Professional Documents
Culture Documents
CERTIFICATION
The undersigned certify that they have read and hereby recommend for acceptance
by the University of Dar es Salaam a thesis entitled: Modelling ICT Adoption and
Use for SMEs Competitiveness and Growth, in fulfilment of the requirements for
Dar es Salaam.
…………..……………………………….
Prof. E. Mjema
(Supervisor 1)
Date: …………...……………………
…………..……………………………….
Prof. B. A. T. Kundi
(Supervisor 2)
Date: …………...……………………
ii
DECLARATION
AND
COPYRIGHT
I, Cuthbert Ed’Benny Msuya Amos, declare that this thesis is my own original
work and that it has not been presented and will not be presented to any other
Signature ------------------------------------------
This thesis is copyright material protected under the Berne Convention, the
Copyright Act 1999 and other international and national enactments, in that behalf,
except for short extracts in fair dealings, for research or private study, critical
permission of the Director of Postgraduate Studies, on behalf of both the author and
ACKNOWLEDGEMENT
First and foremost, I would like to thank my GOD my creator for giving me the
strength, good health, knowledge and understanding that enabled me to achieve this
the University of Dar es Salaam for supervising this research. Their assistance on
academic issues, positive criticism and direction in this work have been invaluable.
Their guidance, comments and the massive editorial work made this work a success
financial support which made this work possible. I am particularly very thankful to
Prof. M. Maboko the then Deputy Vice Chancellor on Academic affairs for enabling
me to secure a UDSM SIDA SAREC sponsorship for this research. Without this
Finally, but definitely not least, I would like to thank Dr. S. Kihwele for giving me
all staff members of the MIE Department and fellow postgraduate students for all the
assistance they rendered to me during the course of this study. My wife Melania and
our children Amos, Alex and Anneth deserve my sincere gratitude for giving me the
reason to work harder. To all of you I say thank you very much and GOD bless you.
iv
DEDICATION
late brother Marcelino A. W. Msuya, my late cousin Grace Y. Mngara and my whole
family. Thank you very much for being there for me.
v
LIST OF ABBREVIATIONS
AM Alternative Model
DF Degree of Freedom
EM Expectation Maximisation
IS Information Systems
IT Information Technology
MG Model generating
ML Maximum likelihood
N Population
n Sample Size
PC Personal Computer
SC Strictly Confirmatory
UN United Nations
ABSTRACT
The Small and Medium Sized Enterprises (SMEs) sector in Tanzania is characterised
by stagnant micro enterprises that have little incidence of growth. In addition, there
is enough evidence to the effect that SMEs in Tanzania are not utilising ICTs to their
advantage despite that fact that ICT adoption and use has become critical for any
business survival and growth. Thus, this research focused at developing an ICT
Using multiple research design, methodological triangulation and survey data from a
that identifies critical adoption factors, test for effectiveness of government policies
as well as test the post adoption SMEs performance was developed and validated.
marketing strategy are the critical determinant factors of ICT adoption in Tanzania
SMEs; (ii) Government policies in the form of taxes and tariffs, support programs
and support infrastructure do not help SMEs in ICT adoption situations; (iii) By
2014, adoption and use of ICTs in SMEs had grown from nonexistence in 2004 to
80.1% computer, 68.9% Internet access, 56.6% website, and 72.2% email; (iv) 47%
The developed model was able to account for 47.8% of ICT adoption and 16.5% of
SMEs performance using 5 predictor variables only proving to be reliable and easy to
ix
use tool. Therefore, the model is recommended for use in Tanzania and other
Msuya, C. A., Mjema, E and Kundi, B (2016), “Assessment of ICT Adoption and
Tanzania.
Msuya, C. A., Mjema, E and Kundi, B (2017), “ICT Adoption and Use in Tanzania
2017.
Msuya, C. A., Mjema, E and Kundi, B (2017), “Towards the Development of the
TABLE OF CONTENTS
Page
Certification...................................................................................................................i
Acknowledgement.......................................................................................................iii
Dedication....................................................................................................................iv
List of Abbreviations....................................................................................................v
Abstract.....................................................................................................................viii
Table of Contents..........................................................................................................x
List of Tables............................................................................................................xxii
List of Figures..........................................................................................................xxvi
1.7.5 Respondents....................................................................................................16
SECTORS IN TANZANIA..........................................................................22
2.1 Introduction.....................................................................................................22
........................................................................................................................42
3.1 Introduction.....................................................................................................42
4.1 Introduction.....................................................................................................67
4.2.5.1 Computers.....................................................................................................106
4.2.6.2 Innovations..................................................................................................118
4.4 Hypotheses....................................................................................................123
5.1 Introduction...................................................................................................126
5.5.2 Survey...........................................................................................................142
6.1 Introduction...................................................................................................205
7.1 Introduction...................................................................................................233
8.1 Introduction...................................................................................................306
8.2 Conclusions...................................................................................................307
8.2.3 The Relationship between the Relevant Factors and their Effect on ICT
REFERENCES.......................................................................................................326
APENDICES...........................................................................................................368
B: Research Instrument.....................................................................................369
Adoption Model............................................................................................395
A: Support Programs.........................................................................................397
C: Support Infrastructure...................................................................................399
xxii
LIST OF TABLES
Table 3.1: Theories of 20 Most Cited Articles and Books on ICT Adoption........48
Research..............................................................................................138
............................................................................................................147
xxiii
Table 5.4: Pilot Survey Reliability and Internal Consistence Analysis Results. .163
Table 6.2: Main Survey’s Reliability and Internal Consistence Analysis Results....
............................................................................................................210
Table 6.9c: Use of Computers for Business Transactions Using Software Packages.
............................................................................................................224
Table 7.2: The SMC for the 41 Indicators Measuring Exogenous Constructs........239
Table 7.3: The SMC for the 22 Indicators Measuring Endogenous Constructs......240
Table 7.4: Summary of Highly Correlated Variables for the Three Exogenous Latent
Constructs..............................................................................................242
Table 7.5: Summary of Highly Correlated Variables for the Two Endogenous Latent
Constructs..............................................................................................243
Validity..................................................................................................246
Table 7.7: Implied (for all remaining variables) Correlations for Three Exogenous
Table 7.9: Implied (for all variables) Correlations for two Endogenous Latent
Table 7.10: Standardized Residual Covariance’s for Measurement Model Two. .251
Discriminant Validity.........................................................................255
Table 7.12: Correlation between Five Latent Constructs (after recording variables)
Table 7.13: Parameter Summary for the Developed ICT Adoption Model...........263
Table 7.16: Squared Multiple Correlations for the ICT Adoption Model.............270
Table 7.19: Parameter Summary for the Final ICT Adoption Model....................273
.........................................................................................................296
LIST OF FIGURES
Figure 4.1: The Conceptual Model for Accessing ICT Adoption in SMEs..........122
Figure 7.1: Measurement Model One with Standardised Estimates for Three
Figure 7.2: Measurement Model Two with Standardised Estimates for Two
Figure 7.3: Measurement Model Three with Standardised Estimates for all Five
Latent Constructs................................................................................254
Figure 7.4: Measurement Model Three with Standardised Estimates for all Latent
Figure 7.5: The Initial ICT Adoption Model with Unstandardised Estimates......261
Figure 7.6: The Initial ICT Adoption Model with Standardised Estimates..........262
Figure 7.9: The Final ICT Adoption Model with Unstandardised Estimates.......274
Figure 7.10: The Baseline Model with Unstandardised Estimates for Multiple
Figure 7.11: The Baseline Model with Unstandardised Estimates for Multiple
Figure 7.12: The Structural Weights Model with Unstandardised Estimates for
Figure 7.13: The Structural Weights Model with Unstandardised Estimates for
Figure 7.14: The Baseline Model with Unstandardised Estimates for Multiple
Figure 7.15: The Baseline Model with Unstandardised Estimates for Multiple
Figure 7.16: The Structural Weights Model with Unstandardised Estimates for
Figure 7.17: The Structural Weights Model with Unstandardised Estimates for
Figure 7.18: The Baseline Model with Unstandardised Estimates for Multiple
Figure 7.19: The Baseline Model with Unstandardised Estimates for Multiple
Figure 7.20: The Structural Weights Model with Unstandardised Estimates for
Figure 7.21: The Structural Weights Model with Unstandardised Estimates for
CHAPTER ONE
INTRODUCTION
The importance of the Small and Medium Enterprise (SME) sector as the cornerstone
of most economies is widely recognised (Abdullah and Bakar, 2000; Akhtar, 1997;
Costello, 2009; DBIS, 2013a; Hall, 2002; Mbamba, 2004; Olomi, 2005). The
literatures show that, almost 90% of the total numbers of businesses across the world
are SMEs (Mira and Robert, 2007). SMEs play a significant role in creating
economy. For example, in the Netherlands, in year 1999, SMEs accounted for
98.8% of all private sector companies and contributed 31.6% to Gross Domestic
Product (GDP). The sector also employed 55% of the total workforce (EIM, 1999).
In United Kingdom, in year 2007, about 99.9% of the nation’s 4.3 million business
enterprises were SMEs and they accounted for well over half of employment (58.9%)
The Observatory of European SMEs (2003) note that, in year 2003, about 92% of all
European enterprises were SMEs. More recent figures show that there are more than
Commission, 2014). These SMEs are considered to be the true back-bone of the
provide two out of three of the private sector jobs and contribute to more than half of
the total value added created by businesses in the European Union (European
Commission, 2014).
Previous studies by Abdullah and Bakar (2000) and Urata (2000) suggested that,
developing countries. This has been corroborated by newer studies. According to the
GDP in developing economies; these numbers are significantly higher when taking
into account the estimated contributions of SMEs operating in the informal sector
(IFC, 2010). The literature (DBIS, 2013a; IFC, 2010) has also shown that in
they currently do. Some of the wider issues that have been mentioned as
On the same note, in recent years, adoption and effective use of ICTs in business has
been identified as being critical to business survival and growth (Apulu; 2012;
Costello, 2009; Mbamba, 2004; Naul, 2012; Olomi, 2005; Van Akkeren and Cavaye,
3
1999b). In general, the use of ICTs in SMEs has been considered vital for making
SMEs competitive (Ahmed, et al., 2010; Apulu, 2012; Consoli, 2012; Costello,
2009; European Commission, 2014; Modimongale, 2009; Naul, 2012; Olise et al.,
According to the United Nations (2007), the use of ICTs in SMEs can result in
reduction of communication costs and geographical barriers for both internal and
global clients and suppliers, expanding the market size (client base) through the use
of e-marketing.
The European Commission (2008) has also noted that, the use of ICTs in SMEs can
help SMEs to grow and become more innovative. Thus, the commission
recommends that ICTs adoption and use in SMEs should be encouraged (European
ICTs in SMEs can help to improve the technical and managerial skills of the owner-
managers and thus enabling SMEs to take advantage of the available e-business
solutions. This in turn helps the SMEs to address the issue of high cost of
In addition, Love et al. (2005) claim that, the use of ICTs affords many benefits to
the SMEs at both operational level, tactical level and strategic level. Moreover,
Ongori (2009) observed that, in the present era of globalisation, the adoption of ICT
4
would change the way businesses operate. In particular, Ongori (2009) envisaged
“for SMEs to grow and become successful, they must have the ability to compete and
dynamically respond to rapidly changing markets. This means that SMEs need to
This study looks at the SMEs sector in the context of Tanzania. In particular, the
research investigates at how Tanzania SMEs can use ICTs in order to become
According to the Open Learn (2014), depending on their viewpoint and context,
different people attach different meaning to the word technology. This research uses
the definition by Dictionary.com (2014) which define technology as: “The branch of
knowledge that deals with the creation and use of technical means and their
interrelation with life, society, and the environment, drawing upon such subjects as
Ram (2006). Beckinsale and Ram (2006) define ICT as “any technology used to
Beckinsale and Ram (2006), this covers all forms of technologies such as computers,
Internet, websites, fixed line telephones, mobile phones and other wireless
devices (Manueli et al., 2007). The two technologies are defined in the subsequent
sections.
well as of text, graphics, symbols, and sound. All computers contain a central
processing unit that interprets and executes instructions; input devices, such as a
keyboard and a mouse, through which data and commands enter the computer;
memory that enables the computer to store programs and data; and output devices,
such as printers and display screens, that show the results after the computer has
processed data”. In this research, the use of computers for automation (digitisation)
settings is explored.
6
The Internet is an important aspect of ICT (Apulu, 2012; Beckinsale and Ram, 2006;
networks that use the TCP/IP network protocols to facilitate data transmission and
exchange” (Kripanont, 2007; Peterson and Davie, 2007). Kripanont (2007) report
that, in popular idiom, the Internet often refers to the World Wide Web (WWW),
electronic mail (email) and online chat services that operates on the Internet.
According to the literature, the Internet physically uses a portion of the total
networks by its use of the use of TCP/IP network protocols to facilitate data
transmission and exchange (Kripanont, 2007; Peterson and Davie, 2007). It should
be noted that, while computers facilitate for data processing, storage and
interpretation, the Internet allows for easy ways of transmission and sharing the
The SMEs nomenclature is used to mean micro, small and medium enterprises
accepted definition of SMEs (Harindranath et al., 2010; Massawe, 2003; Pass et al.,
7
2000; Wangwe, 1999). Different countries use various measures of size depending
on their level of development. The commonly used yardsticks are the total number of
employees, total investment and sales turnover (URT, 2002). This study adopts the
URT (2002). In the context of Tanzania, SMEs are defined according to sector,
SMEs are defined as micro, small and medium size enterprises in nonfarm activities,
TShs. 5 million. Small enterprises are those engaging between 5 and 49 employees or
with capital investment from TShs. 5 million to TShs. 200 million. Medium
enterprises employ between 50 and 99 people or use capital investment from TShs.
200 million to TShs. 800 million (URT, 2002). Table 6.1 gives Tanzania SMEs
classification system.
According to URT (2002) in the event of an enterprise falling under more than one
category, then the level of investment becomes the deciding factor (URT, 2002).
8
In Tanzania, the SME sector has also been recognized as a significant sector in
Mbamba, 2004; NBS, 2014; Olomi, 2005; Olomi, 2006; URT, 2002; URT, 2012).
The sector has also been considered a base for industrial development of the country
(Bagachwa, 1983; Mbamba, 2004; URT, 2002). At present, about 27% of the
Tanzania ‘s GDP originates from the SME sector (URT, 2012). Furthermore, it is
observed that, while employment has become a very significant issue in Tanzania,
over the past two decades, the SME sector has been the main source of new
employments (Mlingi, 2000; Olomi, 2005; Olomi, 2006; URT, 2002). According
the literature (Olomi, 2005; Olomi, 2006; URT, 2002) it is estimated that over 90%
of the new entrants into the Tanzania labour force every year end up in the SME
sector (URT, 2002). Olomi (2005; 2006) and URT (2002) conclude that, SMEs
development remains to be the main source of jobs in the future (Olomi, 2005; URT,
2002).
However, despite the importance of this sector as shown by the statistics, the SME
2006; URT, 2002; URT, 2012). Available literature shows the existence of a number
1999; Mbamba, 2004, Olomi, 2005; Olomi, 2006; URT, 2002). For example,
Calcopietro and Massawe (1999) identified and broadly classified the factors
banking and finance structure, legal and regulatory framework, and market
(1999) shows that they are more or less the same issues raised by the Observatory of
European SMEs (2007) for European SMEs. In a different study, Olomi (2006)
specifically identified that, the limited capacity of people who start and operate the
businesses and the poor state of support institutions to the sector as being some of the
most serious problems hampering the development of the SME sector in Tanzania.
This is the same as lack of quality management and poor support infrastructure as
highlighted by the Observatory of European SMEs (2007). Other research work has
shown that the use of ICTs in Tanzania SMEs is still very low (Babiker, 2001;
Baynit, 2002; Issack, 2006; Isaya, 2009; Jonathan, 2004; Kavenuke, 2009; Mbamba,
In response to the challenges faced by the sector, there have been numerous efforts
by the Government of Tanzania to address some of the basic issues identified by the
literature (Mbamba, 2004; Olomi, 2005; URT, 2002; URT, 2012). The enacting of
the SME policy of Tanzania, the ICT policy of Tanzania and consequently the setting
up and coordination of support institutions for the SMEs and tax incentives are some
despite these efforts, most recent studies (URT, 2012) indicate that, most of the
identified constraints have persisted to date. For example, according to the URT
(2012), ICT use among Tanzania SMEs is still very low despite the fact that among
other things, the policies are aimed at encouraging ICT adoption in businesses and
business growth in general (URT,2002; URT, 2003a). Overall, it can be noted that
10
there is lack of significant growth in many individual SMEs and the sector as a whole
(URT, 2012). Available data points out that, for more than three decades now, the
medium size enterprise (Mlingi, 2000; NBS, 2014; NISS, 1991; Olomi, 2005, URT,
Moreover, despite the fact that the number of SMEs has increased from 1.7 million
businesses in 1991 to about 3.2 Million businesses in 2010 and that the number of
people employed in the sector has increased from 3.0 million to 5.2 million jobs in
the same period, the sector contribution to the Tanzania economy has remained at
about 30% of the GDP (NBS, 2014; NISS, 1990; URT, 2002; URT, 2012). This
suggests that most of the individual SMEs remain stagnant for a big part of their life
cycle, a phenomenon also observed by Olomi (2006). Olomi (2006) noted that there
are variations in performance among SMEs; while some are growing, a majority of
small enterprises have permanently remained micro or informal without any marked
growth. As a result, these enterprises have limited access to markets, limited access
to some support services as well as limited capacity to pay taxes and create high-
quality jobs. Olomi (2006) further foresee that, with the ongoing globalization this
Tanzania SMEs are faced with a serious problem: after start-up, most SMEs remain
stagnant and do not grow up into mature business as are expected (Mbamba, 2004;
Mlingi, 2000; NISS, 1991; Olomi, 2005; Olomi, 2006; URT, 2002). Moreover,
11
despite the fact that there is enough evidence to the effect that adoption and use of
ICTs is critical for business survival and growth (Ahmed, et al., 2010; Apulu, 2012;
2010; Hazbo and Arnela, 2010; Naul, 2012; Olise et al., 2014; Tarutė and Gatautis,
2014), ICT adoption and use in Tanzania SMEs is still very low (Baynit, 2002;
Issack, 2006; Isaya, 2009; Jonathan, 2004; Kavenuke, 2009; Mbamba, 2004; Mlay,
2009; Muttayabalwa, 2007; Naul, 2012; URT, 2012). Previous studies on the
problem in other countries show that, economic growth of a firm or that of a country
depends on the competitiveness of that firm or that nation (Rainer and Kazem 1994;
Syed and Mohammad, 2009; World Economic Forum, 2013). The literature further
shows that, in today’s knowledge economy, adoption and use of Information and
competitiveness and the basis for SMEs survival and growth (Ahmed, et al., 2010;
Apulu, 2012; Consoli, 2012; Costello, 2009; European Commission, 2014; Hazbo
and Arnela, 2010; Modimongale, 2009; Naul, 2012; Olise et al., 2014; Tarutė and
Gatautis, 2014).
Based on the observed facts, the literature suggests various models for ICT adoption
by SMEs (Al-Qirim, 2005; Beckinsale and Ram, 2006; Costello, 2009; Grandon and
Pearson, 2004a; Manueli et al., 2007; Mehrtens et al., 2001; Pedersen, 2005; Van
Akkeren and Cavaye, 1999b; Windrum and de Berranger, 2002; Zappala and Gray,
2006). However, most of these models have been developed on the level of
economic development and culture of a particular country, and none has been tested
to suit the Tanzania situation. According to Kilele (2011) and Mbamba (2004), the
12
most effective model has to relate to the local environment, economic and social
priorities of a country. Thus, because of the social context, the available models
cannot be used in Tanzania since they lack constructs and or elements that captures
the uniqueness of Tanzania situation. Review of the literature does not show any
work related to ICT adoption model that has been designed and tested specifically for
guiding SMEs ICT adoption process in the context of Tanzania. This is a knowledge
gap in the literature and a shortcoming in Tanzania SME sector. This work is an
attempt to bridge this gap by developing and testing a model that will aid ICT
The overall objective of this research is to develop a model for guiding Tanzania
SMEs in the ICT adoption process. To achieve the main objective, the following
ii. To establish the relationship between the relevant factors and their effect on
iii. To establish the status of ICT adoption and use by Tanzania SMEs.
The results of this research have both academic and practical importance.
Academically the research contributes to the general literature that fills in the
knowledge gaps that has been highlighted by the literature review. In practical terms,
the developed model will enable SMEs in Tanzania to adopt ICTs successfully by
aiding the ICT adoption process. Also, the outcome of this research will draw
attention to issues that hold back efficient use of ICTs in SMEs after adoption and
explain how SMEs can use ICTs to gain competitive advantage. This will result in
SMEs growth and economic development of the country. Moreover, the results of
this research will serve as a yardstick on the relevance and effectiveness of existing
ICT policies. This will enable for timely policy reviews, implementation and support
strategies for SMEs by policy makers such as the government, regulators and
professional institutions. The developed model can also be used in other countries
that have similar social and economic conditions like Tanzania, such as the
adoption model for aiding SMEs in Tanzania to adopt ICTs successfully. The model
can be replicated in other countries with similar social and economic conditions to
the context of Tanzania SMEs in order to examine what potential determinant factors
are involved and how much they influence the adoption decisions. Post adoption
evaluation was also carried out in order to establish how adoption of ICTs influences
SMEs competitiveness and growth. In order to make the study manageable in the
given time frame and resource limitations, the research adopted the following
strategies:
Data was collected in four regions only in mainland Tanzania namely Dar es Salaam,
Arusha, Mwanza and Mbeya. The selection of these regions was justified by the fact
that, the four regions and in particular the four cities in these regions have the highest
business density than any other region or city in the country (TRA, 2013; URT,
2012). For example, according to the URT (2012) in year 2010, business
concentration in Mbeya city was 46% of all businesses in the Mbeya region while for
the Dar es Salaam city, business concentration was 45% of all businesses in Dar es
Salaam region. The high concentration of businesses in relatively small area made
data collection easier and reduced travel costs to reach the respondents. In addition,
the four regions offered the best opportunity to collect data about SMEs in rural
settings, as well as the data about SMEs in urban contexts, which was a prerequisite
15
for the study. It should be noted that, the four regions apart from being the home to
the four largest cities in Tanzania, they also have vast rural areas (NBS, 2014).
businesses and included SMEs from all sectors in the studies (Sophonthummapharn,
2008). Other researchers however have argued that, this has limited the
generalisation of results since SMEs in different sectors are radically different in the
nature of their business, and thus each sector could contribute to the research
uniquely (Sophonthummapharn, 2008). The author notes that, the choice of what
In this study, SMEs from two sectors, the service and trading sectors were
researched. This choice was motivated by the fact that, the two sectors account for
over 85% of all SMEs in Tanzania. According to the URT (2012), the general
trading sector account for 55.4% of all SMEs while the service sector account for
30.5% of all SMEs. Therefore, the choice of the two sectors was expected to give
results that are relevant to the majority of SMEs in Tanzania. The choice also made
the data collection exercise easier. In addition, studying more than one sector created
this thesis report finding made on analyses that treat the SMEs from the two sectors
and above and excluded those below this threshold. This choice was influenced by
the fact that it was much easier to get detailed information about SMEs in this
category than in the other categories. According to data available from Tanzania
Revenue Authority (TRA), and the Districts/Municipal Directors, during the time
frame of this research, Dar es Salaam had about 25,386 businesses in this category,
Arusha had about 11,612 businesses, Mwanza had about 4855 businesses and Mbeya
technologies (Beckinsale and Ram, 2006; Costello, 2009; Manueli et al., 2007;
the Computer and Internet technologies only, and this can also be attributed to
research constraints, that is, the time frame and the research budget. The choice of
these technologies was influenced by the fact that they have been shown to be the
fundamental source of competitiveness and growth for businesses in the present day
digital economy (Apulu, 2012; Costello, 2009; European Commission, 2014; Hazbo
and Arnela, 2010; Olise et al., 2014; Tarutė and Gatautis, 2014).
17
1.7.5 Respondents
sector and general trading sector. The choice of respondents was influenced by the
fact that, in SMEs, owners-managers make all key decisions including the decisions
on what type of technology is appropriate for their business (Apulu, 2012; Costello,
2009; Levy and Powell, 2005; Rashid and Al Qirim, 2001; Van Akkeren and
Cavaye, 1999b). Thus, only the data obtained from owners and or managers was
included in the analysis and data obtained from company employees was rejected.
follows:
This chapter presents a brief general introduction on the background of the research
along with definitions of the key concepts of this research, that is, ICTs, Computers,
the Internet and SMEs before spelling out the research problem. The chapter also
outlines the research main objective, together with specific objectives. This is
followed by the significance of the study as well as the scope of the research. The
Chapter Two: Literature Review I: The SME Sector and ICT Development in
Tanzania
This chapter explores the SME sector and ICT development in the context of
Tanzania. The chapter is arranged as follows: First, a historical account of the SME
made. Finally, the use of ICTs in Tanzania SMEs is explained before a summary is
provided.
In this chapter, literature reviews regarding many aspects of ICT adoption in SMEs
are explored. A thorough review of past research and current theories and models
related to ICT adoption and use in SMEs is made. Finally, the shortcomings of the
existing models and knowledge gaps that justify the need for this study are identified.
This chapter proposes and discusses a conceptual model for this study. The
conceptual model is developed using constructs and elements that have been firmly
established by the available literature that they are critical to adoption issues in
SMEs. The conceptual model has three groups of key determinants that are
expected to influence ICT adoption and usage behaviour by SMEs together with
key determinants. Post adoption evaluation is also captured in the conceptual model
This chapter presents the research design and methodology used in this study. Using
research are briefly discussed, and the philosophical standpoint of the author is
strategies, and time dimension are discussed, and justification of specific choices and
uses made in this study are then clarified. Moreover, this chapter elaborates the
development, as well as data collection in both pilot study and the main survey.
Finally, the chapter provide a summary of data analysis methods and tools used in
the study.
This chapter give account of some of analyses carried out on the data, and the
findings observed. The testing commences with analyses that are (almost always/
mandatory) carried out first before other types of data analysis can take place. These
missing data analysis which show and mitigate the impact of missing data, constructs
convergent validity tests, which is used to show the validity of the constructs, testing
for the univariate and multivariate normality of data using the Skewness and Kurtosis
statistic measures and testing for multivariate outliers using Mahalanobis distance
20
statistic. Thereafter, descriptive analyses are performed and inferences are made.
Results of the analyses are given in tables, figures and plots in order to enhance the
This chapter presents development and testing the ICT adoption model. Construct
performed first before the ICT adoption model is developed and analysed using the
software is used in the implementation of SEM. Research hypotheses are tested and
This chapter gives the overall conclusions of the study. The key findings of the
study, as well as the implications of the study, are made. The chapter also
acknowledges limitations of the study and ends by giving suggestions for further
research.
PROBLEM IDENTIFICATION,
RESEARCH OBJECTIVES,
CHAPTER 1 SIGNIFICANCE OF THE STUDY,
SCOPE AND LIMITATIONS
This chapter has introduced the background information on the importance of the
SME sector in the economy of any country. The chapter has also highlighted the state
of the SME sector in Tanzania with great emphasis on the need for development of
the sector as a means of addressing critical social economic challenges faced by the
22
country such as employment creation, poverty reduction and the overall economic
growth of the country. The chapter further outlined the problem statement and set out
the research objectives. Moreover, a brief explanation of the justification for the
study as well as the scope of the research was made. The chapter ends by giving an
CHAPTER TWO
2.1 Introduction
This chapter explores the SME sector and ICT development in the context of
Tanzania. The chapter is arranged as follows: First the SME sector is thoroughly
discussed, and the historical account and the current status of the SME sector in
ICT Policy and the Regulatory Framework are highlighted. Furthermore, important
statistics related to E-readiness are given. In conclusion, the chapter describes the
The history of the SMEs sector in Tanzania is defined by three different times. The
colonial era which cover the timeframe from year 1891 to year 1960; the time soon
after independence in 1961 to the mid 1980s during which the country embraced
socialism political ideology and centrally planned economy; and the post
independence time from the mid 1980s to date, when the country switched from the
prior and during the early days of colonial era, the elements and skills of
During the colonial era, there were deliberate efforts in restricting the participation of
1999). Available literature shows that, during this time, the participation of
such as tiny shops whereas Arabs were allowed to operate as retailers only, and
Mutagwaba, 1999).
Soon after independence in year 1961, and in particular following the Arusha
ownership of the economy. This made the public sector the most important source of
investment and employment in the formal sector throughout this period. During this
health services delivery as well as water supply and sanitation were recorded in the
1970s and early 1980’s as a result of the socialism approach (Hamisi, 2011; Naul,
2012; Olomi, 2001a; Olomi, 2001b; Temu and Due, 2000). However, it was also
during this time, that the private sector was seriously marginalized (Naul, 2012;
Olomi, 2001a; 2001b). Within this socialism political framework, private business
sector was actively discouraged in favour of public enterprises that were government
2001a; 2001b). Furthermore, all major undertakings in the private sector were
nationalized, and regulations restricting civil servants and leaders of the ruling
25
political party from engaging in business activities were instituted. This left
whatever was remaining of the business activities in the private sector to people who
had little or no education at all, since at that time, almost all indigenous educated
people were members of the civil service. Moreover, within this socialism policy,
decision making was based on a top down approach with the government being the
only organ that made all key decisions. According to Olomi (2001a; 2001b), the
initiatives and or creativity, willingness to take risks and related behaviours (Olomi
2001a; 2001b).
In the mid-1980s, Tanzania experienced a massive economic crisis that lasted for
over a decade and left the economy in shambles (Naul, 2012). During this time, the
government of Tanzania was forced to move from centrally planned public sector led
economy towards a more market oriented one, thus permitting the private sector
development. It was in this background that the SME sector in Tanzania was
established (Naul, 2012; Olomi, 2001a; 2001b). Since this time, the government
has taken a number of positive steps to ensure that the private sector and, in
particular, the SME sector is developed. These include for example, the formulation
of regulatory frameworks and policies such as the SME Policy of Tanzania (URT
2002) and the Tanzania ICT Policy (URT, 2003a), as well as the formation of
support institutions for the sector such as Small Industries Development Organisation
Nevertheless, looking at the historical background, it can be argued that, the SME
26
design and thus there are still a lot to be done to develop the sector further.
date data on the state of the sector (Olomi, 2006). According to Olomi (2006), for
almost two decades, most reports on the sector have relied on the data from 1991
National Informal Sector Survey (NISS) which became outdated and unreliable as
time went by. Olomi (2006) further noted that, although, in the same period, other
studies such as the 1992 Rural Informal Sector Survey (RISS) and the 1995 Dar es
Salaam Informal Sector Survey (DISS) were carried out and were the basis of some
of the reports on the sector, by far, in this period, the NISS (1991) remained to be the
only nationwide study of the informal sector. The author of this research observed
the same phenomenon. The most recent comprehensive study in the sector is the
URT (2012) which became available in 2013. It is thus natural that most of the
statistics given in this section are based on the URT (2012) and the NISS (1991)
reports.
individuals in Tanzania owned and ran small businesses. The report further shows
that, while 86.2% of the small businesspersons owned and ran only one business, the
rest owned and ran two (12.8%) or more (1%) businesses. In total, all owners owned
and ran about 3,162,886 SMEs. The URT (2012) further reveals that, about 96.4%
27
of small business owners were sole proprietors, and about 3.5% were in partnerships
The URT (2012) report also show that, only 3.9% of all small businesses were
formally registered with the Business Registrations and Licensing Agency (BRELA);
of those unregistered, 96.4% were micro businesses, and 84.4% were classified as
small businesses. It is also reported that, only 44.7% of small business owners kept
financial records. Based on the survey findings, it was estimated that small
businesses contributed about 27% to Tanzania's GDP in 2010 and also made a
The major broad sectors identified by the URT (2012) include, the trade sector which
had about 1,758,896 SMEs and accounted for 55.4% of all SMEs, the service sector
which hand about 964,235 SMEs and accounted for 30.5%, of all SMEs and the
manufacturing sector which had about 430,381 SMEs and accounted for 13.6% of all
SMEs in Tanzania. The remaining 0.5% of SMEs were categorized as other services
(URT, 2012). Most of the SMEs in the other services category were related to
agriculture, forestry, and fishing (0.4%) and the remaining 0.1% were related to
water supply, sewerage, and waste management (URT, 2012). Out of the 3,162,886
SMEs in Tanzania over 90% were located in mainland Tanzania and the rest were
located in Zanzibar (URT, 2012). Table 2.1 show the general distribution of the
SMEs across the country while Figure 2.1 show the sectoral distribution of SMEs in
the country.
28
On employment creation, the URT (2012) report that, about 2.9% of all small
businesses had five or more employees; 66.1% were one person businesses, and
31.0% had two to four employees. Overall, the SMEs employed about 5,206,168
718,663 were relatives and friends; and 79,390 were apprentices. According to the
URT (2012) report, these figures indicate that employment in small business is
29
mainly a family affair. The low number of apprentices also indicates insufficient
skills development within the MSME segment. About one fifth of employed people
NISS (1991) and Olomi (2005) observed that, the SME sector in Tanzania is
graduation to formal small and medium size. Olomi (2005) further argued that, these
enterprises remain marginal players, creating and sustaining low quality jobs. The
URT (2012) observations seem to confirm what has been observed by previous work.
Development of the ICT sector with respect to use of the computer technology can
be traced back to year 1956 when the Public Works Department under the British
Administration introduced the hand punch input device for computer cards (Sawe,
1999). According to Sawe (1999) the device was used to capture data for processing
Finance introduced the first computer in the country (Mbamba, 2004; Naul, 2012).
However, this investment failed to meet the expectations anticipated earlier and the
decades in the time from year 1974 to year 1993. Despite the ban on the importation
30
behalf of Tanzania Commission for Science and Technology (COSTECH) show that
by 1993 computer use in Tanzania was still very low as shown in Table 2.2. In
recognition of the importance of computer use in the social and development of the
country, the government of Tanzania lifted the ban on the importation of computers
Tanzania abolished all taxes and duties on computers and peripherals since the
financial year 2001/2002 as a stimulus to the development of the ICT sector (URT,
2003a).
communication service. In addition, TTCL was also responsible for the regulation of
As a part of a wider economic liberalization policy in the country, in year 1993, the
2010). This led to the split of the TPTC into the Tanzania Posts Corporation (TPC),
1997 (URT, 1997). The National Telecommunication Policy provided the framework
for further reforms and private-sector engagement in the sector (Behitsa et al., 2010;
URT, 1997).
established through the Act of the Parliament (Behitsa et al., 2010). TCRA is an
independent agency for the regulating and licensing of postal, broadcast and
competition and economic efficiency, protect consumer interests, grant licenses and
enforce license conditions, regulate tariffs, and monitor performance (Behitsa et al.,
2010). In the same year 2003, three other policies meant to provide frameworks and
guidance for further development and management of the sector was passed. These
include the National Information and Broadcasting Policy (URT, 2003b), the
National Postal Policy (URT, 2003c), and the Tanzania National ICT Policy (URT,
2003a). According to Behitsa et al. (2010), of the four mentioned policies, the
32
vision to 2020 (Behitsa et al., 2010). The policy aims at ensuring accelerated
of the national development strategy (Behitsa et al., 2010). Tanzania’s ICT Policy
(Behitsa et al., 2010). The policy aims at providing a national framework that will
The sector became fully liberalized in year 2005 and by year 2009; Tanzania had a
these efforts, in year 2009, Tanzania’s telecommunications sector was the fastest
growing sector of the economy (Behitsa et al., 2010; URT, 2010). In that year, the
sector recorded a 21.9% growth, up from 20.5% in 2008 and contributed 2.5% to the
GDP up from 2.1 % in 2008 (URT, 2010). The full impact of these efforts can be
section 2.3.3. Naul (2012) notes that, to date, ICT has grown in importance and
usage, and it is applied in almost all aspects of life from domestic, business and the
academic arena.
33
Available data show that since liberalization of the telecommunication sector began,
there has been remarkable growth. However, in order to fully comprehend the
figures and statistics that show the current status of the ICT sector in Tanzania, it is
important to take note on how the data in the sector has been archived over the years.
Under the TTCL, telecommunications sector licenses were based on the so called
vertical regime, whereby the license granted the operator “the right to operate a
technology and service neutral licensing regime, technically known as the Converged
Licensing Framework (CLF). TCRA introduced the CLF in February 2006 with four
license clusters namely: The Network Facilities License (NFL), the Network
Services License (NSL), the Applications Service License (ASL) and the Contents
Services License (CSL). These licenses cover international, national, regional and
district market segments. At the same time, in a phasing out arrangement, TCRA
continued to issue licenses issued under the old regime in the areas of Public Data
Table 2.3 shows the trend of Voice Mobile Operators and ISP/Data operators in the
time frame from year 2003 to year 2009. In this time frame, the number of Voice
Mobile Operators increased from 5 in year 2003 to 7 in year 2009 while the number
of Internet Service Providers (ISP) grew from 22 to 62 in the same time frame.
34
As at September 2014, under the CLF, the TCRA has issued 22 Network Facility
Licenses, of which 8 are both international and national, 12 are national and 2 are
regional. Within the same time frame, 18 Network Services Licenses were issued, of
which 8 are both international and national, 7 are national, and 3 are regional.
both international and national, 1 is international, 55 are national, 11 are regional and
1 district license. Also, a total of 110 Content Services Licenses have been issued, or
national Radio stations, 17 regional radio stations and 61 district radio stations.
Behitsa et al. (2010) noted that, it is not easy to determine the actual number of
operational licensees, due to the nature of the licensing process. They recommended
a study to determine the different levels of operation for the different licensees.
Table 2.5 document the trend of the tariffs for prepaid voice services in the time from
year 2005 to year 2013. It can be observed that there has been a significant
reduction in the cost in this time frame. According to Behitsa et al. (2010), the
prepaid voice (telecommunication) per minute tariffs decreased by about 40% over
Table 2.6 show the trend on the subscription for both fixed and mobile networks and
the overall Teledensity for the time from year 2005 to year 2014. It can be observed
that, during this time, voice subscribers (both fixed and mobile) increased from
3,118,157 to 30,530, 609. On the same note, the Teledensity increased from 10% in
year 2005 to 68% in year 2015. This by all means is a major growth of the sector.
However, Behitsa et al. (2010) cautions on the meaning and use of this data since it
is known that most mobile phone users can have up to four registered lines with
different operators. When this is taken into account, the actual Teledensity may be
much lower than recorded here. Moreover, it is also known that, most of mobile
phone users are located in urban areas, and thus this figure does not tell anything
about the actual digital divide between rural and urban dwellers. Nevertheless, the
Table 2.7 and Table 2.8 show the data for Internet subscribers by subscription type
very low.
In a study conducted in year 2005, Souter et al. (2007) concluded that Internet
penetration in Tanzania was negligible. Behitsa et al. (2010) argue that, until 2009
Table 2.8. Available literature (URT, 2003a) show that, one of the major constraints
on ICT development in Tanzania has been very high costs of service provision, a
According to Behitsa et al. (2010) this was true during the time when internal
network that have limited reach and the international communications infrastructure
depended much on satellite and microwave links both of which are significantly
more expensive to operate and offer much less capacity than optical fibre cables.
In line with the ICT policy (URT, 2003a) in year 2009, Tanzania embarked on
with a view to achieving its ICT vision (Pazi and Chatwin, 2013; Pazi et al., 2013;
Yonazi, 2012). The NICTBB project has four phases. Phase one is intended to
connect all regional administrative headquarters, phase two to connect some district
headquarters, phase three to connect all remaining district headquarters and phase
four to connect all villages in mainland Tanzania. The NICTBB phase one and two
were completed and became operational in year 2010 and 2012 respectively. The
two phases covers 7560 km out of the intended 10,000km for the whole project (Pazi
and Chatwin, 2013) and has connected 21 regional and some district headquarters.
39
Moreover, by design, the NICTBB addresses national needs and those of the
access to International submarine cables (Pazi and Chatwin, 2013). On the same
context, the first international submarine fibre cable arrived in Tanzania in July 2009,
and became operational in year 2010 (Pazi and Chatwin, 2013; Yonazi, 2012). At
SEACOM and EASSY cables in Dar es Salaam. Figure 2.2 show the NICTBB map
with regional and cross-border PoPs as well as the two international submarine
cables highlighted.
40
The advent of the NICTBB and the landing of international submarine optical fibre
cables have had a great impact on the development of the ICT sector in Tanzania.
For example, according to Yonazi (2012), by year 2012, the backhaul tariffs in
Tanzania were reduced by 99%, compared to year 2009 tariffs as a result of the
NICTBB. Yonazi (2012) further observes that, the abundance of national and
constraints still remain to bring up ICT usage in Tanzania, this section has shown a
number of very positive initiatives that has been taken to push forward the sector.
As pointed out in section 2.2.2, there is very little literature on the SME sector in
Tanzania. Academic studies carried out about ICT adoption in SMEs in Tanzania
include the work of Isaya (2009), Jonathan (2004), Mbamba (2004), Muttayabalwa
(2007) and Naul (2012). Other studies such as that of Babiker (2001), Baynit
(2002), Issack (2006), Kavenuke (2009) and Mlay (2009) explores ICT adoption and
picture that ICT adoption and use in the country, in general, is still very low despite
government efforts such as enacting of ICT and SMEs policies and the tax incentives
for the acquisition of ICTs in particular computers. This opinion was also echoed by
three of the respondents during the pilot study of this research. The three
respondents on different occasions and locations were of the opinion that the country
as a whole was not ready to engage in serious business models involving massive use
of ICTs. One respondent cited the lack of a national payment system, local credit
cards, and a legislative framework appropriate for e-business. The other two cited as
examples, lack of adequate infrastructure to support their business ideas, high cost of
ICT business solutions, lack of trust in online business transactions and unplanned
frequent power cuts. The low usage of ICTs among Tanzania SMEs is also
42
highlighted by the URT (2012) which is one of the most recent comprehensive
According to the URT (2012), there are very few small businesses that own a laptop
or a computer. Those who own a computer use it mainly for business correspondence
(0.5%), business records (0.5%), accessing the internet (0.3%), providing computer
services to customers (0.1%), selling products and services online (0.0%), or private
use (0.1%). Also, most of the small businesses surveyed did not use the internet for
doing business. Only a few (0.5%) used the internet for getting information about
products and markets, and almost none used it for orders with suppliers and
customers. A very few (0.6%) used it for sending and receiving emails.
Note, however, that, the URT (2012) baseline survey choice of respondents included:
SMEs that conducted business by the road side (16.6%), SMEs that conducted
business at home (39.8%), and mobile businesses (8.4%). Only 18.4% of the
respondents of the URT (2012) were located in formal commercial area. In this
addition, only SMEs with annual turnover of from 12,000,000/= and above were
considered in this research. The choices made were based on the fact that, it was
easier to reach the SMEs in these categories and get their detailed information than
the SMEs in the other categories. Given, the differences on the selection of the unit
of analysis for the two studies, that is the current study and the URT (2012) baseline
survey, this research is expected to give slightly different statistics on the state of
This chapter has highlighted the developments in the SME sector and ICT sector
respectively in the context of Tanzania. The chapter has shown that while there are
significant developments in the two sectors since structural adjustment policies were
implemented, a number of challenges still remain. One notable problem is the low
usage of ICTs among Tanzania SMEs. This problem is one of the primary concerns
ICT solutions, mistrust of online business transactions and frequent power cuts to be
some of the wider issues affecting ICT adoption and use in SMEs.
44
CHAPTER THREE
3.1 Introduction
This study covers a topic that has been the focus of much research in the past decade,
and, for this reason, a lot of literature exists in the area with a variety of
the work of Costello (2009), Korpelainen (2011), Mpofu et al. (2009) and
include Information System (IS), Information Technology (IT), and Information and
these terms are not distinct from each other. They are connected to technology and
this reason, all studies related to IS, IT, and ICT adoption are applicable to this
research.
The rest of this chapter is organised as follows: First a review of the literature is
made on the impact and importance of ICTs use in SMEs. Second, a review of past
research and current theories and models related to ICT adoption and use in SMEs is
made. Finally, the shortcomings of the existing models and knowledge gaps are
identified.
45
The literature has shown that, in recent years, ICT implementations in business have
become indispensable (Apulu, 2012; Costello, 2009; Galloway and Mochrie, 2005;
Hazbo and Arnela, 2010; Mbamba, 2004; Modimongale, 2009; Mpofu et al., 2009;
ICTs in business has revolutionised business practices, and this has made adoption
and use of ICT critical to all business. Previous studies show that, benefits of ICT
cut across all sectors of the economy and all fields of human activities (Apulu, 2012;
business have been identified (Apulu, 2012). Generally speaking, ICTs are said to
Naul (2012) note that, the benefits of ICTs to any business can be categorised into
According to Naul (2012) primary activities involve such activities as inbound and
services. Inbound logistics consist of relationships with suppliers that include all
activities required to receive, store and disseminate outputs (Naul, 2012). Outbound
logistics involve activities required to collect, store and distribute the output such as
Technological Development and infrastructure that serves the company needs and
ties its various parts together (Naul, 2012). Infrastructure consists of functions or
the acquisition of inputs for the firm, while Human Resource Management consists
technical knowledge that is brought to bear in the firm’s transformation of inputs into
According to Moreton and Chester (1997), there are some organisational initiatives
that are impossible to realise without the use of ICT. They further argue that “ICT
information from both inside and outside business that is needed to detect and
understand the patterns and pace of change” (Moreton and Chester, 1997). Apulu
(2012) claim that, ICTs offers many potential benefits to organisations. They make
the organisations more efficient, effective and competitive (Apulu, 2012). Fulantelli
and Allegra (2003) and Jonathan (2004) observe from the literature that, ICTs give
Allegra (2003) claim that, “ICT provides mechanisms for gaining access to new
consulting, continuous training and new advisory modes”. The implication of this
47
observation is that, organisations that are capable of exploiting the benefits offered
Harindranath et al. (2010) noted that, regardless of the differences that exist between
big businesses and small businesses, SMEs are actually not different from larger
firms in one key aspect. That is, in order to survive and prosper in competitive
business arenas, both SMEs and larger firms need to successfully maintain a
competitive advantage. According to Dyerson et al. (2009), “the adoption and use
of ICT is widely seen as critical for the competitiveness of SMEs in the emerging
global market and has resulted in more effective use of time”. Skoko et al. (2008)
claim that, the role of ICT in SMEs must be considered very important since ICTs
The literature (Evans and Wurster, 1997; Jannex et al., 2004) observes that, ICTs can
increase the richness and reach of the SMEs. Using ICTs, SMEs get the opportunity
collaborate and conduct transactions with their customers, distributors and suppliers
via the internet (Evans and Wurster, 1997; Jannex et al., 2004). In other words,
ICTs give SMEs the ability to participate in the global digital economy (Golding et
al., 2008). According to Ashrafi and Murtaza (2010), ICTs give SMEs the ability to
gain access to new markets, supply new products and services, add value to products,
48
the business, the ability to employ new business outlets and the ability to maintain
competitiveness edge.
According to Pavic et al. (2007) the advances in ICTs have given SMEs the
Apulu (2012) observe that, the contributions of ICT to business development have
been all-encompassing and therefore businesses of all size including SMEs find that
compete effectively in the world markets (Apulu, 2012; Costello, 2009; Frempong,
2007). The United Nations (2007) conclude that, the use of ICT enables SMEs to
participate in the knowledge economy and offers vast opportunities to narrow down
the social and economic inequalities that will assist SMEs in achieving broader
evidence to the effect that, SMEs have not been responding quickly enough to
changes in ICT (Harindranath et al., 2010). That is, the take-up of such technologies
by SMEs has not been widespread (Harindranath et al., 2010). This shortcoming has
been a subject of intense research (including this work) in the past two decades. In
the next section, ICT adoption theories and models are thoroughly explored.
49
Gallivan (2001) as cited in Jeyaraj et al. (2006) and Korpelainen (2011) distinguishes
four theories namely the Diffusion of Innovation Theory (DOI), the Theory of
Reasoned Action (TRA), the Theory of Planned Behaviour (TPB), and the
which most of the technology adoption studies are based. According to the literature
(Manueli et al., 2007; Venkatesh and Davis 2000), several hundred studies may be
2007; Venkatesh and Davis, 2000). Apart from the four theories, the Social
Cognitive Theory (SCT) has also been used in some adoption studies
this ranking, TAM was found to be the most cited theory of the literature. Another
previous literature has also distinguished that in the past two decades, the TAM has
been the most influential model (Chuttur, 2009; Jeyaraj et al., 2006; Korpelainen,
2011). A summary for each of the four core theoretical constructs are presented
below while full details are presented in other studies such as Costello (2009),
Table 3.1: Theories of 20 Most Cited Articles and Books on ICT Adoption
The framework of innovation adoption process was introduced in 1962 and has been
extensively cited in the literature since then (Rogers, 2003). Rogers (1965; 2003),
Innovation Diffusion Theory (IDT) to explain how, why, and at what rate new ideas
and technology spread through any given group of individuals or organizations. DOI
channels over time among the members of a social system” (Rogers, 2003). DOI has
(34%), late majority (34%), and laggards (16%) based on a bezel-shaped curve as
Rodgers (2003) explained that the innovation stretch through society in an S curve.
exponentially (Rodgers, 2003). Rodgers (2003) also demonstrated that, change can
be promoted and will create a domino effect within a specified population. Rodgers
(2003) study examined the belief that an innovation decision was based on a cost-
benefit analysis and that people would adopt if they were convinced that the
innovation could produce some relative advantage to the idea it replaced. Diffusion
theory also states that "opinion leaders and their attitudes directly affect the
DOI theory have remarked that, the theory attempts to explain a very complex reality
in a very simplified a fashion. However, Costello (2009) notes that, “this theory has
remained as a starting point upon which much IS research in this area is based”.
Costello (2009) further notes that, since this early work, research has consistently
revealed that perceived need (relative advantage) is key issue in the adoption
relationship between behaviour and attitudes (Ajzen, 1988; Fishbein and Ajzen,
1975; Werner, 2004). The main assumption of TRA is that individuals are rational in
considering their actions and the implications of their actions (decision-making). The
TRA model is shown in Figure 3.2. The TRA has two main concepts: “principles
53
specific behaviour directed to a specific target in a given context and time, specific
attitudes that correspond to the specific target, time and context should be assessed
Behaviour Actual
Intention Behaviour
The concept of behaviour intention states that, “an individual’s motivation to engage
in behaviour is defined by the attitudes that influence the behaviour” (Fishbein and
Ajzen, 1975). Behaviour intention indicates how much effort an individual would
attitudes and subjective norms (Ajzen, 1991; Fishbein and Ajzen, 1975). An attitude
(Werner, 2004).
(Werner, 2004). The first limitation is that intention determinants are not limited to
attitudes, subjective norms, and perceived behavioural control (Ajzen, 1991). There
may be other factors that influence behaviour. Empirical studies showed that only
40% of the variance of behaviour could be explained using TRA or TPB (Ajzen,
1991; Werner, 2004). The second limitation is that there may be a substantial gap of
time between assessment of behaviour intention and the actual behaviour being
assessed (Werner, 2004). In that time gap, the intention of an individual might
change. The third limitation is that, TRA is a predictive model that predicts an
behave as predicted by those criteria (Werner 2004). In terms of ICT adoption, TRA
(as part of TAM) have been used to explain the adoption process from individual
The Theory of Planned Behaviour is an extension of TRA (Werner 2004) and thus
has the same main assumptions as TRA. TPB try to overcome TRA’s weakness by
Ajzen (1991) argued that, perceived behavioural control might indirectly influence
55
behaviour. TPB have the same limitations as TRA in predicting behaviour, since
they are both based on the same underlying assumptions (Werner, 2004). TPB has
also been used to explain the adoption of IT (See Table 3.4). The TPB model is
Behavioural Attitude
Belief’s Toward the
Behavior
(1975). Based on the TRA constructs, Davis (1986; 1989) proposes TAM to explain
and predict the behavioural intentions of individuals toward IT usage (Davis, 1986;
Davis, 1989; Davis et al., 1989). The TAM model hypothesizes that actual
use. According to Korpelainen (2011), since TAM has been introduced, it has been
56
the most influential and widely used model in predicting and explaining the usage
2001; Jeyaraj et al., 2006; Korpelainen, 2011). Figure 3.4 shows the TAM.
Perceived
Usefulness
Perceived
Ease of use
On the other hand, Van Akkeren and Cavaye (1999b) point out that, TAM has been
criticized for possible limitations since it emphasizes only the effect of technology
(Van Akkeren and Cavaye, 1999b). According to Van Akkeren and Cavaye (1999b),
critics of TAM conclude that, a limitation of the model is the fact that, outside
influence, economic factors, and influences on personal behaviour are excluded (Van
TAM such as TAM2 (Venkatesh and Davis, 2000) have been developed in an
important part of the literature review. Several models for ICT adoption by SMEs
has been suggested in the literature (Al-Qirim, 2005; Beckinsale and Ram, 2006;
Costello, 2009; Grandon and Pearson, 2004a; Levy and Powell, 2005; Manueli et al.,
2007; Mehrtens et al., 2001; Rashid and Al-Qirim, 2001; Van Akkeren and Cavaye,
1999b; Zappala and Gray, 2006). In these studies, inhibitors, drivers and factors that
In a previous study, Levy et al. (2005) developed a set of eBusiness inhibitors and a
set of eBusiness drivers shown in Table 3.2 and Table 3.3 respectively. The
inhibitors and drivers were developed from data collected from a survey of 354
SMEs in the UK and the literature (Costello, 2009; Levy et al., 2005). According to
Costello (2009) and Levy et al. (2005), many of the identified drivers can be
explained as perceived benefits while as, many of the inhibitors are understood as
being due to management limitations. Costello (2009) claim that, a review of these
factors shows that, almost all of the factors could be seen as being drivers/inhibitors
of any technology. Furthermore, Costello (2009) argues that, the issues highlighted
significant in research.
58
Inhibitor Source
Cost Implementation Costs Santarelli and D’Altri (2003);
Kendall et al. (2001); Grandon and
Pearson (2004a); Van Akkeren and
Cavaye (2000); Lawson et al.
(2003)
Limited financial resources Sharma et al. (2004); Chapman et
al. (2000);
Riemenschneider et al. (2003)
Need for immediate return Van Akkeren and Cavaye (1999b)
on investment
Security Concerns about Santarelli and D’Altri (2003);
confidentiality Kendall et al. (2001); Lawson et al.
(2003)
Fear of fraud Van Akkeren and Cavaye (2000)
Management Insufficient time spent on Bianchi and Bivona (2002);
planning Grandon and Pearson (2004a)
Insufficient knowledge or Klein and Quelch (1997);
experience of IS Premkumar and Roberts (1999);
Zhu et al. (2003); Sharma et al.
(2004); Kowtha and Choon (2001)
Inexperienced owner Van Akkeren and Cavaye (2000);
Klein and Quelch (1997);
Premkumar and Roberts (1999)
Technology Complexity requiring new Kowtha and Choon (2001); Van
skills Akkeren and Cavaye (2000);
Riemenschneider et al. (2003)
Existing IS limiting future Van Akkeren and Cavaye (2000);
development Zhu et al. (2003)
Lack of trust in external IS Chapman et al. (2000)
suppliers
59
Driver Source
Reduced operating costs Standing et al. (2003); Quayle and Christiansen
(2004); Quayle (2002); Kendall et al. (2001);
Riemenschneider et al. (2003)
Sales and purchasing Quayle and Christiansen (2004); Jeffcoate et al.
cost reduction (2004); Tse and Soufani (2003); Riemenschneider et
al., (2003)
Improved range and Quayle and Christiansen (2004); Jeffcoate et al.
quality of services to (2004); Tse and Soufani (2003); Mehrtens et al.
customers (2001); Teo and Pian (2003); Sadowski et al. (2002);
Santarelli and D’Altri (2003); Quayle (2002); Daniel
and Grimshaw (2002); Riemenschneider et al., (2003)
Increased speed in Tse and Soufani (2003)
dispatch of goods
Finding suppliers Dandridge and Levenburg (2000); Teo and Pian
(2003);
Santarelli and D’Altri (2003)
Avoiding loss of market Santarelli and D’Altri (2003); Kendall et al. (2001);
share Riemenschneider et al. (2003)
Increase market share Standing et al. (2003); Quayle and Christiansen
(2004);
Daniel and Grimshaw (2002); Kendall et al. (2001)
Market intelligence Quayle and Christiansen (2004); Jeffcoate et al.
(2004); Mehrtens et al. (2001)
Improved trading Quayle and Christiansen (2004); Mehrtens et al.
relationships (2001)
In the work of Van Akkeren and Cavaye (1999a), lack of business benefit, mistrust
of the ICT industry and lack of time were identified as the main inhibitors to internet
adoption in SMEs. In a subsequent study, Van Akkeren and Cavaye (1999b), cited
by Costello (2009), Manueli et al. (2007), and Mpofu et al. (2009) identified and
classified key ICT adoption attributes in SMEs into two main categories: owner-
manager characteristics and small firm characteristics. Figure 3.5 below depicts the
(ROI); and firm/business characteristics for factors that contribute to ICT adoption in
small businesses.
Perceived Benefit
Computer Literacy
Assertiveness
Perceived Control
Subjective norm
Mistrust of IT industry
Lack of time
Organization readiness
External pressure to adopt
Customer/Supplier dependency
Structural sophistication of the firm
Size sector status
Information Intensity
Van Akkeren and Cavaye (1999b), suggested that, more factors should be discovered
by research. In particular, Van Akkeren and Cavaye (1999b), called for inclusion of
Building up from the work of Van Akkeren and Cavaye (1999b), Costello (2009)
(2009) extended the work of Van Akkeren and Cavaye (1999b) by incorporating
(1999b). Costello (2009) called for other factors such as the government
Owner/Manager Issues
Education Experience Moderator
Knowledge of IT Government Interventions
Perceived Value
Measure of
ICT ADOPTION Investment
(Post Evaluation)
Firm Issues
Organizational Readiness Constraints Variables
External Pressure Size, Sector, Age, Status
Strategy
Many other models in the literature (Levy et al., 2005; Peou, 2009) follow a similar
pattern. That is, they build up from one or more previous models, to explain a
particular situation or a new phenomenon. Table 3.4 give a summary of some of the
relevant studies of ICT adoption in SMEs as they appear in the literature. The
summary provides the main theoretical construct underlying each study, additional
factors, the technology examined in the study as well as the numbers of SMEs
examined.
-Perceived
Competitive
Pressure
Grandon and TPB n. a e-commerce n. a
Mykytyn (2004) adoption
Grandon and TAM -Organizational e-commerce 100
Pearson (2004a) readiness adoption in SMEs
-External pressure USA
-Perception of
strategic value
It can be observed from a review of various models developed to aid ICT adoption
by SMEs (Table 3.4 above) that a number of factors that can influence ICT adoption
exist. In an attempt to determine the main ICT adoption factors in SMEs, Grandon
and Pearson (2004a) cited in Costello (2009) analysed ten ICT adoption models from
the literature. Grandon and Pearson (2004a) found that many of the same issues
recurred throughout the literature. This can also be deduced from Table 3.4 above.
In another study, Costello (2009) thoroughly analysed the literature and summarized
the main adoption factors as they appear in the literature. The summary of these
factors is given in Table 3.5. According to Costello (2009), the fact that many
factors are similar in so many models may indicate that the technology to be adopted
is irrelevant. The factors indicated in Table 3.4 together with other factors found in
Perceived Usefulness
Perceived Ease of Use
Entrepreneur, Underpinned by Storey and Levy and Powell
Firm, Strategy. surveys with WM SMEs (2005)
Personal factors, Underpinned by Rashid and National B2B
Economic Factors (cost and Al-Qirim and survey of 60 (2005)
resource), WM SMEs.
Environmental factors,
Relevant solution.
A systematic review of the existing adoption theories and models shows that
currently there are a number of ICT adoption models being offered to aid ICT
Table 3.4, it can be clearly seen that while some studies employ a single model,
many combine more than one model to better explain the adoption situation of a
of additional factors in their studies. This reflects the insufficiency and inconsistency
that, to date, the most effective model that support and aid SMEs in their adoption of
new technology has not been determined (Costello, 2009; Mpofu et al., 2009;
The literature also suggests the need for the development of mid-range theories, that
is, theories that provides for better understanding of the factors that drive or inhibit
the adoption and use of ICT within the specific context of SMEs (Al-Qirim, 2004;
68
Apulu, 2012; Beckinsale and Ram, 2006; Bharati and Chaudhury, 2006; Caldeira and
Ward, 2002; Chibelushi and Costello, 2009; Finchman, 2000; Mpofu et al., 2009;
Zappala and Gray, 2006). Available literature presents many empirical observations
from developed nations that have social economic settings that are quite different
from those of the so-called Least Developed Countries (LCD’s) like Tanzania while
comprehensive and systematic studies on ICT adoption and use in SMEs in LDC’s
countries south of Sahara including Tanzania are visibly missing (Apulu, 2012;
Mbamba, 2004; Mpofu et al., 2009). This is another research gap in the literature.
Costello (2009) and Sarosa and Zowghi (2003) observe that, despite the number of
technology adoption models available, most of research work to date has given most
attention to identification of drivers and barriers to adoption of ICT and there is still a
lack of strategy, models or frameworks that actually guide SMEs in the adoption
process. Costello (2009) further points out that, the most frequently asked question
by any SMEs is how to adopt successfully. In Tanzania, the studies carried out with
regard to ICT adoption by SMEs include the work of Isaya (2009), Jonathan (2004),
Mbamba (2004) Muttayabalwa (2007) and Naul (2012). The contribution of these
studies is mainly based on the identification of the factors that impede ICT adoption
or SMEs growth. None of these works offer a framework to help with strategic
Moreover, these studies do not address post adoption issues such as how ICT can be
used to strengthen the competitiveness of the SMEs in order to ensure their survival
and growth. This is yet another research gap. In this study, an attempt is made to
bridge the second and third knowledge gaps identified from the literature. In
69
particular, the research concentrates on developing a model for aiding ICT adoption
In this chapter, the importance of adoption and use of ICTs by SMEs has been
adoption by SMEs, including the theoretical foundation of the models has been
made. The chapter wind up by highlighting the knowledge gaps of the existing
CHAPTER FOUR
4.1 Introduction
In the two previous chapters the literature review that forms the basis of this study
has been covered. Many well-known theories and models which are useful for the
theoretical background for this research have been discussed. In view of the
literature review and gap analysis made, a summary of ICT adoption factors in this
research is presented in Table 4.1. These factors are in reality a summary of critical
issues raised by other models found in the literature (Costello, 2009). On a similar
note, a conceptual model for aiding SMEs ICT adoption process within the context
of Tanzania is proposed as shown in Figure 4.1. In the proposed model, the factors
of Table 4.1 are categorised into six major groups namely: Personal Factors,
70
SMEs Performance. Within each group, individual factors explored in this research
are shown. In Table 4.2, individual factors explored in this study within each
group are indicated together with the academic reference of each item.
Akkeren and Cavaye (199b) and Costello (2009). According to Costello (2009),
between these areas Costello (2009). Costello (2009) argues that the small
within the firm already. In addition, the organisational readiness of a firm could be as
thorough and that it captures all important elements, like in Costello (2009), evidence
from existing models both in practice and in academic literature and evidence from
The proposed model builds up on Van Akkeren and Cavaye (1999b) and Costello
(2009) models and adds other factors found in the literature that capture the
uniqueness of the Tanzania situation. For example, the literature (Nkonoki, 2010;
Mbamba, 2004) have shown that, economic factors and in particular access to
financial support (Nkonoki, 2010), is one of the critical issues affecting the
development of the SME sector in Tanzania. Thus, economic factors are included
71
(2009) called for inclusion and testing for the moderating effect of Government
policies on the main adoption factors. In this work, the moderating effects of
It should be noted that, like in previous adoption studies in SMEs (Apulu, 2012;
Costello, 2009; Mpofu et al., 2009; Van Akkeren and Cavaye, 1999b) the
justification for inclusion of factors and or element in this study is based on the fact
that:
ii. The element appears in adoption and or growth models as of concern to micro
companies or SMEs.
adoption situation
The rest of this chapter is arranged as follows: First the operational definition of the
research variables and constructs are reviewed in order to acknowledge their validity
72
and importance in this study. Secondly the conceptual model is presented in order to
show the existing relationships between the model variables and constructs. Thirdly
From the SME and IS literature, there are a number of factors that directly affect ICT
adoption and business performance in general that can be attributed to the owner-
manager of the business (Apulu, 2012; Costello, 2009; Ghobakhloo et al., 2011a;
control, computer literacy, subjective norm and assertiveness (Apulu, 2012; Chung,
2006; Costello, 2009; Ghobakhloo et al., 2011a; Grandon and Pearson, 2004b; Levy
and Powell, 2005; Mehrtens et al., 2001; Rashid and Al-Qirim, 2001;
noted that the subject area is very wide, meaning at times it is not possible to include
all variables and factors in a single study. Thus, in this research, the education
manager toward ICT and the ICT knowledge of the owner-manager, were explored
control subjective norm, and assertiveness were not explored. The three variables
are further discussed in the next sections in order to establish the legitimacy of their
According to Costello (2009), of all the factors that impact business growth the
education of the owner-manager tops the list. This may be attributed to the fact that,
education imparts people with knowledge and intellectual capabilities that enable
them to successful manage their daily undertakings. Costello (2009) suggest that,
Costello (2009) claim that, all previous research related to SME growth and
successful adoption of technology, has shown that the education of the owner-
manager is the most important factor as a proxy for business growth (Costello, 2009).
This justifies the inclusion of this factor in this model so that relationship between
In house knowledge of ICT is an important factor for a business to benefit from the
knowledge and technical skills when compared to large businesses (Alarm and Noor,
2009; Apulu, 2012; Costello, 2009; Ghobakhloo et al., 2012; Mpofu et al., 2009;
Rahab and Hartono, 2012; Sophonthummapharn, 2008). Previous studies have also
shown that, small businesses failed to utilize ICT to due to lack of ICT knowledge
(Rahab and Hartono 2012). In Rahab and Hartono (2012), it is further shown that,
owners-managers that lack knowledge and awareness of ICT tend to reject the notion
that ICT could be of any use to their business as they had no idea of the benefits that
ICT could potentially offer (Costello, 2009; Rahab and Hartono 2012). This
would seem to imply that if these leaders could be educated on the benefits of ICT,
they may be more willing to adopt such technology and reap the benefits.
Van Akkeren and Cavaye (1999b) also cited in Costello (2009) established that, if
the CEO is innovative and knowledgeable about IT then adoption was more likely to
be successful. This was later corroborated by Mehrtens et al. (2001). Costello (2009)
claims that, although knowledge of ICT is a critical issue for all companies, “if that
knowledge has been gained through the educational experience of the owner-
manager that has an impact on the company turnover, perceived value as well as
adoption”. Costello (2009) argue that, since the perceived benefits to the company
are most often, perceived by the most influential individual in the company, the
owner-manager, then it is very important that they have enough knowledge of ICT to
either, make the decision themselves or recognise their lack of knowledge and seek
appropriate advice. Thus, this element is included in this study to complement the
owner-manager education.
77
Perceived benefit (or perceived usefulness + perceived ease of use) is one of the core
constructs of behaviour intention for the different versions of the TAM model (Davis
1989; Venkatesh and Davis, 2000), the SCT model and the DOI models
(Kripanont, 2007). This construct has been used in many technology adoption
studies including computer acceptance (Igbaria et al., 1997; Lin and Wu, 2004), use
of Internet purchasing (Olson and Boyer, 2003), Internet commerce (Poon and
Swatman, 1999; Walczuch et al., 2000), Internet adoption (Chung, 2006; Kripanont
2007; Mehrtens et al., 2001), e-commerce adoption (Al-Qirim, 2005; Grandon and
Pearson, 2004a, Grandon and Pearson, 2004b; Kaynak et al., 2005; Mirchandani and
et al., 1995; Premkumar and Roberts, 1999), PDA acceptance (Yi et al., 2006),
eCRM adoption (Sophonthummapharn, 2008) and ICT adoption (Alam and Noor,
2009; Costello, 2009), and has been proven to be a major determinant of the adoption
decision.
According to Van Akkeren and Cavaye (1999b), perceived benefits affect technology
adoption in terms of the perceived ease of use and/or usefulness of the technology.
They argue that if an owner-manager does not perceive the technology in a positive
way, he or she will be reluctant to adopt (Van Akkeren and Cavaye, 1999a; Van
Akkeren and Cavaye, 1999b). Costello (2009) state that “SMEs adopt technology
because they perceive the advantage it represents over and above traditional
78
methods previously employed by the company”. Alam and Noor (2009) claim that,
existing literature has proved that the greater the benefits perceived by the SMEs the
Chung (2006) perceived benefits of the Internet by SMEs include both direct and
indirect benefits. Cost reduction on operations and improved internal efficiencies are
some of the direct benefits while improved business processes and customer services
are some of the indirect benefits (Chung, 2006). OECD (2005) report that, “ICT is
able to improve information and knowledge management inside the firm and
increase the speed and reliability of transactions for both business-to-business (B2B)
and business-to-consumer (B2C) transactions”. Alam and Noor (2009) claim that
“ICT is able to offer enterprise a wide range of possibilities for improving their
However, the literature shows that the outcome of adoption is not a simple and
straightforward issue (Alam and Noor, 2009; Apulu, 2012; Costello, 2009; Mpofu et
al., 2009; Sophonthummapharn, 2008) and this may discourage some SMEs from
adoption (Alam and Noor, 2009). Costello (2009) argue that, while there is evidence
that adoption of new technology can lead to improvements, on the other hand there is
(2009), there are still many organisations that are not taking advantage of ICT
adoption despite the many perceive benefits that have been made available through
adoption with ICT. They thus recommend for perceived benefits to be taken into
consideration as one of the factors that affects ICT adoption in SMEs (Alam and
Noor, 2009). Costello (2009) stated that, “perceived benefits appear in so many
technology adoption models and research studies that it would have a natural place
in any new model”. Thus, in this research, perceived benefits are used to explore the
adoption and use of computer and Internet technologies in SMEs in the Tanzania
advantage over traditional methods will be explored in this research under the
Organizational characteristics were also some of the most frequently studied factors
concerning ICT adoption in SMEs and SMEs growth (See Table 3.5 and Table 4.1)
processes and attributes that influence the uptake of new technological innovations
and status of the firm (Costello, 2009; Grandon and Pearson, 2004a; Levy and
Powell, 2005; Mehrtens et al., 2001; Rashid and Al-Qirim, 2001; Storey, 1994;
Thong and Yap, 1995; Van Akkeren and Cavaye, 1999b). In the work of Costello
80
(2009), extensive literature review on how organisation factors play out in small
business technology adoption situation is made. Other research such as Mpofu et al.
(2009) and Apulu (2012) also contribute in this area. In the next sections,
organisational readiness, external pressure to adopt, business strategy, age, sector and
status of the firm are explored in order to justify their inclusion in this research. In
this study, the structural sophistication of the firm was not measured, but was
Costello (2009) the evidence from the literature review shows that companies
become more structurally complex as they grow and that the larger the organisation
the more likely they are to consider strategy. This implies that structural
sophistication of the firm can therefore be captured via strategy (Costello, 2009). On
a similar note, external pressures were examined and the pressure of customer and/or
supplier is noted within this element. Thus, all the factors which represent the firm
characteristics are encapsulated into the firm, organisational readiness, strategy and
external pressures. Further discussion on the individual factors under this category is
This element refers to status of the business, and the sector in which the business
operates (Costello, 2009; Mpofu et al., 2009). Business status can include the age of
the firm and size of the firm (Costello, 2009; Mpofu et al., 2009). Costello (2009)
noted that, factors relating to the firm itself have been shown to impact on adoption.
In fact, the literature has enough evidence about the importance of this factor in
81
adoption situations (Costello, 2009; Dholakia and Kshetri, 2004; Mpofu et al., 2009;
Thong and Yap, 1995) and thus the factor was measured and evaluated in this study.
Business Age: Costello (2009) argue that, there are many reasons for incorporating
this element in a new study. One major reason is the fact that, it has been shown that
many SMEs experience rapid growth upon start up. In order to keep up with this
growth, SMEs adopt technology at a faster rate than at any other time during their
lifecycle (Costello, 2009; Levy and Powell, 2005; Storey, 1994). In view of this
observation, it would be anticipated that companies that have been in operation for a
start up (Costello, 2009). That is, the technology infrastructure would be less
variable. Previous research found out that there was a negative relationship between
growth and age of the firm since many firms grow quickly initially and then slow
down (Storey, 1994). Costello (2009) suggests that newer studies should anticipate
the same results as Storey (1994) since as stated earlier, it seems that fast growing
young companies adopt ICTs more quickly than older, slower growing companies
(Costello, 2009).
Firm Size: Thong and Yap (1995) noted that, small businesses suffer from a special
(1995), resource poverty results from various conditions unique to small businesses,
82
Yap (1995) found out that because of these unique conditions, small businesses are
and Yap (1995) were later confirmed in other research. Dholakia and Kshetri (2004)
decision process in acquiring ICTs. They argued that, larger organizations tend to
have the resources and tools that are necessary in initiating and deployment of new
Kshetri (2004) found out that, size as measured by the number of employees, is
that, larger firms tend to have more of the necessary resources for adopting techno
the common constraints seen in SMEs as limited financial resources, lack of in-house
similar note, Costello (2009) found out that, both size of company and age can be a
major indicator of success. When both elements are present, they can be a
compelling argument (Costello, 2009). Costello (2009) claim that, since small
companies are born and die with increasing frequency, a business that have been
future success too (Costello, 2009). However, Costello (2009) caution that, many
83
companies are sole traders and intend to stay that way choosing to run the business
for ‘life-style’ purposes despite the fact that they also have adoption needs. Costello
(2009) notes that, in the UK, the trend to run the business for ‘life-style’ purposes has
In contrast with Dholakia and Kshetri (2004) observations, Locke (2004) did not find
turnover and number of employees. However, Costello (2009) claim that a number of
researchers have called for further work that includes size and age of firm. On a
support the inclusion of size in new studies such as Al-Qirim (2005), Dholakia and
Roberts (1999), and Thong (1999). Prior studies typically employ only one
restrict the interpretation of the findings. In order to gain more insight about this
construct, this research measure business size in three dimensions, the number of
Business Sector
Sheppard and Hooton (2007) suggest that business operations in some sectors
embrace ICT more readily than others. This view is supported by research such as
Dholakia and Kshetri (2004), Mpofu et al. (2009), Sophonthummapharn (2008) and
Thong and Yap (1995). The literature shows that, business in its particular industry
Thong and Yap (1995), IT adoption can change a business environment in three
ways; First IT can change the industry structure and, in so doing, alter the rules of
businesses new ways to outperform their rivals. Finally, IT spawn’s new businesses,
often from within existing operations of the business. That being the case, a
business in an environment that is more competitive would feel a greater need to turn
to IT to gain a competitive advantage (Thong and Yap, 1995). On the other hand,
Thong and Yap (1995) note that, a business in a less competitive environment would
environment or the industry pressure, is a kind of external pressure and thus the issue
Organisational Readiness in this context refers to the firm’s ability and or readiness
to deal with technology adoption issues, in this case computer and Internet
al., 2001; Costello, 2009; Grandon and Pearson, 2004a; Kuan and Chau, 2001;
impact on the decision to adopt. Chwelos et al. (2001) noted that, a firm’s IT
Kuan and Chau (2001) observed the same trend as Chwelos et al. (2001). Mehrtens
85
et al. (2001), and Grandon and Pearson (2004a) found that, the availability of
The literature identifies availability of in-house knowledge of ICT, as one of the key
factors that contributes to organisation readiness (Costello, 2009; Jeon et al., 2006;
SMEs with more IS knowledgeable employees were more likely to adopt IS. This
view was corroborated by Jeon et al. (2006) who confirmed that, the knowledge of
business in SMEs. Mehrtens et al. (2001) identified the level of Internet use among
computer systems to access and use the Internet without major problems as being
that, firms which do not have Technological Expertise may be unaware of new
technology. On the other hand, such firms may not want to take the risk of adopting
new technology and thus decide to postpone adoption of such technology until they
Costello (2009) claim that, the literature has identified the advice sought by a firm,
internal pressure, specialist skills in the company and implementation issues linked
86
Costello (2009), if companies had to seek advice regarding ICT adoption outside of
their own organisation, then it can be assumed that the necessary knowledge to make
the decision was not available in house. The literature shows that small business
owners-manager more often rely on advice from the social capital they have access
to (Cooke, 2007; Costello, 2009; Mpofu et al., 2009). Costello (2009) note that in
such situations, the majority of advice is given in informal way and it may not be the
right advice.
According to Costello and Thompson (2004 and Costello (2009), internal pressure to
company. Costello and Thompson (2004) and Costello (2009) note that, a company
pressure to adopt (Costello and Thompson, 2004; Costello, 2009). Costello (2009)
argue that if employees are knowledgeable about ICT then they are likely to be
aware of the availability of, and the need for systems that can increase capacity,
capability or aid a marketing strategy (Costello, 2009). That can result in internal
pressure to adopt.
In addition, Costello (2009) note the fact that, there is enough well documented
evidence to prove that lack of right technological skills in a company can severely
impact an adoption. However, Costello (2009) argues that, there are technology
87
skills and knowledge needed to make the decision to adopt in the first place. Costello
(2009 claim that if the skills to align technology with the business are not available
then the decision to adopt will be flawed (Costello, 2009). The literature (Costello,
2009; Mehrtens et al., 2001; Mpofu et al., 2009) note that, most of post adoption
The literature has also established that in adoption situations small companies mostly
concentrate on the implementation and the cost of the technology (Costello et al.,
2006). According to Levy and Powell (2005), this observation is attributed to the
fact that very few SMEs focus on strategy. Thus, as technology trends escalate and
data volumes increase the issue simply get worse (Costello, 2009). Costello (2009)
observe that, most small companies do not invest in training and employees learn
be at the centre of adoption issues within small companies (Caldeira and Ward, 2002;
Costello, 2009). Costello (2009) further notes that, the use of outside help may also
aggravate the situation as they do not understand the business. Therefore, it can be
argued that many of the implementation problems are linked to skills as not having
the right skills can impact on the problems surrounding the post-adoption period
(Costello, 2009).
In view of this discussion, there is enough evidence from the literature to the effect
that organisation readiness is a key factor in ICT adoption (Chwelos et al., 2001;
Costello, 2009; Grandon and Pearson, 2004a; Kuan and Chau, 2001; Mehrtens et al.,
88
2001; Sophonthummapharn, 2008; Thong, 1999; Venkatesh et al., 2003) and thus is
included in this study. In this research, the advice sought by the firms in adoption
resources in the firm and implementation issues reflecting these concerns were
The word strategy can be defined in different ways (Jonas, 2000; Mintzberg, 2001).
accomplish its mission (Jonas, 2000). Levy and Powel (2005) label strategy as “the
actions taken by the firm once in business”. Levy and Powel (2005) site market
manager, the business strategy and its context that is important for business growth
(Levy and Powel, 2005; Storey, 1994). Costello (2009) argue that, there is a clear
company. According to Costello (2009), IS theorists believe that ICT adoption and
investment should be made in the context of IS/ICT strategy and should support
business strategy.
89
management tool (Costello, 2009; Nkonoki, 2010) and this has a big impact on their
decisions (Costello, 2009). Thus, this construct has been used in many technology
adoption studies in order to explain how SMEs could be assisted in the adoption
process. It is for this same reason that the construct is included in this research.
Nkonoki (2010), cited lack of business strategy as one of the major factors affecting
SMEs development in Tanzania. Some of notable studies in the literature that have
Pearson, 2004b), ICT adoption (Costello, 2009; Van Akkeren and Cavaye, 1999b),
Internet adoption (Levy and Powel, 2005) and e-business (Levy and Powel, 2005).
In the work of Costello (2009) strategy is interpreted as “the elements that are most
area of strategic intent by Levy et al. (2001). This research adopts the same
(2009) notes that, this information can be captured via the infrastructure. On a
similar tone, Costello (2009) notes that rolling programs of technology updates and
frequent use of the latest technologies to improve the business can be considered to
be strategic decisions. On the other hand, if a change that take place in a company
are not planned and the company reacts to customer demands in a reactive manner
Costello (2009) identified the level of decision making undertaken, reason for
(Costello, 2009). These elements are also used in this study to explore issues related
decision making can still be very complex within small companies. Costello (2009)
argues that, simplified structure in micro-companies does not necessarily lead to less
complexity in decision making as personal beliefs and knowledge can have a major
impact. The work of Levy and Powell (2005) established that small companies adopt
different management styles as they grow. Thus, who makes the decision to adopt
Costello (2009), delegation of decision making may show that a company is starting
to grow and adopt a more formal management style. On the other hand, lack of
which is typical for small companies (Bianchi, 2002; Costello, 2009). The literature
Matlay 1999; Mpofu et al., 2009; Sophonthummapharn, 2008; Thong and Yap,
1995). Therefore, just like in previous research (Costello, 2009), it is anticipated that
most of SMEs studied will have an owner-manager who makes the decision
themselves (Costello, 2009). After all, ICT adoption decisions are not fundamentally
different to other decisions and thus are prone to the same lack of understanding as
Reason for Adoption: Costello (2009) claim that, when the reasons for adoption is
included within strategy, it helps to define the objectives that a company may have
within an adoption situation. Available literature shows that the reasons given by
companies to justify their investments in ICTs are many and varied (Costello, 2009;
Costello and Sloane, 2003; Levy et al., 1998; Storey, 1994). Costello (2009) note
that, while some of the given reasons are deliberate strategic investments, others
reflects a decision to adopt brought about by peer pressure. Poon et al. (1996)
discovered that, even the excitement surrounding the technology can drive small
companies to adopt. Therefore, Costello (2009) suggests that, when the reason to
adopt is explored, it helps to shed light on the thinking within the company (Costello,
2009). Costello (2009) argue that, many SMEs are not aware of strategy, and do not
implement strategy using a formal method. Thus, Costello (2009) recommends that
including the reason for the adoption as an element in Adoption models will provide
purchase (adoption) has been defined for exploration from the literature regarding
strategy. This area according to Costello (2009) provides insights into the attitudes
the company or the owner-manager may have towards technology being adopted.
Costello (2009) note that the significance’ for a particular company may vary from
being a financially significant purchase which may indicate that the company is
focused on short term, cost reducing, profit driven strategies, or merely that they
consider ICT as a yet another infrastructure cost. In addition, a company may decide
92
Previous research has shown that, exploring the significance of the purchase as
the adoption situation and the strategy that they have adopted (Costello, 2009; Levy
and Powell, 2005; Mehrtens et al., 1999; Van Akkeren and Cavaye, 1999a). Levy et
al. (2005) also cited by Costello (2009) identified drivers and inhibitors of internet
complexity requiring new skills to security concerns. Thus, this element will
highlight the emphasis that the owner-manager and/or decision maker places on their
It should be noted that, the reason of the purchase differs from the significance of the
purchase in that the reason of the purchase may be shown to be due to pressure from
the purchase may indicate attitudes, bias and culture towards the adoption (Costello,
2009).
External Pressures refer to pressures emanating from outside the firm and they can
(2011b) and Ghobakhloo et al. (2012) cite the literature to support the notion that, for
customers, and staying competitive and/or enhancing innovation abilities have forced
addition, they note that, as small businesses are susceptible to customer pressure.
That is, these firms adopt IT as a result of demand from customers to develop the
Customer pressure can be defined as the behaviour and or demand of customers that
businesses are increasingly under pressure from customers and suppliers to include
technology into the way they run their business (Costello, 2009; Ghobakhloo et al.,
2011b; Grandon and Pearson, 2004a; Grandon and Pearson, 2004b; Mehrtens et al.,
2001; Mpofu et al., 2009; Van Akkeren and Cavaye, 1999b). Based on this fact,
Costello (2009) conclude that, it is thus very important to include external pressures
According to Costello (2009), when many of the SME customers are adopting new
technology at a fast rate, the SME may find it very difficult to keep pace, and that
exerts pressure on the SME to adopt (Costello, 2009). However, Costello (2009)
notes that, most often the SMEs fail to see that external issues may be exerting
94
pressure on them to adopt (Costello, 2009). She argues that, SMEs should view the
the influences on the purchase and by identifying external pressure in the decision-
Competitive Pressure can be defined as “the intensity level of competition that causes
to seek and retain competitive advantages. When a firm recognise that a particular
technology has made its rivals more profitable than it is, that firm suffers from
Competitive Pressure and will feel forced to adopt the same or similar technology.
Additionally, the sector in which a firm operates may also influence the decision to
(Sophonthummapharn, 2008), when a firm see more and more companies in its
partners), that firm may feel the pressure to adopt the same technology, in order to
retain its competitive advantage. This is the Industry pressure. This review shows
that external pressure can play a key role in adoption situations. This justifies the
95
inclusion of external pressure in this study. In this research, external pressures are
attempt to obtain other significant insights into the social and economic circles that
SMEs move in and are influenced by including the social capital that they have
studies. This factor refers to the availability of financial resources for adoption and
et al., 2011a; Ghobakhloo et al., 2012; Costello, 2009). In general, adoption costs
research, Economic factors are studied. In particular, this research looks at access to
financial support and costs of ICT systems. The two elements are further explained
According to Nkonoki (2010), capital constraints and lack of access to finances are
obviously the most discussed by many scholars as major factors limiting business
growth. Ghobakhloo et al. (2012) argue that, “financial resources are one of the
most crucial resources which are known as the key SMEs performance requirements
96
and are the critical success factors”. Review of other previous research has shown
that, firms with adequate financial resources will be better prepared in an adoption
situation (Chwelos et al., 2001; Kuan and Chau, 2001; Lee, 2004;
Sophonthummapharn, 2008). Chwelos et al. (2001) found that, the intent to adopt
examining EDI adoption in SMEs, Kuan and Chau (2001) noted that, firms that
(2008) argue that, “firms that have adopted technology, are more likely to have more
(2009) point out that, financial factors have strong influence on ICTs diffusion to
support can play a critical role in technology adoption situation and thus its inclusion
Generally, SMEs are known to lack in financial resources when compared to large
Ghobakhloo et al. (2012) claim that, most SMEs suffer from the lack of sufficient
financial resources and most owner-managers invest their own personal assets.
Ghobakhloo et al. (2012) further observe that, for obvious reasons, limited financial
resources make small businesses to be very careful about their investment and capital
consequences for SMEs (Ghobakhloo et al., 2012). In extreme situation that may
lead to insolvency and economical failure (Ghobakhloo et al., 2012). Peou (2009)
argued that small firm financing is a major concern in Cambodia. According to Gono
97
et al. (2014), SMEs have been found to be financially constrained due to lack of
(2010) noted that, capital constraints and in particular in-access to finance is one of
the major factors hindering SMEs growth in Tanzania. In-access to finance is a type
have also shown that one of the major problems affecting the SME sector in
Tanzania is limited access to finance (Kuzilwa, 2005; Olomi, 2006; URT, 2002).
According to DBIS (2013b), overdrafts and bank loans are the most common sources
of additional finance for SMEs. In addition, DBIS (2013b) argue that, the most
significant advantage overdrafts and bank loans have over raising equity is that,
this research, the interactions between Entrepreneurs and financial institutions are
explored.
According to Ghobakhloo et al. (2012), past studies has shown that cost of ICT
systems affects adoption of the technology in SMEs (Alam et al., 2009; Costello,
2008). Ghobakhloo et al. (2012) state that, owner-managers considers the elements
of IT costs (hardware and software) closely during IT adoption process within SMEs.
In a study conducted in Holland, Walczuch et al. (2000) found out that, high costs
were the major reason for Dutch SMEs not having internet access and their own
98
websites. Ghobakhloo et al. (2012) claim that, most businesses in United States of
America (USA), have significant difficulty affording the costs of ICT tools while
90% of these businesses consider lack of financial resources and skills as the main
general SMEs cannot afford to adopt ICT or reap its benefits through the effective
use of ICT, in short or medium period of time because of the financial constraints
experienced by the majority of SMEs, as well as the high start-up costs of ICT or
On the other hand, Premkumar (2003) argues that adoption cost is not a significant
Malaysia in 2009, and found out that “despite IT costs being one of the major risks
ICT infrastructure costs and ICT adoption in these businesses” (Ghobakhloo et al.,
2012). Alam and Noor (2009) argues that, the literature has shown that there is a
direct and significant relationship between cost and adoption of technology. The
lower the cost of adoption the higher the new innovation such as the ICT will be
However, Ghobakhloo et al. (2012) maintain that, in spite of decreases in the initial
and direct costs of IT adoption in recent years, cost is still regarded as an essential
issue when it comes to adoption and implementation of ITs in SMEs. Love et al.
(2005) also note that, although the prices of hardware and software have decreased
99
noticeably and have become more affordable, the estimation of IT adoption cost is
difficult (Love et al., 2005). This difficulty leads to uncertainty about anticipated IT
benefits, and thus cost is still a significant barrier to IT investment in SMEs (Love et
al., 2005). In addition, Love et al. (2005) observe that, direct costs are usually
underestimated and viewed as the cost of hardware, software and installation while in
actual fact, IT’s direct costs result from the implementation of new technology (Love
et al., 2005).
The literature suggests that, beside initial costs of software and hardware and
installation costs, IT adoption expenses also go beyond direct costs and include costs
of staff training and motivation, transformation from old to new systems in terms of
cost of management time and effort, productivity losses and finally expenses
In view of this discussion, it is seen that, cost of ICT systems affects the adoption of
the technology, especially when we take into account that, most SMEs are
2012; Ghobakhloo et al., 2011a). Thus, the inclusion of this element in this study is
justified.
100
Due to the peculiar nature of SMEs, Costello (2009) suggested the inclusion of this
construct in any new model of ICT adoption. After all, available literature shows
government support (Alam and Noor, 2009; Costello, 2009; Ghobakhloo et al., 2012;
Sophonthummapharn, 2008).
resources and support than other companies, because of their size and lack of
SMEs need more government support than larger firms. Costello (2009) argue that,
due to lack of resources such as expertise in the planning process and in the
technology, SMEs have a strong need for impartial advice independent from vendors.
In addition, many SMEs need practical help in the form of trusted ICT Consultancy
as well as grants or loans (Costello, 2009). This is the type of support that can be
initiatives and policies could directly and or indirectly stimulate the development of
This notion is shared by other authors such as, Alam and Noor (2009), Costello
suggests that, ever since it was established that eBusiness is a major source of
101
competitive advantage, governments around the world are creating funding schemes
In addition, there have also been many endeavours by authors around the globe to
familiarise and group barriers and enablers in this major area of concern (Costello,
2009). In view of this, the literature shows that, government support for facilitating
However, the literature suggests that, generally, governmental assistance have not
been advantageous to the SMEs (Costello, 2009; Ghobakhloo et al., 2012; Nkonoki,
2010). According to Costello (2009) the literature has suggested that, many
intervention projects have addressed the needs of the policy makers’ career rather
than the intervention itself. As an example, Costello (2009) claim that, in spite of
sector still has problems with technology adoption and in fact SMEs are often left
suspicious of those that work to help them such as Business Link and Chambers of
(2012) observed that, although governments have tried to assist SMEs in adopting IT
indication that, there are adoption barriers built into governmental agency
adoption barriers are attributable to the gap between what is really required by SMEs
Nkonoki (2010) suggests that, even though the government of Tanzania recognise
the importance of SMEs sector, and thus has set up policies and support institutions
to support the sector, most small business owners are not made aware of the services
minority ones benefiting from these schemes or services are the large-scale
businessmen. In the same context, Fink (1998) found out that, government grants do
On the other hand, in spite of the above-mentioned results indicating that government
intervention has not generally been found to be helpful, latest studies, especially in
literature explains that, IT adoption and e-readiness within Iranian SMEs has
On a similar note, recent studies from Malaysia have shown that, Malaysian SMEs
generally do not agree with the observation that, cost is a significant determinant of
ICT adoption (Alam and Noor, 2009; Ghobakhloo et al., 2012; Tan et al., 2009).
According to these studies, the rationale behind this observation is that, all types of
financial support have been provided by government to these businesses for ICT
103
adoption (Alam and Noor, 2009; Ghobakhloo et al., 2012; Tan et al., 2009).
training programs (Alam and Noor, 2009; Ghobakhloo et al., 2012; Tan et al., 2009).
simplified for Malaysian SMEs and this is attributed to the supportive policies and
The lesson learned from this review is that, given the right approach by governments
in their effort to support the SME sector, positive results will be achieved. Costello
(2009) argues that, “Policy makers must address the issue for the benefits of SMEs,
rather than strive to hit government targets. Their major concern should be the SMEs
needs and not personal career development (Costello, 2009). From a similar
perspective, Alam and Noor (2009) suggests that, given the globalisation of the ICT
that, in spite of the lack of enough research on how government policies boost
growth of small firms’ the fact remains that, if the schemes and policies are put into
use for the benefit of the majority, positive results will be achieved.
104
and Noor, 2009; Costello, 2009; Ghobakhloo et al., 2012; Ghobakhloo et al., 2011a;
Mpofu et al., 2009; Sophonthummapharn, 2008; Tan et al., 2009). For example, if
the government encourage SMEs to adopt the Internet and e-commerce, it must also
come up with related laws to support transactions over the Internet. If that is not
done, then it is likely that, the adoption rate will be slow (Sophonthummapharn,
2008). It can thus be argued that, the role of the government includes: Setting up of
institution and assign clear roles to key actors, create good environment for business
to operate (Alam and Noor, 2009; Costello, 2009; Ghobakhloo et al., 2012;
2008; Tan et al., 2009; URT, 2002). In this research, Support programs, Taxes and
Tariffs and Support Infrastructure are studied under the government policies
context.
thoroughly discussed. The literature shows that, one of the key areas that the
government can help SMEs is the creation and coordination of Support institutions
(Alam and Noor, 2009; Apulu, 2012; Costello, 2009). Alam and Noor (2009)
programs (Alam and Noor, 2009; Ghobakhloo et al., 2012). In this research,
105
skill training programs and access to market information are looked at.
The literature shows that, taxation is a very important topic for policy makers
(Atawodi and Ojeka, 2012; CEBR, 2009; Freedman, 2003; Mungaya et al., 2012;
Mwangi and Nganga, 2012; OECD, 2009). This is attributed to the fact that, taxation
is the major way of funding of governments. Atawodi and Ojeka (2012) cite the
the purpose of funding governance”. A tax can either be of three basic structures;
his income (Atawodi and Ojeka, 2012). A regressive tax is one that charges a higher
rate to persons receiving lower income, and finally a progressive tax levies a higher
rate to higher income earners (Atawodi and Ojeka, 2012). According to Mungaya et
al. (2012), a poorly conceived taxation system can have catastrophic consequences
for the concerned economy. They thus argue that, a tax structure must be adequately
In the context of this research, previous studies on ICT adoption by SMEs have
shown that, tax incentives for SMEs can stimulate ICT adoption in the SMEs (Alam
and Noor, 2009). Alam and Noor (2009), cite a study carried out in Israel to identify
106
three most important factors that had contributed to the creation ICT industry in
Israel. The study, found government’s tax incentives to be one of the success factors
(Alam and Noor, 2009). However, the literature shows differing arguments for and
against the targeting of tax incentives at SMEs (Atawodi and Ojeka, 2012; CEBR,
2009; Freedman, 2003; Mungaya et al., 2012; Mwangi and Nganga, 2012; OECD,
2009).
One of the major issues raised in the literature against the targeting of tax incentives
at SMEs is the fact that, the provision of tax reliefs and exemptions for small
businesses is against the key principle of neutrality (Freedman, 2003; OECD, 2009).
Freedman (2003) also note that, since it is extremely difficult to target growth
oriented SMEs only, reliefs aimed at all small businesses are available, inevitably, to
can be created, or reorganised partly in order to obtain the tax advantages and or for
the purpose of tax avoidance (Freedman, 2003). In addition, it is also argued that,
tax incentives and reliefs to small business may result in economic inefficiency
rather than to small, less efficient firms. Alternatively, they may not be effective at
all.
On the other hand, the literature shows a great support for tax incentives to SMEs
(Atawodi and Ojeka, 2012; CEBR, 2009; Freedman, 2003; Mungaya et al., 2012;
Mwangi and Nganga, 2012; OECD, 2009). According to CEBR (2009), there is
for small businesses to engage in activities that they have particular strengths in:
Mwangi and Nganga (2012) observe that, there are various types of taxes which the
government use in raising required revenue but those taxes may have a negative
effect on the SME’s sector growth. Mwangi and Nganga (2012) recommend that, the
level of taxation set must be friendly and not stifle the running of business. Atawodi
and Ojeka (2012) found out that, there is a significant negative relationship between
taxes and the business’ ability to sustain itself and to expand. They thus
recommended for a tax policy that will stimulate the growth of the SME sector
URT (2002) state that, “SMEs are generally, confronted with unique problems
including heavy costs of compliance resulting from their size”. On a similar context,
Nkonoki (2010) came to the conclusion that, reducing the corporate taxes charged to
small firms, as well as reducing fees for registering small firms, can result in growth
of the SME sector in Tanzania. This study looks at how tax and tariffs affect
Previous research has shown that, infrastructure provided by the government and or
its institutions, is vital to help both economic growth and technological progress of
SMEs (Apulu, 2012; Costello, 2009; Ghobakhloo et al., 2012; Ghobakhloo et al.,
2011b; Mpofu et al., 2009). In addition, the literature shows how telecommunication
al., 2010; Costello, 2009; Ghobakhloo et al., 2012; Ghobakhloo et al., 2011b; Mpofu
108
et al., 2009; Nchunge et al., 2013). The literature has shown that, poor or
expensive service provision (Behitsa et al., 2010). This is known to have a negative
impact on ICT adoption (Apulu, 2012; Behitsa et al., 2010; Mpofu et al., 2009;
infrastructure plays into the overall picture of ICT development in the context of
Tanzania. On a similar tone, Nchunge et al. (2013) argue that, availability of other
support infrastructure such as roads and reliable energy are also important factors in
this research and they refer to all infrastructures that support technology transfer,
ICT adoption is one of the dependent variables and is a core issue in this research,
observed problems. In section 3.1 the benefits of ICT adoption by SMEs in general,
Computer and the Internet technologies, the two elements studied under the context
of ICT adoption.
109
4.2.5.1 Computers
There is evidence to the fact that, the benefits of ICTs, cut across all fields of human
activities (Apulu, 2012; Ion and Andreea, 2008; Onasanya, 2002a; Onasanya,
2002b). Osaat and Oyet (2012) claim that, the discovery of computer so far remains
the most important development in the ICT revolution”. It can thus be argued that,
computer technology cut across all aspects of human life. According to Onasanya
(2002a, 2002b), computer today is involved in reshaping the entire world and had
been more deeply involved in the texture of human life than any other dormant
technology ever.
organize, transmit, and algorithmically transform any type of information that can be
digitized (Brynjolfsson and Hitt, 2000). Numbers, text, video, music, speech,
programs, and engineering drawings are some of information type that can be
solve highly complicated problems quickly and accurately. Massive amount of data
can fast be manipulated and results can be viewed, stored or shared in the most
science (Anyaogu, 1991; Onasanya, 2002a; Onasanya, 2002b; Brynjolfsson and Hitt,
2000).
110
In the context of business, Feigenbaum (2015) state that, “In an age of booming
lungs”. Feigenbaum (2015) further argue that, whether we like it or not, computers
have become an integral part of the way business is done. Sison (2012) claim that,
computers are used for all aspects of running a business. According to Sison (2012)
businesses use computers to keep records, develop budgets and forecasts, prepare
marketing documents, research and stay in contact with other employees and
Sison, 2012; Suttle, 2015). In addition, computers are used for maintaining
Onasanya, 2002b).
Available literature has shown that, adoption and use of computer system can be of
great benefit to a company (Anyaogu, 1991; Brynjolfsson and Hitt, 2000; Crowder,
2015; Feigenbaum, 2015; Onasanya, 2002b; Sison, 2012). Sison (2012) suggests
that, computer use in business enhances productivity and provides results that might
not otherwise be possible. On a similar note, the literature have enough evidence
that, when used effectively, computers save time, money, and increase business
Feigenbaum, 2015; Sison, 2012; Suttle, 2015). In view of this observation, Sison
(2012) recommends that businesses should look at their operation and ensure that
they are using their computers to the fullest extent. Brynjolfsson and Hitt (2000)
111
noted that, as the computers become cheaper and more powerful, the business value
procedures and organizational structures that leverage this capability and less by the
its full potential can boost business efficiency, productivity and growth.
Previous research on SMEs concludes that, computers can benefit small business the
same way they can benefit big organisations (Apulu, 2012; Costello, 2009;
Ghobakhloo et al., 2012). In particular, the literature show that effective use of
(Apulu, 2012; Costello, 2009; Galloway and Mochrie, 2005; Harindranath et al.,
2010; Hazbo and Arnela, 2010; Lerman et al., 2004; Modimongale, 2009; Naul,
the adoption and the level of computers use in SMEs and its contribution to the
From the definition of the Internet, section 1.1.3, it can be summarised that, the
system. The biggest strength of the Internet is its ability to offer abundant
information resources using faster communication links at a low cost. Some authors
have argued that, the Internet is a virtual treasure trove of information (Ernst, 2001).
112
In the past decade, there has been a dramatic growth of the Internet and the World
Wide Web (Chung, 2006). Kripanont (2007) claim that, the Internet today is a
people worldwide.
Since its advent, the Internet has transformed the world like no other technology
before (Apulu, 2012). Apulu (2012) report that, the Internet is considered to be one
of the “defining symbols” of the 21st century innovation. According to Apulu (2012),
the Internet has transformed the conceptual notions of how people value knowledge
to create a new economy. Sellitto and Martin (2003) cited by Apulu (2012) claim
that, the internet has become an extremely important modern-day technology for
businesses. Manyika and Roxburgh (2011) note that the Internet have changed the
way we work, socialise, create and share information and organise the flow of
people, idea and things around the globe. In view of this, it can be concluded that,
the Internet today affects every aspect of human life. Some of the areas that has
research, business and economy and leisure and entertainment (Kripanont, 2007).
The literature provides the proof to the effect that adoption and use of the Internet
has advantages to the business (Apulu, 2012; Ifinedo, 2011; Ion and Andreea, 2008;
Kula and Tatoglu, 2003; Udo and Edoho, 2000). Ernst (2001) argue that, the Internet
has become the means for conducting growing numbers of transactions between
flexibility, and efficiency that the Internet offers (Ernst, 2001). Ernst (2001)
113
concludes that, the Internet has opened new markets to developing Asia and has
In the context of the SMEs, there is enough literature to support the fact that, Internet
adoption is a key success factor to small business (Alam, 2009; Ana et al., 2006;
Chung, 2006; Dholakia and Kshetri, 2004; Gilmore et al., 2007; Hsu et al., 2008;
Ifinedo, 2011; Kaynak et al., 2005; Kula and Tatoglu, 2003; Martin and Matlay,
2003; Mehrtens et al., 2001; Nathan, 2013; Tan et al., 2010). Ifinedo (2011) claim
that, the emergence of the internet has presented businesses (small and large) with an
Ghobakhloo et al. (2011b) report that, in the global business environments, SMEs are
global markets.
Martin and Matlay (2003) argue that, business could gain competitive advantage
from Internet usage if they can achieve the right mix of managerial capacity and
marketing focus in terms of image, brand and customer needs. Dholakia and Kshetri
(2004) noted that, the Internet can be a critical factor in enhancing a firm’s market
reach and operational efficiency. They further argued that, Internet based
technologies provide small firms the opportunity to overcome the limitations of size
and compete more effectively and/or in larger markets with bigger sized
(2004) report that, there is some evidence to suggest that the Internet has increased
114
context, Gilmore et al. (2007) suggest that, the use of the internet for e-commerce
impacted upon the barriers to export entry and has provided hope to millions of small
Kaynak et al. (2005) identified the most prominent benefits of conducting business
i. The ability of business to offer direct links with customers, suppliers and
iii. The ability of companies to develop new products and services for existing
iv. The opportunities for companies to market their products around the world
world.
In addition, Kaynak et al. (2005) report that, among the principle benefits of internet-
based EC that are more directly relevant for small business include: direct savings
115
such as product promotion, new sales channels, quick product delivery, more
On the other hand, a systematic literature review has conclusively shown that, in
spite of the obvious benefits, the rate of adoption of Internet and its related
technologies or services by SMEs is low (Alam, 2009; Ana et al., 2006; Apulu,
2012; Chung, 2006; Dholakia and Kshetri, 2004; Ghobakhloo et al., 2011b; Gilmore
et al., 2007; Hsu et al., 2008; Ifinedo, 2011; Kaynak et al., 2005; Kula and Tatoglu,
2003; Martin and Matlay, 2003; Mehrtens et al., 2001; Nathan, 2013; Tan et al.,
2010). Furthermore, the literature claims that, much research that has been
countries (Alam, 2009; Ana et al., 2006; Apulu, 2012; Chung, 2006; Dholakia and
Kshetri, 2004; Ghobakhloo et al., 2011b; Gilmore et al., 2007; Hsu et al., 2008;
Ifinedo, 2011; Kaynak et al., 2005; Kula and Tatoglu, 2003; Martin and Matlay,
Ghobakhloo et al. (2011b) and Tan et al. (2007) notice that, SMEs in developing
countries face challenges different from those in developed countries and differs
greatly in adopting and benefiting from e-commerce (Ghobakhloo et al., 2011b; Tan
et al., 2007). Ghobakhloo et al. (2011b) further observes that, e-commerce adoption
in these businesses, has only recently gained attention in the academic press.
literature recommends for researches that are robust enough to capture most, if not
all, of the idiosyncrasies observed (Apulu, 2012; Ghobakhloo et al., 2011b; Mpofu et
al., 2009). In view of the discussion above, the inclusion of Internet technology in
The final construct in the proposed model is concerned with the post adoption
work (Costello, 2009; Lefebvre and Lefebvre, 1996; Van Akkeren and Cavaye,
1999b). In their assessment of current models in the literature, Van Akkeren and
investments, and thus called for a model which included return on investment (ROI).
Van Akkeren and Cavaye (1999b) noted that “SME owners are only concerned with
when short-term returns are not guaranteed”. According to Costello (2009), a recent
review of the literature revealed that the inclusion of ROI in a model as still not
being fulfilled. In addition, Costello (2009) noted that, there is concern from the
Costello (2009) further discovered that, the vast majority of small businesses rely on
“gut instinct” to make a decision as to whether the adoption is successful or not. She
117
noted that, 97% of the micro-companies studied did not evaluate purchases or
measure the success of those purchases in any tangible way (Costello, 2009).
Costello (2009) argue that, “this, may indicate a gap in knowledge of micro-
companies regarding some factors that are important in measuring adoption success
number of factors that could have been measured but were not. According to
measurement is not a simple task. They argue that, the difficult lies in defining
performance is defined as “how well the organization is managed” and “the value
the organization delivers for customers and other stakeholders.” In the context of
manager interests after ICT adoption. The literature has shown that, in the context of
Mehrtens et al., 2001; Thong and Yap, 1995; Van Akkeren and Cavaye 1999b).
118
Haber and Reichel (2005) claim that, studies in different industries have primarily
and Reichel (2005) this reliance, reflect the shareholder interests of the SMEs
owner–manager. Haber and Reichel (2005) report that frequently used financial
measures include return on investment (ROI), profit and revenues. On the other
hand, Haber and Reichel (2005) note that, assessing performance solely on the basis
ventures that relate to managerial aspects such as market share, number of employees
and revenue per employee (Haber and Reichel, 2005). On a similar note, Wu (2009)
The literature notes that, Innovation can also be used as firm’s performance indicator
(DBIS, 2014; Gunday et al., 2009; OECD, 2005). According to Gunday et al.
enter new markets, to increase the existing market share and to provide the company
with a competitive edge. Gunday et al., 2009, further notes that innovation is
(2014) claim that, there is a large body of evidence to support the notion that,
innovation is at the core of business productivity growth, and therefore at the core of
119
adoption in small business. The factors are discussed in the next sections.
Botchkarev and Andru (2011) report that Return on Investment (ROI) is one of the
analysis. According to Botchkarev and Andru (2011) initially ROI was identified as a
financial term and defined as a concept based on a rigorous and quantifiable analysis
calculate ROI, the benefit (return) of an investment is divided by the cost of the
However, Cresswell (2004) note that “ROI analysis in general is a rather diverse
collection of methods, skills, tools, activities, and ideas. They all may be useful for
assessing the relative value over time of some investment” (Cresswell, 2004).
Investopedia (2011) explain that, the calculation for ROI and, therefore the
(2011) and Botchkarev and Andru (2011) note that the definition of ROI in the
such, there is no one "right" calculation (Investopedia, 2011; Botchkarev and Andru,
2011).
Botchkarev and Andru (2011) argue that the large number of ROI methods today,
has led to the situation where ROI is often experienced as a non-rigorous, amorphous
bundle of mixed approaches, prone to the risks of inaccuracy and biased judgement.
This can further be explained by the existence of two extreme views regarding the
use of ROI. While one view claim that ROI is “the most popular” metric to use
another, the other view is to “forget ROI” altogether (Botchkarev and Andru, 2011).
Nevertheless, Botchkarev and Andru (2011) claim that, when applied correctly, ROI
analysis is a powerful tool for evaluating existing information systems and making
Andru, 2011). At present, ROI is widely recognized and accepted in business and
financial management in the private and public sectors (Botchkarev and Andru,
Haber and Reichel (2005) argue that, using objective financial measures would seem
to be the simplest way to assess performance. However, they point out that, these
data are sometimes confidential and difficult to obtain from the respondents (Haber
and Reichel, 2005). They argue that small firms are known for their inability and
121
on small ventures are not publicly available (Haber and Reichel, 2005). According
to Haber and Reichel (2005), in such scenario, previous research has shown that,
subjective measures are more flexible and thus useful. They argue that, given the
need for valid performance measures and the difficulty in collecting valid data, there
simultaneously (Haber and Reichel, 2005). Costello (2009) discovered that the
majority of SMEs do not evaluate performance after adoption and those who do, tend
to use a single or simple metrics. In view of the observations made by Haber and
Reichel (2005) and Costello (2009), in this research, increase in market size, increase
in capital, increase in sales, increase in profit, and the number of employees are
4.2.6.2 Innovations
production of goods and services” The literature show that innovativeness is one of
the fundamental instruments of growth strategies (DBIS, 2014; Gunday et al., 2009;
OECD, 2005). It enables a business to enter into new markets, to increase the
existing market share and to provide the company with a competitive edge (Gunday
et al., 2009; OECD, 2005). DBIS (2014) claim that, there is enough evidence from
the literature to the effect that innovation is at the core of business productivity
According to the literature (Gunday et al., 2009; OECD, 2005) innovation as a term
is not only related to products and processes, but is also related to marketing and
122
organization (Gunday et al., 2009; OECD, 2005). Gunday et al. (2009) claim that
different types of innovation are described in the literature. OECD (2005) identify
marketing innovation and organizational innovation. The OECD (2005) notes that,
product and process innovations are closely related to the concept of technological
developments.
(OECD ,2005). The OECD (2005) further defines process innovation as “the
(OECD, 2005).
(and thus labour productivity), gaining access to non-tradable assets (such as non-
codified external knowledge) or reducing costs of supplies (OECD, 2005). From the
operational definitions of the four types of innovations, it can be seen that computer
and Internet adoption by a firm can affect both types of innovation. In this research,
under the Innovation construct, the emergence of new processes and methods that
Having established the validity of different constructs and factors, this section give a
summary of factors used in this study. The summary is given a tabular form as
Explanatory Variables
PERSONAL FACTORS-PF
Education Experience SME PERFOMANCE-SP
Knowledge of IT Return on Investment
Perceived Benefit Process Innovation
125
Figure 4.1: The Conceptual Model for Accessing ICT Adoption in SMEs
In this study, descriptive analysis was used in preliminary data analysis. Thereafter
validation.
4.4 Hypotheses
From the conceptual model developed the hypotheses for this research were
formulated and they were arranged into five groups. Group one had three hypotheses
126
(H1a, H1b and H1c) that were meant to test the individual effect of explanatory
adoption (the dependent variable). Group two had three hypotheses (H2a, H2b and
H2c). These hypotheses tested the combined effect of two explanatory variables on
ICT adoption. Group three had one hypothesis H3 which tested the combined effects
of all explanatory variables on ICT adoption. Group four had one hypothesis H4
which tested the effect of ICT adoption on the performance of SMEs (SMEP).
Finally, the fifth group had three hypotheses (H5a, H5b and H5c). The hypotheses in
group five tested the moderating effect of government policies (support programs,
taxes and tariffs and support infrastructure) has on the influence of predictors
H1a: Personal factors have a direct positive significant relationship with ICT
adoption in SMEs.
H1b: Organizational factors have a direct positive significant relationship with ICT
adoption in SMEs.
H1c: Economic factors have a direct positive significant relationship with ICT
adoption in SMEs.
H2a: Personal factors and Organizational factors have a direct positive significant
H2b: Personal factors and Economic factors have a direct positive significant
H2c: Organizational factors and Economic factors have a direct positive significant
H3: Personal factors, Organizational factors and Economic factors have a direct
H4: ICT adoptions have a direct positive significant relationship with SMEs
performance.
H5a: The influence of personal factors, organisation factors and economic factors
H5b: The influence of personal factors, organisation factors and economic factors
H5c: The influence of personal factors, organisation factors and economic factors
In this chapter, the conceptual model in this research have been developed and
presented. The model constructs and variables have been explored in order to
establish their validity in this study. A total of eleven hypotheses have been
formulated from the model for the aim of testing the effect of explanatory variables
on dependent variables. The methodology used in carrying out this research is given
CHAPTER FIVE
5.1 Introduction
One of the formidable problems that a researcher faces after defining the research
problem is the preparation of the design of the research project, popularly known as
the “research design” (Apulu, 2012; Kothari, 2004; Saunders et al., 2009;
due to the fact that, scholars use various terms to describe research approaches and
strategies (Apulu, 2012) as seen in the given definitions for research design and
methodology.
129
collection and analysis of data in a manner that aims to combine relevance to the
research purpose with economy in procedure.” This means that, both data and
methods, and the way in which these will be configured in the research project, need
to be the most effective in producing the answers to the research questions, taking
into account practical and other constraints of the study (Apulu, 2012; Kothari, 2004;
research design is also known as a research plan or research strategy. Saunders et al.
(2009) defined research strategy (or research design) as an overall approach that a
researcher adopts in order to answer the research question (Saunders et al., 2009). On
a similar note, Crotty (1998) claimed that, a research strategy or plan of action is the
design that shapes a researcher’s choice and use of particular methods and links them
design lying behind the choice and use of particular methods and linking the choice
and use of those methods to the desired outcomes” (Apulu, 2012). Remenyi et al.
put into practice in a research process, from the theoretical underpinning to the
collection and analysis of data”. Collis and Hussey (2003) identified methodology as
the “overall approach to the entire process of the research study”. According to
to be investigated in a study and thus its definition can vary according to the
problems to be investigated.
130
This study adopts the description of the different research terms as advocated by
methods and technique or techniques used to obtain data, along with procedures to
analyse these data, represents only the final decision about the overall research
design. Thus, using the metaphor of the “Research Onion”, Saunders et al. (2009)
presented the overall research methodology in which the thoughts with regard to the
research problem lie in the centre. That way, several layers (of the onion) have to be
“peeled away” before reaching this central position. According to Saunders et al.
(2009), these layers are the important aspects to be considered in determining the
research methodology for a particular research study. Figure 5.1 shows the
These layers illustrate the steps of research design. It should be noted that, while
there are different definitions and classifications of these terms, classification set
This chapter presents the research design and methodology used in this study.
However, prior to that, an overview of different types of research designs are given
in order to identify the type to be used in the current study. This helps to understand
the decisions made on the choice of methods and techniques in the study. After
research type identification, the rest of the chapter is arranged as follows: First the
alternatives for research approaches, designs, strategies, and time dimension are
discussed, and the specific choices made in this study are clarified. Third, this
procedure, questionnaire development and the pilot survey. Finally, the chapter
From the literature, the author notes that there are different ways of classifying
research. Some authors classify research based on the method used such as
according to the observational method used such as survey research or case study
research. However, Yin (2009) and Costello (2009) point out that, the main reasons
phenomenon (Costello, 2009, Yin 2009). Thus, research designs can be classified as
theory available to guide predictions like when a researcher examines a new interest
a major emphasis on the discovery of ideas and insights and it is used when seeking
insight into the general nature of a problem, the possible decision alternatives, and
literature review, interviews, Delphi technique, focus group, case study, project test,
2008). The researcher observes and then describes what was observed
theory, usually serve to guide the process and provide a list of what needs to be
For example, “What are the characteristics of the population or situation being
include frequency counts (how many), measures of central tendency (mean or mode),
conducted through sample surveys, an omnibus panel, a true panel, and longitudinal
problem in order to explain the causal relationships among variables (Saunders et al.,
2009; Sophonthummapharn, 2008). As such they are designed to test whether one
that specify the nature and direction of the relationships between or among variables
that can be used to definitively explain the phenomena, which leads to the
requirement. In more detail, it tests whether or not some event causes another. This
(Sophonthummapharn, 2008). The data are quantitative and almost always require
the use of a statistical test to establish the validity of the relationships. For example,
explanatory survey research may investigate the factors that contribute to customer
satisfaction and determine the relative weight of each factor, or seek to model the
From the discussion above it can be seen that, the three types of research differ in
several aspects including research purpose, the way research questions or hypotheses
135
are formulated, and the way data are collected. However, despite the distinctions
among the three types of research, they nonetheless have complementary roles in
absolute because in reality any research project is likely to serve several purposes
and therefore require more than one research design (Sophonthummapharn, 2008).
In a typical case where a research project employs more than one research design,
exploratory research is more often used as a starting point in order to get a clear
and serve as guides for the subsequent descriptive or causal research projects.
Descriptive research design can also be a starting point. However, the choice of
This study employs multiple research designs as suggested by Costello (2009) and as
depicted in figure 5.2. The study begins with an exploratory phase involving
extensive literature review about the topic of interest, that is, adoption and use of
ICTs in SMEs. Research questions and hypotheses are then developed for
this world” (Oates, 2006). This means that different paradigms will result in
different views of the world. Saunders et al. (2009) define philosophy as the belief
and thinking that an individual has about knowledge and how it is created and
(2008) further argues that, “the way a researcher views environments or the world
137
surrounding him/her will underlie the choice of which research practices should be
Apulu (2012) observed that, there are three factors that influence the need to
paradigms help to define the research design, the type of evidence that is required,
how it will be gathered and interpreted, and how this will give answers to the
identify which research design will work for a particular study. Thirdly,
philosophical paradigms can help the researcher to create research designs that may
Saunders et al. (2009) identifies ten different philosophies that guide research (see
philosophies are a result of how we think about research philosophy and they identify
al. (2009). The literature (Apulu, 2012; Costello, 2009; Saunders et al., 2009;
Sophonthummapharn, 2008), show that research paradigms are often shared within a
particular research field and as such researchers from the same field will normally
tend to have the same philosophy (Costello, 2009). Costello (2009) noted that, in
philosophical paradigms find extensive use with the positivist paradigm being the
According to Hinkelmann (2010) positivist paradigm is the oldest approach and has
taken centuries to develop. The paradigm has its grounding within the physical
“the scientific method” since this reflects the underlying assumptions within it.
That is, it believes in the possibility to observe and describe reality from an objective
observe the world in some neutral and objective way, discover “general”
relationships and “universal” laws, derive theories and test them (Costello, 2009;
Hinkelmann, 2010).
understand differences between humans in our roles as social actors (Costello, 2009;
Oates, 2006). This approach allows researchers to be concerned with the social
context of systems and how the system is influenced and can influence the
subjective realities and can therefore make the quality of research more difficult
The third paradigm, that is, critical research is relatively less well accepted in IS
research is often portrayed as a third alternative to the first set of paradigms, that is,
positivism and interpretivism. The critical research philosophy accepts social realty
139
as interpretivism does, but claims that social reality has objective properties that
can dominate the way we perceive the world (Apulu, 2012; Costello, 2009; Oates,
2006). Apulu (2012), noted that, the central issue of critical research is that it aims at
Apulu (2012) and Costello (2009) claim that, research paradigms are often
have a strategy that can be interpreted via multiple paradigms (Apulu, 2012;
Costello, 2009; Oates, 2006). Table 5.1 shows research paradigms with associated
strategies.
The author of this work has a strong background in Engineering and thus naturally
most of his views are Positivists in nature. This research test hypotheses based
Positivists paradigm. However, it should also be noted that the research also
design.
In research, there are two broad methods of logical reasoning namely the deductive
2008). The two approaches are further explained in the next section.
Deductive reasoning works from the more general to the more specific, and is often
thought, theories or hypothesis are developed and then tested through empirical
might begin by examining theories related to their topic of interest. They then narrow
those theories down to more specific research questions or hypotheses that can be
Inductive reasoning works the other way, moving from more specific observations to
begin with specific observations and measures, begin to detect patterns and
regularities, and then formulate some tentative hypotheses that they can explore and
the real world. Table 5.2 provides a summary of comparison of the two approaches
to research.
SMEs, together with similar studies were reviewed and discussed in order to develop
were formulated and tested in order to understand the adoption of ICTs among SMEs
generalised.
Saunders et al. (2009) defined research strategy as “the general plan of how the
procedure used to answer research question(s) and fulfil the purposes of the research.
The literatures show that there are a number of research strategies that can be
2009; Sophonthummapharn, 2008). Moreover, Saunders et al. (2009) point out that,
objectives, the extent of existing knowledge on the subject area to be researched, the
143
amount of time and resources available, and the philosophical underpinnings of the
strategy is inherently superior or inferior to another. Each strategy has its own
strengths and weaknesses for any particular research situation (Saunders et al., 2009;
can be used either jointly or separately in any research project (Saunders et al., 2009;
The literature shows several major research procedures that can be labelled as
research strategies. These includes experiment, survey, case study, action research,
Wedawatta et al., 2010). This research adopts the case study and survey research
strategies. In the following sections, the case study and survey strategies are briefly
The literature (Gerring, 2004; Yin, 2009; Zucker, 2009) has multiple definitions and
understandings of what a case study is. Yin (2009) for example defines a case study
within its real-world context especially when the boundaries between phenomenon
On the other hand, Sophonthummapharn (2008) cites other literatures and further
explain that a case study refers to “A strategy for doing research which involves an
2009; Saunders et al., 2009; Sophonthummapharn, 2008; Yin, 2009) case studies can
be used in both exploratory, descriptive and explanatory research and they have the
ability to answer the ‘why’ ‘what’ and ‘how’ questions. Yin (2009) noted that, a
ii. You cannot manipulate the behaviour of those involved in the study
iii. You want to cover contextual conditions because you believe they are
iv. The boundaries are not clear between the phenomenon and context.
Sophonthummapharn, 2008; Yin, 2009), case studies may either focus on a single
case or use a number of cases: A single case may form the basis of research on
typical, critical or deviant cases, while multiple cases may be used to achieve
questionnaires. According to Costello (2009), case studies are the most common
5.5.2 Survey
survey (Leeuw et al., 2008). Leeuw et al. (2008), cites a number of books on survey
survey error instead of giving a definition, and other books that give definitions
Leeuw et al. (2008), looking at the common things in these definitions, a survey can
show that, survey research strategy is the most popular and common strategy for
social research, including business disciplines (Babbie, 2004; Saunders et al., 2009,
‘where,’ and ‘how’ questions and is mainly used in descriptive and exploratory
deductive research approach. One of the strengths of a survey strategy is the fact that
data are typically quantitative and are elicited from subjects by questioning. More
often than not, the questions are asked using questionnaires. The questions can also
the quality of respondents and the questions asked affect the research findings. Thus,
before data collection because the better they are, the more reliable and valid the data
is obtained and this leads to more accurate research generalizations. The collected
data can be easily compared and analysed using various statistical techniques. Survey
collecting original data to explain a population that is too large to observe directly.
may be taken to reflect those of the larger population, and carefully constructed
standardized questionnaires provide data in the same form from all respondents
(Babbie, 2004). In more detail, a survey strategy provides researchers more control
over the research process, and it is possible to generate findings that are
representative of the whole population at a lower cost than collecting the data for the
depicted in Figure 5.2. This choice results in the use of multiple strategies for the
research since each research strategy has its strengths and weaknesses for a given
147
inferior to another and that research strategies can be used either jointly or separately
in any research project. A typical example is Costello (2009) who combines case
strategies to use. These include among other things the researcher’s philosophical
belief, research approach, experience, time and budget available. Taking these
factors into account as explained in earlier sections of this thesis, the use of case
In this work, multiple case studies strategy was used in the exploratory phase of the
research in order to help the researcher get a better understanding of the problem
strategy was used for the descriptive and explanatory phases of this research. Semi
structured questions and interviews were used as data collection techniques for the
case studies while for the survey, self-administered questionnaires were used.
Yin, 2009) show that, there are two major research methods: quantitative and
significantly different in the way data are collected and analysed (Costello, 2009;
Saunders et al., 2009; Sophonthummapharn, 2008; Yin, 2009). In other words, the
148
two methods use data of different formats. While as quantitative research method
focus on numerical data, qualitative research method on the other hand focuses on
non-numerical data such as voice text and pictures (Apulu 2012; Babbie, 2004;
Saunders et al., 2009). Sophonthummapharn (2008) and Saunders et al. (2009) note
that, when applied to a particular phenomenon, both methods have advantages and
2004; Saunders et al., 2009; Sophonthummapharn, 2008) show that, the two methods
have complementary roles in research and that no one method is better or dominates
the other. They are both widely used in social research (ACAPS, 2012; Babbie,
et al. (2009) refer to “research choice” as the way a researcher chooses to combine
Saglam and Milanova (2013) note that, there are many descriptions to quantitative
which the investigator primarily uses post-positivist claims for developing knowledge
(i.e., cause and effect thinking, reduction to specific variables and hypotheses and
questions, use of measurement and observation, and the test of theories), employs
Generally, the quantitative research deals with numeric data. The method poses the
who, what, when, where, how much, how many, and how questions (Saglam and
argued that, quantitative research method is best suited for testing theories and
generalising findings (ACAPS, 2012; Costello, 2009; Saglam and Milanova, 2013;
Saunders et al., 2009; Sophonthummapharn, 2008). The vital skills needed for
hypotheses, testing the hypotheses with proper statistical techniques, and the ability
(Sophonthummapharn, 2008).
Ritchie and Lewis (2003) noted that, most qualitative research literature begin with
some attempt to define what is meant by this term, either theoretically or practically,
the term is used as an overarching category (Ritchie and Lewis, 2003). That is, it
covers a wide range of approaches and methods found within different research
For practical reasons, this research adopts the definition by Nkwi et al. (2001) who
explain qualitative research as “any research that uses data that do not indicate
150
ordinal values” In this definition, the focus is on the data generated and or used. In
reality, the data in qualitative research is non-numeric and can be in the form of text,
images, and sounds (Apulu, 2012; Hancock et al., 2007; Nkwi et al., 2001; Ritchie
The literature (Apulu, 2012; Hancock et al., 2007; Ritchie and Lewis, 2003) also
point of view (Apulu, 2012; Hancock et al., 2007; Ritchie and Lewis, 2003).
Qualitative research poses the why? how? and in what way? questions as it seeks to
Hancock et al., 2007; Ritchie and Lewis, 2003). According to the literature (Apulu,
2012; Ritchie and Lewis, 2003; Saglam and Milanova 2013; Sophonthummapharn,
2008), qualitative research is basically used in areas where little or no literature exists.
In such cases, qualitative method is usually used to provide an in-depth insight into the
phenomena being investigated (Apulu, 2012; Ritchie and Lewis, 2003). Table 5.3
methods.
successfully conduct a qualitative study include the ability to think abstractly and
According to the literature (ACAPS, 2012; Creswell, 2003; Saglam and Milanova,
particular study. The literature (Apulu, 2012; Costello, 2009; Creswell, 2003;
these methods has its strengths and weaknesses. According to Babbie (2004) more
often, to get a complete understanding of a research topic may require the use of both
methods. Therefore, the two methods can be used to complement each other
depending on the nature of the study (Apulu, 2012; Costello, 2009; Saunders et al.,
two methods are used in complimentary way, that allows researchers to conclude
In practice, the two methods can be used either as mixed method designs or as
multimethod designs (Esteves and Pastor, 2004). According to Esteves and Pastor
qualitative and quantitative strategies within a single project that may have either a
supplemental to the major or core method and serve to enlighten or provide clues
This definition implies that, one method could be used initially and then followed by
the other, depending on the nature of the study. In addition to the mixed method
design, Esteves and Pastor (2004) define multimethod design as “The conduct of two
or more research methods, each conducted rigorously and complete in itself, in one
From this discussion, it can be concluded that, the selection of a research choice
depends on the nature of the study as suggested by the literature (Apulu, 2012;
Costello, 2009; Creswell, 2003; Esteves and Pastor, 2004; Saunders et al., 2009;
factors that play in this decision are: the research problem, the personal experiences
This research employed the multiple research design (see section 5.2.5) and that
made the use mixed method design necessary. The research problem demanded for
153
SMEs in Tanzania). That called for a quantitative study using the survey strategy
(ACAPS, 2012; Costello, 2009; Saglam and Milanova, 2013; Saunders et al., 2009;
Sophonthummapharn, 2008).
However, prior to the major survey, a pilot study which was qualitative in nature was
deemed necessary in order to help the researcher get in depth knowledge of the
research topic before formulating the hypotheses and developing the instrument for
the study. Therefore, while as the core method of the research was the quantitative
method, the qualitative method was used to enlighten on the study as implied by the
According to the literature (Kripanont, 2007; Peou, 2009; Saunders et al., 2009;
mainly intended to provide answers if there are any changes on the observed
Generally, research time dimension depends on the intended purpose of the study and
availability of resources needed for the study (Kripanont, 2007; Saunders et al.,
longitudinal study (Sophonthummapharn, 2008) and thus, most studies in the context
study since data was collected once (over a period of nine months) in order to answer
research objectives. This choice was made based on available resources for the
research especially time, budget and staff available. Moreover, the choice is
order to meet the objectives of the research, this instrument had to be developed and
tested for reliability and validity before it could be used in the major survey. This
section describes the questionnaire development process and explains how the
In this work, multiple case studies strategy was used in the exploratory phase of the
research in order to help the researcher get a better understanding of the research area
and the research problem. In this phase, semi structured interviews were used to
collect data from six companies. The main objective of the semi-structured
interviews was to provide the researcher with basic information needed in the design
of a formal survey instrument and not to perform detailed analysis of the case
studies. Thus, all significant variables derived from literature review were combined
with the information gathered from the case studies, with the aim of developing an
responses from a chosen sample” In this research, the questionnaire design process
was guided by the theories and the conceptual model presented in chapter 4 of this
thesis. According to the literature (Kripanont, 2007; MRS, 2011; Peou, 2009;
the purpose of the research, planning of issues such as how different variables will be
categorised, scaled and coded after receipt of responses, the wording and the general
In this work, the researcher took all of these points into consideration while
designing the survey questionnaire for the study. In order to remain focused on the
156
purpose of the study, only the questions related to the research objectives were
integrated into the questionnaire. The wording of the questions was kept simple and
avoided the use of jargons and too technical language. This was aimed at enabling
respondents to understand the questions easily and answer them. Also, open ended
dealing with similar aspects of the study were grouped together and each group
brief sentence or two explaining the purpose of the questions in that section. The
It should be noted that, this research was conducted in mainland Tanzania, a country
whereby Kiswahili and English are widely spoken and they save as the two official
national languages. Bearing that in mind, it was deemed necessary to have the
choice. That being the case, the questionnaire was designed first in English, the
was translated from English to Kiswahili. The translation of the questionnaire was
done in consultation with expert translators from the linguistics department of the
University of Dar es Salaam and the author was able to produce a Kiswahili version
of the questionnaire. During the translation, the focus was put on conceptual rather
than literal translation. It should be noted that, the translation process is beyond the
scope of this work. However, it suffices to say that, the translated instrument had the
same conceptual meaning as the original English instrument and thus was able to
157
capture all the wanted information. Different sections of the questionnaire are
This section aimed at obtaining information about the general profile of the company
and the respondents. A total 13 questions with different scales were asked in this
open-ended question that was meant to measure the entrepreneur value of the owner-
manager. The questionnaire design in this section was purely based on literature
Akkeren and Cavaye, 1999b), many similar studies that contain elements about the
firm, include age, size, sector, legal form, location and ownership. Thus, these
This section of the questionnaire was designed to elicit the information about what
the company actually has in terms of ICT infrastructure and how often that
technology is used in support of firm activities. A total of six questions were asked
and the respondents were asked to choose all that apply to their firms. This way the
information about computer and the Internet technologies and their frequency of use
in SMEs was gathered. Question six gave the option to the respondent to provide
information about any other ICT the firm has that was not listed. All questions were
This section was used to gather information about how the computers and the
Internet are used in a firm. The literature (Chung, 2006; Modimogale, 2009) show
that, adoption of technology does not by itself guarantee firms competitiveness and
growth, but rather how the technology is used. There is a total of 13 questions
agree). Four questions were used to look into how computers are used and 9
questions are used to look into how the internet is used by the firms. Appendix IB
The Personal Factors construct is one of the three independent variables of the ICT
information about the owner-manager (The Personal Factors) attributes that affect
towards the benefits of using ICTs, since other attributes such as education and
shows the questions in this section. A total of twelve questions were asked in section
D and the scale was established as a 5-point Likert–type interval scale (1=Strongly
variable of the ICT adoption model as depicted by Figure 4.1 Within the context of
measured and the information obtained used in the ICT adoption modelling.
material resources within the company. Strategy was measured by looking at the
reasons given for adoption and decision making. External Pressure was measured by
were open ended questions meant to gather addition information about other
contributing factors.
Section F was concerned with the identification of Economic Factors that affects ICT
adoption in SMEs. This is the third independent variable of the ICT adoption model
Financial Support and Cost of ICTs were measured. Access to financial support was
measured by the lack of capital sources, lack of cash in hand, lack of additional
capital, difficult to find loan, many requirements from financial institutions, banks
require collateral and high interest, and lack of financial institution for SMEs and the
160
need for immediate return on investment. Cost of ICT systems was measured by
acquisition, implementation and operational costs of ICT systems. In total, there was
16 questions in this section and the questions were posed as a 5-point Likert–type
show the questions asked to deduce this information. Note that all questions in this
section are negatively stated statements. Thus, after data collection and prior to any
analysis, data for these questions was transformed so that the entire data set had the
ICT adoption by SMEs. The section has a total of eleven questions as shown in
support programs, taxes and tariff rates, availability of support infrastructure. The
on other desirable government interventions. Note that all questions in this section
(except question G11) are negatively stated statements. After data collection and
prior to any analysis, data for these questions was transformed so that the entire data
This section was concerned with establishing the effect of ICT adoption on SMEs
(Post adoption Evaluation) thus the questions tried to elicit the information on
161
whether the adoption has been a success or not. Appendix IB section H show the
Investment (ROI) and Innovation was measured. ROI was measured by market size,
sale volume, additional capital and profits. Innovation was measured by the
emergence of new processes that enhance efficiency. The scale was established as a
Prior to the use of the questionnaire in the survey, the instrument was pretested in
order to determine the accuracy and consistency of the responses. The details of this
testing is a trial run of the instrument with a group of respondents with the aim of
whether the respondents have any difficulty understanding the questionnaire and
expected to respond similarly to the samples on which the scale eventually will be
applied. On the other hand, for the purpose of refining a measuring instrument, pre-
In this research, the first pre-test involved two groups. The first group was made up
of two University of Dar es Salaam professors whom are also supervisors of this
work. The second group had five PhD students. The two groups were given the
questionnaire with their comments. Some questions were also removed from the
questionnaire since they were not adding any value to the study.
In the second pre-test, a group with 30 entrepreneurs were given both the English and
with comments. This was a 70% return rate. The comments provided by these
layout and the sequencing of the questions. A covering later (See Appendix I-A) that
explains to the respondents the objectives of the research and what the data will be
used for, was prepared to be sent out with each questionnaire. The final pre-test of
the questionnaire was a pilot survey and is covered in the following section.
According to Simon (2011), a pilot survey can refer to a small-scale version of the
larger survey. In other words, a pilot survey refers to trial runs done in preparation
for the major study. On the other hand, pilot studies can also refer to trying out or
scale research is carried out (Kripanont, 2007; Simon, 2011). Simon (2011) and
Kripanont (2007) note that, it is a good practise to carry out a pilot survey prior to the
main survey. Simon (2011) notes that, while pilot surveys does not guarantee the
success of the main study (Simon, 2011), they can give advance warnings with
regard to the weaknesses in the proposed study (Kripanont, 2007; Simon, 2011).
Kripanont (2007) asserts that, a pilot survey must always draw subjects from the
target population. It must also simulate the procedures and protocols that have been
designed for data collection (Kripanont, 2007; Simon, 2011). Simon (2011) suggests
that a sample size of between 10% and 20% of the actual sample for the main study
is adequate in many studies. Kripanont (2007) claim that a sample size of 25 to 100
respondents is enough.
In this research, a pilot study was carried out with the intention of collecting data for
assisted in testing the reliability and validity of the instrument before the major
survey was carried out. Moreover, the pilot survey helped the research team to gain
completion time and estimate response rate. The researcher also used the pilot study
research assistants to respondents in all three districts of the Dar es Salaam region,
which are Ilala, Kinondoni and Temeke. Respondents were given a time frame of
two weeks to complete the questionnaire, after which the researcher or his assistants
164
collected back and out of which 37 were deemed good for analysis and 6 were
discarded. The obtained data was analysed using IBM SPSS version 20 and the
results obtained helped the researcher to further refine the instrument until the
instrument was ready for survey. The tests conducted on the pilot data are explained
instrument are all about testing the goodness of data obtained. Reliability can be
defined as “The extent to which research findings would be the same if the research
(Kripanont, 2007). In other words, the reliability of a measure indicates the extent to
which the measure is without bias (error free) and hence offers consistent
measurement across time and across the various items in the instrument (Kripanont,
2007; Sekaran, 2003). It helps to assess the goodness of measure, and indicates
To test the reliability of the research instrument used in this study, the Cronbach’s
coefficient alpha, the item-to-total correlation and the inter-item correlation were
used. The Cronbach’s coefficient alpha is one of the most popular tests of inter-item
The Cronbach’s coefficient alpha has a value between 0 and 1 (Kripanont, 2007;
are considered to be poor, those in the 0.7 range, acceptable, and those over 0.8 good.
Generally speaking, the closer the reliability coefficient gets to 1, the better.
Kripanont (2007) and Sophonthummapharn (2008) note that, in most research, the
The item-to-total correlation and the inter-item correlation are other measures that
can also be used to assess internal consistency of a research instrument (Hair et al.,
2006; Kripanont, 2007) and thus were also used in this study. According to
Kripanont (2007), correlation, (both positive and negative correlation), in the range
medium correlation and r = 0.50 to 1.00 is large correlation (Hair et al., 2006;
the instrument in research, the item-to-total correlations should be 0.50 and above,
while the inter-item correlations should exceed 0.30 (Hair et al., 2006; Kripanont,
2007). Table 5.4 presents reliability test results performed on the pilot survey data.
From Table 5.4 it can be seen that, the Cronbach’s alphas for all scales and sub
scales is in the range of 0.701 to 0.987 with only two sub scales registering
Cronbach’s alphas of 0.701 and 0.762. The rest of scale registered Cronbach’s
alphas above 0.800. This indicates that the items in each concept were positively
correlated and thus point out the accuracy in measurement (Hair et al., 2006;
Moreover, Table 5.4 shows that, one item related to Organisation Factors, had inter-
item correlation value less than 0.3 and four items, two items in the Organisation
Factors and other two items in the Government Policies had item-to-total correlation
values of less than 0.5. According to Hair et al. (2006) and Kripanont (2007), the
inter-item correlations should exceed 0.30 and that the item-to-total correlations
Table 5.4: Pilot Survey Reliability and Internal Consistence Analysis Results
Strategy
-Decision making 3 0.760 Acceptable 0.355~0.741 0.458~0.729
-Reason for adoption 5 0.922 Good 0.459~0.924 0.551~0.895
Shields 2000), validity refers to how well a test, measures what it is claim to
measure. In other words, validity can be thought of as “the extent to which the data
collected truly reflect the phenomenon being studied” (Kripanont, 2007). According
to Golafshani (2003), validity test is all about determining whether the research truly
measures that which it was intended to measure or how truthful the research results
are. Several types of validity tests for testing the goodness of measures have been
criterion-related validity, and construct validity. In this research content validity and
Content validity also referred to as the face validity, is a test that assesses whether a
tool appears to others (expert judges, and pre-tests) to be measuring what it says it
does (Golafshani, 2003; Hair et al., 2006; Kripanont, 2007; Twycross and Shields
168
2000). In this research content validity was done as the instrument was read by two
Professors supervising this work. Moreover, pre-tests involving PhD students were
also carried out. The input provided by both the Professors and pre-tests were used
correlating test results with another criterion of interest (Golafshani, 2003; Hair et
al., 2006; Kripanont, 2007; Twycross and Shields 2000). The criterion-related
validity can be either concurrent or predictive (Golafshani, 2003; Hair et al., 2006;
Kripanont, 2007; Twycross and Shields 2000). According to Twycross and Shields
measure against which the new measure can be compared, predictive validity
measures the extent to which a tool can predict a future event of interest. Criterion
Kripanont, 2007; Twycross and Shields 2000) whereby, when the correlation is high,
Construct validity tests the link between a measure and the underlying theory
(Golafshani, 2003; Hair et al., 2006; Kripanont, 2007; Twycross and Shields 2000).
Kripanont (2007) claim that, construct validity can be used to testify to how well the
results obtained from the use of the measure fit the theories around which the test
169
usually measured using a correlation coefficient and the rule of thumb is, when the
correlation is high, the tool can be considered valid. Kripanont (2007) suggests that,
matrix of correlations. In addition, Kripanont (2007) note that, the three most widely
discussed in chapter seven where the survey data is tested for validity as part of
model development.
Convergent validity determines the degree to which two measures of the same
concept are correlated (Hair et al., 2006; Kripanont, 2007). High correlation
indicates that the scale is measuring its intended concept (Hair et al., 2006;
validity (Hair et al., 2006; Kripanont, 2007). Table 5.4 shows that there was one
item with inter-item correlation value less than 0.3, and four items with item-to-total
Based on these results, that is, the Cronbach’s alphas, the inter-item correlations and
the item-to-total correlations as presented in Table 5.4, the questionnaire was proved
to be a reliable instrument for data collection. Variables that caused the low values
170
from the questionnaire. These includes 4 items measuring policy awareness in the
Government policies, one item from support programs, three items that measured
making as part of strategy. After that, the questionnaire was revised before the final
survey was performed. Also, before the final survey was conducted, it was
The next section gives detailed information on how the sample for this research was
Yin, 2009) show that, there are two basic options for a researcher to obtain
census.
ii. Only selected members of the population are questioned or tested. This is
known as sampling.
From the two approaches above, a census can further be explained as a study using
all available elements (members) of a population. Sampling on the other hand may
2009; Kothari, 2004; Saunders et al., 2009; Sophonthummapharn, 2008; Yin, 2009).
The choice between the census method and sampling depends on a number of factors
the major ones being the reasons for the research, the size of the population being
studied, economic reasons and time constraints (Costello, 2009; Kothari, 2004;
Saunders et al., 2009; Sophonthummapharn, 2008; Yin, 2009). Generally, when the
expensive, difficult, and time consuming. Thus, census is conducted only when it is
in research, when the group of interest is too large, containing too many cases,
elements, or members which make it impossible to collect data from all of them
this research sampling procedures were used as it was not possible to collect data
from the entire group of interest given the research time frame and budget.
Figure 5.3 gives a general summary of the sampling process. The sampling
frame, specifying sampling methods, determination of the sample size and selecting
collective of study units for which the values of the variates of interest could possibly
Tanzania were the target population and the owners or managers of these SMEs were
the sampling units. According to the Tanzania Ministry of Trade and Industry
(MIT), in year 2010 there were about 2,679,626 people in Tanzania mainland
who owned and ran micro, small, or medium size business (URT, 2012). Thus,
The sampling frame, also known as the source list or population list refers to the list
from which the study sample is drawn from (Costello, 2009; Kothari, 2004; Saunders
et al., 2009; Sophonthummapharn, 2008; Yin, 2009). The list contains the names of
all items of a universe (in case of finite universe). If the source list is not available,
the researcher has to prepare it (Kothari, 2004; Peou, 2009; Saunders et al., 2009;
Sophonthummapharn, 2008). Peou (2009) note that, the source list should be
impractical to find a complete list of the sampling frame if the target population is very
large and dynamic. A source list drawn from such a population always has some
large (Peou, 2009). Thus, the researcher must take this fact into consideration when
generalizing the research findings to the entire population because if a sample frame
does not fully represent an intended population, this will result in frame error and
affect the degree of reliability of sample result (Costello, 2009; Kothari, 2004;
In this study, it was found that there was no formal comprehensive list of all SMEs in
Tanzania. The study population list was thus created from a combined list using data
obtained from District Directors, the Tanzania Revenue Authority (TRA) database and
the Internet. The use of combination list is a common practise in studies that lack a
174
single comprehensive database from which the population frame can be drawn (Peou,
2009). Given the budget and time frame of this study as well as the type of the
population, a source list of more than 2,679, 626 businesses is considered too big and
The sample size refers to the number of items to be selected from the universe to
2008; Yin, 2009). The size of the sample should reflect the degree of being
representative of the entire population from which it is drawn and how confidently
proven that the larger the sample size, the better researchers can generalize findings
to the population, when other factors such as time and resource constraints are taken
into consideration, it becomes a reality that the size of sample should neither be
excessively large, nor too small but should be optimum (Kothari, 2004; Saunders et
al., 2009; Sophonthummapharn, 2008; Yin, 2009). An optimum sample is one which
Sophonthummapharn, 2008; Yin, 2009). Subjective (Ad hock) methods are less
sophisticated than statistical methods and they generally use the following
175
approaches: The rule of thumb approach e.g. take 5% of the population as the sample
size; conventional approach e.g. use of average of sample sizes used in similar or
other studies; the cost basis approach e.g. use the number that can be studied with
the available funds and use of published tables, which provide the sample size for a
shows that a sample size between 30 and 500 is adequate for most research
(Sophonthummapharn, 2008).
Statistical methods on the other hand are more sophisticated than subjective methods
However, when statistical methods are used to determine the sample size, they
enable the researcher to establish a more precise degree of being representative and
the purpose of the study and population size, three criteria usually will need to be
specified to determine the appropriate sample size: the level of precision sometimes
called the sampling error, the level of confidence or risk, and the degree of
variability in the attributes being measured. Israel (2013) suggests that, for
populations that are very large, equation 5.1 can be used to find a representative
Where
176
When the sample size is known, and is not very large, the literature (Israel, 2013)
Where
When the population is small, the sample size can be reduced slightly (Israel, 2013).
This is because a given sample size provides proportionately more information for a
177
small population than for a large population (Israel, 2013). The sample size can
In this study, the formula of Equation 5.1 was used to calculate the minimum sample
size, since the population of about 2,679, 626 sampling units is considered too large.
and in this research refer to the proportion of computer and Internet adopters
and non-adopters in Tanzania mainland SMEs. Since there were no initial estimates
of and , the worst-case scenario of = 0.5 and = 0.5 was selected. Note
that the value 0.5 (maximum variability) is always assumed if and are not
the research time and budget constraints, precision level (margin error) of ± 5% and a
confidence level of 95% which has a corresponding Z value of 1.96 were selected. It
should be noted that, these values are widely used and accepted in academic and
Thus, from Equation 5.1 the minimum sample size is found as:
Developed Countries (Aikaeli, 2013; Peou, 2009) in this study an estimated response
178
rate of 40% was used and this resulted in an actual sample size of 962.5 which was
adjusted to 1000. Thus, a sample size of 1000 was used in this research.
sampling, the chance of being included in the sample is not known. A probability
samples are the only type of samples where the results can be generalized from the
In addition, probability samples allow the researcher to calculate the precision of the
estimates obtained from the sample and to specify the sampling error (Aikaeli, 2013;
in contrast, do not allow the study's findings to be generalized from the sample to the
must limit the findings to the persons or elements sampled. Detailed explanation of
different types of sampling techniques is found in the literature (Aikaeli, 2013; Israel,
Due to the nature of the study design, both methods of sampling were used to collect
made in the initial phase of the study where multiple case studies were used in
exploratory phase of the research. At that point, the aim was to get some helpful
information that could help shape the main study and not to try generalising case
study findings, and thus purposive sampling was ideal for that situation. In the
survey phase of the study, the main objective was to collect data to be used in the
Arusha, Dar es Salaam, Mbeya and Mwanza were chosen as large primary sampling
units and within these regions, some districts namely; Kinondoni, Temeke, Ilala,
Nyamagana, Ilemela, Sengerema, Arusha City Council, Meru and Mbeya City Council,
were chosen as secondary sampling units. Within each secondary sampling unit, a
sampling frame was made and then a simple random sampling was used to obtain the
The criterion used in the choice for the regions and districts is the fact that these
regions are home to major urban centres in Tanzania where most SMEs are located
(Mbamba 2003, TRA 2013; TRA, 2015, URT, 2012). This allowed for the SMEs to be
easily reached and this reduced research time and cost (Kripanont, 2007; Mbamba
Table 5.5a; show the distribution of the sample into the primary sampling units, that is,
the regions. This distribution was made proportional to the number of SMEs in each
district based on data obtained from TRA and the district director’s offices. According
to the TRA data, Arusha region had about 11, 610 SMEs, Dar es Salaam had about
25,300 SMEs, Mbeya had about 1,146 SMEs and Mwanza had about 4855 SMEs.
Looking at these figures it can be seen that, Dar es Salaam region had more SMEs than
the rest of regions combined together thus Dar es Salaam was given 50% of the
samples. Arusha region had almost twice the number of SMEs compared to Mbeya
and Mwanza combined thus Arusha region was allocated with a half of the remaining
samples, that is, 25% of the total samples. In a similar way, Mwanza was allocated
Table 5.5b, show sample distribution into secondary sampling units that is the different
districts. Proportional distribution was applied again based on TRA data and data
Arusha Meru 50 5%
Ilala 250 25%
Dar es Salaam Kinondoni 150 15%
Temeke 100 10%
Mbeya Mbeya 100 10%
Nyamagana 80 8%
Mwanza Ilemela 20 2%
Sengerema 50 5%
Total 1000 100%
In this research data were collected from nine districts of four regions in mainland
covering letter were hand distributed by the researcher and his assistants to the unit
of analysis, that is, the owners-managers of SMEs. Participation in the survey was
voluntary. Each district had one research assistant and thus a total of nine research
assistants were employed. The research team explained to the respondents that it
was very important that the questionnaire was completed by the person who was in
charge of the firm and not anybody else. Filled questionnaires were again physically
collected from respondents by the research team. During the collection phase of the
questionnaires, whenever possible, the researcher and his assistants checked the just
received questionnaire for any missing data and politely asked for the respondent to
finish filling in any missing data. Although this tactic did not work all the time, it
nevertheless helped a great deal to reduce the volume of missing data and thus had a
method due to difficulties associated with data collection. In this research, the same
technique was used with the aim of improving the response rate.
Data collection commenced on 23rd January, 2014 and went on until 23rd September
2014. Initially, data collection was expected to last for six months only. However,
due to problems encountered on the field, in particular the low response rate, data
collection exercise was extended for three months and thus a total of nine months
One notable problem which made it necessary to extend the data collection time was
the dispute between the Tanzania Revenue Authority (TRA) on one hand and the
business community on the other hand, regarding the use of Electronic Fiscal
Devices (EFD) for aiding revenue collection by TRA. In compliance with the
Income Tax Act, through the Income Tax EFD Regulation of 2012, TRA began the
implementation of the so called second phase of EFD in year 2013 (TRA, 2015).
According to TRA (2015), this phase targeted the following business groups:
i. All businesses/persons that were not VAT registered with an annual turnover
ii. Traders trading in the Region’s prime areas, identified on the basis of rent
payable.
iii. Traders dealing with selected business sectors such as Spare Parts, Hardware,
Soon after the start of implementations, the targeted businesses in many parts of the
comply and called for industrial action. Since then, there have been many attempts
by the government, TRA and the business community to resolve the issue through
negotiations, but up until the time of writing this thesis the dispute has remained
unresolved. From time to time, industrial action by traders in the said areas has taken
place.
The impact of this problem in this research has been enormous since businesses in
this dispute were actually the same businesses that made the population of this
a very hostile way to the researcher and/or his team. These people felt that, the
research (in a way that was not known to them at that time) was related to the TRA
exercise which they detested, since EFDs are ICT devices and the research was about
ICTs. In other instances, the targeted respondents took the questionnaire stayed with
it for long periods and did not attempt to fill in any details; no amount of follow ups
could move these people. In other cases, respondents requested to be paid some
184
amount of money (ranging from TShs 5,000 to TShs 10,000) before they could fill in
the questionnaire. Failure of that, they refused to participate in the survey. This had
a great impact on the response rate for the research, since the research had a limited
Out of the 1000 questionnaires distributed, 599 questionnaires were collected back
out of which, 194 questionnaires were rejected outright as they simply did not
contain any meaningful data. The remaining 405 questionnaires could be used for
one or more type of analyses and thus the initial response rate was 40.5%. The 405
questionnaires were coded and digitised in SPSS and the resulting data set was
named data set1. Data cleaning on the digitised data set1 resulted in a further
removal of 62 entries and data set 2 with 343 cases was realised. This dropped the
response rate to 34.3%. Data set 2 was further analysed in order to get a summary of
useful collected data, the results of which are given in this section. Table 5.6a give a
summary collected survey data from the secondary sampling units (districts) point of
view.
From Table 5.6a it can be seen that the lowest response rate recoded is 8% from
Mbeya City Council while the highest response rate was 62% from Sengerema
District Council. Ilemela District Council had the second lowest response rate of
15% followed by Kinondoni with 26.67%. Temeke District Council had 33%, Meru
District Council had 34% response rate, Ilala 39.6%. Arusha City Council recoded a
185
response rate of 36.5% while Nyamagana District Council recoded the second
Table 5.6b give a summary of the primary (Regions) sampling units. From table 5.6b
it can be seen that the highest response rate 48.67% was recorded in Mwanza
Region. The lowest response rate of 8% was recorded in Mbeya. Arusha region had
a response rate of 36 % while Dar es Salaam had a response rate of 34.4%. The
overall survey response rate of 31.3% was recorded. This response rate is lower than
However, according to Kripanont (2007), a response rate of 30% and above of usable
questionnaire data is acceptable in research. Thus, the recoded 34.3% response rate
times (preferably 10 times or more) as large as the number of variables in the study
could assist SMEs to successfully adopt ICTs and thus it was not supposed to have
more than 20 variables. In that case, a sample size of 343 cases was further justified.
A number of statistical methods were used for data analysis. Each one of these
methods and techniques was meant to individually or collectively address the main
classified in two main groups. The first group was concerned with methods used in
the so called preliminary analysis (Pallant, 2005). These are the kind of analysis that
precedes almost any kind of major statistical analysis. The second group consisted
of the methods used in the development of the ICT adoption model for SMEs. A
summary of the methods for data analysis in this research is given in the next
sections.
187
Preliminary data analysis involved testing for the reliability validity and internal
and the inter-item correlation statistics were used to test and inform on the inter-item
including: the ability to describe the characteristics of the sample; checking variables
for any violation of the assumptions underlying any of the statistical techniques used
and addressing specific objective. In this research, specific objective number three
was answered by descriptive analysis of the data while specific objective number
four was fulfilled by both descriptive analysis and Structure Equation Modelling
(SEM). The results from tests using methods falling under this category are given in
chapter six.
The second group of data analysis methods and techniques involve the methods used
for the development of an ICT adoption model for Tanzania SMEs. This was the
188
main objective of this research. Structure Equation Modelling (SEM) method was
one or more Independent Variables (IVs), either continuous or discrete, and one or
(Tabachnick and Fidell, 2013). Both IVs and DVs can be either factors or measured
et al., 2010; Kripanont, 2007; Schumacher and Lomax 2010; Tabachnick and Fidell
2013). Kripanont (2007) note that, SEM is becoming a method of choice for
sciences.
known as the path model) and the measurement model (Hair et al., 2010). A
structural equation model or path model depicts the structural relationships among
constructs (Hair et al., 2010; Kripanont, 2007). In other words, it relates the
the other hand enables the researcher to use several variables (indicators) for a single
IV or a single DV.
189
The choice of SEM as a method for developing the model in this research was
motivated by the advantages SEM has over other techniques. Kripanont (2007)
observe that, when compared to other multivariate techniques, SEM has four
the data analysis, although SEM can also address the latter approach. SEM
lends itself well to the analysis of data for the purposes of inferential
ii. SEM can provide explicit estimates of error variance parameters, but
iii. Data analysis using SEM procedures can incorporate both unobserved and
observed variables, but the former data analysis methods are based on
multivariate relations, and for estimating point and/or interval indirect effects
whilst there are no widely and easily applied alternative methods for these
kinds of features.
190
Kripanont (2007) identifies three important general strategic frameworks for testing
structural equation models. Strictly confirmatory (SC), Alternative model (AM) and
Model generating (MG) frameworks. This research adopted the Model Generation
scenarios because the researcher could postulate and reject a theoretically derived
model on the basis of its poor fit to the sample data, and could proceed in an
exploratory (rather than confirmatory) fashion to modify and re-estimate the model.
Kripanont (2007), further observes that the primary focus is to locate the source of
misfit in the model and to determine a model that better describes the sample data.
framework, there are two approaches for doing SEM analyses: the two-step approach
and the single step approach. In a two-step approach, the measurement models are
first evaluated to ensure that the items used to measure each of the constructs is
adequate (Kripanont, 2007), before the second step which involves the assessment of
the structural model is made. In the single step SEM analysis, measurement and
The literature (Byrne, 2010; Kripanont, 2007) highly recommend the use of the two-
step approach as it overcome the typical problem of not being able to localise the
source of poor model fit associated with the single-step approach (Byrne, 2010;
191
Kripanont, 2007). When a two-step approach is used, the second step is carried out
only after the measurement models have proven to be proper measures of the
constructs (Byrne, 2010; Kripanont, 2007). This research used, IBM SPSS version
21 for preliminary analysis (chapter six) while as IBM AMOS version 20 was used
evaluation is one of the most difficult and unsettled issues related to structural
equation modelling”. The author of this work notes that, there are many statistics
that are used in evaluation of structural equation models (Arbuckle, 2009; Byrne
2010; Hair et al., 2010; Kripanont, 2007; Tabachnick and Fidell, 2013). These
measures of fit are grouped into different types and each type has its specific
According to the literature (Arbuckle, 2009; Byrne 2010; Kripanont, 2007) the major
a goodness of fit index (GFI) and related measures (Arbuckle, 2009; Byrne 2010;
Kripanont, 2007). Detailed account of these measures is found in the literature such
as Arbuckle (2005- 2009) and Byrne (2010). In Arbuckle (2009) the formulae
related to each fit statistic can be found (Arbuckle, 2009; Byrne 2010). This research
adapts the summary of fit measures by Kripanont (2007) since detailed account of all
of this work. Kripanont (2007) claim that, among the many measures of fit, five
192
popular measures are: Chi-square , the normed chi-square ( /df), Goodness of Fit
Index GFI, TLI, and RMSEA. The meaning of this observation is that, a researcher
is not obliged to use all known fit measures in a study (Arbuckle, 2009; Byrne 2010;
Kripanont, 2007). A brief account of fit measures used in this research and their
parameters (and relatively many degrees of freedom) are sometimes said to be high
in parsimony, while as models with many parameters (and few degrees of freedom)
parsimony is a complex model. Kripanont (2007) note that, “many fit measures
goodness of fit”. Degree of Freedom (DF) is one of the fit measures used in
research.
ratio CMIN/DF and the minimum discrepancy function abbreviated as FMIN are fit
contains the chi-square statistic (Kripanont, 2007; Byrne (2010). The chi-square
statistic is an overall measure of how many of the implied moments and sample
moments differ (Kripanont, 2007; Byrne (2010). The more the implied and sample
moments differ, the bigger the chi-square statistic, and the stronger the evidence
The P value is the probability of getting as large a discrepancy as occurred with the
is a “p value” for testing the hypothesis that the model fits perfectly in the population
select the model by testing the hypothesis to eliminate any models that are not
consistent with the available data (Kripanont, 2007). According to Kripanont (2007),
freedom. For correct models, the ratio should be close to 1 (Arbuckle, 2005-2009;
Byrne 2010; Kripanont, 2007). According to Arbuckle (2009), several writers have
suggested the use of this ratio as a measure of fit. However, Arbuckle (2005-2009)
claimed that, it is not clear how far from 1 the ratio should get before concluding that
fit. Kripanont (2007) recommended the value of 3 which is the one used in this
research.
The literature (Arbuckle, 2009; Byrne 2010; Hair et al., 2010; Kripanont, 2007;
Tabachnick and Fidell, 2013) have acknowledged that, the chi-square ( ) statistic
sensitivity to sample size have led to problems of fit that are now widely known
(Byrne; 2010). It was thus necessary for researchers to look at others that also
support goodness of fit. The fit measures covered in the next sections tries to address
Kripanont (2007) note that, under this category, the Root Mean Square Error of
Arbuckle (2009), when RMSEA is used as a model fit measure the rule of thumb is
that, a value about 0.05 or less indicates a close fit of the model. A value of 0.0
indicates the exact fit of the model (Arbuckle, 2009), while a value of about 0.08 or
According to Kripanont (2007) there are three significant indices in this group.
Normed Fit Index (NFI), Tucker-Lewis coefficient (TLI), and the Comparative Fit
195
Index (CFI). The rule of thumb when using this goodness of fit statistics is that, the
NFI values range between 0 and 1 with 1 indicating a perfect fit (Arbuckle, 2009).
For the CFI, its value is truncated to fall in the range from 0 to 1 and CFI values
close to 1 indicate a very good fit (Arbuckle, 2009). TLI values lies in the range
between 0 and 1. A TLI values close to 1indicate a very good fit (Arbuckle, 2009).
In this group, Kripanont (2007) suggests the use of the Goodness of Fit Index (GFI)
and the Adjusted Goodness of Fit Index (AGFI). The two measures are associated
with Maximum likelihood (ML) and Unweighted Least Squares (ULS) estimation
(Arbuckle, 2009; Kripanont, 2007; Byrne 2010). Byrne (2010) claim that, the GFI
and AGFI can be classified as absolute indices of fit because they basically compare
the hypothesized model with no model at all (Byrne, 2010). Both indices have
values ranging from zero to 1.00, with values close to 1.00 being indicative of good
fit (Arbuckle, 2009; Byrne 2010; Kripanont, 2007). Table 5.7 show the summary of
One of the important things this research wanted to establish was the effect of
achieve this, it was necessary to perform multiple-group analysis using the Analysis
Arbuckle (2009) and Kripanont (2007) provide detailed explanations of how AMOS
performs different tests during modelling and how to interpret the output from these
assumptions must be met before SEM using AMOS can take place. For example,
most multivariate analysis assumes normal distribution of the sample and thus it is
necessary to test for normality of data before analysing the data. Under non-
procedures in order to get valid results (Arbuckle, 1995-2009; Kripanont, 2007). The
next sections address the critical issues to be considered before and during
multivariate data analysis using the methods that has been discussed so far.
According to the literature (Graham, 2012; Hair et al., 2010; Kripanont, 2007; Pigott,
2001; Tabachnick and Fidell 2013) different statistical analyses have different
minimum sample size requirements. Table 5.8 give a summary of sample size
requirements for SEM which was the major analyses carried out in this research.
Note that the sample size for this research was 343 cases and thus from the
is therefore very important to examine the data, before data analysis commence. The
first step in this respect include checking the data file for errors as suggested in the
remove the errors observed. The second step involves the missing data analysis and
the imputation of the missing data. Thereafter, preliminary analyses can be carried
out with the aim of testing for the assumptions underlying the statistical bases for
multivariate analysis. Detailed explanations about these tests are given in the next
sections.
The literatures show that, at some point in their work, all researchers face the
problem of missing quantitative data (Kripanont, 2007; Pigott, 2001; Tabachnick and
Fidell 2013). Pigott (2001) note that, the reasons for missing data are many and
varied. Some of the most common reason for missing data include a case whereby
199
the research respondent refuses or forget to answer a survey question, lost files, or
data are not recorded properly (Pigott, 2001). According to Hair et al. (2010) and
research) in multivariate analysis is twofold. First, the missing data may result in the
reduction of the sample size available for analysis from an adequate sample to an
inadequate sample if the remedies for missing data are not applied. Second, any
statistical results based on data with a non-random missing data process could be
biased if the missing data lead to erroneous results (Hair et al., 2006; Kripanont,
2007). In addition, Arbuckle (2005) note that, in some cases, fitting some models
Four imputation methods for dealing with missing data are identified in the literature
(Graham, 2012; Hair et al., 2010; Kripanont, 2007; Pigott, 2001; Tabachnick and
Fidell 2013). Hair et al. (2010) define imputation as the process of estimating the
missing value based on valid values of other variables and or cases in the sample.
regression imputation
200
Hair et al. (2006; 2010) cited by Kripanont (2007) note that, the identification of an
appropriate method for dealing with missing data is guided by a four steps process.
The first step is to determine the type of missing data, the second step is to determine
the extent of missing data, analyse cases and variables, the third step is to diagnose
the randomness of the missing data processes and the fourth step is to select the
According to the literature (Graham, 2012; Hair et al., 2010; Kripanont, 2007; Pigott,
2001; Tabachnick and Fidell 2013), the application of these methods on a particular
case depends on two things: the nature of missing data and the amount of missing
values (Graham, 2012; Hair et al., 2010; Kripanont, 2007; Pigott, 2001; Tabachnick
and Fidell 2013). Tabachnick and Fidell (2013) further observe that, in missing data
situations, the pattern of missing data is more important than the amount missing.
Tabachnick and Fidell (2013) claim that, missing values scattered randomly through
a data matrix pose less serious problems than non-randomly missing values. On the
other hand, they argue that, non-randomly missing values, no matter how few of
them there are, they pose a serious problem because they affect the generalisability
of results (Tabachnick and Fidell, 2013). Missing data are technically characterised
(MNAR) which stands for Missing Not At Random (Graham, 2012; Hair et al.,
2010; Kripanont, 2007; Pigott, 2001; Tabachnick and Fidell 2013). Missing data
201
that is MAR can be ignored while as missing data that is MNAR is considered as
The rules for selecting imputation methods (Hair et al., 2010; Kripanont, 2007) are
such that:
i. When the missing data is under 10%, any of the imputation methods can be
applied except the complete case method which is the least preferred.
ii. If the missing data is 10% to 20%, the case substitution, and regression are
the most preferable methods if the missing data is MCAR. However, if the
iii. When the missing data is over 20%, and it is considered that imputation is
necessary, the preferred methods are the regression method for MCAR
missing data and the model-based methods when the missing data is MAR
In this research, missing data analysis was done using SPSS Version 21. SPSS
Version 21 has four techniques for determining the randomness of the missing data
and all of them were used in this research. The techniques are: List wise; Pairwise;
techniques are found in the literature (Hair et al., 2010; Kripanont, 2007; Tabachnick
Tabachnick and Fidell (2013) and Pallant (2005) claim that, many statistical methods
are sensitive to outliers. Outliers distort statistics, and thus it is important to identify
outliers and make decisions about what to do with them (Hair et al., 2010;
more variables (Kripanont, 2007). According to Tabachnick and Fidell (2013) there
ii. Failure to specify missing values in the computer syntax so missing values
Tabachnick and Fidell (2013) note that, errors in data entry and missing values
specification can easily be found and remedied. Moreover, if the outlier is due to a
case that should not have been sampled, it can be deleted once detected (Hair et al.,
2010; Tabachnick and Fidell, 2013). However, deciding what to do with outliers
difficult (Tabachnick and Fidell, 2013). To retain a beneficial outlier, the researcher
203
must alter the values on the variables so that impact of the case is reduced
The literature (Hair et al., 2010; Kripanont, 2007; Tabachnick and Fidell, 2013)
distance and the ratio were used to test the data for the presence of multivariate
outliers. Mahalanobis distance is the distance of a case from the centroid of the
remaining cases where the centroid is the point created at the intersection of the
According to the literature (Tabachnick and Fidell, 2013; Peou Chea, 2009),
outlier if the maximum Mahalanobis distance exceed the critical chi-squared value
and Fidell, 2013; Peou, 2009). Alternatively, the ratio can be used to detect
the presence of outliers in data (Hair et al., 2010; Kripanont, 2007). Hair et al.
Once detected, outliers must be analysed in order to determine their usefulness in the
analysis (Hair et al., 2010). If outliers are found to be useful, they must be retained.
However, if outliers are found not useful, they must be deleted (Hair et al., 2010).
Hair et al. (2010) observe that, although many philosophers offer guidance of how to
deal with outliers, their recommendation is that the outliers be retained if they
represent observation from the intended population (Hair et al., 2010; Peou, 2009;
Tabachnick and Fidell, 2013). It should be noted that, while as deleting outliers
improve the analysis; on the other hand, deleting outliers reduces the sample size and
compromise the generalisability of results (Hair et al., 2010; Tabachnick and Fidell,
methods (Hair et al., 2010). Many statistical techniques assume that the distribution
of scores on the dependent variable is normal. Thus, it is very important to test data
for normality before applying statistical analysis methods. Kripanont (2007) and
Hair et al. (2010) note that, although some robust statistical techniques are less
affected when violating certain assumptions, but in all cases complying with some of
similar note, Tabachnick and Fidell (2013) claim that, screening continuous variables
particularly when inference is a goal. They further argue that, although normality of
205
the variables is not always required for analysis, the solution is usually quite a bit
better if the variables are all normally distributed (Tabachnick and Fidell, 2013).
Hair et al. (2010) claim that, multivariate normality is the most fundamental
data distribution for an individual metric variable and its correspondence to the
normal distribution (Hair et al., 2010). The literature (Hair et al., 2010; Tabachnick
and Fidell, 2013) identify graphical and statistical as methods of assessing normality.
In addition, Skewness and Kurtosis are identified as the two measures used to
evaluate normality (Hair et al., 2010; Tabachnick and Fidell, 2013). Kurtosis refers
Skewness on the other hand explains the symmetry of the distribution (Hair et al.,
When the data under consideration is normally distributed, the values of skewness
and kurtosis are zero (Hair et al., 2010; Kripanont, 2007; Pallant, 2005; Tabachnick
and Fidell, 2013). If, however a positive skewness value is observed, it indicates a
left skewed distribution whereas a negative skewness value indicates a right skewed
distribution. For the Kurtosis measure, a positive value shows a relatively peaked
distribution while a negative value shows a relatively flat distribution (Hair et al.,
The literature (Hair et al., 2010; Kripanont, 2007; Tabachnick and Fidell, 2013)
substantially skewed distribution, while the closer the value is to zero the greater the
206
variables’ normality. For the Kurtosis measure, values less than 1 are negligible;
values from one to ten indicate moderate non-normality while values greater than 10
indicate severe non-normality (Hair et al., 2010; Kripanont, 2007; Tabachnick and
Fidell, 2013)
Byrne (2010) observes that, although sample data may be univariate normal (or
moderately univariate non-normal), the multivariate distribution of the data can still
be multivariate non-normal. In addition, Byrne (2010) note that, of the two measures
for assessing normality of data, that is Skewness and Kurtosis; it is the multivariate
Kurtosis statistic that indicates the extent of departure from multivariate normality.
Thus, the Critical Ratio (C.R) value for the Kurtosis measure is also used to inform
on the multivariate normality of data under test (Arbuckle, 2009; Byrne, 2010).
According to Arbuckle (2009) and Byrne (2010), C.R values above 5 are an
The literature (Arbuckle, 2009; Byrne, 2010), acknowledge the sensitivity of SEM
2010; Kripanont, 2007). In such scenarios, the use of bootstrapping methods or the
use of other estimation methods may be justified (Arbuckle, 2009; Byrne, 2010;
Kripanont, 2007). In this work, tests and results about the multivariate normality of
(MANOVA) work effectively when the dependent variables are only moderately
correlated (Kripanont, 2007). When two or more explanatory variables are highly
2008; Tabachnick and Fidell, 2013), multicolinearity and singularity cause both
logical and statistical problems. For example, Sophonthummapharn (2008) note that,
before some statistical analyses such as MANOVA are performed (Kripanont, 2007;
In a similar note, Kripanont (2007) recommends testing the data for multicolinearity
singular, they contain redundant information and they are not all needed in the same
208
analysis. This means some of the multicollinear variables can be deleted from the
multicolinearity. They suggest that, if the only goal of analysis is prediction then
multicolinearity can be ignored (Tabachnick and Fidell, 2013). Another option is, to
combine the multicollinear variables and form a composite variable if the variables
are measuring the same construct (Tabachnick and Fidell, 2013). In addition, the
researcher can compute principal components and use the components as the
predictors instead of the original variables (Tabachnick and Fidell, 2013). A final
Tabachnick and Fidell, 2013) shows that, multicolinearity can be assessed by looking
at the sample correlation. If the value of sample correlation between any two or
more indicators exceeds 0.80, then the variables are said to be multicollinear
(Kripanont, 2007; Tabachnick and Fidell, 2013). Tabachnick and Fidell (2013) note
that, in some cases, correlations from 0.7 and above between variables can be a
matter of concern. In this research data was tested for multicolinearity. Details of
This chapter has presented the research design and methodology used in this study.
All critical issues that have impact on the outcome of the research have been
discussed and explanations given as to what motivated the decisions made. After
determining the type of research and the philosophical standing of the researcher,
details of the research instrument development and testing have been provided. Data
collection procedures and the challenges faced during data collection together with
the impact of the challenges on the research outcome have also been explained.
Finally, data analysis methods and their considerations were made. Results of this
CHAPTER SIX
6.1 Introduction
This chapter provides results of some of the analyses carried out in this research.
Analyses commence with the so called preliminary data analyses. These are the
analyses that are (almost always/ mandatory) carried out first before other types of
data analyses can take place. For example, in any research, it is always necessary to
perform data cleaning and missing data analysis before other types of analyses can be
At this point it should be noted that, while a lot of analyses were possible with the
obtained survey data, the main objective was to develop a model of ICT adoption and
use by Tanzania SMEs. That being the case, only the analyses that complimented
model development or the ones that addressed fully or partially specific objectives of
the research were carried out. Two specific objectives are addressed in this chapter.
Specific objectives number three is fully addressed here while specific objective
number four is partially addressed. The two specific objectives were respectively
stated as:
of the sample, statistics on ICTs adoption in SMEs, statistics on post adoption use of
ICTs by the SMEs, and the statistics on the influence of ICT adoption on SMEs
performance.
Missing data analysis was performed using SPSS version 21. The results for this
analysis show that the missing data were less than 5% for all variables involved (See
Appendix IB). Moreover, using Little’s MCAR test, the pattern of missing data was
percentage of missing data and the fact that the missing data was not MCAR justified
the use of multiple imputation method for dealing with missing data. Multiple
After imputation, a complete data set with 343 cases was realised. Prior to other
analyses, the values of all negatively stated variables (variables F1-F16 and G1-G9)
were transformed in order to ensure that all variables in the data had the same
positive direction (Peou, 2009). After this transformation, other analyses continued.
In this research, Mahalanobis distance was used to test the data for the presence of
software, all variables in the survey (89 variables) data with a sample size of 343
cases were tested for outliers. In SPSS, Mahalanobis distance values are obtained as
residuals statistics in linear regression analysis. The results of this test are presented
in Table 6.1. Note that, in this regression analysis, for convenience, questionnaire
IDs was used as the dummy Dependent Variable (DV) because multivariate outliers
Fidell, 2013). According to Tabachnick and Fidell (2013), the remaining variables
From Table 6.1 it can be seen that the minimum Mahalanobis distance value is
11.759 and the maximum Mahalanobis distance value is 247.350. The critical Chi-
square value (Obtained from Chi square distribution Tables) given the degrees of
found to be = 135.978. Thus, all variables in the data with Mahalanobis distance
criterion, in this analysis it was discovered that 68 cases had variables that were
possible outliers.
Residuals Statisticsa
Minimum Maximum Mean Std. Deviation N
Predicted Value -41.14 414.65 202.06 100.536 343
Std. Predicted Value -2.419 2.115 .000 1.000 343
Standard Error of 14.153 62.446 35.615 11.195 343
Predicted Value
213
Further analysis of the potential outliers revealed that, 2 cases did not meet the SME
criteria and thus were considered not part of the intended population. These were
outright deleted and the sample size was reduced to 341 cases. The remaining 66
observed potential outlier cases were part of the intended population and thus were
retained.
Based on the ratio criterion, there were no suggestion of the presence of outliers
in the data since = 247.350/89 =2.77 did not exceed the threshold of 3 or 4 for
large samples (Hair et al., 2010; Kripanont, 2007). Therefore, although, some cases
demonstrated the characteristics of outliers, they were not extreme cases according to
the value of which did not exceed the threshold value. It was thus not necessary
to delete the 66 observed cases from the sample as recommended by Pallant (2005).
In this way, Outliers in the data were detected analysed and retained or deleted as
214
advocated by the literature (Hair et al., 2010; Peou, 2009; Tabachnick and Fidell,
2013). Finally, a dataset with 341 cases remained for further analyses.
Results for reliability analysis are given in Table 6.2. It can be observed from Table
6.2 that, all internal consistency reliabilities based on Cronbach’s alphas for
measurement items (all interval scales) were higher than 0.8 except in two cases
within the Government Policies scale where the Cronbach’s alphas were 0.786
(which is acceptable) for the Taxes and Tariffs sub-scale and 0.585 for the support
infrastructure sub-scale.
However, when the two sub-scales were combined the Cronbach’s alphas became
0.844 which was good. According to Kripanont (2007), higher values of Cronbach’s
alphas (0.7 and above) indicate the items in each set (concept) are positively
correlated to one another and that items in each set are independent measures of the
Therefore, in this case, Table 6.2 results confirm the accuracy of the main survey
For the internal consistence measures, this research used the inter-item-correlation
and the item-total-correlation. From Table 6.2, one item in the Organisation Factors
recoded a value of 0.226 for the inter-item-correlation, which is less than the
threshold of 0.3 (Kripanont, 2007). One variable E4 was removed from the scale and
the minimum inter-item-correlation for the strategy sub scale improved to 0.38. For
the item-total-correlation measure a value below the threshold of 0.5 was recorded
for the Government Policies sub-scale. Kripanont (2007) recommends that, the item-
total-correlation exceeds 0.5. However, when the sub-scales were combined into a
single scale, the minimum acceptable item-total-correlation was achieved. Thus, the
216
overall result for reliability test as presented in Table 6.2 prove that, the
Table 6.2 shows the convergent analysis results for this study. From Table 6.2, only
one case has inter-item-correlation of less than the threshold value of 0.3. The
only one case has a value below the threshold value of 0.5. The remaining cases
have high values than the threshold. These results ascertain the convergent validity
of the instrument used in this study. The two cases with low values were omitted in
model development.
In this research, Skewness and Kurtosis were used to test survey data for normality.
The background details of the two measures were covered in section 5.11.3. In
section 5.11.3, it was explained that multivariate normality is the most fundamental
assumption in multivariate analysis. Thus, bearing this in mind and the sensitivity of
SEM analyses on the multivariate non-normality of data, it was necessary to test the
Appendix IIB Table 1 shows the results from measurement model 3 variables where
it is found that the variables have a Kurtosis value of 124.053 and Critical Ratio
217
value of 50.719. These values suggested that the survey data is highly multivariate
nonnormal. Appendix IIB Table 2 reports Kurtosis value of 71.106 and Critical
Ratio value of 33.245 for variables of the developed model. The non-normality of
data in this research justified the use of Bollen-Stine bootstrap method during model
service and general trading sectors and thus at this point, all information that was not
given by the owner-manager were already filtered out. Further analysis such as the
test for outliers helped to prune out all cases that did not fit the rest of research
criteria. From Table 6.3, Figure 6.1 and Figure 6.2 it can be observed that, the
surveyed firms fit Tanzania’s definition of SME (see section 1.2.5) by 100% both in
terms of the capital investment criteria and by the number of employees’ criteria.
The surveyed SMEs were from the service sector 60.64% and general trading sector
degrees and 33.53% had college diplomas. The rest of the respondents were
advanced level secondary school. The remaining 9.62% of the respondents were
Looking at the age of the surveyed firms, it was observed that 29.45% had been in
business for a period of between 1 and 5 years (start-ups). 33.53% had been in
business for a period between 6 and 10 years, 28.57% between 11 and 20 years,
221
7.87% had been doing business for between 21 to 30 years, while 0.58% has been in
In this section and analysis of ICT adoptions in the surveyed firms is made. The
ICTs studied in this research are computers and the Internet, which include
connectivity here simply referred to as the Internet, the website and email
these technologies in this research. Further analysis is given the next sections.
From the survey data (Appendix II-C Table 1) it was observed that, 75.4% of the
SMEs have computers that are used on daily basis. 4.1% have computers that are
used on weekly basis and 0.6% of the surveyed firms had computers used at least
respondents (62 cases) who know about the technology but have not adopted and
1.8% (6 respondents) who do not know about the technology at all. Figure 6.3 give a
pictorial overview of computer adoption and frequency of use in the surveyed SMEs.
Overall there were 273 (80.1%) adopters and 68 (19.9%) non-adopters of the
computer technology as depicted in Table 6.4. In addition, it was also observed that
34.6% of computer adopters had their computers networked as shown in Table 6.5.
222
Table 2 of appendix II-C shows adoption and frequency of use of the internet. Out of
341firms, 224 (65.7%) were reported to have adopted and used the Internet on daily
basis, 9 firms (2.6%) had adopted and used the Internet on weekly basis while 2
respondents (0.6%) claimed to use the Internet at least once every month. 104 firms
respondents (0.6%) claimed not to know the technology at all. Overall 235
(31.1%) could be categorised as non-Internet adopters. Table 6.6 and Figure 6.4 give
Analysis results for website adoption are provided by Appendix IIC Table 4, Figure
6.5. and in Table 6.7. From appendix II-C Table 3, 181 firms which is equivalent to
53.1% have a company website that is used on a daily basis, 11 firms (3.2%) have a
website that is used at least once in a week and 1 firm (0.3%) that has a website that
firms (49.5%) with owners-managers who know about the technology but
nonetheless have not adopted and 5 firms (1.5%) that has owners-managers that do
not know about the website technology. Overall, there were 193 firms (56.6%) that
have adopted the website technology and 148 (43.6%) non-adopting firms as
Email adoption in Tanzania SMEs follow a similar pattern like the Internet and
computer technologies in that it appears there are more ICT adopters in Tanzania
Appendix II-C Table 4, Figure 6.6 and Table 6.8. According to Appendix II-C Table
4, 237 (69.5%) firms out of 341 have Email that is used on daily basis, 9 firms
(2.6%) have Email that is used on weekly basis and 2 firms (0.6%) have Email that is
used at least once in a month. 88 firms (25.8%) have owners-managers that are
aware of the Email technology although they have not adopted the technology and
5firms (1.5%) have owners-managers that are not even aware of the technology.
From Table 6.6 it can be seen that overall there are a total of 248 (72.7%) firms that
226
have adopted the Email technology while 93 firms (27.3%) can be categorised as
Email non-adopting firms. Figure 6.4 give a summary of adoption and frequency of
In this section, the analysis of how the surveyed firms use adopted ICT is made. In
particular, the analysis seeks to investigate and explain if Tanzania SMEs use ICT to
gain competitive advantage over their competitors. The rationale for this type of
analysis is based on the literature (Galloway and Mochrie, 2005; Harindranath et al.,
2008; Modimogale, 2009) which has shown that, adoption of ICTs is not prolific by
competitiveness of SMEs actually depends on the way in which ICTs are used to
support the business process (Modimogale, 2009). To clarify the issue further,
Modimogale (2009) categorised ICT adoption and use into three groups: The general
user ICT group; Production Integrating ICT group and the Market Oriented ICT
group. In this work, the three ICT grouping by Modimogale (2009) were used as a
The general user ICT group is a one that has implemented basic ICTs such as stand-
alone computers, the email and the Internet (Modimogale, 2009). The adoption rate
According to Modimogale (2009), this is considered as the entry point into to the
new economy and ICTs are mostly used to meet specific business needs such as
The Production Integrating ICT group is a more advanced group than the general
user ICT group (Modimogale, 2009). Modimogale (2009) note that, ICTs in this
group would form part of the strategic plans of a business for achieving business
The Market Oriented ICT group relates to marketing aspect of the company and is
Murtaza, 2010; Jannex et al., 2004; Modimogale, 2009; Pavic et al., 2007) and some
websites can even allow e-commerce to take place, meaning, orders can be made and
almost anywhere in the world (Ashrafi and Murtaza, 2010; Jannex et al., 2004;
Survey results on the use of computers are presented in this section. Data analysis
reveal that, use of computers which is consistent with good practise as explained in
section 4.1.5.1 of this thesis, is above 44% of surveyed firms. To be more specific,
58.1% of surveyed firms (Table 6.9a) show that, use computers for all accounting
activities. 52.8% firms (Table 6.9b) use computers for market research, while 48.4%
of surveyed firms (Table 6.9d) use computers for business transactions using
software packages. Finally, 44.9% of all surveyed firms claimed to use computers for
According to the literature (Chung, 2006; Mehrtens, 2001; Modimogale, 2009), the
results for Internet usage in this research show that, 60% of the respondents (Table
6.10a) use the Internet (email) for external communications, 55.7% of respondents
(Table 6.10b) use the Internet for obtaining information from suppliers, 52.2% of
respondents (Table 6.10c) use the Internet for sending purchase orders to suppliers,
and 53.7% of respondents (Table 6.10d) use the Internet for product and market
research. In addition, 53.4% of the respondents (Table 6.10e) use the website
6.10f) use the company website to receive orders from customers. It is also seen
from the results (Table 6.10g) that, 36.1% of the respondents were able to offer
measures looked here includes profit, market size and the ability of firms to innovate.
Analysis result show that, 49.6% of the surveyed firms attribute their profit to
computer adoption (Table 6.11a) and 44.9% of the surveyed firms attribute their
In terms of increase of market share due to ICT adoption, 47.5% of the firms
attributed their market share increase to computer adoption (Table 6.11d) while as
48.1% of the surveyed firms attributed their market share increase to Internet
adoption (Table 6.11c). In addition to the market share, 53.4% of the firms recoded
the emergence of new processes that enhance efficiency (Process Innovation) due to
computer adoption (Table 6.9e) while 48.7% of the surveyed firms attributed their
research (Behitsa et al., 2010; Isaya, 2009; Mbamba, 2004; Muttayabalwa, 2007;
Naul, 2012; URT, 2012; Souter et al., 2007) which showed very low usage of ICTs
in SMEs, the findings of these analyses show that, by year 2014, computer adoption
by SMEs in the service and trading sector had reached 80%, (See Table 6.4); Internet
adoption had reached 68.9%, (Table 6.6); website adoption had reached 56.6%,
(Table 6.7); and email adoption had reached 72.7% as depicted by Table 6.8. These
findings point to remarkable and rapid growth in adoption and usage of ICTs in
The research findings regarding ICT use in Tanzania SMEs show that, about 53% of
the surveyed firm’s respondents were shown to use the ICTs in a manner consistent
with the Market Oriented ICT group as suggested by Modimogale (2009). This is
supported by the fact that 53.7% of these firms were able to use company websites to
235
conduct product and market research, (Table 6.10d), 53.4% were able to offer
product information to their customers, (Table 6.10e) and 53.1% were able to receive
orders from customers (Table 6.10f). On a similar note, it is observed that (Table
6.10g), about 36.1 % of the surveyed SMEs could offer online payment options.
These observations confirm the emergence of e-commerce within the SME sector in
Tanzania as suggested by Yonazi (2012) and explained in section 2.3.3 of this thesis.
Post adoption performance evaluation of the surveyed firms present evidence to the
effect that by early 2014, about 48% of surveyed SMEs were using ICTs in a manner
(2009) since the firms managed to achieve process innovation as depicted by Table
6.11e and Table 6.11f. Further post adoption analyses show that, by early year
2014, about 47% of SMEs in Tanzania were using ICTs in a way that allowed the
performance in terms of increase in profit and market size as a result of ICT adoption
and use. (See Table 6.11a, Table 6.11b Table 6.11c and Table 6.11d). This
observation suggests that, for firms that are competitive, there is a positive and direct
On the other hand, it is also imperative to point out that, more than a half of the
SMEs that had adopted (See Table 6.11a, Table 6.11b Table 6.11c and Table 6.11d)
were not using ICTs in a productive way since they did not report any improvement
in their performance despite having adopted ICTs. These observations augur well
of ICTs by firms does not necessarily give a firm competitive advantage. He claims
that, what ICTs does is to give firms the ability to be competitive (Modimogale,
2009). In other words, competitiveness is a product of how the firms use ICTs. The
literature (DBIS, 2014; Gunday et al., 2009; OECD, 2005) show that, innovation is
key for firms to become competitive. This notion is supported by this research
finding as we are seeing about 48% of firms that are innovative and about 47% of
firms that are competitive. Thus, it can be said that, the majority (53%) of SMEs in
Tanzania are not using ICTs to gain competitive advantage over their competitors
In view of the analyses made and the descriptive statistics presented in section 6.7.3
section 6.7.4, and section 6.8, the requirements of the two specific objectives were
met. The statistics provided give a full and clear picture about the status of ICTs
adoption and use in Tanzania SMEs. This address fully specific objective number
three which sought to establish the status of ICT adoption and use in Tanzania SMEs.
The specific objective number four of this research sought to establish the influence
specific objective, it can be seen from the analysis results that, about 47% of
performance. The author notes that, the observed relationship is based on how ICTs
are used by the SMEs. That is, SMEs that managed to be innovative using ICTs,
became competitive and recorded good performance. Therefore, it can be said that,
adopted ICTs when used in the right way has a direct positive relationship with
firm’s performance. In other words, the more the firm innovate using ICTs, the
237
higher the firm performance is expected to be (DBIS, 2014; Gunday et al., 2009;
OECD, 2005). This relationship is further analysed and concluded in chapter seven
This chapter has presented results from preliminary analysis and descriptive analysis.
Preliminary analysis addressed the missing data issue. In addition, the reliability and
internal consistence of the instrument and constructs were tested and found to meet
the criteria acceptable in research of this nature. Moreover, the data was tested for
normality and outliers were detected and dealt with. All this was done so as to
Descriptive analyses carried out were all aimed at fulfilling the requirements of
specific objectives number three and specific objective number four of this research.
Thus, reported statistics inform on the status of ICT adoption and use by Tanzania
SMEs. IT is noted that in the time frame between year 2004 and year 2014, there has
been a remarkable and rapid growth of ICT adoption and use by Tanzania SMEs. In
addition, the statistics also explain the effect ICT adoption and use has on SMEs
performance, when ICTs are used in the right way. It should be noted that, many
other analyses were possible with the survey data. However, since those analyses
were not the focus of the study, they will be addressed in other publications related to
CHAPTER SEVEN
7.1 Introduction
In chapter six, the characteristics of SMEs from the service sector and the general
trading were explored. In particular, the analysis on the current status of ICT
adoption and use in Tanzania SMEs was made. In so doing, specific objective
number three was fulfilled. Specific objective number one and specific objective
number four were also partially achieved in chapter six. In this chapter, the research
main objective which is to develop a model of ICT adoption by SMEs together with
Thereafter, using survey data, confirmatory and exploratory factor analyses are
performed. That way, the ICT adoption model for SMEs in Tanzania is generated
and validated. It is anticipated that, the generated model together with its
interpretation will encourage SMEs in Tanzania to adopt and use ICTs in the manner
effect of government policies on ICT adoption and the post adoption performance
Equation Modelling (SEM) was used in this phase of model generation. The
validity analysis. These tests are performed in order to determine the suitability of
recommended by the literature) was used (See section 5.10.2). Three measurement
models were separately evaluated first before the evaluation of the final model.
model two evaluated the endogenous latent constructs and measurement model three
evaluated all latent variables. Finally, the structural model was evaluated and testing
of the hypotheses ensued. In the next sections, detailed information about the
As depicted by Figure 4.1, the proposed model has a total of six latent constructs (or
factors). According to the literature (Byrne, 2010; Hair et al., 2010; Kripanont, 2007;
Schumacker and Lomax 2010; Tabachnick and Fidell 2013) latent constructs
(factors) refer to variables that cannot be measured directly. Instead, latent factors are
240
questionnaire or from some type of observation (Byrne, 2010; Hair et al., 2010;
Kripanont, 2007; Schumacker and Lomax 2010; Tabachnick and Fidell 2013). In
other words, measured variables are used as the indicators of latent constructs.
Kripanont (2007) observe that, indicators are associated with each latent construct
and are specified by the researcher (Byrne, 2010; Hair et al., 2010; Kripanont, 2007;
Out of six latent constructs, four constructs were exogenous constructs and two
construct in the model (Byrne, 2010; Hair et al., 2010; Kripanont, 2007). The
Factors, Economic Factors, and Government Policies that are studied as moderators
in this research. For the endogenous constructs, these are latent, multi-item
equivalents to dependent variables (Byrne, 2010; Hair et al., 2010; Kripanont, 2007;
Sharma, 1996; Tabachnick and Fidell 2013). They are thus constructs that are
affected by other constructs in the model (Byrne, 2010; Hair et al., 2010; Kripanont,
2007; Sharma, 1996; Tabachnick and Fidell 2013). Kripanont (2007) note that, the
literature.
241
Generally, the literature (Byrne, 2010; Hair et al., 2010; Kripanont, 2007; Sharma,
1996; Tabachnick and Fidell 2013) acknowledge that, the number of observed
variables has an impact on many statistical analyses. That is, the bigger the number
of observed variables, the bigger the sample size will have to be (Stevens, 2002).
Stevens (2002) noted that, in a standard ordinary least squares multiple regression
analysis, 15 cases per predictor is considered adequate. Based on the argument that
recommends that, 15 cases per measured variable in SEM should be taken as the rule
of thumb.
Table 7.1 give a summary of the model latent constructs and the number of indicators
used for both exogenous constructs and endogenous constructs. At this point it
should be noted that, all factors that did not meet the requirements for reliability and
internal consistence analysis (See section 6.1.1 and Table 6.1) were omitted from the
analyses of this stage. In addition, other factors from the questionnaire that were
meant for descriptive analyses only were also not considered in SEM analysis. Table
7.1 show that there is a total of 64 observed variables, with 41 variables measuring
Taking into consideration for the rule of thumb of 15 cases for each observed
dataset) than what was available (see chapters 5 and 6) was needed for this
modelling. However, prior to model generation by using SEM and AMOS, all
factors were analysed for their suitability in the final model and thus the number of
factors in the final model met the sample size requirements. This analysis fulfilled
the requirements of specific objective number one, which sought to analyse the
In chapter six it was noted that the research data is not multivariate normal. The non-
normality of data made the use of Bollen-Stine bootstrap method during model
development necessary. When used, this bootstrap method produces the Bollen-
value may become unreliable. In the next two sections, detailed account of other
tests that are a pre-requisite to model generation by SEM technique that were not
covered in chapter six is given. In particular, these tests aim to establish the
Hair et al. (2010) define reliability as “the extent to which a variable or a set of
measurements are taken, the reliable measures will all be consistence in their values
the internal consistency of a set of measures rather than the reliability of a single
variable (Kripanont, 2007). Construct reliability captures the degree to which a set
of model parameters. Kripanont (2007) further note that, the construct reliability
measure has wide applicability because it can be computed for the construct (s) in a
model, confirmatory factor analysis or path model with latent variables (Kripanont,
2007). Kripanont (2007) also note that, model based estimates of reliability can be
found by looking at either the Squared Multiple Correlations (SMC) for the observed
variables, or the variance extracted estimate. In this research, the SMC (also referred
According to Tabachnick and Fidell (2013) SMC is the squared multiple correlation
variables in multiple correlation. Kripanont (2007) note that, when SMC is used as a
measure of construct reliability, the cut off point for an acceptable indicator variable
is a one that has SMC of 0.3. Kripanont (2007) further recommends that a good
Table 7.2 show the SMC for all the 41 observed variables for the exogenous
constructs. From table 7.2 it can be observed that a total of 11 (as highlighted in
Table 7.2) variables measuring the three exogenous latent constructs had a SMC less
than the recommended 0.5. These variables were (deleted) excluded from further
SEM analysis in order to improve model fit to the data. Observable variables that
remained after the removal of factors that failed the SMC test included variables D1-
D12 measuring the Personal Factors (PF) latent construct, variables E7-E12
measuring the Organisation Factor (OF) latent construct and variables F7-F15
measuring the Economic Factors (OCF) latent construct. The three moderating
Table 7.2: The SMC for the 41 Indicators Measuring Exogenous Constructs
F1 .363 F3 .187
F2 .354
The SMC for the indicators measuring the two endogenous latent constructs are
shown in Table 7.3. From Table 7.3 it can be seen that, out of 23 observed variables
for the two endogenous latent constructs only one variable had SMC less than 0.5.
This variable (C1) was also deleted from further SEM analysis for the same reason of
improving model fit to data. The remaining variables for the endogenous constructs
included variables C2-C13 measuring Adoption (AD) construct and variables H1-
Table 7.3: The SMC for the 22 Indicators Measuring Endogenous Constructs
H1 .749
remained for SEM analysis. Out of the 52 indicator variables, 27 were measuring the
three exogenous latent constructs while 22 were measuring the two endogenous
covariance, and implied (all variables) correlations of the survey data after deletion
of variables with low SMCs, was determined and recorded as shown in appendix
constructs.
Appendix III-A Table 1 show the sample correlation for the 27 variables used to
measure the three exogenous latent constructs. From appendix III-A Table 1 it is
seen that only variables D1, E9-E12 and F15 were not highly correlated with other
variables. The rest of observed variables were highly correlated and this proved the
Appendix III-B Table 4 show the sample correlation for the 22 variables used to
measure the two endogenous latent constructs after removal of variables with low
SMC. Like for the exogenous variables, there was evidence of multicolinearity for
C12, C13, H5 and H10 were not highly correlated with any variable.
The presence of multicolinearity in the data made it necessary for further analysis of
the variables in order to determine their usefulness in the SEM analysis. This was
models.
Table 7.4: Summary of Highly Correlated Variables for the Three Exogenous
Latent Constructs
Table 7.5: Summary of Highly Correlated Variables for the Two Endogenous
Latent Constructs
Hair et al. (2010) define validity as “the degree to which a measure accurately
represents what it is supposed to”. Kripanont (2007) note that, validity is the
accuracy of a measure, and exists when the measure is a perfect representation of the
constructs that are theoretically different should in reality be different from each
other (Guo et al., 2008; Kripanont, 2007). Discriminant validity reflects the extent to
which the different constructs in a model are different (Kripanont, 2007). In other
et al., 2008). Therefore, discriminant validity test is performed in order to show that
measures or concepts that are supposed to be unrelated are, in fact, not related (Guo
Kripanont (2007) note that, Structural equation modelling techniques can be used to
2007). In addition to the correlation analysis, pattern and structure coefficients can
empirically distinguishable (Kripanont, 2007). These two methods were used in this
noted that, the structure coefficients are generated in AMOS output in the “all
analysis in SEM, there should be no more than five constructs under investigation at
a time. In this research, due to the large number of observed variables involved,
discriminant validity analysis was done in two phases. Phase one involved the
analysis for the exogenous latent constructs (here referred to as the measurement
model one) and endogenous latent constructs (here referred to as the measurement
model two) separately. In phase two, all five constructs for the model were analysed
together and this model is here referred to as the “measurement model three”. The
In section 5.11.4 the fact that some statistical analyses are sensitive to
from SEM analysis, that is, if the sample correlation between the two indicators
covariance between two indicators, in order to determine the correct model. The
literature (Arbuckle, 2009; Kripanont, 2007) note that, with correct model, most
standardised residuals should have an absolute value less than 2. Byrne (2010) claim
that, the maximum allowable absolute value for standardised residuals covariances is
2.5 (Byrne, 2010). Taking into account the level of multicolinearity between
exogenous variables (See Table 7.4 and Appendix III-A Table 1) and the number of
variables that had standardised residual covariance above 2 (Appendix III-A Table 2)
251
the correct measurement model one for the exogenous latent constructs was
variables were highly correlated with more than one variable (See Table 7.4 and
Table 7.5) it was also necessary to choose a pair of factors that described the
model one, discriminant validity analysis was carried out for the exogenous latent
variables.
Table 7.6 show the correlation between the three latent constructs. The construct
standardised estimates are requested as part of the output (Arbuckle, 2009; Hair et
al., 2010; Kripanont, 2007). From this output, it can be seen that the three latent
variables were different since the correlation between them was less than 0.8. The
factors).
Table 7.7 depict the pattern and structure coefficients (implied correlations for all
variables) of the three constructs in measurement model one. The pattern and
structure coefficients are calculated and generated by AMOS when all implied
252
moments are ordered as part of AMOS output (Arbuckle, 2009; Hair et al., 2010;
Kripanont, 2007). In this case, it can be seen that observed variables load strongly
on the latent construct they are supposed to measure and less on the other constructs.
Thus, the pattern and structure coefficients confirm discriminant validity of the three
Analysis of the standardised residual covariances showed that, the absolute value of
standardised residuals between all variables (after deleting offending variables) was
less than 2 as depicted in Table 7.8. This suggested that the measurement model was
correct.
Table 7.7: Implied (for all remaining variables) Correlations for Three
Exogenous Latent Constructs for Investigating Discriminant
Validity
The measurement model one for the three exogenous latent constructs is depicted in
Figure 7.1. The literature (Arbuckle, 2009; Byrne 2010; Hair et al., 2010; Kripanont,
2007; Tabachnick and Fidell, 2013) have detailed information on how AMOS and
254
SEM outputs are interpreted. A summary of fit measures for this research are
For the model presented by Fig 7.1, fit statistics CMIN (Chi-square) = =44.627,
0.05) and CMIN/DF ratio =1.859, indicated a very good fit of model to data. In
addition, taking into account the fact that chi-square statistic is very sensitive with
samples size (Kripanont, 2007; Arbuckle, 2009; Hair et al. 2010, Tabachnick and
Fidell, 2013; Byrne 2010) other fit measures were considered as recommended by
the literature (Kripanont, 2007; Arbuckle, 2009; Hair et al. 2010, Tabachnick and
Fidell, 2013; Byrne 2010). These statistics RMSEA = 0.050, TLI=0.985, CFI =
0.990, NFI = 0.979, GFI = 0.972, AGFI = 0.947 also indicated a very good fit of
Figure 7.1: Measurement Model One with Standardised Estimates for Three
Exogenous Latent Constructs
Analysis of measurement model two were similar to the analyses carried out for the
measurement model one. Taking into account that some variables were
256
multicollinear (See Table 7.5 and Appendix III-B Table 4) and that some of the
variables had standardised residual covariance above 2 (See Appendix III-B Table 5)
the correct measurement model for the two endogenous latent variables was
determined.
The measurement model for the two endogenous latent variables is shown in Figure
7.2. The model yielded =21.085, degree of freedom=19, p-value 0.332 which is
not significant at the level of 0.05, Bollen-Stine bootstrap p-value =0.850 which is
also not significant at the level of 0.005 and CMIN/DF =1.110. All these measures
indicated a very good fit of model to data (Kripanont, 2007; Arbuckle, 2009; Hair et
al. 2010, Tabachnick and Fidell, 2013; Byrne 2010). Other fit measures included
RMSEA = 0.018, TLI=0.999, CFI = 0.999, NFI = 0.990, GFI = 0.984, AGFI = 0.970.
These measures also indicated a very good fit of model to data. (See section 5.10.2.1
Discriminant validity analysis for measurement model two showed that the latent
constructs were different since the correlation between the two latent constructs was
0.63 a value which is below the threshold of 0.8 (Kripanont, 2007; Arbuckle, 2009;
Hair et al. 2010, Tabachnick and Fidell, 2013; Byrne 2010). Moreover, the pattern
and structure coefficients as shown in Table 7.9 indicated that, the two endogenous
In addition, the analysis of the standardised residual covariances showed that, the
offending variables) was less than 2 as depicted in Table 7.10. This suggested that
Table 7.9: Implied (for all variables) Correlations for two Endogenous
Latent Constructs for Investigating Discriminant Validity
AD SMEP C5 C8 C9 C10 H1 H5
AD 1.000
SMEP .623 1.000
C5 .873 .544 1.000
1.00
C8 .867 .540 .757
0
C9 .875 .545 .764 .759 1.000
C10 .898 .559 .784 .779 .786 1.000
1.00
H1 .524 .841 .457 .454 .458 .470
0
H5 .435 .699 .380 .377 .381 .391 .588 1.000
H7 .508 .816 .444 .441 .445 .456 .687 .571
H9 .584 .938 .510 .507 .511 .524 .789 .656
C5 C8 C9 C10 H1 H5 H7 H9
C5 .000
-.02
C8 .000
4
C9 .067 -.019 .000
-.05
C10 -.021 .054 .000
6
-.62 -
H1 -.079 -.232 .000
6 1.302
H5 .661 .299 -.252 -.097 .099 .000
-.42 -
H7 -.430 -.451 .370 -.092 .000
7 1.122
-.06 -.04
H9 .444 .634 -.024 .391 -.023 .000
3 7
258
Figure 7.2: Measurement Model Two with Standardised Estimates for Two
Endogenous Latent Constructs
A measurement model for all five constructs involved in this study is depicted in
Figure 7.3. This model was arrived at by taking into account the multicolinearity of
from each pair that were highly correlated (0.8 or above) was deleted. Likewise, any
pair of variables that had standardised residual covariance of more that 2 (in absolute
The model of Figure 7.3 fit the data very well as attested by the fit measures: Chi-
NFI=0.960, GFI = 0.942 and AGFI = 0.912. Note that the Bollen-Stine bootstrap p-
discriminant validity between the Personal Factor (PF), an exogenous latent construct
and Adoption (AD) an endogenous latent construct as well as for Economic Factors
Table 7.11 showing the correlations between different constructs of the model.
260
Figure 7.3: Measurement Model Three with Standardised Estimates for all
Five Latent Constructs
indicated that, the constructs in the measurement model three were empirically
showed that, the absolute value of standardised residuals between all variables (after
deleting offending variables) was less than 2 as depicted in Appendix III-C Table 8.
This suggested that the measurement model was correct, except for the highly
model two (Figure 7.2) and measurement model one (Figure 7.1) respectively show
that model fit was achieved using different combinations of variables. For example,
the PF latent construct in measurement model one used the variables D2, D3 and D9
while for the measurement mode three PF used the variables D3, D5 and D10 to
achieve model fit. This was taken into consideration while fitting the overall
262
research model. That is, different pairs of variables were tried and the ones that
resulted in the best model fit were used in the ICT Adoption model.
To address the issue of high correlation between PF and AD and that between ECF
and SMEP (see Table 7.11) the variables C6, C9, C10, H1, H5 and H8 were recorded
from 5 points to three points (Tabachnick and Fidell, 2013). The resulting model
using these recoded values is shown in Figure 7.4. The fit measures for this model
very good fit of model to data. In addition to model fit, the problem of high
correlation between the constructs PF and AD as well as ECF and SMEP was
addressed.
measurement model three. It can be seen from Table 7.11 that the highest correlation
Figure 7.4: Measurement Model Three with Standardised Estimates for all
Latent Constructs using recorded Variables
After model identification, the next logical step in SEM analysis process is to
estimate model parameters. Model parameters for this research were obtained using
AMOS version 20, which uses Maximum Likelihood as its default method of
analysed) and variances will be displayed in the path diagram (Byrne 2010;
variables on another variable (Byrne 2010; Kripanont, 2007). On the other hand,
note that, the standardized regression weights and the correlations are independent of
the units in which all variables are measured, and will not be affected by the choice
The literature (Arbuckle, 2009; Byrne 2010; Hair et al., 2010; Kripanont, 2007;
Schumacker and Lomax 2010; Tabachnick and Fidell, 2013) show that, the fit
measures discussed in section 5.10.2.1 provide information about how well the
model fits the data. However, according to Kripanont (2007), the strength of the
therefore important that the SMC of each dependent variable is considered together
with fit measures in order to best describe the structural model (Arbuckle 2009;
addition, Arbuckle (2009) observe that, SMC is a useful statistic that is also
independent of all units of measurement (Arbuckle, 2009). Thus, apart from the fit
The proposed research model shown in Fig 4.1 was implemented in AMOS for SEM
analysis using variables that had passed all initial tests for their usefulness in SEM
analyses. Figure 7.5 show the Initial ICT Adoption model for SMEs in Tanzania
with Unstandardised Estimates while Figure 7.6 shows the initial ICT Adoption
measurement model one and measurement model two were used in coming up with
the initial ICT Adoption model. This enabled for the initial ICT Adoption model to
consider a total of 17 observed variables. Looking at the fit measures for the Initial
ICT Adoption model in particular the p-value = 0.000 and the Bollen-Stine bootstrap
p-value = 0.005 both of which are significant at the level 0.05 it can be concluded
that the initial model did not fit the data very well. Other fit measures such as the
normed chi-square, CMIN/DF =4.563 and RMSEA = 0.102 also confirmed the
inadequacy of the model fit to data (see fit measures in section 5.10.2.1). It was
2009; Byrne 2010; Hair et al., 2010; Kripanont, 2007; Schumacker and Lomax 2010;
Tabachnick and Fidell, 2013) in order to obtain a model that fits the data well.
The first steps in model respecification involved the use of model variables used in
measurement model three rather than using model variables based on measurement
model one and measurement model two respectively. The variables of measurement
model one and measurement model two were the ones used in the initial ICT
measurement model three were tested in order identify a model with best statistics.
267
After these steps, the initial ICT adoption model still did not fit the data well. It was
misfit. In this phase, it was necessary to delete some variables that contravened the
underlying statistical assumptions for the SEM analysis. Finally, an ICT Adoption
Figure 7.5: The Initial ICT Adoption Model with Unstandardised Estimates
Figure 7.6: The Initial ICT Adoption Model with Standardised Estimates
Table 7.13 gives a summary of parameter for the ICT Adoption model. The model
had a total of 53 parameters estimates. Figure 7.7 show the ICT Adoption model
Table 7.13: Parameter Summary for the Developed ICT Adoption Model
Figure 7.8 show the same ICT Adoption model but this time with standardised
estimates. The estimates for the standardised model include standardised regression
weights, correlations, and square multiple correlations (Arbuckle, 2009; Byrne 2010;
the units measured (Arbuckle, 2009; Byrne 2010; Kripanont, 2007) and thus they are
not affected by the choice of identification constraints (Arbuckle, 2009; Byrne 2010;
Kripanont, 2007).
The developed ICT Adoption model had the following fit statistics: Chi-
Stine bootstrap p-value=0.085, which is not significant at the level of 0.05 and thus
indicating that the model fits the data very well. In addition, other fit measure that
NFI=0.954, GFI=0.955, AGFI=0.929 also showed that the model fits the data well
A summary of developed model variables is given in Table 7.14. From Table 7.14 it
is seen that, out of a total of fourteen observed variables measuring the PF latent
construct, only three variables were found to be most significant. These factors were
the perceptions (Perceived benefits) of the manger-owner that: The Internet reduces
customers; and the Internet is an effective way to gather market and competitor
related information. In the research instrument, these variables were coded D3, D5,
For the OF construct, out of eight observed variables measuring this construct, only
two variables that is the marketing strategy and external pressure from customers
were found to be the most important measures of the construct. These variables were
For the ECF construct, out of 16 variables measuring this construct, two variables,
that is acquisition costs of computer systems and operational costs for the internet
273
were found to be the most important measures of the construct. These variables
For the AD construct, out of 13 variables measuring this construct, use of the internet
for randomly looking for information, use of the internet for sending purchase orders
to suppliers and use of the internet for product and market research were found to be
the most important variables for measuring ICTs adoption and use by Tanzania
SMEs. These variables were coded in the research instrument as C6, C9 and C10
respectively.
For the SMEP construct, out of 10 variables measuring this construct, only three
variables, that is, increased market size as a result of computer adoption, emergence
computer technology adoption and increased sales volume in the business as a result
of internet adoption were found to be the most important variables for measuring
SME performance by Tanzania SMEs. These variables were coded in the research
The next step carried out after the identification of the ICT adoption model was to
test the hypotheses as put forward in section 4.3. Hypotheses’ testing was done in
two phases. The first phase involved testing of the hypothesis without the effect of
moderator variables (The direct path hypotheses). These were the hypotheses that
category, the hypotheses tested include the hypotheses H1a, H1b, H1c, H2a, H2b,
274
Testing of the hypotheses in this phase involved the analysis of the regression
covariances of the ICT Adoption Model. These estimates were calculated by AMOS
software.
Testing commenced by testing the hypotheses H1a, H1b and H1c. These hypotheses
dependent variables (endogenous constructs) of the model. Results (See Table 7.26)
show that the three hypotheses H1a, H1b and H1c were accepted. This was
followed by testing the hypotheses H2a, H2b, and H2c. These hypotheses tested the
variables (endogenous constructs) of the model. Results (See Table 7.26) show that
the hypotheses H2a and H2b were accepted while hypothesis H2c was rejected.
Finally, the direct hypothesis H3 and H4 were tested. Contrary to the testing of
analysis of the entire ICT adoption structural model developed rather than testing
only the constructs involved with a particular hypothesis. In order to avoid repetition
in this section. Overall hypothesis testing results are given in Table 7.26.
275
Table 7.15 report the regression weights of the ICT Adoption model. The results
level = 0.05, while the paths between PF and AD and the path between AD and
SMEP are statistically significant at the probability level of 0.01. The path between
ECF and AD had a p value of 0.252. According to the literature (Kripanont, 2007;
Arbuckle, 2009; Byrne 2010) based on the probability level of 0.05, parameters that
are not significant, with the exception of error variances, can be considered
significant parameters should be deleted from the model in the interest of scientific
parsimony. Thus, with a p-value of 0.252, the effect of Economic Factors (ECF) on
ICT adoption (AD) was unimportant and thus the construct was not considered
Estimat
S.E. C.R. P Label
e
AD <--- OF .117 .045 2.581 .010* par_12
AD <--- PF .141 .036 3.915 *** par_14
-
AD <--- ECF -.032 .028 .252 par_15
1.145
SMEP <--- AD .575 .095 6.042 *** par_13
Arbuckle (2005-2009) and Kripanont (2007) note that, the square multiple
correlations of a variable is the proportion of its variance that is accounted for by its
predictors (Arbuckle, 2009; Kripanont, 2007). The meaning of this is, if for example
276
for 50% of the variance of Y. Table 7.16 record the squared multiple correlations for
the ICT Adoption model. From Table 7.16 is can be deduced that the observed
variables D3, D5 D10, E7 and E11accounted for 47.8% of the variance of (adoption)
AD. In addition, the variables D3, D5 D10, E7 and E11 also accounted for 16.5% of
Table 7.16: Squared Multiple Correlations for the ICT Adoption Model
SMC Estimate
AD .478
SMEP .165
regression weights allows for direct comparison of the relative effect of each
independent variable on the dependent variable (Hair et al., 2010; Kripanont, 2007)
and thus they are used in hypothesis testing. Table 7.17 show the standardized
regression weights for the ICT Adoption model. From Table 7.17 it can be observed
that, the standardized regression weights between OF and AD, PF and AD and AD
and SMEP were statistically significant while the standardized regression weight
between EFC and AD was not significant. Therefore, hypothesis H3 was rejected
while hypothesis H4 was accepted. It was also observed that, when the model is
evaluated as a whole the hypotheses H1a, H1b, H2a and H4 were accepted, while the
hypotheses H1c, H2b, H2c and H3 were rejected. The implication of this
the other hand, the rejected hypotheses H2b, H2c and H3 involved testing the
combined effect of ECF with one or two other predictors on AD. As can be seen
from Table 7.15 and Table 7.17, the ECF construct was not significant (p value =
0.252 and standardised regression weight -0.086). This explains why all hypotheses
Estimate
AD <--- OF .316
AD <--- PF .391
AD <--- ECF -.086
SMEP <--- AD .407
Analysis of covariances showed that, all factors were statistically significant. Also,
the factors were interrelated as expected as shown in Table 7.18. It was also noted
that, the factors PF and OF were positively correlated while the factors ECF and PF
and the factors ECF and OF were negatively correlated. The positive correlation
between PF and OF (0.944) suggests that, the higher the Personal Factors, (in this
case perceived benefits) the higher Organisation Factors (in this case the external
pressure and strategy). In addition, a higher value of ECF has a negative effect on
D3, D5, D10, E7 and E11 accounted for 47.8% of the variance of (adoption) AD and
16.5% of the variance of (SME Performance) SMEP. This indicated that the
variables were able to explain ICT adoption well, while at the same time giving
weights between PF and AD (0.391) and between OF and AD (0.316) proved that
there is a causal link between PF and AD and also between OF and AD. The causal
link between AD and SMEP was also confirmed by a standardised regression weight
of 0.407.
The second phase of hypothesis testing, involved tests for the moderating effect of
the government policies on adoption and use of ICTs in SMEs. However, prior to
that, predictor variable ECF had to be removed from the ICT Adoption model as it
was proved not to be significant (See section 7.7). The ICT adoption model after
removal of the variable ECF is shown in Figure 7.9 and is hereby referred to as the
Final ICT Adoption Model. Table 7.19 give a summary of the Final ICT adoption
Model parameters.
279
It should be noted that after the removal of ECF the model fitted the data much better
the level of 0.05, Bollen-Stine bootstrap p-value=0.289 which is not significant at the
level of 0.05 and thus indicating that the model fits the data very well. Other fit
AGFI=0.949. All these measures indicated a very good fit of model to the data. In
addition to the fit measures provided for the final ICT adoption model, analysis of
pattern coefficients, standardised residual covariances and the sample correlation did
Table 7.19: Parameter Summary for the Final ICT Adoption Model
In order to test for the moderating effect of government policies on adoption and use
of ICTs in SMEs, multiple group analysis was conducted using AMOS. The
moderators had three variables namely, support programs, taxes and tariffs and
support infrastructure. Hypotheses H5a, H5b and H5c were tested with three
investigating whether there were any significant differences across groups. If any
significant differences were found across the groups, then, that suggested the
moderator had an effect on the predictors (Arbuckle, 2009; Byrne, 2010; Kripanont,
2007). If, however it was found that there were no significant differences between or
among the groups, this suggested the moderator had no effect on the predictor
Figure 7.9: The Final ICT Adoption Model with Unstandardised Estimates
i. First the parameter estimates are computed separately for both groups.
ii. Second, the paths in the model are simultaneously estimated for both groups
iii. The third and last step is to estimate the constrained model. This is done by
parameter estimates across both groups are specified as invariant. If the chi-
square difference tests reveal a significant difference across the baseline and
test provides evidence that at least one or more of the direct effects differs
models in order to identify the specific paths that differ significantly across
the groups.
282
provided by the Government to SMEs has any significant effect on the influence of
government to SMEs”.
Two groups were created from the dataset. One group supported the notion that
there were enough support programs by the government to support ICT adoption by
SMEs in Tanzania. The second group were of the opinion that there were no enough
support programs by the government to support SMEs adopt ICTs. Due to the low
number of respondents (37 cases) who supported the notion that there were enough
support programs, respondents who were neutral were regarded as supporting the
idea. This was done in order to meet the minimum sample size for analysis (Hair
et.al. 2010; Kripanont, 2007; Tabachnick and Fidell 2013). Table 7.20 shows the
the government.
In addition to the sample size considerations for the two groups, it should be noted
that, the estimation of the baseline model for the two groups made it necessary to re-
specify the Final ICT Adoption model in order to make sure the baseline model fit
Figure 7.10 depict the path diagram of the baseline model (unconstrained model)
question that “there are no enough support programs by the government to support
ICT adoption by SMEs in Tanzania”. This group had a total of 102 respondents
Table 7.20) Figure 7.11 show the path diagram of the baseline model Unstandardised
estimates for a group of respondents (group 2). This group had a total of 239 cases,
which is a summation of those who strongly agree + agree (see Table 7.20). The
respondents of this group agreed with the question that “there are no enough support
Figure 7.10: The Baseline Model with Unstandardised Estimates for Multiple
Group Analysis-Adequate Support Programs
Figure 7.11: The Baseline Model with Unstandardised Estimates for Multiple
Group Analysis-Inadequate Support Programs
The baseline model for this analysis had the following fit measures: CMIN=123.725,
Stine bootstrap p-value=0.234, which is not significant at the level of 0.05 and thus
indicating that the model fits the data very well for both groups. Other fit measures
AGFI=0.900. All these fit statistics indicated that the model fitted the data for both
These results indicated that the two groups use the same path diagram albeit with
possible different parameter estimates, as suggested by Figure 7.10 and Figure 7.11.
However, the differences in parameter estimates from the baseline model (as
depicted by Figure 7.10 and Figure 7.11) were not enough by themselves to justify
Kripanont, 2007).
Structural weights models and measurement models (constrained models) for both
groups were generated by using multiple group analysis. According to the literature
(Kripanont, 2007; Arbuckle, 2009; Byrne, 2010), constrained models presents the
Figure 7.12 and Figure 7.13 show structural weights model for the two groups. It is
seen from these estimates that the two groups had the same structural weights
estimates as depicted by Figure 7.12 and Figure 7.13. Fit statistics for the structural
(which is significant at the level 0.05), Bollen-Stine bootstrap p-value =0.154 which
is not significant at the level of 0.05 and thus indicating that the model fits the data
very well for both groups. Other fit measures were RMSEA=0.042, NFI=0.933,
also indicated that the model fits the data for both groups very well.
The comparison of the baseline model and the measurement model (constrained
model) did not show any significant differences across the models as indicated by the
increase in fit measures. That is, DF increase = 7, CMIN increase = 9.670 and p-
value = 0.208 which is not significant at the level 0.05. In addition, the chi-square
difference test also revealed a non-significant difference across the baseline model
and the constrained (structure weight) model: DF increase = (88-78) = 10, CMIN
level of 0.05) (See nested model comparisons in Appendix IV-A). Finally, looking
at the regression weights for the two groups as depicted in Table 7.21a and Table
7.21b it was observed that the regression weights in all direct paths in the model was
Figure 7.12: The Structural Weights Model with Unstandardised Estimates for
Multiple Group Analysis-Adequate Support Programs
Figure 7.13: The Structural Weights Model with Unstandardised Estimates for
Multiple Group Analysis-Inadequate Support Programs
Consequently, based on this analysis, the hypothesis (H5a) that support programs
Estimat
S.E. C.R. P Label
e
**
AD <--- OF .102 .029 3.558 b2_1
*
**
AD <--- PF .178 .028 6.416 b3_1
*
SME **
<--- AD .591 .088 6.688 b1_1
P *
Estimat
S.E. C.R. P Label
e
**
AD <--- OF .102 .029 3.558 b2_1
*
**
AD <--- PF .178 .028 6.416 b3_1
*
SME **
<--- AD .591 .088 6.688 b1_1
P *
To test for the moderating effect of taxes and tariffs on the adoption and use of ICTs
in SMEs, the sample was split into two groups. The first group had 115 cases.
These were the respondents that do not believe that the taxes and tariffs charged by
internet technologies. The second group had 226 cases. These were respondents
who acknowledged that high taxes and tariffs charged by the government on their
businesses was an obstacle in their ICT adoption situations. Note that, in order to
291
meet the minimum sample for analysis, respondents who were neutral to the question
“High tariffs’ and taxes hinder computer and Internet adoption in Tanzania SMEs”
were assumed to belong to the group of respondents who disagreed with the question
(See Table 7.22). The hypothesis (H5b) to be tested was started as:
ICT adoption in SMEs is moderated by the taxes and tariffs charged by the
G5-High tariffs’ and taxes hinder computer and Internet adoption in Tanzania SMEs.
Frequency Percent Valid Percent Cumulative
Percent
Strongly disagree 18 5.3 5.3 5.3
Disagree 29 8.5 8.5 13.8
Neutral 68 19.9 19.9 33.7
Valid
Agree 85 24.9 24.9 58.7
Strongly agree 141 41.3 41.3 100.0
Total 341 100.0 100.0
Figure 7.14 and Figure 7.15 show the path diagrams of the baseline model with
unstandardised estimates for the two groups respectively. The overall fit statistics for
value=0 .279 which is not significant at the level of 0.05. This indicated that the
model fitted the data very well for both groups. With RMSEA=0.039, NFI=0.941,
TLI=0.970, CFI=0.979, GFI=0.943 and AGFI=0.903, the additional fit measures also
indicated that the model fitted the data very well for both groups. In addition, the fit
292
measures and the estimates of shown in Figure 7.14 and Figure 7.15 indicated that
the two groups used the same path diagram but possibly with different parameter
Figure 7.14: The Baseline Model with Unstandardised Estimates for Multiple
Group Analysis-Taxes not an Obstacle
Figure 7.15: The Baseline Model with Unstandardised Estimates for Multiple
Group Analysis-Taxes an Obstacle
AGFI=0.903
294
In confirmation, constrained models were generated and evaluated. Figure 7.16 and
Figure 7.17 show the structural weight models for the two groups respectively. The
fit measures for the structural model was found to be: CMIN=132.624,
These fit statistics indicated that the structural model fitted data very well for both
groups.
Figure 7.16: The Structural Weights Model with Unstandardised Estimates for
Multiple Group Analysis-Taxes not an Obstacle
295
Figure 7.17: The Structural Weights Model with Unstandardised Estimates for
Multiple Group Analysis-Taxes an Obstacle
The comparison between the baseline model (unconstrained model) and the
Note the increase in degree of freedom =7, CMIN increase=8.546 and the p-
value=0.287 which is not significant at the level of 0.05. On a similar note, the chi-
square difference test also revealed a non-significant difference across the baseline
model and the constrained (structure weight) model, as suggested by the comparison
of the baseline model with the structural weights model: DF increase = (88-78) = 10,
CMIN increase = (132.624 - 117.928) = 14.696 and p-value = 0.144 which was not
significant at the level 0.05. (For more details see nested model comparisons in
Appendix IV-B). In addition to this analysis, it was also observed from Figure 7.16
and Figure 7.17 as well as Table 7.23a and Table 7.23b that, direct paths of the
model had the same regression weights for two groups. Therefore, the hypothesis
(H5b) that “The influence of personal factors and organisation factors (predictors) on
ICT adoption in SMEs is moderated by the taxes and tariffs charged by the
government on the SMEs” was rejected since there was no statistical difference
Estimat
S.E. C.R. P Label
e
**
AD <--- OF .104 .029 3.612 b2_1
*
**
AD <--- PF .162 .028 5.753 b3_1
*
SME **
<--- AD .582 .097 5.984 b1_1
P *
297
Estimat
S.E. C.R. P Label
e
**
AD <--- OF .104 .029 3.612 b2_1
*
**
AD <--- PF .162 .028 5.753 b3_1
*
SME **
<--- AD .582 .097 5.984 b1_1
P *
The hypothesis (H5c) regarding the impact of support infrastructure provided by the
To test this hypothesis, the sample was split into two groups. The first group had
126 cases. These were the respondents who were of the opinion that the
infrastructures that support businesses in ICT adoption situations were adequate. The
second group had 215 cases. The respondents in this group were of the opinion that
the infrastructures that support businesses in ICT adoption situations were inadequate
298
In order to meet minimum sample for analysis, respondents who were neutral were
considered to be part of the first group, like in previous cases in section 7.8.1 and
section 7.8.2. Thereafter the groups were analysed in order to establish if there were
Figure 7.18 and Figure 7.19 show the path diagrams of the baseline models with
unstandardised estimates for the two groups respectively. Model fit statistics for the
is not significant at the level 0.05. This indicated a good fit of the model to the data
CFI=0.979, GFI=0.940, AGFI=0.898, also indicated that the model fitted the data
The fit measures and the estimates as shown in Figure 7.18 and Figure 7.19 indicated
that the two groups use the same path diagram but with different parameter
estimates. Since this information was not conclusive for the purpose accepting or
rejecting the hypothesis (Kripanont, 2007; Arbuckle, 2009; Byrne, 2010) analysis of
Figure 7.18: The Baseline Model with Unstandardised Estimates for Multiple
Group Analysis-Adequate Infrastructure
Figure 7.19: The Baseline Model with Unstandardised Estimates for Multiple
Group Analysis-Inadequate Infrastructure
Figure 7.20 and Figure 7.21 show the structural weight models for the two groups
respectively. The fit measures for the structural model was found to be:
0.05, Bollen-Stine bootstrap p-value=0.289, which is not significant at the level 0.05,
indicating a good fit of data to the model for both groups. Other fit measures,
also indicated that the model fitted the data very well for both groups.
302
Figure 7.20: The Structural Weights Model with Unstandardised Estimates for
Multiple Group Analysis-Adequate Infrastructure
Figure 7.21: The Structural Weights Model with Unstandardised Estimates for
Multiple Group Analysis-Inadequate Infrastructure
Like in the other moderating hypotheses tests, the comparison between the baseline
significant difference across the models. Note the increase in degree of freedom =7,
CMIN increase = 8.119 and the p-value=0.322 which is not significant at the level of
0.05. On a similar note, the chi-square difference test also revealed a non-significant
difference across the baseline model and the constrained (structure weight) model, as
suggested by the comparison of the baseline model with the structural weights
and p-value = 0.312 which was not significant at the level 0.05. (For more details see
Moreover, it was observed that, the direct paths of the model had the same regression
weights for two groups as depicted by Table 7.25a and Table 7.25b respectively.
Estimat
S.E. C.R. P Label
e
**
AD <--- OF .121 .031 3.946 b2_1
*
**
AD <--- PF .164 .028 5.910 b3_1
*
SME **
<--- AD .525 .091 5.774 b1_1
P *
304
Estimat
S.E. C.R. P Label
e
**
AD <--- OF .121 .031 3.946 b2_1
*
**
AD <--- PF .164 .028 5.910 b3_1
*
SME **
<--- AD .525 .091 5.774 b1_1
P *
Thus, as a result of this analysis, the hypothesis (H5c) that support infrastructure has
After model development and hypothesis testing, it was necessary to interpret the
model findings and show how the model can guide Tanzania SMEs in ICT adoption
process. It should be pointed out that all points raised in section 4.1 are important
However, the developed model informs on the critical factors of ICT adoption in the
context of Tanzania. Model interpretations can be viewed from two perspectives: the
From the owner-manager perspective, generally the literature shows that the owner-
manager of small business make all key decisions on how the firm conducts its
business including the decisions for acquiring new technologies for the firm. It is
therefore correct, to point out that, the rate of ICT adoption and effective utilisation
305
The developed model specifically identifies critical factors as the perceptions of the
external pressures and costs of ICT systems. These factors alone explain ICTs
Owners-managers must have the right education needed to manage their firms since
adoption of ICTs is not a substitute for poor management skills. In additional to the
managerial skills, owners-managers must strive to develop their ICT knowledge and
skills. That will enable them to make informed decisions in adoption situations like
what type of ICTs are needed by their firms, the skills needed by their employees for
success and the actual benefits to their firms. It should be noted that, education
Owners-managers must ensure that ICTs adoptions are aligned with the business
strategy of their firms. Research findings show that, adoption of ICTs with the aim
of supporting the firm’s strategy is vital for successful adoption and use of ICTs.
306
they happen and thus take initiatives that will ensure successful adoption. More
often, SMEs fail to identify the external pressure to adopt and thus fail to use it to
their advantage. Costello (2009) argues that SMEs should view external pressure as
Owners-manager must make sure that their firms have enough skilled labour force
that is capable of using ICTs effectively. This can be achieved by employing ICT
using staff training programs to develop the ICT skills of employees. Effective
From the government point of view, good policies were found from the literature to
suggest that government policies aimed at helping the SMEs to adopt ICTs are not
effective. Given the importance of the SMEs sector in the economic development of
the country, the government of Tanzania needs to address the issues raised by
research findings by developing new policies with enough initiatives and incentives
that promote ICT adoption and use within the SME sector. Based on research
findings, specific areas that need attention are explained in subsequent paragraphs.
307
research findings show the current one is not effective. SMEs often need assistance
market information. Therefore, the government must look into how support
institutions that offer necessary training and support programs to SMEs are created
The tax policy needs to be redesigned such that a tax system with enough incentives that
findings show that SMEs consider the present tax system an inhibitor of ICT adoption
and growth. It is important that the level of taxation set by the new tax system is
friendly and does not stifle the running of SMEs. For example, laws that results in
heavy costs of compliance by SMEs must be revised or abolished. Tax rebates may
Research findings show that support infrastructures are not adequate. This may have
made ICT solutions unaffordable to many SMEs. Therefore, based on this, the
infrastructures that support use of ICTs in SMEs. That way service provision of ICT
solutions will be affordable to many SMEs and thus stimulate adoption and use of
ICTs.
Research findings suggested that, lack of laws and regulatory frameworks inhibits
needs to enact laws and regulatory frameworks that to guide the SME sector in the
positive direction. Generally speaking, the author noted that, it is the duty of the
In this chapter, the ICT adoption model for Tanzania SMEs was developed, tested
and the results of SEM data analyses were presented and discussed along with the
was carried out and summarised in section 7.9. Model development process
involved several stages. In each stage, analysis of all research variables that had
passed preliminary analysis was done in order to determine the usefulness of each
variable in the model. To begin with, construct reliability was carried out and the
SMC of all variables was determined. All variables with SMC values less than 0.5
were removed from further analysis since they were considered useless for any
discriminant validity of latent constructs. In this test, all variables that contravened
critical statistical assumptions for SEM analysis were omitted (deleted) from the final
analysis (Arbuckle, 2009; Byrne 2010; Hair et.al. 2010; Kripanont, 2007;
Schumacker and Lomax 2010; Tabachnick and Fidell, 2013). For example, for all
variables that were highly correlated, (correlation from 0.8 and above) one variable
was deleted from the pair. The highly correlated variables indicated the presence of
multicolinearity in data (Arbuckle, 2009; Byrne 2010; Hair et al., 2010; Kripanont,
2007; Schumacker and Lomax 2010; Tabachnick and Fidell, 2013). In a similar
309
way, all variables were tested and appropriate measures were taken to ensure that
they conformed to SEM requirements. This way, the reliability and validity of the
model constructs and variables was firmly established before the model could be
Model fitting was done in two stages as recommended by the literature (Kripanont,
2007; Byrne 2010). First the measurement models were fitted and analysed before
the structural model was fitted and analysed. This helped to easily identify the
source of poor fit in the final model. During model fitting, it was necessary to
model that fitted the data well. Thereafter the model was used to test the hypotheses.
Two sets of hypotheses were tested in two stages. In the first case, direct path
regression weights of direct paths were used to judge the hypotheses. That is,
to the standardised regression weights, SMC and covariances were also used in the
description of the structural model. The results of this testing confirmed the final ICT
adoption model.
The second stage of hypothesis testing involved the test of moderating hypotheses.
The effect of moderating variables on the predictor variables was tested using
between the baseline model and structure weights model was used as the major
Table 7.26 and Table 7.27 give a summary of the hypothesis testing results. From
Table 7.26 it is seen that five direct path hypotheses were accepted and three
hypotheses were rejected. The rejected hypotheses were all related to the economic
factors. Table 7.27 show the summary of moderating hypotheses. All of the
moderating hypotheses in this research were rejected. Table 7.28 gives a summary
CHAPTER EIGHT
8.1 Introduction
Small and Medium Sized Enterprises are documented as the basis of most economies
enterprises that have little incidence of growth. In addition, there is proof to the
effect that SMEs in Tanzania are not exploiting ICTs to their advantage despite the fact
that, in today’s knowledge economy, ICT adoption and use has become essential for any
business survival and growth. Based on the observed problems, i t was theorised that,
314
with an adoption model that informs on key adoption issues in the context of
Tanzania, many SMEs will adopt ICTs, innovate, and become competitive in today’s
digital economy.
Thus, this research sought to develop and test an ICT adoption model for SMEs in
Tanzania. The theories relevant to ICT adoption in SMEs and related fields were
examined in order to determine pertinent issues for the development of the ICT
adoption model. A conceptual model based on the literature was then proposed.
main data collection strategy, data was collected from the service and general trading
techniques were then used to develop, test and validate an ICT adoption model in
This chapter concludes this research work and is arranged as follows: First,
conclusions based on key research findings are briefly explained. Secondly, the
contributions of this work to the knowledge body are mentioned. Thirdly, based on
given to key stakeholders. Finally, limitations of the research and future research are
outlined.
315
8.2 Conclusions
The main objective of this research was to develop a model for guiding Tanzania
SMEs in the ICT adoption process. Therefore, a Structural Equation Model that
identified six constructs and their critical factors was developed. The developed
model constructs include: (i) Three exogenous latent constructs, namely Personal
Factors, Organisation Factors and Economic Factors which were identified as the
direct determinants of ICTs adoption in SMEs; (ii) One moderating construct namely
on ICT adoption by Tanzania SMEs and (iii) Two endogenous constructs namely
ICT Adoption and SMEs Performance. ICT adoption construct explains ICT
adoption and use while SMEs Performance construct explains the effect ICT
The study established the sequence of model operations as follows: First the most
important factors that influence ICT adoption in SMEs were identified and
relationship between the identified categories (constructs) of factors and the effect
they have on ICT adoption by SMEs. Finally, using Structural Equation Modelling
(SEM) analysis techniques, the strength and influence of constructs and variables
were determined. This process informed on the critical successful adoption issues
for consideration prior and after adoption of ICTs. On the other hand, government
policies and regulations for guiding the SME sector were also tested for their
effectiveness.
316
model testing and validation using research data resulted in a parsimonious model
explain ICT Adoption and 3 variables for measuring post adoption SMEs
Organisation Factors and Economic Factors predictor variables accounted for 47.8%
of the variance of ICT adoption and 16.5% of the variance of SME Performance.
This indicates that the identified variables explain ICT adoption very well, while at
the same time giving reasonable explanation for SME performance. Thus, the model
was proved to be a reliable tool for guiding ICTs adoption process within the context
of Tanzania. Conclusions based on specific findings from the model testing and
Theoretical analysis of the factors influencing ICT adoption by Tanzania SMEs was
the first specific objective and the initial step in ICT adoption model development.
This study established four main categories (constructs) of factors that influence ICT
i. Personal Factors: These are the factors related to the owner-manager of the
SMEs. The study established that the education level of the owner-manager,
317
(perceived benefit) towards the benefit of ICTs to his/her business are the
ii. Organisation Factors: These are factors that are directly related to the
organisation. The study established that, the firm age, the firm size, business
iii. Economic Factors: These are factors that are related to post start up firm
financing. The study established that access to financial support and cost of
taxes and Tariffs and support infrastructure are the most important factors in
this category.
Specific ICTs studied in this research were the computer and Internet technologies.
The internet technologies included access (connectivity) to the Internet, adoption and
use of company websites and adoption and use of email. In the developed model,
measures post adoption SMEs performance was identified. The study established
318
that return on investment measures and innovations are the most important factors in
this category.
8.2.3 The Relationship between the Relevant Factors and their Effect on ICT
The second specific objective was to establish the relationship between the relevant
factors and their effect on ICT adoption. Theoretical analysis of research variables
suggested that Personal factors, Organisation factors and Economic factors are direct
of model variables using survey data and SEM techniques revealed that:
adoption in SMEs.
ii. Organisation Factors have a direct positive significant relationship with ICT
adoption in SMEs.
iii. Economic factors have a direct positive significant relationship with ICT
adoption in SMEs.
iv. Within the Personal Factors construct, the perceptions of the owner-manager
Tanzania SMEs. Specific ICTs benefits identified include the perception that:
communication tool with customers and that ICTs are an efficient way of
vi. Within the Economic Factors construct, access to financial support and cost
vii. Personal Factors and Organisation Factors together have a direct positive
viii. Personal factors and Economic factors together have a direct positive
ix. Organizational factors and Economic factors together do not have a direct
xii. Taxes and Tariffs charged by the government on the SMEs do not have any
xiii. Support Programs provided by the government to SMEs do not have any
The third specific objective was to establish the status of ICT adoption and use by
i. Adoption and use of ICTs in the Tanzania SMEs sector has rapidly grown
ii. About 55% of SMEs use their ICTs as a strategic communication tool with
their suppliers.
iv. About 53% of SMEs use their ICTs as a strategic marketing tool.
The fourth and last specific objective was to establish the influence of ICT adoption
i. About 48% of SMEs were innovative as a result of ICT adoption and use.
ii. About 47% of SMEs were competitive as a result of ICT adoption and use.
iii. ICT adoptions have a direct positive significant relationship with SMEs
performance.
322
acquisition and operational costs together accounted for accounted for 16.5%
problem since 53% of SMEs that had adopted were not competitive and 52%
One of the areas that were highlighted in knowledge gaps analysis from the literature
was the lack of comprehensive and systematic studies on ICT adoption and use in
research has added to the existing body of literature in the field of IS research with
particular emphasis on Tanzania. This contributes towards the filling of the observed
knowledge gap.
Specifically, this research identified and addressed the inadequacies of earlier studies
research as follows:
323
suggested by the literature. The developed model fills in this knowledge gap
ii. None of the previous studies in Tanzania settings has attempted empirically
to establish in a broad sense the status of how Tanzania SMEs use ICTs after
holistically validate the theory that ICT adoption and use can enable small
managed to show empirically the causal relationship between the use of ICTs
and the competitiveness of the firms and therefore contributing to the existing
iv. Literature review and results of this work show that, most of the issues
relating to SMEs are homogeneous. This means that the developed model
can be used for testing adoption issues in other countries with similar socio-
324
research.
i. The author noted that, many of the previous researches that have examined
contribution to research.
ii. The use of multiple case studies strategy in the exploratory phase of the
the multiple case studies assisted the researcher get a better understanding of
the problems and anxieties faced by SMEs in ICT adoption situations and
iii. Structural Equation Modelling has many advantages over other multivariate
statistical methods. However, the author noted that most of the previous
research used different methods of data analysis other than SEM. The
methodology used in this research incorporates the use of SEM for ICT
The practical contributions of this research are brought to light by the insights
provided by key research findings to both policy and practise. These are summarised
as follows:
i. Research findings on the impact of the policies aimed at helping the SMEs
Therefore, it can be argued that based on the findings of this research, some
ii. Research findings inform the owner-manager of SMEs on the key issues to
consider for successful adoption and utilisation of ICTs. Results show that,
with marketing strategy and customer pressure are the most significant ICT
326
adoption factors in Tanzania SMEs. Post adoption results inform the owner-
manager that innovation using ICTs is vital for the firm to become
competitive.
iii. Research findings informs on the current status of ICT adoption and use in
Tanzania SMEs. This information was lacking in the literature and therefore
The literature review identified the owner-manager of SMEs, the government and
policy makers as the key stakeholder of the SMEs sector. Therefore, results of this
research have implications that may be very useful to the key stakeholders in their
The implications for practice from this research are based on the developed ICT
adoption model and its interpretations. The model informs on the key ICT adoption
factors and therefore its use can result in many SMEs adopting ICTs, innovate and
i. Inform those in practice on the key issues to consider prior to ICTs adoption
ii. Test the effectiveness of government efforts aimed at the development of the
SME sector. This will enable the government to make informed decisions
iii. Study SMEs adoption issues in other countries with similar social economic
conditions. That way the model may provide some very useful information
The owner-managers of small businesses are known to make all key decisions on
how the firm should conduct its business including the decisions for acquiring new
technologies for the firm. Therefore, the support and commitment of the owners-
manager is very important in any adoption situation. Based on this observation and
other research findings the author recommends the following to the owner-manager:
i. Owner-manager must have the right education and skills needed to manage
situations.
328
ii. Owner-managers must make every effort to acquire or improve their ICTs
knowledge and skills as this will enable them make successful and beneficial
iii. Prior to adoption, the owner-manager must ensure that his/her firm have
adequate skilled personnel that can use ICTs effectively. Effective use of
iv. The owner-managers must ensure that ICTs adoptions are aligned with
and thus take initiatives that will ensure successful adoption. Research
findings show that customer pressure is a critical factor for successful ICT
adoption in SMEs.
increase the use of ICT in their firms since the success of the firms depends
The SME policy of Tanzania has been in operation for more than a decade. Review
of the literature suggested that that the policy has failed to address many of the
constraints it aimed to deal with. The empirical evidence from this research confirms
329
research findings, it is evident that there is a need to develop new policies with
enough initiatives and incentives that promote ICT adoption and use within the SME
sector. In particular, the government (policy makers and support agencies) needs to
do the following:
i. Review the policy regarding government support to SMEs since the present
ii. Redesign and introduce a new tax system with more incentives for ICT
iii. Test the effectiveness of policies from time to time in order to allow for
iv. Continue to develop and maintain critical infrastructures that support use of
v. Enact laws and regulatory frameworks that guide the SME sector in the
vi. Through support programs, ensure that SMEs adopt and use ICTs in line with
their business process. This in turn will help to improve the competitiveness
of the SMEs and thus become a part of the present digital economy.
Just like in any other research, this research also had a number of limitations and
To begin with, it should be noted that ICT is a broad term covering a number of
different technologies. However, computer and Internet technologies were the only
ICTs considered in this study. It may be interesting to explore for example the impact
of smart phones on small businesses. Smart phones can give small business a quick,
easy and portable access to the Internet, email and other applications using voice,
data and text albeit at a much higher cost. It will be interesting to find out how SME
Another limitation in this research is the fact that only two sectors, the service and
general trading were considered in the study. Inclusion of SMEs in other sectors
might have brought more insights and understanding on ICT adoption issues faced
by SMEs.
Prior to data collection, the minimum sample size was determined and found to be
385 cases. However, only 341 cases of collected data were found to be useful in
analysis. The author noted from the literature that, reduction of minimum sample
331
size has effect of reducing the expected accuracy and generalisability of research
findings. This reduction in the sample size is therefore considered a limitation in this
research.
Different statistical methods and analysis tools have different sample size
analysis methods and tools, the SMEs from the two sectors were treated as a single
The challenges faced during data collection, affected the response rate of the survey
in a way that the requirements of the calculated sample size were not met. Moreover,
without the researcher’s knowledge, respondents could also have hidden some
important information which could possibly have improved the research outcome
Budget and time constraints prohibited the use of more data analysis tools such as the
Satorra-Bentler robust method to further validate the results. This is also considered
a limitation.
Taking into consideration the findings of the research, the scope of this study and the
observed limitations, the areas of potential future research were identified and are
outlined below:
332
More research with adequate sample size and other estimation tools is needed to
further validate the developed model so that generalisation of results can be done
with much higher accuracy. The sample may also include SMEs from more sectors
The developed model can be used to test the impact of smart phone’s use in SMEs
and thus provide extra insights on how the SME sector interacts with ICTs to gain
competitiveness. The author noted that, smart phones can provide quick access to
the internet, email and other useful applications using mobile phone infrastructures.
Available data show that, by 2014 the teledensity (penetration) had reached 68% of
the population and that most of that growth is attributed to mobile operators and thus
There is a need to research and clearly explain the emergence of the e-commerce
regulatory framework for supporting e-business. Yet it seems that some SMEs have
managed to defy the odds and have taken advantage of what is available effectively.
SMEs. Research findings show that about 53% of SMEs that had adopted ICTS
(Computer and Internet) were not able to achieve any remarkable success. This
333
needs to be addressed since the 53% represents a big potential for the development of