
6JR0.337 **0.454 **0.359 **0.523 **0.535 **1
7IRC0.314 **0.385 **0.293 **0.484 **0.372 **0.469 **1
Note: N = 257; * p < 0.05, ** p < 0.01.
Table 4. Reliability measures for convergent and discriminant validity.
Table 4. Reliability measures for convergent and discriminant validity.
ConstructIndicatorFactor
Loading
Cronbach’s
Alpha
CRAVEMSVASVSqrt
(AVE)
PEUPEU010.7220.8220.8230.6080.2210.1630.780
PEU020.833
PEU030.780
PUPU010.7470.8460.8500.5880.2860.2110.767
PU020.852
PU030.724
PU040.737
ATAATA010.8540.8680.8690.6880.2630.1700.829
ATA020.824
ATA030.810
BIBI010.7420.7650.7670.5230.4260.2900.723
BI020.705
BI030.722
TRTR010.7900.8150.8170.5990.4320.2460.774
TR020.712
TR030.816
JRJR010.8200.8260.8270.6150.4320.2980.784
JR020.763
JR030.769
IRCIRC010.7850.8850.8860.6600.3380.2130.812
IRC020.793
IRC030.832
IRC040.839
Table 5. Hypothesis testing results.
Table 5. Hypothesis testing results.
HRelationshipEstimateS.E.C.R.pResult
H1PU ← PEU0.2650.0614.3290.000Supported
H2BI ← PEU0.1830.0662.7840.005Supported
H3ATA ← PU0.6120.1085.6710.000Supported
H4BI ← ATA0.1910.0533.6170.000Supported
H5PU ← JR0.2950.0575.1480.000Supported
H6BI ← JR0.3810.0675.7170.000Supported
H7PU ← TR0.1640.0642.5480.011Supported
H8BI ← TR0.1790.0722.4920.013Supported
H9JR ← IRC0.6830.0858.0780.000Supported
H10TR ← IRC0.4640.0746.2720.000Supported
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Brar, P.S.; Shah, B.; Singh, J.; Ali, F.; Kwak, D. Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers. Sensors 2022, 22, 1866. https://doi.org/10.3390/s22051866

AMA Style

Brar PS, Shah B, Singh J, Ali F, Kwak D. Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers. Sensors. 2022; 22(5):1866. https://doi.org/10.3390/s22051866

Chicago/Turabian Style

Brar, Preetinder Singh, Babar Shah, Jaiteg Singh, Farman Ali, and Daehan Kwak. 2022. "Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers" Sensors 22, no. 5: 1866. https://doi.org/10.3390/s22051866

APA Style

Brar, P. S., Shah, B., Singh, J., Ali, F., & Kwak, D. (2022). Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers. Sensors, 22(5), 1866. https://doi.org/10.3390/s22051866

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop