Research article | DOI: https://doi.org/10.31579/2834-5126/013
Exploratory factorial structure of the legal corporation in the COVID-19 era
- Cruz Garcia Lirios 2
- Eyder Bolivar-Mojica 1
- Meriño Cordoba 2
- Carmen Ysabel Martínez de Meriño 3
- Helga Lucero Barrera ArciniegasHelga Lucero Barrera Arcinieg 3
- Javier Carreon Guillen 4
- Alejandro Acevedo Amorocho 4
Latin American Autonomous University, Mexico.
National Autonomous University of Mexico.
Luis Amigo University, Mexico.
Indercon, Mexico.
National Autonomous University of Mexico.
*Corresponding Author: Cruz Garcia Lirios
Citation: Eyder Bolivar-Mojica, Cruz G Lirios, Meriño Cordoba, Carmen Y M de Meriño, Helga L B Arciniegas, et all, (2023), Exploratory Factorial Structure of The Legal Corporation in The Covid-19 Era, Clinical Trials and Clinical Research. 2(1); DOI:10.31579/2834-5126/013
Copyright: © 2023, Cruz Garcia Lirios. this is an open access article distributed under the terms of the creative commons’ attribution license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original and source are credited.
Received: 14 February 2023 | Accepted: 21 February 2023 | Published: 28 February 2023
Keywords: COVID-19 era; internet; harassment; equity; profit
Abstract
Studies on the consumption of information technologies, electronic devices and digital networks have shown that expectations are explanatory variables of processes of acceptance, adoption and intensive use that would be linked to anxiety and addiction, as well as to processes of aggression such as stalking, buying or infidelity. In the case of the Internet and electronic networks such as Facebook, Twitter, Instagram, SnapChat, Periscope, YouTube or WhatsApp, there have been trends towards violence that can trigger and suicidal ideation. However, the measurement of the sociocultural and sociocognitive determinants of intensive use have not established integral models that explain the structure of relations between the variables. Therefore, the present work was proposed to validate an instrument that measures the phenomenon, considering the exposure or the intensive use of electronic networks. The factors that determine the intention of use in a factor structure that explained 63% of the total variance were confirmed, although the design limits the findings to the research scenario, suggesting the inclusion of another factor related to the behavior.
Introduction
In the area of Internet accessibility, Mexico occupies the last place with respect to other member countries of the Organization for Economic Cooperation and Development (OECD for its acronym in English). In contrast, Switzerland, Iceland and Finland have 100% coverage. If subscriptions trafficking, Mexico occupies the fifth place among their economies with less scribers Internet s. In this sense, Mexico is not among the countries with more intensive use of electronic devices and their applications [1].
Both approaches were synthesized by the Theory of Reasoned Action (TAR) and the Theory of Planned Behavior (TCP), antecedents of the Theory of the Acceptance of Technology (TAT). The TAR points as a key to rational decisions and the formation of capital to the beliefs that are generated from the available information. Access to information sources generates content categorization and establishment of topics to be rejected or accepted by users of the media [2].
This is how beliefs about the ease or usefulness of a technology will determine more punctually the intensive use of electronic devices. Also, the Theory of Social Entrepreneurship anticipate the outcropping of new agents, actors and subjects to the extent that electronic devices are evolving, innovation intensifies, and the risks increase [3].
Cyberbullying understood as a deliberate, premeditated and systematic attack on a group or individual over another group or individual helpless situation, it has been explained to do from differences between ethnic groups, gender differences, differences in pairs differences between aggressors, bystanders and victims, by type of harassment, differences for socialization, by using devices and speeches. But the cyberbullyng not been explained from perceptual variables [4].
Although relations between the perceptual variables explain brandished cyberbullying, we must consider a perceptual factor namely the perception of harassment. Psychological studies of entrepreneurship warn that the perception of opportunity, derived from digital services that the state managed or self - managed citizenship is indicated by the ability, opportunism, compromise, propensity, innovation, trust, motivation and dedication [5].
Information Technology and Communication (ICT) to influence educational and organizational systems foster the development of perceptions utility that relate directly with production decisions, management and reproduction of knowledge. Learning software involves not only profit expectations and profits but is also accompanied by the generation of a climate and commitment within the learning group [6].
However, the intensive use of ICT requires technical support since most of it deals with devices that require constant maintenance. That is why the perceived usefulness increases when the device or software technology is supported by an expeditious and effective technical support [7].
Uncertainty, risk and insecurity are factors that influence satisfaction in the use of software or electronic devices. In that sense, the profitability of a technological or electronic system is understood as one that reduces costs and maximizes benefits in terms of investment, time and system maintenance [8].
● Perceptions of risk determine general beliefs, unfavorable attitudes, heuristic decisions and unforeseen actions. O well:
● Perceptions of utility affect specific beliefs, favorable attitudes, planned decisions and systematic actions.
In the case of digital financial protocols, indicator of economic development and updating software to ensure the safety of investors, it creates uncertainty, risk, dissatisfaction and insecurity that inhibits alliances between multinationals and SMEs in local markets or the internationalization of SMEs through multinationals in the global market [9].
However, compatibility seems to have a greater influence on the acceptance of technology. Users who accept other technologies associated with the one they intend to adopt are closer to its consumption compared to those who have not been users of any technology linked to the one they intend to acquire [10].
In the case of electronic devices, intensive use is linked to user satisfaction. An increase in frequency and hours of use leads to an increase in levels of satisfaction with technology. It is a compatibility between the technology and the lifestyle of the user since in its daily activities the technology allows a greater comfort, entertainment, performance or satisfaction [11].
Although perceived quality selects the usefulness of the technology, it is the perception of effectiveness that determines the usefulness of this technology. In this sense, users develop expectations not only of improving their function or purposes, but the possible results that may be obtained by accepting a certain technology [12].
Associating psychological variables with sociological factors such as age, sex, occupation or income explain the individual and group situations that can be extended to the diagnosis of an organization, community or society. In that sense, a model of relations dependency would be relevant for the diagnosis of social group that intensively use ICT with emphasis on electronic and virtual social networks [13].
It refers to the digital enterprise freedoms and capabilities that precede change agents. Unlike Internet users react saturating servers to protest government policies, cyber agents are those who 1) provided the themes for dissemination in the communication and 2) influence the electorate through systematic dissemination of their rights to access unrestricted access to information and privacy of personal data [14].
Is thus the digital entrepreneurship is linked to the social agency while promoting change from the digital skills of the Internet rather than from the use of violence or civil disobedience [15].
Therefore, the establishment of issues on the public agenda is the result of a reverse process that the media kept to influence mass societies attributing stereotypes to social groups, but now in the information society, networks communication exceed the ratings, but above all influence the decisions and actions of citizens to establish an issue on the public agenda that relates to some unfortunate decision of the authorities or rulers [16].
If the digital venture is the result of public policies that promote inclusion of citizens in government affairs through digital services, then Digital Entrepreneurship Theory explains two processes: compliance and innovation. If domination and social control is the purpose of a state and its citizens, then play conformity and obedience would be two indicators contrast with entrepreneurship and characteristic innovation transforming the state and participated in citizen public policy [17].
The digital divide as a result of domination and social control, conformity and obedience is explained from the power exercised by the majority groups on minority groups. In contrast, the global village would spread confidence, entrepreneurship, commitment, innovation and satisfaction as central elements of state deregulation and citizen participation, but as a stage propellant perception of compatibility, usability and self - efficacy are determinants domination relations such as peer harassment [18].
Accordingly, the digital entrepreneurship understood as perceptions of opportunity and innovation management capabilities and a steerable knowledge to human development presupposes a community response to the issues concerning the digital divide [19].
In this network of relationships socio - cultural variables relating to standards, beliefs and values, socio economic and demographic variables such as gender, age, occupation, income, and marital status, and organizational variables concerning compatibility, flexibility, scalability, portability, credibility and privacy would be excluded. This is because the model explains the rational, deliberate, planned and systematic processes that underlie between users and technology [20].
Method
The research was carried out in a locality of central Mexico with low level of human development, considerable birth rate, low level of per capita income and professional instruction, as well as high citizen participation in municipal issues of fundraising, social entrepreneurship and innovation in the commercialization of products and services.
A non-experimental, cross-sectional, exploratory and correlational study was carried out with a non-probabilistic selection of 400 students from a public university, considering the system of professional practices and social service, as well as the framework of strategic alliances between the institution and dedicated organizations to the creation of knowledge.
The Cyberculture Expectancy Scale was used, which measures eight dimensions relative to; 1) values, 2) norms, 3) perceptions, 4) beliefs, 5) attitudes, 6) knowledge and 7) intentions related to the optimization of resources and process innovation. All reagents are answered with any of the options ranging from 0 "not likely" to 5 = "quite likely".
The Delphi technique was used to select, compare and integrate the allusive reagents to each of the seven dimensions, following the evaluations and recommendations of expert judges in the field.
The students were surveyed in the facilities of their university, provided a written guarantee of anonymity and confidentiality of their responses to the possible effects of the results of the investigation.
The information was processed in the statistical analysis package for social sciences (SPSS version 20.0). The parameters of normality, reliability, adequacy, sphericity, validity, fit and residual were estimated in order to contrast the null hypothesis regarding the significant differences between the theoretical relationships of the variables with respect to the empirical relationships to be observed.
The authors will declare that the document is free from conflict of interest, provided that in a framework of free access to information the dignity and integrity of the parties involved are guaranteed.
Results
The descriptive values that show the normal distribution of the responses to the reagents and that allow multivariate analysis such as reliability, adequacy, sphericity and validity. The subscales had values (respective alphas of, 780, 764, 706, 783, 790, 743, and 752) above the minimum threshold, suggesting the relationship between the established factors in order to observe their structure determining trajectories (see Figure 1).

Source: Elaborated with data study. A = Alpha removed value item. ⌠ᵪ2 = 435,3 (23gl) p < ,01; KMO = ,723⌡Method: Principals; Rotation: Promax. F1 = Values (16% total explained variance), F2 = Norms (14% total explained variance), F3 = Perceptions (12% total explained variance), F4 = Beliefs (10% total explained variance), F5 = Attitudes (7% total explained variance), F6 = Knowledge (3% total explained variance), F7 = Intentions (1% total explained variance). All items are answered with any of the options ranging from 0 = "not likely" to 5 = "quite likely".
Figure 1. Scree plot
The seven factors explained 63% of the total variance, suggesting the inclusion of another factor that the literature refers to as adoption or use of the Internet to address addiction and anxiety as factors associated with the intensive use of the Internet information, electronic devices (see Figure 2)

Figure 2. Exploratory factor model of legal expectancy in the COVID-19 era
Source: Elaborated with data study
The structure of relationships between the factors, indicators and measurement errors was estimated in order to observe the emergence of an explanatory model of the phenomenon.
The adjustment and residual values ⌠ᵪ2 = 32,3 (34gl) p < ,01; GFI = ,990; CFI = ,997; RMSEA = ,0008⌡suggest the non-rejection of the null hypothesis regarding the significant differences between the theoretical relations of the variables with respect to the reflective structural model of the expectations towards the Internet.
Discussion
The contribution of this work to the theoretical and conceptual frameworks and the findings reported by the state of knowledge lies in the proposal of a model for the study of exclusion and digital, or gap, building a global digital village in which entrepreneurship and innovation would be their preponderant indicators.
However, the model does not include variables of technological and organizational order perm i so anticipate differences between users no longer from their skills and knowledge, but s of the resources available and the groups to which they belong [21].
Thus, human development is not only a scenario of asymmetrical relations that result in violence and aggression, it is also an area of perceived usefulness in technologies and devices become instruments of harassment [22].
The cyberbullying referring to human development implies:
Opportunities, technologies and capabilities to reproduce the asymmetric relations that are developing in everyday life. In this regard, harassment, aggression and violence on the Internet and social networks indicate the convergence of electronic devices and computation skills used to exacerbate differences between aggressors and victims [23].
Internet and social networks as potential scenarios for harassment, aggression and violence as these technologies inhibit solitude with continuous and ongoing user interaction [24].
Conclusions
The objective of this paper was to explore the structure of the internet's legal expectation regarding security, although the research design limited the results to the sample surveyed, it suggests the extension of the work towards dimensions related to computer security such as theft of identity or cyber frauds. Regarding the applicability of computer, financial, educational and family policies, this paper warns that the emergence of a risk perception structure and disposition to them will generate a scenario of conflicts between social and political actors, as well as between sectors private and public for the protection of information and the protection of individual guarantees.
References
- A. Karnik (1999). “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India.
View at Publisher | View at Google Scholar - A. Simsek(2011). The relationships Between computer anxiety and computer self-efficacy. Contemporary Educational Technology,177-187.
View at Publisher | View at Google Scholar - C Garcia (2015). Towards a water agenda for sustainable local governance. Social Sciences, 130-154.
View at Publisher | View at Google Scholar - C. Garcia (2014). A sociopolitical approach to shortages, tariffs, subsidies and tandems relating to water services. Educational Testing, 73-98.
View at Publisher | View at Google Scholar - C. Garcia (2015). Dimensions of governance for water sustainability. Peoples and Borders,195-203.
View at Publisher | View at Google Scholar - C. Garcia (2015). Sociopolitical difference’s reliability to water conflicts between civilian actors. Invurnus, 3-13.
View at Publisher | View at Google Scholar - C. Garcia (2014). Specifying a model of social and political agenda on water conflicts and peacekeeping retributive OBETS, 249-265.
View at Publisher | View at Google Scholar - C. Garcia (2016). Specifying a model of social and political farsightedness Luna Azul, 270-292.
View at Publisher | View at Google Scholar - C. García (2015). Specifying a communication model of environmental risks to climate change. Entreciencias, 71-96 2015.
View at Publisher | View at Google Scholar - F. Bakabulindi (2012). Does use of ICT relate with the way it is perceived? Evidence from mekerere university. International Journal of Computing and ICT Research,75-94.
View at Publisher | View at Google Scholar - H. Kotaman(2010).Turkish early childhood educators’ sense of teacher efficacy. Education & Psychology,603-516.
View at Publisher | View at Google Scholar - H. Long (2013). The relationships Among learning orientation, market orientation, entrepreneurial orientation, and firm performance. Management Review, 37-46.
View at Publisher | View at Google Scholar - J. Breckling, Ed (1989). The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer.
View at Publisher | View at Google Scholar - J. Carreon (2015). Using SPSS and AMOS in a study of environmental thinking and voting intentions in a sample of students. Multi - disciplinarity, 73-95.
View at Publisher | View at Google Scholar - J. Padhye, V. Firoiu, and D. Towsley (1999). “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-102.
View at Publisher | View at Google Scholar - L. Summer (2011). The Theory of Planned Behavior and the impact of past behavior. International Business & Economics Research Journal, 91-110.
View at Publisher | View at Google Scholar - M. Shell (2002). IEEEtran homepage on CTAN. [Online].
View at Publisher | View at Google Scholar - M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin (2000). “High resolution fiber distributed measurements with coherent OFDR,” in Proc. ECOC’00, paper 11.3.4, p. 109.
View at Publisher | View at Google Scholar - R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn (1997). “High-speed digital-to-RF converter,” U.S. Patent 5 668-842.
View at Publisher | View at Google Scholar - S. M. Metev and V. P. Veiko (1998). Laser Assisted Microtechnology, 2nd ed., R. M. Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag.
View at Publisher | View at Google Scholar - S. Tekeher (2013). Mathematics teacher educator's and pre - service teacher's beliefs About the use of technology in teaching in African university. Internationl Journal of Innovative Interdisciplinary Research ,9-20.
View at Publisher | View at Google Scholar - S. Zhang, C. Zhu, J. K. O. Sin, and P. K. T. Mok (1999). “A novel ultrathin elevated channel low-temperature poly-Si TFT,” IEEE Electron Device Lett., vol. 20, pp. 569–571.
View at Publisher | View at Google Scholar - Y. Shaheen (2010). The perceived usefulness of information for investment decisions: Evidence from Palestine Securities Exchange Hebron University Research Journal, 283-307.
View at Publisher | View at Google Scholar - Y. Yuangion (2011). The impact of strong ties on entrepreneurial intention. An empirical study based on the mediating role of self-efficacy. Journal Entrepreneurship, 147-158.
View at Publisher | View at Google Scholar