Factors influencing diffusion of Digital Signature in Iranian public Organizations


1 PhD. Student of Technology Management, Allameh Tabataba’i University

2 Associate Professor of industrial management, Allameh Tabataba’i University


Digital signature is one of the fundamental infrastructures of e-government development. In our country despite implementing the requited infrastructures for using digital signature, the usage of this technology is very limited. The aim of this paper is to identify the factors influencing diffusion of digital signature in government organizations. For this purpose the identified factors were classified according to the TOE (technology, organization, and environment) framework. The proposed hypotheses were analyzed using the SEM (Structural Equation modeling) method. The result shows that among the identified factors the four factors of complexity, compatibility, regulatory support and trust to technology providser have more significant effect on diffusion of digital signature. Policy recommendations have been proposed according to the results of hypotheses tests.


1- داوری، علی و رضازاده، آرش.، 1395، مدل سازی معادلات ساختاری با نرم افزار PLS، تهران، انتشارات جهاد دانشگاهی تهران، چاپ سوم
2-  Ahmadi, H., M. Nilashi, et al. (2017). "Hospital Information System adoption: Expert perspectives on an adoption framework for Malaysian public hospitals." Computers in Human Behavior 67: 161-189.
3- Carayannis, E. G. and E. Turner (2006). "Innovation diffusion and technology acceptance: The case of PKI technology." Technovation 26(7): 847-855.
4- Chang, I.-C., H.-G. Hwang, et al. (2007). "Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department." Decision Support Systems 44(1): 350-359.
5- Christian Schaupp, L. and L. Carter (2005). "E-voting: from apathy to adoption." Journal of Enterprise Information Management 18(5): 586-601.
6- Cohen, J. (1992). "A power primer." Psychological bulletin 112(1): 155.
7- Currie, W. L. (2012). "Institutional isomorphism and change: the national programme
8- for IT–10 years on." Journal of Information Technology 27(3): 236-248.
9- Davis, F. D. (1989). "Perceived usefulness, perceived ease of use, and user acceptance of information technology." Mis Quarterly: 319-340.
10- DIMMAGGIO, P. and W. Powell (1983). "The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields." American Sociological Review 48(2): 147-160.10.
11- Fishbein, M. and I. Ajzen (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
12- Geisser, S. (1974). "A predictive approach to the random effect model." Biometrika 61(1): 101-107.
13- Gomez-Barroso, J.-L. and C. Feijoo (2009). "Policy tools for public involvement in the deployment of next generation communications." info 11(6): 3-13.
14- Gupta, A., Y. A. Tung, et al. (2004). "Digital signature: use and modification to achieve success in next generational e-business processes." Information &Management 41(5): 561-575.
15- Hoepner, P. (2006). "Study PKI and Certificate Usage in Europe." Fraunhofer Institute FOKUS, Institute for Open Communication Systems.
16- Hulland, J. (1999). "Use of partial least squares (PLS) in strategic management research: A review of four recent studies." Strategic management journal: 195-204.
17- Lin, H.-F. and S.-M. Lin (2008). "Determinants of e-business diffusion: A test of the technology diffusion perspective." Technovation 28(3): 135-145.Carayannis, E. G. and E. Turner (2006). "Innovation diffusion and technology acceptance: The case of PKI technology." Technovation26(7): 847-855.
18- Lopez, J., R. Oppliger, et al. (2005). "Why have public key infrastructures failed so far?" Internet Research15(5): 544-556.
19-  Loukis, E., S. Kokolakis, et al. (2011). "FACTORS OF PKI ADOPTION IN UROPEAN FIRMS."
20- Low, C., Y. Chen, et al. (2011). "Understanding the determinants of cloud computing adoption." Industrial Management & Data Systems111(7): 1006-1023.
21- OECD (1997). Diffusing technology to industry: government policy and rogrammes, OECD.
22- Pan, M.-J. and W.-Y. Jang (2008). "Determinants of the adoption of enterprise resource planning within the technology-organization-environment framework: Taiwan's communications industry." Journal of Computer information systems 48(3): 94-102.
23- Rossi, B., B. Russo, et al. (2012). "Adoption of free/libre open source software in public organizations: factors of impact." Information Technology & People25(2): 156-187.
24- Raina, K. (2003). PKI security solutions for the Enterprise: solving HIPAA, E-Paper Act, and other compliance issues, John Wiley & Sons.
25- Rogers, E. M. (2002). "Diffusion of preventive innovations." Addictive behaviors 27(6): 989-993.
26- Rogers Everett, M. (1995). "Diffusion of innovations." New York.
27- Rossi, B., B. Russo, et al. (2012). "Adoption of free/libre open source software in public organizations: factors of impact." Information Technology & People 25(2): 156-187.
28- Schumacker, R. E. and R. G. Lomax (2012). A beginner's guide to structural equation modeling, Routledge.
29- Son, J.-Y. and I. Benbasat (2007). "Organizational buyers' adoption and use of B2Belectronic marketplaces: efficiency-and legitimacy-oriented perspectives." Journal of Management Information Systems 24(1): 55-99.
30- Srivastava, A. (2011). "Resistance to change: six reasons why businesses don’t use e-signatures." Electronic Commerce Research 11(4): 357-382.
31- Stone, M. (1974). "Cross-validatory choice and assessment of statistical predictions." Journal of the royal statistical society. Series B (Methodological): 111-147.
32- Tornatzky, L. G., M. Fleischer, et al. (1990). Processes of technological innovation, Lexington Books.
33- Tornatzky, L. G. and K. J. Klein (1982). "Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings." Engineering Management, IEEE Transactions on(1): 28-45.
34- Zhu, K. and K. L. Kraemer (2005). Post-adoption variations in usage and value of e-business by organizations: cross-country evidence from the retail industry." Information systems research 16(1): 61-84.