Abstract
The context of education has changed due to revolutionary developments in the information communication technology (ICT) industry in the post-COVID era. Innovative learning methods were introduced in the education sector to promote quality education. The students find it more convenient to use ICT tools to integrate their knowledge-seeking. China has recently paid more attention to developing and adopting electronic infrastructure. The study assesses the effect of technology self-efficacy (TSE) on ICT acceptance and implementation in China’s education sector. It also analyzed the role of perceived trust, perceived security, and electronic word of mouth (eWOM) in integrating digital information sharing and interaction tools. Data is collected from 382 business students at Chinese universities. The results revealed that perceived trust mediates the relationship between TSE and the actual use of ICT tools, intention to use ICT tools for information, and intention to use ICT tools for interaction. Further, perceived security and eWOM significantly moderate the relationship between TSE and perceived trust. The findings indicate that it is essential to offer assistance and instruction to students in the educational sector so they can use ICT technology more frequently. It is also crucial for organizations to establish a supportive culture and provide the necessary technological resources to facilitate the use of ICT.
Similar content being viewed by others
Introduction
Dependence on technology has rapidly increased over the years, especially in the post-COVID-19 era1. All industries have utilized advanced technology when lockdowns exist, and people interact minimally. Even after COVID-19, the fear remains, and people still rely more on advanced technological applications for learning2. The education sector is flourishing due to digitalization, the introduction of more compelling devices, and the utilization of new tools3. Many countries restructured their systems to adopt information communication technology (ICT) in educational sectors, but China’s transformation and unprecedented growth are evident. China is leading the way in this digital revolution in education and is a global leader in innovation and technology. Government initiatives, technological improvements, and the growing need for a more contemporary and effective educational system have pushed the acceptance and usage of ICT tools in Chinese educational institutions4. Integrating innovative technologies and constructing electronic infrastructure can open new avenues for students to learn. Knowledge transfer and sharing have become easy using ICT tools in education. The students can utilize different digital tools for learning purposes5.
The success of e-learning programs largely depends on the user’s acceptance of the system. It is based on students’ willingness to adopt digital tools for attaining knowledge and interaction purposes6. The individual acceptance of new technologies has remained a widely researched topic for the last two decades7. The technological acceptance model (TAM) is a fundamental behavioural model that explains the users' perspective on adopting and applying new technologies8. The theory of reasoned action (TRA) explains the user attitude that reshaped their behaviour and subjective norms that convert into the intention and later lead to actual actions using ICT tools9. TAM and TRA provide theoretical support to the digitalization process in Chinese education. Students have technological self-efficacy (TSE), increasing their intention to use modern technologies. Students perceived that the new techniques could polish their skills and provide ease and flexibility in learning, and they intend to adopt them10.
TSE is discussed earlier in technological applications like computers, mobiles, tablets, laptops, robotics, and the internet11. However, its implications in educational sectors to know more about its actual use or perceived use for interaction and information still requires more instigation12. Perceived trust is crucial in online platforms, increasing consumer behavioural intentions. It increases the customers’ satisfaction level, which leads to expanded use of ICT tools4. Students learn from online platforms when perceived trust is there. It also increases their intention to revisit and enhances the benefits of ICT in the education sector. The mediating role of perceived trust between TSE and the actual use of ICT tools, intention to use ICT tools for information, and intention to use ICT tools for interaction by Chinese university students needs more research.
Security concerns relate to the perceived risks associated with using ICT tools, such as data breaches, privacy issues, and cyber threats. The students often face online scams hacking and find inappropriate content and material, which reduces their trust levels in online platforms13. Scholars suggested that users' privacy should be protected through verification, passcode protection, encryption, and authentication14. The security increases consumers' trust and behavioural perceptions. When consumers know their personal information is not used elsewhere, their trust level will be high on the website15. A higher level of TSE often correlates with increased confidence in using ICT tools, leading to more innovative and effective educational practices. It is important to determine how students engage with ICT tools, innovate teaching methods, and adapt to technological advancements.
Electronic word of mouth (eWOM) refers to sharing opinions, experiences, and recommendations about ICT tools and platforms through online platforms and social networks. Positive eWOM can enhance ICT tools’ perceived usefulness and credibility, encouraging their adoption and use among educators and students16. TSE increases students' perceived trust level, but positive eWOM further strengthens the relationship. The moderating role of perceived security and eWOM between TSE and perceived trust has rarely been studied. That is why the study aims to analyze the impact of TSE on actual use and intention to use ICT tools for information and interaction by Chinese students through perceived trust. It also explains the moderating role of perceived security and eWOM between TSE and perceived trust. The findings will contribute to the Chinese educational sector and present the students' behavioural intention to accept and implement ICT for learning and knowledge-sharing purposes. It also helps policymakers devise policies to promote e-learning technologies and make them more secure by keeping user concerns in mind.
Theoretical underpinning and hypotheses development
The theory of planned behaviour extends the TRA, which discusses individuals’ actual and perceived behaviour toward technology adoption. These theories are based on the Belief-Attitude-Intention (B-A-I) model17. It implies individual perceived behaviour, cultural norms, and situational factors as predictors of their actions. It also explains the individuals' behaviour and subjective norms that can impact their intention, which later turns into the actual behaviour7. In the context of technology adoption in education, TRA refers to an individual’s positive or negative feelings about using ICT tools. If students believe they can effectively use technology (high TSE), they are more likely to have positive attitudes toward adopting ICT tools. These are perceptions about whether others think they should or should not use ICT tools18. eWOM can influence these norms. Positive reviews or recommendations from colleagues or peers can encourage technology adoption.
The application of ICT for learning is also an essential element of technology development models. The TAM strengthens the actual and perceived individual use of technological tools. Its two basic divers, utility and perceived ease of use, are the primary determinants of depicting the intentions to apply technology18. It was extensively involved in diversified fields due to its intelligibility in describing the attitudes of individuals toward advanced innovation and technology adoption19. TAM suggests that perceived trust is a key determinant of users’ attitudes towards using a technology. Trust in ICT tools is crucial for their adoption. Users need to believe that the technology will perform reliably and securely8. Security concerns can act as barriers to technology adoption. Users need assurance that their data and privacy will be protected when using ICT tools. Positive eWOM can influence attitudes and subjective norms, encouraging more educators and students to adopt ICT tools20. The study is based on the TRA and the TAM to answer how TSE affects the actual use of ICT tools, information, and interaction in the education sector.
Technological self-efficacy and use of ICT tools
TSE depicts the individuals' behaviour regarding the adaptability of digital learning in the educational sector through traditional and advanced applications21. The students’ acceptance of online applications motivates them to learn through advanced technologies7. These could save their time, create ease, and provide flexible learning opportunities. Most have the knowledge and access to digital tools like tablets, laptops, computers, and mobile phones with internet access22. Therefore, it is not difficult for them to utilize the same for educational purposes. Studies show that students’ intention to use ICT tools in learning could enhance their satisfaction due to perceived ease and usage23. That is why the past study24 highlighted a positive relationship between TSE and the actual use of ICT tools. TAM represents the users’ intention towards technology acceptance and adoption. It provides theoretical grounding for the students' actual use of ICT and discusses their future intent to apply it for information and interaction.
Mediating role of perceived trust
Trust is a specific attitudinal response of a person to another in exchange for fairness, truthfulness, and authenticity. All social relationships are based on trust, particularly in online platforms where advanced technology is applied; it is worth considering25. Both parties confidently deal with whether an element of trust exists. Many studies analyzed the role of consumer credibility and trust in online networks and demonstrated its persuasiveness across different scenarios26,27. It creates satisfaction, increasing individual intention to use the product or service again. The expectancy-disconfirmation theory states that one can be satisfied if the perceived outcomes exceed the expectation level, which can be more productive if the trust element exists28.
One key determinant influencing students’ adoption and usage of ICT is technology self-efficacy, which refers to an individual's trust in their ability to use technology to achieve desired outcomes. Higher levels of trust have been associated with increased motivation to learn and use technology, leading to more frequent and proficient ICT usage19. Perceived trust refers to an individual's confidence in technology’s reliability, security, and effectiveness. Cultural and societal factors may influence Chinese university students’ perceptions of trust in technology. China’s rapid technological advancements and emphasis on education may shape students' attitudes and beliefs toward technology, affecting their perceived trust and subsequent ICT usage patterns4. Students would be more likely to integrate technology into their teaching and learning procedures and feel more at ease. Customers are more likely to see technology favorably and perceive it as reliable, which might increase the acceptance and usage of ICT in education. Because regulatory agencies are seen as reliable, educational stakeholders might be more open to experimenting with new ICT tools and platforms25.
Customers will be more engaged and satisfied if they trust service providers29. This reflects that system authenticity and quality information are the main determinants of trust that increase the usage of online applications. Trust creates a lasting relationship in an online environment where one-to-one interaction is missing30. In an online venue, TSE can enhance ICT tools among Chinese students, but trust can increase their actual and perceived application for learning and knowledge sharing. Suppose a student intends to apply to an online education system. In that case, their trust will be high in such a learning mode that ultimately increases ICT's actual and intentional use for information and interaction. These arguments are hypothesized below:
H1: Perceived trust mediates the relationship between TSE and the actual use of ICT tools among Chinese university students.
H2: Perceived trust mediates TSE and the intention to use ICT tools for information in the Chinese university.
H3: The relationship between TSE and the intention to use ICT tools for interaction is mediated by perceived trust among Chinese business students.
Moderating role of perceived security
TSE describes the individual effort of learning digital tools to keep updated with the online environment. When students are convinced that new technologies can benefit them in their learning and knowledge-seeking process, they are ready to adopt them and learn new techniques to help them utilize these tools. It reflects their positive attitude towards e-learning. However, trust is a major obstacle to online systems31. Students often doubt whether they will visit a website due to the increasing number of online scams. Therefore, researchers suggested a secure system that enhances user trust15. When consumers are sure their personal information is not shared, stolen, or misused on any online platform, their trust level increases32. Worries about data breaches, unauthorized access, or abuse of personal information can greatly impact perceived security in an educational setting. The confidence people have in ICT is the belief that their data will be managed responsibly and securely and that the system will perform as expected. In this regard, a person with strong technology self-efficacy may become less trusting of ICT use if they have security worries. On the other hand, even among those who have a lesser level of technology self-efficacy, robust perceived security measures can increase trust. However, TSE increases the perceived trust. But, the intervening role of perceived security will highly strengthen the relationship. The same is posited below in the form of hypothesis 4.
H4: Perceived security moderations the relationship between TSE and perceived trust, such that the effect of TSE on perceived trust is more assertive when perceived security is higher.
Moderating role of electronic word of mouth
EWOM is an exchange of views, feedback and opinions among e-users, which can affect their revisit and reuse intention and behaviour. It is presented through word-to-word communication, comments on the website and social networking online33. EWOM is spread globally through emails, blogs, review sites, etc., due to the free Internet freedom of expression34. It plays a significant role in building the reputation of the online platform. Previous studies show that positive eWOM is a marketing tool that increases the sale, use, and value of products and services internationally and geographically35,36. A positive eWOM helps to establish a trustworthy positive relationship between students and educational institutes that increases the use of online platforms for learning37. TSE motivates the students to utilize their existing knowledge and develop new skills to apply ICT, increasing their perceived trust in e-learning. The sharing and consumption of knowledge have changed dramatically in the digital age. eWOM, which is frequently disseminated through review sites, social media, and online forums, has grown to be a significant factor in decision-making. Positive feedback and suggestions from peers, colleagues, or reliable sources can allay doubts and anxieties regarding the use of ICT in education, which in turn increases perceptions of the reliability of solutions offered by ICT. However, the eWOM makes this relationship stronger and more constructive due to the positive communication by the users. The same argument is presented in the below hypothesis:
H5: eWOM moderates the relationship between TSE and perceived trust, such that the effect of TSE on perceived trust is more robust when eWOM is positively increased.
Figure 1 explains the theoretical framework of the study.
Research methodology
Many educational institutions have encouraged using ICTs for the sustainability of education. This study empirically investigated students’ intention to use ICT for information and interaction in their education’s long-term viability. Students who participated in blended learning and used ICT in their education made up the study sample. The survey’s questions regarding demographics were evaluated on a five-point Likert scale, with “1” representing strongly disagree and “5” representing strongly agree. The distribution of questionnaires employed self-administration, and respondents were requested to respond to questions about ICT use and its impact on their education. The collected data were scrutinized with the assistance of the PLS-SEM technique using Smart PLS 3.3 statistical software. Factor loadings were employed to establish construct validity and reliability for the model's satisfactory level of fit, as endorsed by38.
Data collection and sample characteristics
The respondents were students from China’s standard universities, emphasizing developing and integrating ICT implementation and acceptance in China's education sector. Tablet computers are a common learning tool for ICT among university students from the campuses. For data gathering, we randomly selected six top-ranking universities in Beijing, China, as listed by Times Higher Education. The higher education ministry ranked the selected sample universities at the top based on the curriculum, learning objectives, and instructors. The eligible participants in this survey were referred to as the target population39. This extensive investigation gathered a demonstrative sample of the target population to deliver the essential data. Nonprobability sampling was used as a sampling frame that could not be created or acquired because it was difficult to get a list of potential respondents; convenience sampling was used. The sample size was calculated using the suggested method40,41. A comparable strategy was used by prior investigations42,43. The investigators shared information about the study constructs with participants via emails, WeChat, Weibo, and social media posts.
We are requesting that students voluntarily complete the questionnaire. We employed self-administered primary data collecting, both online and offline. Self-completed questionnaires were used in this survey method study to gather the primary data. This study used self-administered questionnaires since they speed up data collection from a larger sample size. Questionnaires were manually and electronically sent to qualified respondents to boost the response rate. The research team was approached on respective campuses to obtain authorization to gather study data and explain its goals. We have distributed a total of 520 questionnaires to university students. 406 participants were responded, with a response rate (78%). However, the data was further scrutinized as many questionnaires were incomplete. Some were invalid for data analysis due to mistakes, biasedness, and missing replies. After careful examination of the data, multivariate outliers, and unengaged responses of all returned questionnaires, leaving 382 useable cases for analysis. The final response rate is 73% of usable data. This sample size aligns with recommendations suggesting that empirical research should involve more than 30 but fewer than 500 participants44.
However, the sample data contains 211 male (55%) and 171 female (45%) respondents. The age of respondents is categorized as the maximum, with 179 respondents (47%) between 27 and 33 years old. 102 (27%) were lied in 20–26 years old, while the remaining 101 (26%) were above 33. Moreover, the educational background of respondents consists of the following distribution: 194 respondents (51%) had bachelor's degrees, 107 (28%) had master's degrees, and 81 (21%) were Ph.D. doctors. The participants' educational background consists of 141 (37%) belonging to management science and 118 respondents (31%) belonging to business administration. 81 participants (21%) belonged to hotel management. 42 respondents (11%) belonged to other fields. Furthermore, the experience of respondents with ICT consists of the following distribution: 53 respondents (14%) have low experience with ICT, 188 (49%) have good experience with ICT in education, and 141 (37%) have high expertise to use ICT. Table 1 displays further respondent information.
Instrumentations
This questionnaire is divided into two parts. The first component of the survey consists of inquiries about the respondents' background, such as gender, age, and employment history. After filtering questions, respondents were asked whether they were enrolled in graduate/post-graduate programs at universities in China (See Table 1). Second section of the questionnaire was designed to measure the components employed in this investigation. All questions were modified from earlier research. The interval scale (Likert type) was used to collect participants’ responses. TSE in ICT is about individuals’ belief in their aptitude to leverage digital technologies for educational purposes, encompassing both the ability to utilize existing tools and the adaptability to learn and apply new ones effectively10. It was measured by seven items taken from45.
The actual use of ICT in education involves integrating technology into all aspects of the educational process, from content delivery and assessment to communication and administration46. It aims to create more engaging, efficient, and effective student learning and was assessed by five items taken from47. The intention to use ICT for information refers to an individual deliberate and conscious plan to incorporate ICT tools, resources, and solutions into the educational process to enhance information acquisition, dissemination, and utilization6. It was estimated that six items were taken from48. Intention to use ICT for interaction can be defined as the purposeful and planned commitment of educators, institutions, or individuals to incorporate ICT tools in the learning process to facilitate communication, collaboration, and student engagement49. It was measured by six items adopted by50.
Perceived trust refers to the subjective belief or confidence that individuals, such as students, have in the reliability, effectiveness, and ethical use of ICT technologies and digital information within the realm of education51. Six items of perceived trust were suggested by25. Perceived security refers to individuals' assessment or belief in ICT technologies used in educational settings. It encapsulates the collective perception of how well ICT infrastructure and practices safeguard sensitive data, ensure privacy, and mitigate risks associated with cyber threats and breaches within educational institutions52. It was evaluated by five items taken from53. eWOM is the digital dissemination and sharing of opinions, recommendations, reviews, and information about ICT tools, services, platforms, and practices used in educational settings54. It was assessed by three items taken from55. Details of measurements of items are attached in Table 2.
Analysis and results
The PLS-SEM technique was used to analyze the data. This multivariate approach is frequently used to examine the correlation between many construct variables. The PLS-SEM technique was chosen because it is adaptable to small sample sizes and disregards normal data distribution. The statistical software SMARTPLS 3.3 version (https://www.smartpls.com/) was used for data analysis and model testing56. Measurement and structural assessment models were used to test the preliminary hypothesis as recommended by57. First, the measurement models have proposed construct reliability, convergent, and discriminant validity. The second method was a structural model, which provides the overall significance of the hypothesis. It improves statistical analysis’s effectiveness, simplicity, and precision. Compared to other analysis approaches, PLS-SEM is best suited for creating new, theoretically complex models that meet goals58.
Measurement model
The SEM approach's measurement model had to be evaluated first to see if the data could be used for preliminary hypothesis testing59,60. The two processes in the measurement model procedure to choose the validation criteria are construct reliability and validity61. In the construct reliability procedure, Cronbach alpha, composite reliability, and AVE become the assessment benchmarks. The author stated that data with Cronbach alpha and CR values greater than 0.7 have strong internal consistency reliability. Similarly, AVE values higher than 0.5 show valid reliability of constructs. Additionally, for the observable variables to sufficiently clarify the latent variables, factor loadings must be higher than 0.762. Factor loadings were employed to establish construct validity and reliability for the model’s satisfactory level of fit, as endorsed by38. The Cronbach alpha value for actual use = 0.856, intention to use for interaction = 0.918, intention to use for information = 0.873, TSE = 0.925, perceived trust = 0.897, perceived security = 0.909, and eWOM = 0.883. The CR value for actual use = 0.896, intention to use for interaction = 0.936, intention to use for information = 0.902, TSE = 0.940, perceived trust = 0.897, perceived security = 0.933, and eWOM = 0.905. The AVE value for actual use = 0.634, intention to use for interaction = 0.711, intention to use for information = 0.604, TSE = 0.694, perceived trust = 0.662, perceived security = 0.735, and eWOM = 0.613. As a result, the measurement model has strong convergent validity for data. The factor loading values for measurement models for university students are shown in Table 2.
The Fornell-Larcker approach was used to evaluate the discriminant validity. The diagonal values in bold in Table 3 are the square root of the AVE, which must be greater than the correlation value between the variables. The AVE value for data from university students in this study is greater than the correlation value between latent variables. However, HTMT is considered a superior method to Fornell-Larcker criteria because it discriminates more explicitly among constructs63. In the study, all the HTMT values are also within range and considered acceptable for discriminant validity. As a result, the proposed model can be explained by the discriminant validity, which is sufficient. See Fig. 2, which explains the measurement model's estimation.
Structural model
Bootstrapping was used for the structural path’s significance assessment in the second step of evaluating the structure equation modeling. In the bootstrapping approach, sub-samples (5000) were assessed with replacements to look for errors, and the results guided the predicted t-values for the proposed model’s significance test64. According to65, the t-value must be considered to ascertain the association’s importance. This study demonstrates a significant connection using a t-value more than 1.96 and a p-value lower than 0.05. Furthermore, mean and standard deviation (SD) values can also be useful for assessing the normality of the data distribution. While PLS-SEM is often considered robust to violations of normality assumptions, understanding the data distribution can still be valuable for interpreting results and ensuring the reliability of the findings66. Figure 3 illustrates how the bootstrapping method approaches data normality for structural models. Thus, Table 4 presents the suggested model quality requirements. The variance inflation factor (VIF) in all constructs is used in the first phase to evaluate the multicollinearity in the study model. The VIF value should not exceed five to guarantee that the constructs have no multicollinearity issue. The model utilized in this study is sound based on the measurements, as indicated in Fig. 2, where the R2 value is high. The results demonstrate the value of R2 in the independent constructs, such as perceived trust, explains 18%, 41%, and 25% of the variation in AU, ITUINF, and ITUINT. The goodness of fit (GoF) index was also determined using the standardized root mean square residual (SRMSR) values for the constructs67. The values of SRMR = 0.135, which indicate that the model is a good fit. See Fig. 3, which explains the structural model's estimation.
Table 4 presents the ultimate judgment on hypothesis development. This study's revealed the findings as it looked at the connection between TSE and perceived trust. The significant association was indicated by results (β = 0.180, t = 2.327, p < 0.05). This study examined the connection between perceived trust and actual use. The results showed a significant association (β = 0.431, t = 8.697, p < 0.05). This study examined how perceived trust and intention to use it for information are related. The significant association was indicated by results (β = 0.645, t = 18.757, p < 0.05). This study also examined how perceived trust and intention to use for interaction are related. The results indicated a significant association (β = 0.508, t = 11.128, p < 0.05).
For mediation analysis, the results of this study revealed that perceived trust positively mediates the relationship between TSE and actual use as values (β = 0.078, t = 2.217, p < 0.05). Perceived trust positively mediates the relationship between TSE and intention to use for information, as results indicated (β = 0.116, t = 2.377, p < 0.05). Furthermore, perceived trust positively mediates the relationship between TSE and intention to use it for interaction, as results indicate (β = 0.092, t = 2.146, p < 0.05). Thus, our study hypotheses H1, H2, and H3 are accepted. For moderation analysis, the results showed that perceived security positively moderates the relationship between TSE and perceived trust. The results indicated a significant association (β = 0.121, t = 2.872, p < 0.05). Thus, our study hypothesis H4 is accepted. Furthermore, eWOM positively moderates the relationship between TSE and perceived trust. The results indicated a significant association (β = 0.105, t = 2.303, p < 0.05). Thus, our study hypothesis H5 is accepted.
Moderating graphs
We contrived the graphs to describe the results of moderating the role of perceived security and eWOM. Figures 4, 5 display the moderating role of perceived security and eWOM between perceived trust and TSE, respectively. Figure 4 depicts the moderating effect of perceived security between TSE and perceived trust. The vital point in the moderation graphs is that TSE and perceived trust are stronger under high perceived security. Figure 5 clarifies the moderating effect of eWOM on TSE and perceived trust. The prominent point in the moderation graphs is that TSE and perceived trust are powerful under high eWOM. This ultimately supports H4 and H5.
Discussion
In the modern era, ICT has permeated every facet of human life, revolutionizing how we communicate, work, and learn. ICT integration has emerged as a powerful catalyst for transformation in education, offering novel avenues to enhance teaching and learning experiences68. China's education system is characterized by its sheer scale and complexity, with millions of students and educators spread across diverse geographical and sociocultural landscapes. The integration of ICT in this context is not a mere choice but a strategic imperative for fostering innovation, promoting equitable access to quality education, and preparing a globally competitive workforce69. Therefore, the current research study examines the impact of TSE on the intention to use ICT for information and interaction, as well as their actual use through perceived trust in the education sector of China. It also investigates the moderating role of perceived security and eWOM between TSE and perceived trust. A web-based questionnaire of 382 students from China's universities evaluates the conceptual framework. Five significant research findings are presented in the study.
Firstly, the findings state that perceived trust mediates the relationship between technological self-efficacy and the actual use of ICT tools. Students' trust in technology plays a crucial role as individuals believe in ICT technology's reliability, security, and effectiveness in their actual use. A past study70 suggested that students in the Chinese education sector have varying levels of confidence in their ability to use ICT technology for educational purposes. Individuals are willing to use ICT technology for specific purposes, such as acquiring information, interacting with others, or utilizing it in their educational activities. A prior study71 supported our argument that higher TSE may lead to greater perceived trust in technology. Greater perceived trust in technology leads to individuals’ actual ICT use in their education. Building trust can involve ensuring the technology is secure, reliable, user-friendly, and capable of meeting the specific needs of the educational context72. The findings imply that trust promotes the actual use of ICT in Chinese education.
Secondly, perceived trust mediates the relationship between technological self-efficacy and the intention to use ICT tools for information. Individuals with higher TSE often have greater trust in their abilities to use technology effectively. This self-trust can extend to trust in the technology itself, as individuals believe they can overcome any potential challenges or issues arising during technology use73. TSE can increase the perceived usefulness of ICT tools for information about individuals' educational goals. Educational institutions in China should invest in training and support programs to enhance the technological self-efficacy of educators and students74. This will empower them to use ICT tools effectively. Individuals who trust the ICT technology are more likely to trust the information it delivers, leading to a higher intention to use these tools for acquiring information. Perceived trust is not limited to the functionality of ICT technology but also includes concerns about security and privacy75. Institutions and technology providers should build trust by ensuring ICT tools’ reliability, security, and effectiveness. Transparent communication about data handling and privacy policies can contribute to trust-building76.
Thirdly, perceived trust mediates the relationship between technological self-efficacy and the intention to use ICT tools for interaction. Educators and students with higher levels of TSE may be more willing to use ICT tools if they trust that they are reliable, secure, and credible. Trust in technology is critical because it reduces perceived risks and enhances the perceived benefits of technology adoption77. Educational institutions and technology providers should prioritize building trust in their ICT tools. This can be achieved through transparent communication about the security and privacy measures in place, ensuring consistent reliability, and providing user training and support78. Trust-building initiatives can contribute to a positive environment for the integration of ICT in education. It is essential to recognize that perceived trust is influenced not only by the inherent characteristics of ICT tools but also by external factors such as media reports, user experiences, and institutional policies79. Therefore, efforts to enhance perceived trust should encompass technological and environmental aspects. Recognizing the importance of perceived trust and improving it can foster a more conducive environment for successfully adopting and utilizing ICT tools in education, ultimately benefiting educators and students80.
Fourthly, the findings elaborate that perceived security significantly moderates the relationship between technological self-efficacy and perceived trust. Perceived security pertains to the measures and mechanisms in place to protect the privacy and security of data and information within the education sector, especially in the context of ICT technology use. When individuals trust the security of their data, they are more willing to use ICT27. A past study81 focused on individuals with higher TSE may better understand security features and practices, leading to a more accurate perception of security. When individuals perceive a technology as secure, it positively influences their trust. A sense of security is a fundamental component of trust. Trust is likely to be eroded if technology is seen as a potential source of risk or insecurity82. High TSE can enhance an individual's ability to navigate security features and practices effectively, reinforcing their perception of security and trust. Organizations that want to foster trust in their technology offerings should consider improving the security of their products and services and providing users with the knowledge and skills necessary to use technology effectively83. Empowering users with TSE can enhance their perception of security and, in turn, build trust in the technology.
Fifthly, the findings reveal that electronic word of mouth significantly moderates the relationship between technological self-efficacy and perceived trust. The eWOM usually involves individuals sharing opinions, reviews, or recommendations about products, services, or, in this case, educational experiences through electronic means, such as social media, forums, or online reviews84. The eWOM acts as a bridge between technology self-efficacy and perceived trust. When students and parents with high TSE share positive experiences and recommendations about digital learning tools or online educational platforms, it can enhance the perceived trust of others in these tools or platforms85. The eWOM also contributes to perceived trust by serving as a source of trustworthy information. In the Chinese education sector, eWOM can be a conduit between individuals’ TSE and their perceived trust in digital learning tools, platforms, and educational institutions86. Trustworthy and credible electronic word of mouth can help validate technology competence and encourage the adoption of digital learning solutions. However, ensuring the accuracy and reliability of eWOM is essential to maintaining trust in the education sector87.
Study implications
This study has some important implications in the education sector of China. Firstly, this study's findings highlight the importance of promoting TSE among educators and stakeholders in China’s education sector. By providing training, support, and resources to boost individuals' confidence in using ICT tools, educational institutions can potentially increase the adoption and effective utilization of technology for information and interaction. Secondly, this study underscores the role of trust as a facilitator of technology adoption. Trust in technology systems and providers can positively influence educators’ willingness to embrace ICT for educational purposes. Educational institutions and policymakers should prioritize building trust in technology platforms through transparent and reliable data security measures, privacy protections, and clear communication strategies. Thirdly, the study’s findings emphasize the significance of security measures in fostering technology adoption. A secure digital environment ensures educators and students feel safe using ICT tools. Educational institutions should invest in robust cybersecurity infrastructure, policies, and practices to protect sensitive data and maintain the trust of students. Fourthly, eWOM influences individuals' perceptions and decisions regarding ICT adoption. Educational institutions can harness the power of eWOM by encouraging satisfied users to share their positive experiences and recommendations with colleagues, thereby creating a culture of peer support for technology integration. Lastly, this study suggests that by focusing on TSE, trust-building, security measures, and leveraging eWOM, China’s education sector can effectively promote the adoption and successful utilization of ICT for information and interaction, ultimately enhancing the quality of education in the digital age.
This study provides some contributions and potential guiding strategies for ICT users. First, this study helps understand educators' confidence in using technology, which is crucial for effectively incorporating ICT tools in education. This also offers training programs and workshops to improve students’ skills and confidence in using ICT tools. Second, exploring the role of perceived trust in technology adoption, this study highlights the importance of reliable ICT infrastructure and platforms in the education sector. Similarly, universities create a supportive environment where educators feel encouraged to experiment with new technologies without fear of failure. Third, this study emphasizes the role of security in influencing educators' willingness to adopt and use ICT tools, highlighting the need for robust cybersecurity measures in educational technology. Universities provide a secure and reliable ICT infrastructure to build trust among students. Fourth, this study examines the influence of eWOM on technology adoption, indicating the power of peer recommendations and reviews in shaping educators' perceptions and decisions. Foster a community of students who can share their positive experiences and recommendations about ICT tools. Finally, universities collaborate with ICT industry partners to co-develop and customize educational technologies that meet the specific needs of the Chinese education sector. This will ultimately contribute to improving the quality of education and preparing students for the digital age.
Conclusion
The integration of ICT in the education sector has become a prominent trend, both globally and specifically in China. ICT tools, such as online learning platforms, virtual classrooms, and educational apps, have transformed how education is delivered and experienced. This transformation is particularly relevant in China, where the education sector has been rapidly evolving to keep pace with technological advancements and the demands of a digital age. The current research study has examined the relationship between TSE and intention to use ICT for information and interaction, as well as their actual use through perceived trust in the education sector of China. Furthermore, this study investigates the moderating role of perceived security and eWOM between TSE and perceived trust. This study has five different findings: Firstly, it established that the relationship between TSE and the actual utilization of ICT tools is substantially mediated by perceived trust. Second, the association between TSE and intention to use ICT tools for information is significantly mediated by perceived trust. Third, the association between TSE and intention to use ICT for interaction is significantly mediated by perceived trust. Fourth, the association between TSE and perceived trust is significantly moderated by perceived security. Fifth, the connection between TSE and perceived trust is strongly moderated by eWOM. By critically examining these factors, this study aims to provide valuable insights that can inform strategies for harnessing the full potential of ICT in Chinese education, ultimately contributing to the nation's broader goals of educational excellence and global competitiveness.
Limitations and future directions
Despite making significant contributions, this study has some limitations that will allow other studies to explore the underlying subject. Firstly, our study may have limited generalizability due to its focus on the education sector in China. Future studies would consider that different countries and regions may have unique sociocultural, economic, and regulatory factors that influence the relationship. Secondly, our study, which was conducted at a specific time, relied on cross-sectional data. For future perspectives, researchers will use longitudinal research designs that could provide more robust evidence of causality and changes in the relationship over time. Thirdly, this study may rely on self-reported participant data, which can be subject to biases such as social desirability bias. Future research could incorporate objective measures of TSE and ICT use to reduce the potential for response bias. Fourthly, this study focused on factors like perceived trust and security that are important in ICT adoption. Future research could benefit from more objective measures, such as cybersecurity assessments and audits, to accurately evaluate trust and safety in ICT systems. Lastly, this study’s moderate variable, eWOM, may not fully capture the nuances of online discussions and recommendations. Future research could explore more comprehensive methods for assessing eWOM, such as natural language processing techniques to analyze online content. Additionally, future researchers should adapt to the evolving landscape of technology to determine the relevance and applicability of self-efficacy, trust, security, and eWOM in emerging educational technologies.
Ethics statements
We confirm that all methods were carried out in accordance with relevant guidelines and regulations. Humans who participated in this study are aware of the purpose of the study, and their confidential information is not to be shared with anyone. All study participants provided their written informed consent. Study data is used after the consent of participants. The questionnaire used in this study started with the declaration and purpose of the study. Experimental protocol was approved by the ethical review board of the Beijing University of Technology.
Data availability
The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation. Data can be obtained upon reasonable request by Co-author, Muhammad Farrukh Shahzad (farrukhshahzad207@gmail.com).
References
Geng, L. & Xue, Y. Promoting ICT adoption in rural entrepreneurship: More neighbourhood effect or more institutional incentives?—Empirical evidence from China. J. Int. Dev. 35, 1–19. https://doi.org/10.1002/jid.3738 (2023).
Sahut, J. M. & Lissillour, R. The adoption of remote work platforms after the Covid-19 lockdown: New approach, new evidence. J. Bus. Res. 154, 113345. https://doi.org/10.1016/j.jbusres.2022.113345 (2023).
Xu, J. & Zhu, Y. Factors influencing the use of ICT to support students’ self-regulated learning in digital environment: The role of teachers in lower secondary education of Shanghai, China. Psychol. Sch. https://doi.org/10.1002/pits.22938 (2023).
Shahzad, M. F., Xu, S. & Baheer, R. Assessing the factors influencing the intention to use information and communication technology implementation and acceptance in China’s education sector. Humanit. Soc. Sci. Commun. 11, 1–15. https://doi.org/10.1057/s41599-024-02777-0 (2024).
Wang, S. et al. When adaptive learning is effective learning: Comparison of an adaptive learning system to teacher-led instruction. Interact. Learn. Environ. 31(2), 793–803. https://doi.org/10.1080/10494820.2020.1808794 (2023).
Bai, Y., Mo, D., Zhang, L., Boswell, M. & Rozelle, S. The impact of integrating ICT with teaching: Evidence from a randomized controlled trial in rural schools in China. Comput. Educ. 96, 1–14. https://doi.org/10.1016/j.compedu.2016.02.005 (2016).
van Raaij, E. M. & Schepers, J. J. L. The acceptance and use of a virtual learning environment in China. Comput. Educ. 50(3), 838–852. https://doi.org/10.1016/J.COMPEDU.2006.09.001 (2008).
Shahzad, M. F., Xu, S., Lim, W. M., Hasnain, M. F. & Nusrat, S. Cryptocurrency awareness, acceptance, and adoption: The role of trust as a cornerstone. Hum. Soc. Sci. Commun. https://doi.org/10.1057/s41599-023-02528-7 (2024).
Venkatesh, V., Morris, M. G., Davis, G. B. & Davis, F. D. User acceptance of information technology: Toward a unified view. MIS Q. Manag. Inf. Syst. 27(3), 425–478. https://doi.org/10.2307/30036540 (2003).
Bubou, G. M. & Job, G. C. Individual innovativeness, self-efficacy and e-learning readiness of students of Yenagoa study centre, National Open University of Nigeria. J. Res. Innov. Teach. Learn. 15(1), 2–22. https://doi.org/10.1108/jrit-12-2019-0079 (2022).
Liu, A., Urquía-Grande, E., López-Sánchez, P. & Rodríguez-López, Á. How technology paradoxes and self-efficacy affect the resistance of facial recognition technology in online microfinance platforms: Evidence from China. Technol. Soc. 70, 102041. https://doi.org/10.1016/J.TECHSOC.2022.102041 (2022).
Zhao, C. & Zhao, L. Digital nativity, computer self-efficacy, and technology adoption: A study among university faculties in China. Front. Psychol. 12(September), 1–7. https://doi.org/10.3389/fpsyg.2021.746292 (2021).
Kim, M. J., Chung, N. & Lee, C. K. The effect of perceived trust on electronic commerce: Shopping online for tourism products and services in South Korea. Tour. Manag. 32(2), 256–265. https://doi.org/10.1016/j.tourman.2010.01.011 (2011).
Singh, M., Mittal, M., Mehta, P. & Singla, H. Personal values as drivers of socially responsible investments: A moderation analysis. Rev. Behav. Financ. 13(5), 543–565. https://doi.org/10.1108/RBF-04-2020-0066 (2021).
Chellappa, R. K. & Pavlou, P. A. Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logist. Inf. Manag. 15(5/6), 358–368. https://doi.org/10.1108/09576050210447046 (2002).
Kautish, P., Purohit, S., Filieri, R. & Dwivedi, Y. K. Examining the role of consumer motivations to use voice assistants for fashion shopping: The mediating role of awe experience and eWOM. Technol. Forecast. Soc. Change 190, 122407. https://doi.org/10.1016/j.techfore.2023.122407 (2023).
Chang, Y., Lee, S., Wong, S. F. & Phil-Jeong, S. AI-powered learning application use and gratification: An integrative model. Inf. Technol. People 35(7), 2115–2139. https://doi.org/10.1108/ITP-09-2020-0632 (2022).
Buabeng-Andoh, C., Yaokumah, W. & Tarhini, A. Investigating students’ intentions to use ICT: A comparison of theoretical models. Educ. Inf. Technol. 24(1), 643–660. https://doi.org/10.1007/s10639-018-9796-1 (2019).
Shahzad, M. F., Xu, S., Khan, K. I. & Hasnain, M. F. Effect of social influence, environmental awareness, and safety affordance on actual use of 5G technologies among Chinese students. Sci. Rep. 0123456789, 1–16. https://doi.org/10.1038/s41598-023-50078-4 (2023).
Eneizan, B., Alsaad, A., Alkhawaldeh, A., Rawash, H. N. & Enaizan, O. E-WOM, trust, usefulness, ease of use, and online shopping via websites: The moderating role of online shopping experience. J. Theor. Appl. Inf. Technol. 98(13), 2554–2565 (2020).
Papastergiou, M. Enhancing Physical Education and Sport Science students’ self-efficacy and attitudes regarding Information and Communication Technologies through a computer literacy course. Comput. Educ. 54(1), 298–308. https://doi.org/10.1016/j.compedu.2009.08.015 (2010).
Sharifi-fard, S., Tamam, E., Hj-Hassan, M. S., Waheed, M. & Zaremohzzabieh, Z. Factors affecting Malaysian university students’ purchase intention in social networking sites. Cogent Bus. Manag. 3(1), 1–12. https://doi.org/10.1080/23311975.2016.1182612 (2016).
Zainab, B., Awais-Bhatti, M. & Alshagawi, M. Factors affecting e-training adoption: An examination of perceived cost, computer self-efficacy and the technology acceptance model. Behav. Inf. Technol. 36(12), 1261–1273. https://doi.org/10.1080/0144929X.2017.1380703 (2017).
Hatlevik, O. E. Examining the relationship between teachers’ self-efficacy, their digital competence, strategies to evaluate information, and use of ICT at school. Scand. J. Educ. Res. 61(5), 555–567. https://doi.org/10.1080/00313831.2016.1172501 (2017).
Fakhoury, R. & Aubert, B. Citizenship, trust, and behavioural intentions to use public e-services: The case of Lebanon. Int. J. Inf. Manage. 35(3), 346–351. https://doi.org/10.1016/j.ijinfomgt.2015.02.002 (2015).
Mirkovski, K., Davison, R. M. & Martinsons, M. G. The effects of trust and distrust on ICT-enabled information sharing in supply chains: Evidence from small- and medium-sized enterprises in two developing economies. Int. J. Logist. Manag. 30(3), 892–926. https://doi.org/10.1108/IJLM-06-2017-0155 (2019).
(David)-Lee, T., Park, H. & Lee, J. Collaborative accountability for sustainable public health: A Korean perspective on the effective use of ICT-based health risk communication. Gov. Inf. Q. 36(2), 226–236. https://doi.org/10.1016/j.giq.2018.12.008 (2019).
Zhang, J., Zhang, H. & Gong, X. Government’s environmental protection expenditure in China: The role of Internet penetration. Environ. Impact Assess. Rev. 93, 106706. https://doi.org/10.1016/j.eiar.2021.106706 (2022).
Pang, H. Identifying associations between mobile social media users’ perceived values, attitude, satisfaction, and eWOM engagement: The moderating role of affective factors. Telemat. Inf. 59, 101561. https://doi.org/10.1016/j.tele.2020.101561 (2021).
Zaineldeen, S. & Hongbo, L. Evaluate student satisfaction of student information system utilising technology acceptance model and trust in China. Rev. Rom. Pentru Educ. Multidimens. 13(4), 283–309. https://doi.org/10.18662/rrem/13.4/483 (2021).
Brannon, G. E., Mitchell, S. & Liao, Y. Addressing privacy concerns for mobile and wearable devices sensors: Small-group interviews with healthy adults and cancer survivors. PEC Innov. 1, 100022. https://doi.org/10.1016/j.pecinn.2022.100022 (2022).
Yenisey, M. M., Ozok, A. A. & Salvendy, G. Perceived security determinants in e-commerce among Turkish university students. Behav. Inf. Technol. 24(4), 259–274. https://doi.org/10.1080/0144929042000320992 (2005).
Chu, S.-C., Marina-Choi, S. & Chu-Sejung-Marina-Choi, S.-C. Electronic word-of-mouth in social networking sites: A cross-cultural study of the United States and China. J. Glob. Mark. 24(3), 263–281. https://doi.org/10.1080/08911762.2011.592461 (2011).
Hennig-Thurau, T., Gwinner, K. P., Walsh, G. & Gremler, D. D. Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the Internet?. J. Interact. Mark. 18(1), 38–52. https://doi.org/10.1002/DIR.10073 (2004).
Jalilvand, M. R. & Samiei, N. The effect of electronic word of mouth on brand image and purchase intention: An empirical study in the automobile industry in Iran. Mark. Intell. Plan. 30(4), 460–476. https://doi.org/10.1108/02634501211231946/FULL/PDF (2012).
Sheeraz, M., Tanweer, M., Khan, K. I. & Mahmood, S. Strengthening consumer brand relationships through consumer engagement: Online brand communities in landscape of social media. Pak. J. Soc. Sci. 37(2), 583–607 (2017).
Wahab, A., Aqif, T. & Bint-e-shehzad, Z. Studying the impact of e-marketing by universities on students’ loyalty with the mediation of intention to get enrollment and moderation of eWOM. J. Appl. Res. High. Educ. https://doi.org/10.1108/JARHE-08-2022-0264/FULL/XML (2023).
Hair, J., Hollingsworth, C. L., Randolph, A. B. & Chong, A. Y. L. An updated and expanded assessment of PLS-SEM in information systems research. Ind. Manag. Data Syst. 117(3), 442–458. https://doi.org/10.1108/IMDS-04-2016-0130 (2017).
Shahzad, M. F., Xu, S., Rehman, O. & Javed, I. Impact of gamification on green consumption behavior integrating technological awareness, motivation, enjoyment and virtual CSR. Sci. Rep. 1–18, 2023. https://doi.org/10.1038/s41598-023-48835-6 (2023).
Farrukh, M., Xu, S., Baheer, R. & Ahmad, W. Unveiling the role of supply chain parameters approved by blockchain technology towards firm performance through trust : The moderating role of government support. Heliyon 9(11), e21831. https://doi.org/10.1016/j.heliyon.2023.e21831 (2023).
Farrukh, M., Xu, S., Naveed, W. & Nusrat, S. Investigating the impact of artificial intelligence on human resource functions in the health sector of China : A mediated moderation model. Heliyon 9(11), e21818. https://doi.org/10.1016/j.heliyon.2023.e21818 (2023).
Al-Azawei, A. & Alowayr, A. Predicting the intention to use and hedonic motivation for mobile learning: A comparative study in two Middle Eastern countries. Technol. Soc. 62, 101325. https://doi.org/10.1016/j.techsoc.2020.101325 (2020).
Vanduhe, V. Z. Continuance intentions to use gamification for training in higher education : Integrating the technology acceptance model ( TAM ), social motivation, and task technology fit ( TTF ). IEEE Access 8, 21473–21484. https://doi.org/10.1109/ACCESS.2020.2966179 (2020).
Roscoe, A. M., Lang, D. & Sheth, J. N. Follow-up methods, questionnaire length, and market differences in mail surveys. J. Mark. 39(2), 20. https://doi.org/10.2307/1250111 (1975).
Compeau, D. R. & Higgins, C. A. Computer self-efficacy: Measure and initial development of a test. MIS Q. 19(2), 189–211 (2017).
Lim, C. P., Ra, S., Chin, B. & Wang, T. Leveraging information and communication technologies (ICT) to enhance education equity, quality, and efficiency: Case studies of Bangladesh and Nepal. EMI. Educ. Media Int. 57(2), 87–111. https://doi.org/10.1080/09523987.2020.1786774 (2020).
Faqih, K. M. S. & Jaradat, M. I. R. M. Integrating TTF and UTAUT2 theories to investigate the adoption of augmented reality technology in education: Perspective from a developing country. Technol. Soc. 67, 101787. https://doi.org/10.1016/j.techsoc.2021.101787 (2021).
Kim, N., Park, Y. & Lee, D. Differences in consumer intention to use on-demand automobile-related services in accordance with the degree of face-to-face interactions. Technol. Forecast. Soc. Change 139, 277–286. https://doi.org/10.1016/j.techfore.2018.11.014 (2019).
Zhou, Q., Gao, P. & Chimhowu, A. ICTs in the transformation of rural enterprises in China: A multi-layer perspective. Technol. Forecast. Soc. Change 145(April), 12–23. https://doi.org/10.1016/j.techfore.2019.04.026 (2019).
Wang, F., Wijaya, T. T., Habibi, A. & Liu, Y. Predictors influencing urban and rural area students to use tablet computers as learning tools: Combination of UTAUT and TTF models. Sustainability 14, 21. https://doi.org/10.3390/su142113965 (2022).
Mutimukwe, C., Kolkowska, E. & Grönlund, Å. Information privacy in e-service : Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior. Gov. Inf. Q. 37(1), 101413. https://doi.org/10.1016/j.giq.2019.101413 (2020).
Arpaci, I., Kilicer, K. & Bardakci, S. Computers in Human Behavior Effects of security and privacy concerns on educational use of cloud services. Comput. Human Behav. 45, 93–98. https://doi.org/10.1016/j.chb.2014.11.075 (2015).
Canedo, E. D., Calazans, A. T. S., Masson, E. T. S., Costa, P. H. T. & Lima, F. Perceptions of ICT practitioners regarding software privacy. Entropy 22(4), 1–23. https://doi.org/10.3390/E22040429 (2020).
Zalloum, L., Alghadeer, H. & Nusairat, N. The effect of using mobile banking services applications on electronic word of mouth : The mediating role of perceived trust. Int. Business Res. 12(9), 62–80. https://doi.org/10.5539/ibr.v12n9p62 (2019).
Velázquez, B. M., Blasco, M. F. & Gil-Saura, I. La adopción de la TIC en hoteles y el boca-oreja electrónico. Acad. Rev. Latinoam. Adm. 28(2), 227–250. https://doi.org/10.1108/ARLA-10-2013-0164/FULL/WWW.INTERNETWORLDSTATS.COM (2015).
Saari, U. A., Damberg, S., Frömbling, L. & Ringle, C. M. Sustainable consumption behavior of Europeans: The influence of environmental knowledge and risk perception on environmental concern and behavioral intention. Ecol. Econ. 189, 107155. https://doi.org/10.1016/j.ecolecon.2021.107155 (2021).
Henseler, J., Hubona, G. & Ray, P. A. Using PLS path modeling in new technology research: Updated guidelines. Ind. Manag. Data Syst. 116(1), 2–20. https://doi.org/10.1108/IMDS-09-2015-0382 (2016).
Farrukh, M., Xu, S., Marc, W. & Yang, X. Artificial intelligence and social media on academic performance and mental well-being : Student perceptions of positive impact in the age of smart learning. Heliyon 10(8), e29523. https://doi.org/10.1016/j.heliyon.2024.e29523 (2024).
Farrukh, M., Xu, S., An, X. & Javed, I. Assessing the impact of AI-chatbot service quality on user e-brand loyalty through chatbot user trust, experience and electronic word of mouth. J. Retail. Consum. Serv. 79, 103867. https://doi.org/10.1016/j.jretconser.2024.103867 (2024).
Farrukh, M., Javed, I. & Zahid, I. The influence of the marketing orientation of textile companies in increasing their competitiveness. In Industry and Innovation: Textile Industry. 95–118. https://doi.org/10.1007/978-3-031-57804-5 (Springer Nature Switzerland, Cham, 2024).
Gefen, D. & Straub, D. A practical guide to factorial validity using PLS-graph: Tutorial and annotated example. Commun. Assoc. Inf. Syst. 16, 2005. https://doi.org/10.17705/1cais.01605 (2005).
Zhang, X. et al. Association between social media use and students ’ academic performance through family bonding and collective learning : The moderating role of mental well-being. Educ. Inf. Technol. https://doi.org/10.1007/s10639-023-12407-y (2024).
Fornell, C. & Larcker, D. F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39. https://doi.org/10.2307/3151312 (1981).
Sarstedt, M., Ringle, C. M. & Hair, J. F. Partial least squares structural equation modeling. In Handbook of Market Research 587–632 (Springer, 2022). https://doi.org/10.1007/978-3-319-57413-4_15.
Martins, J. M., Shahzad, M. F. & Javed, I. Assessing the Impact of Workplace Harassment on Turnover Intention : Evidence from the Banking Industry. Emerg. Sci. J. 7(5), 1699–1722. https://doi.org/10.28991/ESJ-2023-07-05-016 (2023).
Awofala, A. O. A. et al. Attitudes toward computer, computer anxiety and gender as determinants of pre-service science, technology, and mathematics teachers’ computer self-efficacy. Digit. Educ. Rev. 36, 51–67. https://doi.org/10.1344/der.2019.36.51-67 (2019).
Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M. & Lauro, C. PLS path modeling. Comput. Stat. Data Anal. 48(1), 159–205. https://doi.org/10.1016/j.csda.2004.03.005 (2005).
Gözüm, A. İ. C., Metin, Ş., Uzun, H. & Karaca, N. H. Developing the Teacher Self-Efficacy Scale in the Use of ICT at Home for Pre-school Distance Education During Covid-19, vol. 28 3 (2023). https://doi.org/10.1007/s10758-022-09616-8.
Chueh, H. E. & Huang, D. H. Usage intention model of digital assessment systems. J. Bus. Res. 156, 113469. https://doi.org/10.1016/j.jbusres.2022.113469 (2023).
Merhi, M., Hone, K. & Tarhini, A. A cross-cultural study of the intention to use mobile banking between Lebanese and British consumers: Extending UTAUT2 with security, privacy and trust. Technol. Soc. 59, 145. https://doi.org/10.1016/j.techsoc.2019.101151 (2019).
Liu, Y. et al. An empirical investigation of mobile government adoption in rural China: A case study in Zhejiang province. Gov. Inf. Q. 31(3), 432–442. https://doi.org/10.1016/j.giq.2014.02.008 (2014).
Quan, W., Moon, H., Sam-Kim, S. & Han, H. Mobile, traditional, and cryptocurrency payments influence consumer trust, attitude, and destination choice: Chinese versus Koreans. Int. J. Hosp. Manag. 108, 103363. https://doi.org/10.1016/j.ijhm.2022.103363 (2023).
Lu, Y., Yang, S., Chau, P. Y. K. & Cao, Y. Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Inf. Manag. 48(8), 393–403. https://doi.org/10.1016/j.im.2011.09.006 (2011).
Liu, Y., Gan, Y., Song, Y. & Liu, J. What influences the perceived trust of a voice-enabled smart home system: An empirical study. Sensors 21(6), 1–22. https://doi.org/10.3390/s21062037 (2021).
Song, Y., Yang, Y. & Cheng, P. The investigation of adoption of voice-user interface (VUI) in smart home systems among Chinese Older Adults. Sensors 22(4), 1–20. https://doi.org/10.3390/s22041614 (2022).
Ejdys, J. Building technology trust in ICT application at a university. Int. J. Emerg. Mark. 13(5), 980–997. https://doi.org/10.1108/IJoEM-07-2017-0234 (2018).
Xu, D. et al. Information credibility, disaster risk perception and evacuation willingness of rural households in China. Nat. Hazards 103(3), 2865–2882. https://doi.org/10.1007/s11069-020-04106-5 (2020).
Mensah, I. K. Factors influencing the intention of university students to adopt and use e-government services: An empirical evidence in China. SAGE Open 9, 2. https://doi.org/10.1177/2158244019855823 (2019).
Almaiah, M. A. & Al Mulhem, A. Analysis of the Essential Factors Affecting of Intention to Use of Mobile Learning Applications, vol. 24 2 (Education and Information Technologies, 2019).
He, J. The impact of users’ trust on intention to use the mobile medical platform: Evidence from China. Front. Public Heal. 11, 1. https://doi.org/10.3389/fpubh.2023.1076367 (2023).
Guo, Y., Chen, J. & Liu, Z. Government responsiveness and public acceptance of big-data technology in urban governance: Evidence from China during the COVID-19 pandemic. Cities 122, 103536. https://doi.org/10.1016/j.cities.2021.103536 (2022).
Zhang, H., Tang, Z. & Jayakar, K. A socio-technical analysis of China’s cybersecurity policy: Towards delivering trusted e-government services. Telecommun. Policy 42(5), 409–420. https://doi.org/10.1016/j.telpol.2018.02.004 (2018).
Zhang, F. & Li, D. Regional ICT access and entrepreneurship: Evidence from China. Inf. Manag. 55(2), 188–198. https://doi.org/10.1016/j.im.2017.05.005 (2018).
Al-Adwan, A. S., Al-Debei, M. M. & Dwivedi, Y. K. E-commerce in high uncertainty avoidance cultures: The driving forces of repurchase and word-of-mouth intentions. Technol. Soc. 71, 102083. https://doi.org/10.1016/j.techsoc.2022.102083 (2022).
Frempong, J., Chai, J., Ampaw, E. M., Amofah, D. O. & Ansong, K. W. The relationship among customer operant resources, online value co-creation and electronic-word-of-mouth in solid waste management marketing. J. Clean. Prod. 248, 119228. https://doi.org/10.1016/j.jclepro.2019.119228 (2020).
Gharib, R. K., Garcia-Perez, A., Dibb, S. & Iskoujina, Z. Trust and reciprocity effect on electronic word-of-mouth in online review communities. J. Enterp. Inf. Manag. 33(1), 120–138. https://doi.org/10.1108/JEIM-03-2019-0079 (2020).
Yuan, Y. H., Tsao, S. H., Chyou, J. T. & Tsai, S. B. An empirical study on effects of electronic word-of-mouth and Internet risk avoidance on purchase intention: From the perspective of big data. Soft Comput. 24(8), 5713–5728. https://doi.org/10.1007/s00500-019-04300-z (2020).
Acknowledgements
The authors thank the editors and anonymous reviewers for their valuable feedback to improve the quality of this work.
Funding
This work received financial support from the National Natural Science Foundation of China under grant number 72074014.
Author information
Authors and Affiliations
Contributions
Conceptualization: M.F.S and S.X. Methodology, M.F.S and K.I.K. Software, M.F.S and K.I.K. Validation, S.X and K.I.K. Formal analysis, M.F.S. Investigation, M.F.S, S.X, and K.I.K. Resources, S.X. Writing—original draft preparation, M.F.S and S.X. Writing—review and editing, M.F.S and K.I.K. Visualization, M.F.S. Supervision, S.X. Project administration, M.F.S. funding acquisition, S.X. All authors have read and agreed to the published version of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Xu, S., Khan, K.I. & Shahzad, M.F. Examining the influence of technological self-efficacy, perceived trust, security, and electronic word of mouth on ICT usage in the education sector. Sci Rep 14, 16196 (2024). https://doi.org/10.1038/s41598-024-66689-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-024-66689-4
Keywords
This article is cited by
-
ChatGPT awareness, acceptance, and adoption in higher education: the role of trust as a cornerstone
International Journal of Educational Technology in Higher Education (2024)
-
Exploring the impact of generative AI-based technologies on learning performance through self-efficacy, fairness & ethics, creativity, and trust in higher education
Education and Information Technologies (2024)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.