Chapter

If We Build It They Will Come? The Technology Acceptance Model

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Global business markets have become more competitive as consumers demand low prices, an increasing variety of goods, and improved product quality. Businesses have turned to information technology to gain performance efficiency in this changing marketplace. Yet, as firms increase their investments in new ­information technology, they may find employees are reluctant to accept and effectively use the new technologies. The technology acceptance model is the most widely used theory by researchers to explore user acceptance. This chapter explores the development, use, and current status of the technology acceptance model, as well as critiques of the technology acceptance model. KeywordsTechnology acceptance model-Theory of reasoned action-User acceptance-Perceived ease of use-Perceived usefulness

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... Current research in this field demonstrates that proper utilization of information systems (henceforth IS) has crucial impact on several key individuals and organizational outcomes (Petter et al., 2013). IS provides a well-timed and precise information for users at different managerial levels (Adeoti-Adekeye, 1997;Costa et al., 2016;Pikkarainen et al., 2004) to achieve better efficiency, run-through better planning and take better decisions (Bradley et al., 2012;Petter et al., 2013). ...
... This study aims to test an integrative single model encompassing D&M McLean, 1992, 2003), TAM (Davis, 1985(Davis, , 1989(Davis, , 1993, and IS user utilization/satisfaction (medical performance, patient care and doctor-patient relationships) in healthcare context. Integrating several IS models helps create better understanding of the impact of technology (Bradley et al., 2012;Dishaw et al., 2002), particularly in multifaceted environmental settings (Tarhini et al., 2015). Thus, such integration is commonly perceived as a good practice that cherish our insight and understanding of adoption, acceptance, use and success of IS (Alqatan et al., 2017;Bradley et al., 2012;Chang, 2010;Dishaw and Strong, 1999;Lee and Lehto, 2013;Usoro et al., 2010;Wu and Chen, 2017). ...
... Integrating several IS models helps create better understanding of the impact of technology (Bradley et al., 2012;Dishaw et al., 2002), particularly in multifaceted environmental settings (Tarhini et al., 2015). Thus, such integration is commonly perceived as a good practice that cherish our insight and understanding of adoption, acceptance, use and success of IS (Alqatan et al., 2017;Bradley et al., 2012;Chang, 2010;Dishaw and Strong, 1999;Lee and Lehto, 2013;Usoro et al., 2010;Wu and Chen, 2017). The study also aims to examine the close and distant predictors of system utilization and IS user satisfaction, reflected in user performance, quality of healthcare and doctor-patient relationships. ...
Article
This study aims to investigate how e-health system characteristics (information quality, system quality, perceived ease of use, perceived usefulness) contribute to the enhancement of medical staff performance, patient care, and doctor–patient relationships at UNRWA-Gaza healthcare centers. It aims at testing an integrative single model comprising Technology Acceptance Model (TAM), D&M model and e-health system utilization. This study followed the quantitative methodology and the deductive research approach. Data were collected from 241 medical staff who use the system employed in 19 different healthcare centers across the Gaza Strip. Partial least square/structural equation modeling technique was used to analyze the collected data and to test study hypotheses. Study concluded that information quality of the adopted Health Information System (HIS) has both direct and indirect positive impact on staff performance, only direct positive impact on patient care and only positive indirect impact on doctor–patient relationship. System quality, on the other hand, was found to have negative direct impact and positive indirect impact on staff performance and has both direct and indirect positive impact on both doctor-patient relationship and patient care. Noteworthy that HIS has availability, speed and error detection and error prevention issues. It is recommended that these shortfalls be addressed together with improving user perception towards ease of use and usefulness of the system. Management should also work to raise confidence in its medical staff to improve the effect of HIS on medical performance and patient care. It is also recommended that UNRWA should implement crowed management techniques such as queuing systems and on-phone booking to minimize patient waiting time. The importance of the study stems from its context being conducted in a developing region (Gaza Strip-Palestine) which has a fragile economic, political and social environment with many other complexities. It is also conducted at United Nations Relief and Work Agency (UNRWA) healthcare centers, which provide medical services to Palestinian refugees. In addition, this study is among the few studies that address the impact of individual e-health success factors on both doctor-patient relationship and patient care constructs. Most previous studies concentrated on the impact of health system adoption as a whole on these two subject variables and one can hardly ever stop at studies that address effect of individual success factors on them. It also integrated both D&M system success model and TAM model with some additional amendments creating and tested a new model.
... Extant research shows that timely and accurate information is a key for better efficiency (Bradley et al., 2012). Moreover, using appropriate information leads to positive outcomes such as better planning, better decision-making, and better results on both individuals and organisational levels (Petter et al., 2013). ...
... On the other hand, the understanding of how people perceive and develop user acceptance and satisfaction of ISs is very important to individuals, system developers, and organisations. Such understanding can help organisations achieve better utilisation of their technological investments (Bradley et al., 2012). Technology acceptance model (TAM) is one of the most widely used IS models for explaining the process through which people adopt, accept, and use technology (Alqatan et al., 2017;Kumar and Shenbagaraman, 2017;Mortenson and Vidgen, 2016). ...
... However, TAM has been criticised for focusing on system usage and characteristics without enough recognition of performed tasks (Lee and Lehto, 2013) and there has been increased interest in combining it with other competing models (Bradley et al., 2012). In this regard, task-technology fit (TTF) model (Goodhue, 1995;Goodhue and Thompson, 1995) can play an important role through matching task characteristics (TCs) and requirements to IS outcomes (Khan et al., 2017) which can handle the deficit of applying TAM alone (Chang, 2010) and enhance its analytical power (Alqatan et al., 2017). ...
Article
This research focuses on studying the management information system (MIS) used in 16 Area Offices of Relief and Social Services Program (RSSP) at UNRWA- Gaza Strip. The research followed a quantitative methodology and a deductive approach. A survey was administered and 217 responses were received out of 274 questionnaires distributed to the targeted full-time employees working in 16 Area Offices, representing a response rate of 79.20%. For data analysis, SmartPLS 2.0 was utilized. The study findings reveal a strong impact of task-technology fit on perceived usefulness, perceived ease of use, and user satisfaction. Moreover, it is concluded that Task Characteristics has a significant negative relationship with Task-Technology Fit. In addition, Technology Characteristics and Computer Self-Efficacy have a significant positive relationship with Task-Technology Fit, while Technology Characteristics has the strongest effect on the Task-Technology fit. Theoretically, the study findings supported the merging of TAM and TTF models to study MIS utilization.
... The origins of TAM can be traced to the Theory of Reasoned Action (TRA) (Fishbein & Ajzen, 1975). TAM evolved from TRA with the goal of explaining the determinants of computer acceptance that is general, and capable of explaining user behavior across end-user computing technologies (Bradley, 2012). The two key variables in TAM perceived usefulness (PU) and perceived ease of use (PEOU). ...
... The two key variables in TAM perceived usefulness (PU) and perceived ease of use (PEOU). The theoretical support for the use of PU and PEOUcan be found in self-efficacy theory, the cost-benefit paradigm, and the adoption of innovation literature (Bradley, 2012). While TAM is referred to as the most influential and commonly employed theory in IS (Y. ...
... The studies did not measure actual usage but relied on the research subject to indicate usage. Furthermore, most of the studies used a single IS system in each research project limiting the generalizability of the results to other types of systems (Bradley, 2012). These limitations raise serious questions about the utility of TAM and related models like Unified Theory of Acceptance and Use of Technology (UTAUT) for understanding the life cycle of use and it is for these reasons and others that there have been widespread calls to go beyond TAM (Benbasat & Barki, 2007;Fidock & Carroll, 2010). ...
Article
Full-text available
The emergence of cloud computing is quickly redefining the information technology (IT) and business landscape. Cloud computing involves delivery of IT infrastructure, software and platforms as a service to the end users. This IT acquisition model saves organizations from huge capital expenditures on IT and the burden of keeping a huge IT department to provide system support. Cloud computing as an IT innovation is steadily generating a lot of interest within IT innovation researchers and practitioners. Extant research in IT innovation has heavily relied on the dominant paradigm which explains and predicts innovation adoption on the basis of economic-rationalistic models. These models assume a direct relationship between an organization’s innovator profile and the quantity of adoption in terms of earliness, frequency and extent of adoption. Further, they have always assumed a positive relationship between the quantity of innovation and quality of innovation. The advent of radical IT innovations like cloud computing calls for a rethinking of the dominant paradigm in terms of its efficacy in explaining innovative behaviors in organizations. Organizations hoping to adopt cloud computing are in need of a unifying IT innovation model that will help them discern whether, when and how to innovate. That is, they are concerned about the quality of innovation. This study proposes an IT innovation adoption model that incorporates the concept of mindfulness as a moderating factor between quantity of innovation and quality of innovation. The proposed conceptual model is a result of a thorough literature review of the IT innovation adoption research. This study, though conceptual, enriches cloud computing research by proposing an IT innovation model that suits its radical nature compared to other IT innovations. The proposed model once validated will also be of valuable use to practitioners and researchers interested in cloud adoption.
... The main objective of TAM is to examine external factors that might influence internal belief, attitude and behavioral intention [10] and [11]. It is the most widely referred model to describe and explain user acceptance and usage toward information system [12], [13], [14], [15], [16], and [17]. ...
... The result show that perceives ease of use (PEU) and usefulness (PU) as the main predictor of intention to use emoney (INT). The findings provide support for TAM to explain user acceptance and usage toward information system which has been proven by prior researchers such as [27], [12], [13], [28], [14], [15], [29], [16], [30], [31], [17], and [32]. Therefore, it can be implied that customers want to accept new technology or system if they perceive it is easy to operate and useful to improve customer performance. ...
... This study, therefore, was an online web-based survey study, which aimed at examining the influence of skills on the intention to adopt eLearning in university institutions in Tanzania. The study collected data using a 5-point Likert Scale questionnaire and it incorporated two variables, one variable, namely, Behavioural Intention adopted from TPB (Ajzen, 1985;Bradley, 2012;Miles, 2021), and the second variable, namely, Skills which was adopted from extensive literature review. ...
Article
eLearning comprises the use of electronic technology to deliver an innovative teaching and learning method that is well-designed, learner-centric, interactive, and provides a supported learning environment to everyone, regardless of location or time. The adoption of eLearning had a varying trend from the point of view of individuals to societies, and even across nations. However, skills had been singled as one of the important components in the adoption, use or continuance of using eLearning systems. This study aimed at examining the influence of Skills on the intention to adopt eLearning in university institutions in Tanzania. The study involved the Open University of Tanzania (OUT) and the Hubert Kairuki Memorial University (HKMU). Furthermore, the study using an electronic web-based survey, quantitative data were collected from a total of 371 respondents, sampled using simple random, purposive, stratified, and proportional sampling techniques. Whereas, academic staff, students, and Information and Communication Technology (ICT) staff were all involved. The study used IBM SPSS Version 22 and SPSS Amos Version 23 with Structual Equation Modeling, to analyze the collected data using Descriptive Statistics, Explolatory Factor Analysis (EFA), and Confirmatory Factor Analysis (CFA). The findings indicated that Skills had positive and statistically significant influence on the intention to adopt eLearning in university institutions in Tanzania. Moreover, further results revealed that Skills accounted for 50 percent toward the intention to adopt eLearning systems. As a result of these findings, the study acclaims that, the Skills variable be added to the Theory of Planned Behaviour (TPB) as one of the independent variables, in explaining adoption, use or continue using eLearning systems, especially, in the context of the developing countries, particularly Tanzania. The study’s results, further recommend additional research in different contexts, examining the influence of skills to the intention to adopt, use or continuing using eLearning systems in which the new TPB model in which skills would be included as one of the independent variables.
... But when it comes to video game industry, both extrinsic and intrinsic motivations are included in the TAM model. Consumers start accepting a new technology or services when they observe the new technology is improving their actions, the usefulness of the particular technology or service, and how much less effort it needs to use the technology or service (Bradley, 2012). ...
Thesis
Full-text available
Microtransactions based business model started with the rise of Digital distribution platforms and as a Game-As-A-Service model (GAAS). Any kind of purchases, from in-game items, DLCs, or even subscriptions that take place after buying the original product is called a microtransaction. While it is a great profitable business for the video game companies, this also led to a predatory microtransaction model in the form of 'Loot boxes'. This paper aims to show the differences between microtransaction based business model and traditional model, while taking a look at its profitability. It also explains the anti-consumer nature of MTX and loot boxes as well as the direct and indirect impact of this model in other industries. Through case studies, surveys and archival methods, all the research questions were answered. Data was collected through online participants in the form of survey. The reason of conducting an online survey was to collect responses of people playing games from different parts of the world. In this way, environmental and cultural factors will have a very marginal impact on the result as it will give an overall view on microtransactions and loot boxes in video games. Games such as League of Legends, Diablo: Immortal, Fortnite were taken as examples and some trend and traffic generating websites were used to generate the required data. It was found that, microtransaction model has definitely increased the profit by a lot as compared to the traditional model. Which is also why, other industries such as automobile are starting to implement this model in their products as well. From the survey that was conducted, it was found out that, a bad monetization practice can easily reduce the player base in a very short interval of time and has also reduced the stock prices of the video game companies themselves.
... Academic works on TAM began with the computer-technology acceptance of organizations (Akour et al., 2006), and then, it became a dominant model investigating the factors affecting the acceptance of individuals of a particular technology (Maranguni c and Grani c, 2015). In particular, the roots of this model go back to Fishbein and Ajzen's Expectancy-value theory (Fishbein and Ajzen, 1977) and the Theory of Reasoned Action (TRA) (Ajzen and Fishbein, 1980) study of cognitive psychology (Bradley, 2012;Silva, 2007). However, TAM in the modern sense first came to the fore when Davis (1989) implied the importance of technology in increasing corporate performance. ...
Article
Purpose The purpose of this article is to examine the impact of digital technology (specifically mobile applications) use on employees' perceptions of motivation at work (MW) and job performance (JP). Design/methodology/approach Survey data were collected from 4,089 employees working in small and medium-sized enterprises (SMEs) registered to Small and Medium Enterprises Development Organization (SMEDO) in Turkey. The relationships were assessed through structural equation modeling with bootstrap estimation. Findings The results support the proposed framework illustrating the positive effect of perceived usefulness (PU) and perceived ease of use (PEOU) of mobile applications on employees' perceived JP. Findings indicate that MW has exhibited a mediating effect between both PU and JP and PEOU and JP. Originality/value This article discusses the accelerating role of coronavirus disease 2019 (COVID-19) pandemic on SMEs' technology acceptance and the acceptance's positive impact on employees' motivation and performance. This article adds to the literature on SMEs by enabling researchers and practitioners to understand the issues in digital technologies acceptance by SME employees and contributes towards enriching the knowledge on technology acceptance perceptions' role in SMEs coping strategies during the COVID-19.
... This study, which was an online web-based survey study, adopted specific objective four that aimed at at examining the influence of behavioural intention on the adoption of eLearning in university institutions in Tanzania. The adopted questionnaire in the data collection used a 5-point Likert scale across all scales (1: strongly disagree to 5: strongly agree), and it incorporated the two variables from the TPB model (Ajzen, 1985;Bradley, 2012;Miles, 2012), in which Behavioural Intention, as well as, the actual use, in this case, eLearning Adoption, were adopted. The model was used to collect the data. ...
Article
Full-text available
eLearning systems have been used a lot, especially in universities, as a way to improve teaching and learning, especially because they make teaching and learning easier and more flexible. However, different countries, regions, cultures, and societies have adopted them at different rates. This study aimed at examining the influence of behavioural intention on the adoption of eLearning in university institutions in Tanzania, in which the Open University of Tanzania and the Hubert Kairuki Memorial University were involved, the Theory of Planned Behaviour was utilized in the study. The study employed an electronic web-based survey to obtain data from 371 respondents using simple random, purposive, stratified, and proportional sampling techniques. Academics, students, and ICT staff participated. Using IBM SPSS Version 22 and Amos Version 23 with SEM, data were analyzed using both exploratory factor analysis (EFA), and Confirmatory Factor Analysis (CFA). The findings revealed that Behavioural Intention positively influenced eLearning Adoption in university institutions in Tanzania. Since the behavioural intention only accounted for 5% of the eLearning Adoption, the study therefore recommended for additional studies to investigate other factors that influence university institutions toward adoption, use or continuance of using eLearning. Further, this study included only two university institutions, it is therefore, recommended that more universities be included in further research in order to investigate future prospects of universities to adopt, use, or continue using eLearning systems.
... Among these popular models are Theory of Reasoned Action (TRA) (Fishbein & Ajzen, 1975), Protection Motivation Theory (PMT) (Rogers, 1975) and Technology Threat Avoidance Theory (TTAT) (Liang & Xue 2009). Out of these models, TTAT has been identified as the most simple and different model that can explain over 40 percent of threats avoidance and behaviour (Samhan, (Bradley, 2012). Core variables of TTAT to end users are perceived severity, perceived vulnerability and self-efficacy. ...
Article
Full-text available
The purpose of this paper is to examine the combined roles that perceived severity, perceived vulnerability, self-efficacy and perceived security play on the usage of internet banking. It also aims to determine the ability of perceived severity to transfer the effect of other determinants of internet banking users. In order to empirically test the conceptual model of this study, data were collected from the users of internet banking in Nigeria. The primary source of data was utilized for data collection using the simple random sampling (SRS). A total number of 500 questionnaires were administered; 463 were retrieved. The data obtained was analysed using SmartPLS - for measurement and structural model. Seven hypotheses developed in the study were tested through the correlation and regression analysis regarding their relationships. The results indicated that four out of the seven hypothesise variables obtained from the analysis provided support for the hypothesized relationships, it is apparent that the significant positive influence of perceived severity, self-efficacy and perceived vulnerability of internet banking users indicated that the variables are essential requirements in enhancing phishing avoidance behaviour in the banking sector. In addition, the study shows significant relationship self-efficacy and perceived security of IB users in the banking sector. Therefore, it is recommended that phishing avoidance behaviour and perceived security should be made statutory in the Nigerian- banking sector to help in preventing cybercrime attack and fraudulent practices. Hence the need to create awareness and expand the application of phishing avoidance behaviour in Nigerian banking sector. Keywords: Perceived severity, Perceived vulnerability, Perceived security, self- efficacy, and Internet banking users
... TAM was introduced by Davis in the late 1980s (Akman and Mishra, 2015), and is built on two main elements of perceived usefulness (PU) and perceived ease of use (PEOU). PU and PEOU both directly influence the user's attitude toward using new information technology which in turn leads to the user's behavioral intention (BI) to use (Bradley, 2012). Besides directly influencing attitude, PU also influences BI which leads to computer usage. ...
Article
Full-text available
Purpose Proliferation of digital devices amongst patrons implies that libraries are faced with the challenge of providing conducive study spaces to patrons. This study, therefore, aims to establish the effect of digital devices on noise levels in the Mzuzu University Library and measures that have been taken to curb it. Design/methodology/approach The study was anchored by the technology advancement model. The mixed methodological design was used and involved use of qualitative and quantitative techniques. Questionnaires were used to collect data from a sample of 110 students, whilst an interview was conducted with one librarian responsible for managing service. SPSS was used to analyse quantitative data, whilst qualitative data was presented by following order of the themes. Findings The findings revealed that students owned a number of digital devices that included smartphones, laptops and augmented reality/virtual reality headsets which they deployed for a variety of uses. The findings further indicated that use of digital devices in the library has resulted in an upsurge in noise levels. Measures taken by students and library staff to tackle the problem have had limited success. Practical implications The prevalence of mobile digital devices has resulted in high levels of noise in academic libraries. However, this has not diminished users’ desire for a quiet study place. This paper, therefore, offers some insights of how libraries can combat the problem of noise to ensure that libraries remain attract to all groups of users. Social implications Besides transforming the way people do business and interact with others, digital devices have also negatively impacted people and society in the form of increased road traffic accidents due to misuse. Promoting responsible use of digital devices in the library may have spill-over effects, in that library patrons may become more disciplined in their usage of the digital devices elsewhere, thereby help eradicate the ills that have come about due to their wanton use. Originality/value Some studies that have been done have pointed to a high prevalence rate of digital devices at Mzuzu University. However, none of them has investigated the impact the existing digital devices have had on noise levels in the library. This study is one of the first studies to be done on the topic not only at Mzuzu University but also academic libraries in Malawi. It is further hoped that action taken based on the recommendations made would lead to reduced noise levels in the library that will lead to creation of a conducive place for study.
... Literature review Technology acceptance model, halal tourism and sharia mobile banking One of the most popular research frameworks for elaborating the factors for individual acceptance of information technology (Hussein, 2017;Lee et al., 2003;Renko and Popovic, 2015;Wang and Liu, 2005), TAM featured in over 7,000 citations on Google Scholar as of 2010 (Bradley, 2012). One reason many researchers use TAM is its ability to provide reliable research results (Surendran, 2012) by exploring the influence of external factors on internal beliefs, attitudes and intentions (Davis et al., 1989). ...
Article
Purpose The increasing number of tourists in the Muslim world every year has encouraged digital business developers and the Sharia banking industry to integrate halal product and service apps with the Sharia mobile banking system. The fourth wave of the industrial revolution has changed the consumer paradigm, creating a young generation that uses digital service transaction systems in their daily lives. This paper aims to investigate the factors that determine intention to use halal tourism apps amongst Muslim tourists to provide insights promoting the development of halal tourism in Indonesia. Design/methodology/approach The research was conducted using an online survey approach. The sample comprised 205 Muslim Millennial and Generation Z travellers. The data collected were analysed using partial least square structural equation modelling. There were three analysis stages: evaluation of the measurement model, assessment of the structural model and hypothesis testing. Findings The findings indicated that trust mediated the relationship between perceived ease of use and perceived usefulness on individual intentions and that halal knowledge positively and significantly impacted individual intentions. In contrast, religiosity was not a significant influence on individual intentions. Originality/value The paper expanded the technology acceptance model by incorporating the key constructs of halal knowledge, religiosity and trust into an integrated research framework; this represented a novel step, especially in the context of halal tourism. The finding that trust mediated the relationship between perceived ease of use and perceived usefulness fills a gap in previous research, which has rarely included the trust construct in technology acceptance models.
... Up to now, numerous models have been developed to explain and predict the intention to use (and use of) information systems. Among these, the technology acceptance model (TAM) [55] is the one that has been widely used, and by many is described as the most influential in IS theory to explore user acceptance [56]. ...
... Up to now, numerous models have been developed to explain and predict the intention to use (and use of) information systems. Among these, the technology acceptance model (TAM) [55] is the one that has been widely used, and by many is described as the most influential in IS theory to explore user acceptance [56]. ...
Conference Paper
Full-text available
Factors affecting mobile business intelligence (m-BI) acceptance and use have become an increasingly important topic in practice due to the growing complexity of organizations, and their underlying information systems (IS). Since, one can notice considerable interest in m-BI, however, to the best of our knowledge few studies (if any) aim to synthesize the existing body of knowledge with regards to the factors affecting m-BI acceptance and use. To fill this gap, we conducted a systematic literature review and summarized the current state of the art. By addressing research questions, we identified a set of five factors, namely: Perceived Value, Perceived Ease of Use, Managerial Attitudes, Facilitating Conditions and Quality of Information, and specified their interrelationships. Moreover, we introduce an acceptance model (m-BIAM) on behavioral intention and use mobile Business Intelligence solutions. The contribution of this study lies in these evidence-based findings, which lay a solid foundation for further studies in the extent of testing and evaluating the m-BIAM model, targeted at delivering more evidence to confirm its validity and predictive power.
... Up to now, numerous models have been developed to explain and predict the intention to use (and use of) information systems. Among these, the technology acceptance model (TAM) [55] is the one that has been widely used, and by many is described as the most influential in IS theory to explore user acceptance [56]. ...
Preprint
Factors affecting mobile business intelligence (m-BI) acceptance and use have become an increasingly important topic in practice due to the growing complexity of organizations, and their underlying information systems (IS). Since, one can notice considerable interest in m-BI, however, to the best of our knowledge few studies (if any) aim to synthesize the existing body of knowledge with regards to the factors affecting m-BI acceptance and use. To fill this gap, we conducted a systematic literature review and summarized the current state of the art. By addressing research questions, we identified a set of five factors, namely: Perceived Value, Perceived Ease of Use, Managerial Attitudes, Facilitating Conditions and Quality of Information, and specified their interrelationships. Moreover, we introduce an acceptance model (m-BIAM) on behavioral intention and use mobile Business Intelligence solutions. The contribution of this study lies in these evidence-based findings, which lay a solid foundation for further studies in the extent of testing and evaluating the m-BIAM model, targeted at delivering more evidence to confirm its validity and predictive power.
... This study uses Technology Acceptance Model (TAM) to see the factors that affect user acceptance of OPAC. TAM is the theory most commonly used by researchers to explore user acceptance [12]. TAM stated that behavioral intension to use information system are determined by two beliefs: perceived usefulness and perceived ease of use. ...
Article
Full-text available
Online Public Access Catalog (OPAC) is one of the e-catalog information technologies applied in libraries. OPAC is a library information retrieval system that can be accessed online. State Islamic University of Sunan Kalijaga Yogyakarta has been using OPAC since 2012 and OPAC users are increasing from year to year. An information system will be used by users if it suits their needs. The successful implementation of OPAC raises questions about the factors that influence this success. For this reason, this study aims to determine the factors that influence users to use OPAC. Structural Equation Modeling (SEM) is a multivariate statistical technique which is a combination of factor analysis and regression analysis (correlation) which aims to examine the relationships between variables in a model. Processing using SEM will be carried out to find the relationship between the variables to be tested, which variables are interconnected, and are there any unrelated variables. The results of processing the variables using SEM can show what variables attract users to use the e-catalog. Acceptance of information systems can be measured by several evaluation models that have been developed at this time. There are many evaluation models used to measure. Technology Acceptance Model (TAM) is the appropriate model to use for this study, because this study is about the acceptance of a system. In addition, several previous studies used by researchers as references also used TAM as their study method to assess user acceptance of a system. This study modifies TAM, which is used to determine user acceptance of an information system, by adding three exogenous variables, information quality, perceived enjoyment, and user interface. Results of this study proved that information quality, user interface, perceived usefulness, perceived ease of use, and behavioral intention to use, are all factors that influence the actual use of OPAC. Perceived enjoyment is a variable that cannot be proved affects the actual use of OPAC.
... Inúmeros modelos teóricos foram desenvolvidos para descrever a aceitação da tecnologia, tais como, a teoria da difusão da inovação (IDT) (Rogers, 1983), a teoria cognitiva social (SCT) (Bandura, 1986), a teoria da ação racional (TRA) (Fishbein, 1979), e a teoria do comportamento planejado (TPB) (Ajzen, 1991). Entre esses modelos teóricos, o TAM tem sido o mais utilizado e citado por pesquisadores (Bradley, 2012). ...
Article
Full-text available
Diversos bancos oferecem aos usuários a possibilidade de acessar e realizar transações pela internet. Porém, as contas digitais não são apenas serviços de “internet/mobile banking”, são contas em que não há interação do consumidor com um funcionário em uma agência física. Na última década, a inovação digital tem-se destacado, observado pelo surgimento de novas tecnologias, plataformas e infraestruturas, com amplas implicações organizacionais e políticas. O objetivo deste artigo foi avaliar como os benefícios das contas bancárias digitais se enquadram no modelo de aceitação de tecnologias, proposto por Venkatesh e Davis (1996), considerando a estrutura de valor dos bancos selecionados. Trata-se de um estudo qualitativo e exploratório, apoiado pela metodologia de estudo de caso, com dados primários coletados de maneira virtual, a partir de uma amostra composta por correntistas dos bancos selecionados. Os resultados demonstraram que a isenção de taxas bancárias, comodidade e facilidade para movimentação de conta são os principais atributos valorizados em uma conta digital. Ademais, embora o modelo de aceitação de tecnologias não tenha sido testado estatisticamente, o estudo evidenciou que é eficaz para pesquisas bancárias, sendo confirmada a aceitação da tecnologia de bancos digitais por meio dos resultados referentes a utilidade e facilidade de uso percebido.
... User's intention to accept and their behavior to use new system or information technology (IT) can be described and explained by TAM (Hussein, 2017;Bradley, 2012). The model can predict customer behavior in e-commerce activity (Pavlou, 2003), e-government (Hamid et al., 2016), e-banking (Liébana-Cabanillas et al., 2013), the use of electronic payment (Plouffe et al., 2001;Hanafizadeh et al., 2014) as well as smartphone (Mugo et al., 2017). ...
Article
Purpose Prior studies in the context of electronic money have examined the effect of social pressure [subjective norm (SN)] on usage intention, but the results are found inconclusive. Individual factor is said to be one of the reasons. Therefore, this study aims to propose knowledge about riba (KR) as the individual factor that might explain the inconsistent previous findings. Design/methodology/approach A total of 253 responses are collected using online questionnaire. The data are examined by using structural equation modeling (SEM). The interaction moderation technique is used to investigate the moderating role of KR on intention to use e-money. Findings The results show that SN significantly influences customers’ perceived usefulness (PU), ease of use (PEU) and intention to use e-money (INT). PU is also proven as a direct predictor of INT. On the contrary, PEU does not significantly influence customer INT, providing support for the indirect effect of hypotheses between PEU–PU–INT. Furthermore, KR is found moderate in the link between PU and INT. Interestingly, the moderating effect of KR does not exist in the relationship from SN and PEU to INT. Research limitations/implications This study has a limitation in terms of the samples that are mainly dominated by students. Students’ perception might be different from practitioners’. Practical implications The results indicated that Indonesian customers are getting aware and knowledgeable about riba. It weakens the effect of PU on INT. SN as a social factor has also a strong effect on INT. As a practical implication, this paper suggests the government to develop and regulate a more Sharia -compliant business model for e-money. The public must be well informed and also well educated. The socialization and education must be included in any Muslim communities. In addition, given the fact that the chip-based e-money products in Indonesia are owned by conventional banks, it is going to be a wise idea if the government can partner up with the Islamic banks to design and develop the Sharia -compliant e-money. Originality/value This paper contributes to the electronic money and internet banking literature by considering Islamic principle factor, that is the rise of public KR. This paper show that inconclusive previous findings might be depended on the public KR.
... Thus, technology acceptance (TA) is an important aspect for the success of IT investments, which is why a plethora of prior research has addressed TA (Marangunić and Granić 2014). Davis et al. (1989) have published their initial Technology Acceptance Model (TAM) almost 30 years ago and it has become the most widely used theory IS researchers draw on to investigate the human behaviour with respect to TA (Bradley 2012), despite numerous criticisms directed at TAM itself and TA research in general (Bagozzi 2007;Lee et al. 2003). ...
... E-banking has changed that system, service acceptance, TAM is widely cited (Alalwan et al., 2016). According to Google Scholar citation report, Davis' (1989) original TAM has been cited 7,714 times as at June, 2010 (Bradley, 2012). The core variables of TAM are PU and perceived ease of use of a technological products or services. ...
Article
Purpose – The purpose of this paper is to examine the combined roles that perceived usefulness,perceived ease of use, perceived security and hedonic motivation play on the adoption of e-banking. It also aims to determine the ability of hedonic motivation to transfer the effect of other determinants of e-banking adoption. Design/methodology/approach– In order to empirically test the conceptual model of this study,data was collected from the users of e-banking in Nigeria. A total of 266 questionnaires were analyzed using Partial Least Square Structural Equation Modeling. Findings– The empirical results revealed a significant and positive relationship between perceived usefulness, perceived security and e-banking adoption. The same result was found to be applicable to the relationship between perceived usefulness, perceived ease of use, perceived security and hedonic motivation. However, support was not found for the relationship between perceived ease of use and adoption of e-banking. Hedonic motivation plays a mediating rolebetween perceived usefulness, perceived security and e-banking adoption. The study did not find a mediating effect of hedonic motivation between perceived ease of use and e-banking adoption. Practical implications– The results of this study provide insights for banking practitioners to know which aspect of e-banking to improve and to aid with policies that will increase adoption. Furthermore, improvements in hedonic motivation will also significantly increase adoption of e-banking.
... Dengan menggunakan TAM dapat diketahui faktor mana saja yang memiliki pengaruh yang besar terhadap kebermanfaatan suatu teknologi. TAM digunakan untuk memprediksikan penerimaan dan menguji alasan penolakan pengguna dalam menggunakan sistem dan pengaruh dari desain sistem terhadap penerimaan pengguna [8], [10]. Sedangkan rancangan antarmuka sistem menu terdapat variabel yang tidak berpengaruh secara signifikan secara langsung yaitu PK → PNM, dengan nilai p value (0,048) yang lebih besar dari 1% sehingga diambil kesimpulan untuk gagal tolak H0. ...
Article
Full-text available
Decision support systems, commonly called DSS (or SPK in Bahasa), in medical used to diagnose illness. But within its implementation these systems are not used optimally. The main cause is the interface of the systems that is not accordance with the user wants. Three interface designs layouts were proposed for the phase of history and physical examination and two interface designs layouts for investigations to be assessed by the respondents. Based on the results of the questionnaires selected by respondents, statistical tests were performed to determine the value of the use of interface design based on the Technology Acceptance Model (TAM) and modified TAM. The statistical methods used to examine the effect of variables on TAM and modified TAM i.e. the Structural Equation Modeling Partial Least Square (SEM PLS) method. The results of this study indicate that the respondents’ choice in the TAM and modified TAM model for the history and physical examination is the same as the based filling system. While for the supporting stage there are differences of respondent choice on TAM model with choice of graphical interaction system and on modified TAM model with windowing system option.
... There are however, challenges that come along with the adoption of e-exams. Some teachers are still reluctant to adopt e-exams as they are inclined to change their examination habits (Kuikka, Kitola & Laakso, 2014;Joseph, 2012). A number of factors such as security, human interference, the complexity of the software and inadequate training for staff and students constitute a major challenge on the implementation of e-exams (Adebayo & Abdulhamid, 2010;Adegbija, Fakomogbon & Daramola, 2012). ...
Article
Full-text available
This study sought students' views about e-exams at CQUniversity with its multiple campus locations. Data were gathered by conducting four focus group interviews with students enrolled at three different courses. After completing the e-exams consisting of short-answers and essay-type questions, the students participated in a focus group interviews. They were asked their views of the current e-exams software, the benefits and challenges and the prospects of e-exams. The students reported the ineffectiveness of the software particularly with the navigation system, which lacked useful features. In general, the students were positive about the adoption of e-exam and suggested a number of improvements in the software and in the management of e-exams. Findings from this small-scale study could be used as a point of reference for future adoption of e-exams at CQUniversity.
... Numerous theoretical models describing technology acceptance have been developed in the field of psychology and sociology, such as the Innovation Diffusion Theory (IDT) (Rogers, 1983), Social Cognitive Theory (SCT) (Bandura, 1986), Theory of Reasoned Action (TRA) (Fishbein, 1979), Theory of Planned Behavior (TPB) (Ajzen, 1991), Technology Acceptance Model (TAM), and Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al., 2003). Among these theoretical models, TAM has been the most widely used and cited by many researchers, with more than 7,000 citations, as reported by Google Scholar citations in 2010 (Bradley, 2012). TAM popularity is likely due to three aspects. ...
Article
Full-text available
This study was undertaken to explore the determinants affecting behavioral intention to adopt mobile banking among generation Y. Based on the theoretical model incorporating the Unified Theory of Acceptance and Use of Technology (UTAUT) and the Technology Acceptance Model (TAM), in this study, a revised and extended model was proposed in order to better explain mobile banking adoption. Moreover, the aim was to determine the mediating effect of hedonic motivation on independent mobile banking adoption. The proposed model was empirically tested using survey data provided by 480 respondents and was further analyzed using a structural Equation model (SEM). The analysis results indicated that the revised model had a good fit in the context of mobile banking adoption by generation Y. In addition, hedonic motivation of mobile banking users was identified as the most important factor motivating customers to adopt mobile banking, whereas mobile banking system security had a negative relationship with hedonic motivation. The results can be used by banking institutions to develop strategies and to improve their services in order to increase the adoption of mobile banking among generation Y.
... On further analysis, the theory used is development of Technology Acceptance Model (TAM). TAM is used to predict acceptance by the user of computer [11]. Besides that, TAM is also used to test the reasons for user refusal in using the system and the influence of the system design to user acceptance. ...
Article
Full-text available
Many decision support systems have been developed to diagnose diseases, but in reality many of these systems fail when applied. This is mainly due to the difficulties in the use of the system due to incompatibility between the system interface and the wishes of physicians. The purpose of this study was to determine the interface design of decision support systems for diseases diagnose in accordance with physician’s wishes and to determine the effects of perceived usefulness and perceived ease of use on the behavioral intention to use the interface design. The data analysis technique used included the Wilcoxon test, the Friedman test, a principal component analysis and a multiple linear regression analysis. From the data analysis it was found that in anamneses and physical examinations, respondents prefer the interface design of natural language processing and a form filling dialogue, whereas in supported examinations, respondents prefer windowing system interface designs. Advanced data analyses found an influence of the variables of perceived usefulness and perceived ease of use on the behavioral intention to use and this influence has a positive effect.
... Beberapa literatur yang melakukan studi tentang penerimaan teknologi telah menggunakan PLS [26], [28], [34]- [37]. PLS merupakan alat yang andal untuk menguji model prediksi karena memiliki beberapa keunggulan [31]. ...
Article
Full-text available
In-App Purchase or payment system based on application is one of promising revenue model in mobile application for application developers or marketers. However, in-app purchase is placed in the lowest rate compared to other model. This paper attempts to present the analysis of in-app purchase adoption viewed from the user behavior of mobile application as consumers. This study is conducted by combining the unified theory of acceptance and use of technology approach that was developed (UTAUT2) with involving perceived security aspect. The result shows that the habit of potential users, information security assurance, and hedonic motivations of potential users are the main supporting factors in adopting in-app purchase. Those factors can be admitted as a reference in developing mobile application, in order to make in-app purchase can be accepted and used by potential users of mobile application.
... PEoU is defined as the degree to which a person believes that using a technology will be free from effort (Davis 1989). PEoU has been a widely-used variable in IS/IT studies, including those on the Internet (Bradley 2012, Jebeile and Reeve 2007, Seyal and Rahman 2003, m-commerce (Yang 2005), and mobile services (López-Nicolás, Molina-Castillo, andBouwman 2008, Nysveen, Pedersen, andThorbjørnsen 2005b). PEoU has also been identified as a significant factor for location tracking and location awareness services . ...
Article
Full-text available
The purpose of this study is to establish and examine the significance of a consumer acceptance and continuance model for location-based services (LBSs) through the integration of perceived entertainment gratification (PEG) and perceived application quality (PAQ) with the technology acceptance model (TAM). By arguing that behavioural intention (BI) does not automatically lead to actual use (AU), we investigated the moderating effect of facilitating conditions (FC) on the relationship between BI and AU. A quantitative study was conducted in Australia and Bangladesh; data were obtained from multiple sources by systematic sampling of the distribution of questionnaires. For data analysis we applied the partial least square (PLS) method. The results indicate that, in both Australia and Bangladesh, perceived usefulness (PU), PEG and PAQ have significant influence on user attitude (UA), which has a subsequent effect on BI. Interestingly, perceived ease of use (PEoU) does not have a direct effect on UA but indirectly influences it through PU—confirming the mediating effect of PU. Further, FC has a moderating effect between BI and AU. The implications of these findings and directions for future research directions are also discussed.
... Although TAM has been widely applied, the theory has not fully explained various factors (e.g. economic, emotional, and social factors) that affect the adoption decision (Bradley 2012). For instance, perceived usefulness and ease of use alone do not fully capture a user's task environment, so extending the theory with contextual factors and integrated additional theories is required. ...
Article
Full-text available
Streaming media devices have recently become one of the innovative IT devices used to replace traditional smart TV sets. In order to examine user acceptance of streaming media device, this study proposes an extended research model based upon flow theory and investigates the relationship among flow, perceived usefulness, product-related characteristics (i.e., content quality, functionality, ease of use, portability), and a manufacturer-related characteristic (i.e., trust). Partial least square methodology was employed to test the proposed model and corresponding hypotheses on data collected from 305 survey samples. The results showed that flow and perceived usefulness, two mediating variables, has a significant influence on usage intention. Among the four antecedents reflecting product-related attributes, content quality has the strongest effect on flow. Interestingly, functionality and ease of use affected only perceived usefulness in an indirect way through flow. Thus, flow mediates the effect of functionality and ease of use on perceived usefulness. This study discusses a number of implications and offers insights useful for both researchers and practitioners.
... Previous research has typically employed the TAM to examine those systems (See Table 1). Although TAM has been widely applied, later studies found that TAM does not explain the variance in an individual's intention well (Bradley, 2012). Perceived usefulness and ease of use alone do not fully capture a user's task environment while human, social, and technological factors were largely unaccounted for in the original TAM model. ...
Article
E-government systems effectively deliver public services to citizens as well as improve productivity and reduce costs for government departments. A pressing issue for many governments is how to expand citizen acceptance of e-government systems. Prior studies on e-tax filing and payment systems have identified various factors for successful adoption, but do not capture the basic psychological needs of users in developing countries. This study examines the determinants of citizens’ intention to adopt an e-tax filing and payment system in Thailand. The unified theory of acceptance and use of technology is integrated with self-determination theory, perceived risk, and perceived credibility to develop a model to explain the users’ acceptance of e-government services. A large-scale survey of Thai taxpayers was conducted and the results show that performance expectancy, facilitating conditions, social influence, and perceived credibility are all significant factors. Perceived autonomy and perceived competence are significant antecedents for performance and effort expectancy (EE). Perceived risk and EE surprisingly did not influence users’ intentions. Several recommendations are proposed that have an immediate application for practitioners to aide in the successful adoption of e-government services.
... Indeed, the TAM has been considered as one of the most popular and acceptable models within the IS field (Rana et al., 2013;Venkatesh et al., 2003). For instance, according to a Google scholar report, 7,714 citations have been recorded for the original study of Davis et al. (1989) by the end of June 2010 (Bradley, 2012). Further, as reported by Rana et al. (2013), Venkatesh and Davis (2000), and Irani et al. (2009), the TAM is one of the strongest and rational models to predict the individual's intention and acceptance over the last two decades. ...
... With increased complexity of information systems, the logical conclusion seems to be that efficiency ought to be increased through their use as well. In reality though, the "productivity paradox" (low financial returns on information technology investments") (Bradley 2012) seems to be valid as well for corporate use of social and mobile media. Throughout this paper, the terms web 2.0 and social media will be used interchangeably. ...
Article
Full-text available
This paper critically reflects predictions that social and mobile media will revolutionize internal and external corporate processes and collaboration approaches by analyzing the current usage of social software and mobile media in various firm's operational fields in German-speaking countries. It further aims at identifying some of factors that influence the implementation and application of social software and mobile media in SMEs. To serve these aims, this paper present study results from an online survey from 2012 on the usage of social and mobile media in 240 SMEs. Existing studies will be analyzed and compared to the results. The study shows that mobile media and social networks are mainly used for customer relationship management and for the internal communication but not for the partner communication and collaboration. The study indicates that companies lack well-defined implementation strategies and frameworks to successfully embed social and mobile media in the corporate culture and structures.
... Secondly, TPB ensures parsimony and provides a solid ground to broaden the existing philosophy on technology acceptance. Bradley (2012) indicated that the additional number of antecedents increases complexity and raises the question of parsimony even though TAM2 and UTAUT have stronger explanatory power than the original models. In addition, Benbasat and Barki (2007) suggested that going back to TRA or TPB would provide the impetus for transcending currently spotlighted models such as TAM and UTAUT, allowing for novelty and discovery. ...
Article
This study develops and empirically tests a research model to comprehensively examine factors influencing the success of the mobile office (i.e., adoption) in business. In particular, this study proposes an integrated theoretical framework that combines the theory of planned behaviour (TPB) and the perspective of perceived value. By doing so, it aims to examine not only fundamental determinants of an information system (IS) adoption proposed by TPB (i.e., attitude, subjective norm, and behavioural control) but also various psychological and emotional factors that determine users' attitude towards IS through the perspective of perceived value. The results indicate that perceived value, colleague opinion and self-efficacy are critical antecedents that increase users' intention to adopt new technology. Furthermore, perceived usefulness and social image are the salient drivers of mobile office adoption because they increase users' value; on the other hand, performance risk and psychological risk are the salient barriers to adoption because they reduce users' value.
... As the theory was parsimonious and had strong empirical support, (Davis, 1989) adopted this as an overarching theory to explain adoption behavior toward information systems. However, TAM did not well explain the variance in user behavior, and provided limited implications for new technology adoption because of its parsimony (Bradley, 2012). Moreover, TAM did not provide a unifying model of all the user acceptance factors, and ignored institutional or external influences (Lucas Jr et al., 2008). ...
... Nous avons souhaité, à ce stade de nos travaux, utiliser ces tests afin de mobiliser le Technology Acceptance Model 3 ou TAM 3 (Davis, 1989;Venkatesh & Davis, 2000;Venkatesh, et al., 2003;Venkatesh & Bala, 2008;Bradley, 2012;Davis, et al., 1989). TAM 3 (figure 32) est un modèle intégrateur de TAM 2 (Venkatesh & Davis, 2000) et du modèle des déterminants de la facilité d'utilisation perçue (Venkatesh, 2000). ...
Article
Since the beginning of the 21st century, the French Army Light Aviation (ALAT) has been concerned with the process of digitalization of the battlefield. In the meantime, only very few scholars had addressed this issue although the consequences of such studies could lead to a paradigm shift in the aerocombat. This Ph.D. thesis aims to outline a series of new outcomes in terms of evolutions of the Information System understood from the perspective of emerging uses developed by the ALAT pilots dealing with Helicopter Mission Planning. This research studies the emerging uses apprehended as “bricolages” in Ciborra’s sense and in the sociomateriality theoretical framework. However, the operationalization of the results is subject to the epistemological framework of critical realism, on the one hand, and to the implementation of new methods in terms of experience feedbacks (Lessons Learned), on the other hand.
Article
The gig economy has played a significant role in the country's economic development and has led to the growth in the employment of the people worldwide by supplementing the primary income of the people. With the security and autonomy that the gig sector promises, people choose to work as gig workers rather than traditional workers. Almost every company uses an enterprise resource planning system (ERPs) to some extent to improve its performance and competitiveness. This paper devises a conceptual model describing how ERP systems help improve the human resource management of the gig workers, maintain customer relations, and bring digital transformation to its business. The research model would provide an understanding of diagnosing how the ERP system can help improve the conditions of the gig workers and the potential problems faced by them in the areas where the ERP system is not working efficiently. The framework would provide insights in simplifying the implementation of ERP in the gig sector that would be useful in the future.
Article
Full-text available
Penelitian ini bertujuan untuk menganalisis minat penggunaan aplikasi pembayaran seluler dalam masa pandemi Covid-19 dengan menggunakan model TRI dan TPB. Data dikumpulkan dari 200 pengguna aplikasi pembayaran seluler di Indonesia. Teknik analisis data yang digunakan yaitu SEM-PLS. Hasil penelitian membuktikan bahwa semua konstruk TPB yaitu sikap, norma subjektif, dan kontrol prilaku yang dirasakan berpengaruh signifikan terhadap minat penggunaan aplikasi pembayaran seluler. TRI berpengaruh terhadap sikap. TRI tidak berpengaruh secara langsung terhadap minat penggunaan aplikasi pembayaran seluler, tetapi berpengaruh melalui sikap. Hasil dari penelitian ini akan membantu penyedia layanan aplikasi pembayaran seluler dan pembuat kebijakan dalam merencanakan layanan dan meningkatkan niat penggunaan aplikasi pembayaran seluler pada masa pandemi Covid-19. Penelitian ini adalah yang pertama secara empiris mengguji model TPB dan TRI untuk menjelaskan adopsi dan minat menggunakan aplikasi pembayaran seluler pada masa pandemi Covid-19. Hasil penelitian akan menambah pengetahuan yang ada tentang literatur aplikasi pembayaran seluler pada masa pandemi.
Article
Full-text available
Web-based information systems designed to increase access to species occurrence data for use in research and natural resource decision-making have become more prevalent over the past few decades. The effectiveness of these systems depends on their usability and extent of use by their intended audiences. We conducted an online survey of academics and government professionals in the United States to compare their species occurrence data needs and their perceptions and use of web-based species occurrence information systems. Our results indicate that although views and perceptions held by academics and government professionals about the importance, usefulness, and ease of use of these information systems tend to be similar, there were differences in their use of species occurrence data and web-based species occurrence information systems. The baseline information obtained in this study will help inform future directions for improvements in species occurrence information systems.
Article
Full-text available
Conceptual modelling of nodding syndrome (NS) has hardly been considered in most scientific literature although symptoms of the disease have been widely studied. A conceptual model is a representation of hypothesis about a system under investigation and enables a comparison between hypothesis and data. Since nodding syndrome is an unexplained neurological illness that mainly affects children aged between 5 to 15 years, without specific diagnosis and treatment, the aetiology remains unknown and under investigation, conceptual modelling may be a crucial ingredient in understanding the disease. The purpose of the study is therefore, to represent nodding syndrome occurrence and immune-pathogenic pathways in the causation of nodding syndrome using system dynamics approaches. We have used systematic review method to filter literature on nodding syndrome from the year. We also used Systems Dynamic Approach and we emphasized confirmed scientific investigation to enable the relationships conform to reality. Vensim software was preferred for implementation of the casual-loop diagrams. Microsoft Office Visio 2007 was identified as suitable for implementation of the sequence conceptual model of nodding syndrome for its ability to show interactions between electrolytes and other actors. Our findings were that system dynamics approach has not been used research of nodding syndrome. More so, conceptual modeling was not considered by most articles.
Book
Full-text available
Conceptual modelling of nodding syndrome (NS) has hardly been considered in most scientific literature although symptoms of the disease has been widely studied. A conceptual model is a representation of hypothesis about a system under investigation and enables a comparison between hypothesis and data. Since nodding syndrome is an unexplained neurological illness that mainly affects children aged between 5 to 15 years, without specific diagnosis and treatment, the aetiology remains unknown and under investigation, conceptual modelling may be a crucial ingredient in understanding the disease. Purpose of the Study: The purpose of the study is therefore, to represent nodding syndrome occurrence and immune-pathogenic pathways in the causation of nodding syndrome using system dynamics approaches. Methodology: We have used systematic review method to filter literature on nodding syndrome from the year. We also used Systems Dynamic Approach and we emphasized confirmed scientific investigation to enable the relationships conform to reality. Vensim software was preferred for implementation of the casual-loop diagrams. Microsoft Office Visio 2007 was identified as suitable for implementation of the sequence conceptual model of nodding syndrome for its ability to show interactions between electrolytes and other actors. Findings: Our findings were that system dynamics approach has not been used research of nodding syndrome. More so, conceptual modeling were not considered by most articles.
Article
Purpose – The need for universities to connect with local communities and to make research relevant to the public has been highlighted over recent years through the debate about public engagement. At the same time, the Internet and its applications have made it possible for universities and academics to engage with the public in an easier and more effective way. The objective of this study is to examine the factors that motivate academics to engage with the public online. Design/methodology/approach – The Decomposed Theory of Planned Behaviour and Uses and Gratifications Theory were used as a basis for the study's research model. An online survey was conducted and 250 valid responses were used for the data analysis (Structural Equation Modelling). Findings – The results indicate that although academics seem to use online technologies for public engagement, this use takes the form of a one-way communication as the most influential factors of attitude when it comes to engaging with the public are image and information seeking rather than networking. Originality/value – While there are some studies about the use of online technologies for teaching or for networking purposes within academia, little is known about academics' intentions to engage with the public online. The study attempts to fill this gap and help universities understand their staff’s motivation and needs, which could be useful when it comes to launching successful public engagement campaigns.
Article
Purpose The purpose of this paper is to examine the combined roles that perceived usefulness (PU), perceived ease of use, perceived security and hedonic motivation play on the adoption of e-banking. It also aims to determine the ability of hedonic motivation to transfer the effect of other determinants of e-banking adoption. Design/methodology/approach In order to empirically test the conceptual model of this study, data were collected from the users of e-banking in Nigeria. A total of 266 questionnaires were analyzed using partial least square structural equation modeling. Findings The empirical results revealed a significant and positive relationship between PU, perceived security and e-banking adoption. The same result was found to be applicable to the relationship between PU, perceived ease of use, perceived security and hedonic motivation. However, support was not found for the relationship between perceived ease of use and adoption of e-banking. Hedonic motivation plays a mediating role between PU, perceived security and e-banking adoption. The study did not find a mediating effect of hedonic motivation between perceived ease of use and e-banking adoption. Practical implications The results of this study provide insights for banking practitioners to know which aspect of e-banking to improve and to aid with policies that will increase adoption. Furthermore, improvements in hedonic motivation will also significantly increase adoption of e-banking. Originality/value This study is one of the pioneer studies that tests the mediating influence of hedonic motivation.
Conference Paper
Information Systems (IS) are omnipresent in today’s organizations. While much research has been performed on adoption, implementation, and use of IS, still many practitioners are faced with IS change endeavors in organizations that equal “death march” projects and fail before or directly after go-live. Research with a positivist stance has thoroughly studied factors that describe individuals’ intentions to adopt or use technology, while largely ignoring social and organizational contexts. Researchers with a constructivist view, on the other hand, have studied how social processes and structures change or emerge in the light of the new IS. We suggest that there is a need to combine what we know from these two streams in an attempt to clarify terminological bafflement that seems to be caused by the different philosophical stances. Our paper contributes by suggesting a framework and methodology for collecting and re-assembling scattered conceptual pieces of organizational and individual IT adoption and integrating them into a coherent understanding.
Article
This paper investigates the role the default effect plays in choosing IT systems. This paper presents two studies concerning the acceptance of Gmail (vs. a self-hosted mailing system) and of legal (vs. illegal) movie downloading. Classic factors such as the perceived usefulness and ease of use of a system hardly explain the intent to use default systems. Including the perception of an alternative system in the model significantly increases the R² of the intent to use the default system. Social influence plays a much bigger role in explaining the intent to use default systems than in the intent to use alternative systems.
Article
Purpose – By studying the drivers of social collaboration the purpose of this paper is to describe how, and for what job-related purposes, social software is employed in the digital workplace. Focussing on consultants, who are considered to be part of a knowledge-intensive and innovative industry, factors that may influence the adoption of professional social software are explored. In addition, insights about socio-demographic differences as well as distinct consulting segments and use categories are provided. Design/methodology/approach – The Unified Theory of Acceptance and Use of Technologies (UTAUT) is the theoretical backbone of this research. The UTAUT model is expanded to fit the research goals, and the results from a quantitative study (n=341) are used to test the model. Findings – The results suggest that the adoption of social software is associated with the expectation that one’s work performance will improve. There are significant differences regarding age and gender in the use of social software for job-related purposes. Practical implications – Using the results of the study, social software suites can be tailored to users’ needs and preferences, which, in turn, may lead to higher levels of acceptance and intensity of use. Originality/value – Social software is already widely adopted for private purposes, and it is being used more and more within the digital workplace, too. However, little research has been conducted into how, and for what job-related purposes, social software is employed, or into the potential drivers for its adoption. The stakeholders in the research include scholars and practitioners alike.
Conference Paper
Purpose – The purpose of this paper is to propose and examine a conceptual model that best explains the key factors influencing Jordanian customers ' intention to adopt mobile banking (MB). Design/methodology/approach – The proposed conceptual model was based on the Technology Acceptance Model (TAM). This was extended by adding perceived risk and self-efficacy as an external factors. Structural equation modelling (SEM) was conducted to analyse the data collected from the field survey questionnaires administered to a convenience sample of Jordanian banking customers. Findings – The results showed that behavioural intention is significantly influenced by perceived usefulness, perceived ease of use, and perceived risk. Research limitations/implications – Practical and theoretical implications for both Jordanian banks and researchers in the MB context are also discussed in the concluding section. Originality/value – MB-related issues are yet to be examined empirically in the Jordanian context. This submission has attempted to fill this gap by empirically examining some of the important factors influencing the adoption of MB from the Jordanian customers’ perspective.
Article
Full-text available
This research examines electronic commerce participation and attitudes by older Americans. Questionnaires were distributed at a large retirement community and several senior centers located in Pennsylvania. The sample of 110 respondents ranged in age from 52 to 8 7. Fifty-nine percent reported purchasing an item online in the last 6 months. The Technology Acceptance Model (TAM) was used and modified to examine the impact attitudes concerning ease of use, usefulness and trust had on electronic commerce usage. Usefulness and trust were found to have a positive, direct affect on usage. Ease of use had significant impacts on usefulness and trust had a significant impact on both ease of use and usefulness. The article concludes with a discussion of these results, study limitations, and directions for future research.
Article
Full-text available
A study developed and validated new scales for perceived usefulness and perceived ease of use, which were hypothesized to be fundamental determinants of user acceptance. The definitions of the 2 variables were used to develop scale items that were pretested for content validity. The items were then tested for reliability and construct validity in 2 studies involving a total of 152 users and 4 application programs. After refining and streamlining the measures, the resulting 2 scales of 6 items each demonstrated reliabilities of .98 for usefulness and .94 for ease of use. The scales also exhibited high convergent, discriminant, and factorial validity. In both studies, usefulness had a greater correlation with usage behavior than did ease of use, though both were significantly correlated with current usage and future usage. Regression analyses suggest that perceived ease of use may actually be a casual antecedent to perceived usefulness, as opposed to a direct determinant of system usage.
Article
Full-text available
While the technology acceptance model (TAM), introduced in 1986, continues to be the most widely applied theoretical model in the IS field, few previous efforts examined its accomplishments and limitations. This study traces TAM's history, investigates its findings, and cautiously predicts its future trajectory. One hundred and one articles published by leading IS journals and conferences in the past eighteen years are examined and summarized. An open- ended survey of thirty-two leading IS researchers assisted in critically examining TAM and specifying future directions.
Article
Full-text available
ABSTRACT Prior research has provided valuable insights into how and why employees make a decision about the adoption and use of information technologies (ITs) in the workplace. From an organizational point of view, however, the more important issue is how managers make informed decisions about interventions that can lead to greater acceptance and effective utilization of IT. There is limited research in the IT implementation literature that deals with the role of interventions to aid such managerial decision making. Particularly, there is a need to understand how various interventions can influence the known determinants of IT adoption and use. To address this gap in the literature, we draw from the vast body of research on the technology acceptance model (TAM), particularly the work on the determinants of perceived usefulness and perceived ease of use, and: (i) develop a comprehensive nomological network (integrated model) of the determinants of individual level (IT) adoption and use; (ii) empirically test the proposed integrated model; and (iii) present a research agenda focused on potential pre- and postimplementation interventions that can enhance employees' adoption and use of IT. Our findings and research agenda have important implications for managerial decision making on IT implementation in organizations.
Article
Full-text available
Addresses the centrality of the self-efficacy mechanism (SEM) in human agency. SEM precepts influence thought patterns, actions, and emotional arousal. In causal tests, the higher the level of induced self-efficacy, the higher the performance accomplishments and the lower the emotional arousal. The different lines of research reviewed show that the SEM may have wide explanatory power. Perceived self-efficacy helps to account for such diverse phenomena as changes in coping behavior produced by different modes of influence, level of physiological stress reactions, self-regulation of refractory behavior, resignation and despondency to failure experiences, self-debilitating effects of proxy control and illusory inefficaciousness, achievement strivings, growth of intrinsic interest, and career pursuits. The influential role of perceived collective efficacy in social change and the social conditions conducive to development of collective inefficacy are analyzed. (21/2 p ref) (PsycINFO Database Record (c) 2006 APA, all rights reserved). © 1982 American Psychological Association.
Article
Full-text available
MIS researchers have developed a number of models for studying the software utilization choices of end users, including the Task-Technology Fit Model and the Technology Acceptance Model. We are exploring the similarities and differences among these models with a goal of developing combined models with more explanatory power. This paper proposes a model that extends the task-technology fit model with a computer self-efficacy construct.
Article
Full-text available
The present research develops and tests a theoretical extension of the Technology Acceptance Model (TAM) that explains perceived usefulness and usage intentions in terms of social influence and cognitive instrumental processes. The extended model, referred to as TAM2, was tested using longitudinal data collected regarding four different systems at four organizations (N = 156), two involving voluntary usage and two involving mandatory usage. Model constructs were measured at three points in time at each organization: preimplementation, one month postimplementation, and three months postimplementation. The extended model was strongly supported for all four organizations at all three points of measurement, accounting for 40%--60% of the variance in usefulness perceptions and 34%--52% of the variance in usage intentions. Both social influence processes (subjective norm, voluntariness, and image) and cognitive instrumental processes (job relevance, output quality, result demonstrability, and perceived ease of use) significantly influenced user acceptance. These findings advance theory and contribute to the foundation for future research aimed at improving our understanding of user adoption behavior.
Article
Full-text available
Computer systems cannot improve organizational performance if they aren't used. Unfortunately, resistance to end-user systems by managers and professionals is a widespread problem. To better predict, explain, and increase user acceptance, we need to better understand why people accept or reject computers. This research addresses the ability to predict peoples' computer acceptance from a measure of their intentions, and the ability to explain their intentions in terms of their attitudes, subjective norms, perceived usefulness, perceived ease of use, and related variables. In a longitudinal study of 107 users, intentions to use a specific system, measured after a one-hour introduction to the system, were correlated 0.35 with system use 14 weeks later. The intention-usage correlation was 0.63 at the end of this time period. Perceived usefulness strongly influenced peoples' intentions, explaining more than half of the variance in intentions at the end of 14 weeks. Perceived ease of use had a small but significant effect on intentions as well, although this effect subsided over time. Attitudes only partially mediated the effects of these beliefs on intentions. Subjective norms had no effect on intentions. These results suggest the possibility of simple but powerful models of the determinants of user acceptance, with practical value for evaluating systems and guiding managerial interventions aimed at reducing the problem of underutilized computer technology.
Article
Full-text available
Research on individual-level technology adoption is one of the most mature streams of information systems (IS) research. In this paper, we compare the progress in the area of technology adoption with two widely-researched streams in psychology and organizational behavior: theory of planned behavior and job satisfaction. In addition to gauging the progress in technology adoption research, this allows us to identify some fruitful areas for future research. Based on our comparison, we conclude that there has been excellent progress in technology adoption research. However, as a next step, we call for research focused on interventions, contingencies, and alternative theoretical perspectives (to the largely social psychology-based technology adoption research. Also, we believe it would be important to use the comparisons discussed here as a basis to develop a framework-driven set of future research directions to guide further work in this area.
Article
Full-text available
Benbasat and Barki (2007) argue that TAM has been both a blessing and curse for the IS field and they detail reasons why this is the case. Our response to their critique is to highlight areas of agreement, disagree with one of their assertions, and extend their thinking along another, related line. Specifically, we agree that some TAM constructs, namely perceived usefulness and system usage, need to be more closely examined in order to break up the "black box" portrayal of these concepts. Our view of Benbasat and Barki's characterization of TAM as unassailable is that common methods bias has never been well tested and that TAM linkages may in fact be methodological artifacts. Finally, it is argued that the field desperately needs more parsimony in TAM models and that meta-analysis is one good way of achieving this goal.
Article
Full-text available
The technology acceptance model (Davis 1989) is one of the most widely used models of IT adoption. According to TAM, IT adoption is influenced by two perceptions: usefulness and ease-of-use. Research has shown that perceived usefulness (PU) affects intended adoption of IT, but has mostly failed to do so regarding perceived ease of use (PEOU). The basic proposition of this study is that this varying importance of PEOU may be related to the nature of the task. PEOU relates to assessments of the intrinsic characteristics of IT, such as the ease of use, ease of learning, flexibility, and clarity of its interface. PU, on the other hand, is a response to user assessment of its extrinsic, i.e., task-oriented, outcomes: how IT helps users achieve task-related objectives, such as task efficiency and effectiveness. Accordingly, the study theorizes that PEOU directly affects IT adoption only when the primary task for which the IT is deployed is directly associated with intrinsic IT characteristics, such as when the task itself is an integral part of an IT interface. Extending this proposition to e-commerce, it was hypothesized that when a Web site is used to purchase products, PEOU would not affect IT adoption because IT ease-of-use is not an inherent quality of the purchased product. On the other hand, when the Web site is used to inquire about products, PEOU should affect IT adoption because the required information is embedded in the IT and thus its quality is directly related to IT ease-of-use. Data collected from 217 subjects in a free simulation experiment support these hypotheses. Implications for future Web development and theoretical refinements are discussed.
Article
Full-text available
Training is still a neglected part of most ERP implementation projects. This case study investigates the relation between training satisfaction and • the perceptions of ease of use, • the perception of usefulness, • effectiveness and • efficiency in implementing an ERP system at a mid-sized organization. Training satisfaction is viewed as a necessary condition for technology acceptance. A survey of 143 employees involved in the implementation of ERP in a mid-sized university was conducted. ANOVA and t-tests were used to explore differences in training satisfaction among groups of users by gender, job type, and education level. We found that training satisfaction differed based on job type and gender but not education level. Multiple regression analysis found (1) post implementation training satisfaction related to ease of use and (2) current training satisfaction and user participation related to perceived efficiency and effectiveness of the ERP systems in doing respondents’ jobs. Keywords: ERP; ease of use; technology acceptance model; training; use
Article
Full-text available
This study investigates technology adoption behavior of Saudi Arabian knowledge workers using desktop computers within the context of TAM2, and the unique effects of Saudi culture on IT adoption within the developing, non-Western, country. Following the guidelines of the etic-emic research tradition, which encourages cross-cultural theory and framework testing, the study findings reveal that the TAM2 model accounts for 40.3% of the variance in behavioral intention among Saudi users, which contrasts Venkatesh and Davis’ (2000) explained 34-52% of the variance in usage intentions among U.S. users. The model’s explanatory power differs due to specific Saudi Arabian emic constructs, including its collectivist culture and the worker’s focus on the managerial father figure’s influence on individual performance, a stark difference from TAM findings in more individualistic societies. The authors’ findings contribute to understanding the effects of cultural contexts in influencing technology acceptance behaviors, and demonstrate the need for research into additional cultural factors that account for technology acceptance.
Article
Full-text available
The relationship between information technology (IT) and productivity is widely discussed but little understood. This article summarizes what we know and do not know, distinguishes the central issues from diversions, and clarifies the questions that can be profitably explored in future research. After reviewing and assessing the research to date, it appears that the shortfall of IT productivity is as much due to deficiencies in our measurement and methodological tool kit as to mismanagement by developers and users of IT. The key findings and essential research references are highlighted and discussed.
Article
Full-text available
Enterprise systems are gaining interest from both practitioners and researchers because of their potential linkages to organizational and individual user's productivity. Information systems (IS) researchers have been investigating the implementation and adoption issues of enterprise systems based on the organizational IS management perspectives. However, there are few papers that investigate enterprise systems management and implementation issues based on the informal control mechanisms, although the enterprise systems are control tools in the organization. Specifically, this paper applies Enterprise Resource Planning (ERP) adoption and implementation to the informal controls, such as cultural control and self-control, which can be viewed as a tacit perspective in knowledge management. Uncertainty avoidance and perceived enjoyment are used as informal controls in the ERP implementation in this paper, and are linked to the technology acceptance variables to investigate the relationships among them. Sociotechnical design, organizational control mechanism, knowledge management, and individual motivation are reviewed to support this potential linkage in the model. Field data via the online survey of ERP systems user group (n= 101) are analyzed with partial least squares and supported our hypotheses. Uncertainty avoidance cultural control and intrinsic motivation as self-control are the important antecedents of ERP systems adoption. Furthermore, the result helps the systems manager understand that informal controls should be applied to the ERP systems implementation to enhance tacit and social aspects of IS management.
Article
Full-text available
Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empiri- cally compare the eight models and their exten- sions, (3) formulate a unified model that integrates elements across the eight models, and (4) empiri- cally validate the unified model. The eight models reviewed are the theory of reasoned action, the technology acceptance model, the motivational model, the theory of planned behavior, a model combining the technology acceptance model and the theory of planned behavior, the model of PC utilization, the innovation diffusion theory, and the social cognitive theory. Using data from four organizations over a six-month period with three points of measurement, the eight models ex- plained between 17 percent and 53 percent of the variance in user intentions to use information technology. Next, a unified model, called the Unified Theory of Acceptance and Use of Tech- nology (UTAUT), was formulated, with four core determinants of intention and usage, and up to four moderators of key relationships. UTAUT was then tested using the original data and found to outperform the eight individual models (adjusted
Article
Full-text available
Much previous research has established that perceived ease of use is an important factor influencing user acceptance and usage behavior of information technologies. However, very little research has been conducted to understand how that perception forms and changes over time. The current work presents and tests an anchoring and adjustment-based theoretical model of the determinants of system-specific perceived ease of use. The model proposes control (internal and external--conceptualized as computer self-efficacy and facilitating conditions, respectively), intrinsic motivation (conceptualized as computer playfulness), and emotion (conceptualized as computer anxiety) as anchors that determine early perceptions about the ease of use of a new system. With increasing experience, it is expected that system-specific perceived ease of use, while still anchored to the general beliefs regarding computers and computer use, will adjust to reflect objective usability, perceptions of external control specific to the new system environment, and system-specific perceived enjoyment. The proposed model was tested in three different organizations among 246 employees using three measurements taken over a three-month period. The proposed model was strongly supported at all points of measurement, and explained up to 60% of the variance in system-specific perceived ease of use, which is twice as much as our current understanding. Important theoretical and practical implications of these findings are discussed.
Article
Full-text available
Expectancy-value theory emphasizes the importance of outcome expectancies for behavioral decisions, but most tests of the theory focus on a single behavior and a single expectancy. However, the matching law suggests that individuals consider expected outcomes for both the target behavior and alternative behaviors when making decisions. In this study, we expanded expectancy-value theory to evaluate the contributions of two competing expectancies to adolescent behavior problems. One hundred twenty-one high school students completed measures of behavior problems, expectancies for both acting out and academic effort, and perceived academic competence. Students' self-reported behavior problems covaried mostly with perceived competence and academic expectancies and only nominally with problem behavior expectancies. We suggest that behavior problems may result from students perceiving a lack of valued or feasible alternative behaviors, such as studying. We discuss implications for interventions and suggest that future research continue to investigate the contribution of alternative expectancies to behavioral decisions.
Article
Article
In recent years, there has been a large body of literature devoted to the acceptance and use of information technology. Researchers have built on the work of Davis to refine the technology acceptance model (TAM) and to use it in various research settings to predict acceptance of information systems. The present study extends that research into Latin America by examining email usage among two distinct populations and investigating possible moderating effects that Hofstede's four cultural dimensions have on the TAM constructs. We examine potential moderating effects by using inferential statistics to test the hypotheses of this research. Our findings indicate that TAM functions well across cross-cultural boundaries but in their current form, it is impossible to test the impact of the individual culture dimensions on the relationships in the TAM model. To address this obstacle an alternative to Hofstede's measurement is suggested for future research.
Article
Protection of physical assets and digital information is of growing importance to society. The need for development and use of security technologies is ever increasing. As with any new technology, user acceptance of new software and hardware devices is often hard to gauge and policies to introduce and ensure adequate and correct usage of such technologies are often lacking. Security technologies have widespread applicability to different organizational contexts that may present unusual and varied adoption considerations. This study adapts the technology acceptance model and extends it to study the intention to use security devices, more specifically biometrics, across a wide variety of organizational contexts. Due to the use of physiological characteristics, biometrics present unique adoption concerns. The extension of the technology acceptance model for biometrics is useful, as biometrics encompass many of the same adoption concerns as traditional security devices, but include a level of invasiveness that is obvious to the user. Through the use of vignettes, this study encompasses a systematically varied set of usage contexts for biometric devices to provide a generalizable view of the factors impacting intention to use over all categories of situational contexts of the device’s use. The technology acceptance model is extended in this study to include constructs for perceived need for privacy, perceived need for security and perceived physical invasiveness of biometric devices as factors that influence intention to use. The model is shown to be a good predictor of intention to use biometric devices and implications of the results for biometric and security technology acceptance is discussed.
Article
A proposed theory of planned behavior, an extension of Ajzen and Fishbein's (1980, Understanding attitudes and predicting social behavior. Englewood-Cliffs, NJ: Prentice-Hall) theory of reasoned action, was tested in two experiments. The extended theory incorporates perceived control over behavioral achievement as a determinant of intention (Version 1) as well as behavior (Version 2). In Experiment 1, college students' attendance of class lectures was recorded over a 6-week period; in Experiment 2, the behavioral goal was getting an “A” in a course. Attitudes, subjective norms, perceived behavioral control, and intentions were assessed halfway through the period of observation in the first experiment, and at two points in time in the second experiment. The results were evaluated by means of hierarchical regression analyses. As expected, the theory of planned behavior permitted more accurate prediction of intentions and goal attainment than did the theory of reasoned action. In both experiments, perceived behavioral control added significantly to the prediction of intentions. Its contribution to the prediction of behavior was significant in the second wave of Experiment 2, at which time the students' perceptions of behavioral control had become quite accurate. Contrary to expectations, there was little evidence for interactions between perceived behavioral control and the theory's other independent variables.
Article
Traducción de: Communication of Innovations. A Cross-Cultural Approach
Book
Getting an innovation adopted is difficult; a common problem is increasing the rate of its diffusion. Diffusion is the communication of an innovation through certain channels over time among members of a social system. It is a communication whose messages are concerned with new ideas; it is a process where participants create and share information to achieve a mutual understanding. Initial chapters of the book discuss the history of diffusion research, some major criticisms of diffusion research, and the meta-research procedures used in the book. This text is the third edition of this well-respected work. The first edition was published in 1962, and the fifth edition in 2003. The book's theoretical framework relies on the concepts of information and uncertainty. Uncertainty is the degree to which alternatives are perceived with respect to an event and the relative probabilities of these alternatives; uncertainty implies a lack of predictability and motivates an individual to seek information. A technological innovation embodies information, thus reducing uncertainty. Information affects uncertainty in a situation where a choice exists among alternatives; information about a technological innovation can be software information or innovation-evaluation information. An innovation is an idea, practice, or object that is perceived as new by an individual or an other unit of adoption; innovation presents an individual or organization with a new alternative(s) or new means of solving problems. Whether new alternatives are superior is not precisely known by problem solvers. Thus people seek new information. Information about new ideas is exchanged through a process of convergence involving interpersonal networks. Thus, diffusion of innovations is a social process that communicates perceived information about a new idea; it produces an alteration in the structure and function of a social system, producing social consequences. Diffusion has four elements: (1) an innovation that is perceived as new, (2) communication channels, (3) time, and (4) a social system (members jointly solving to accomplish a common goal). Diffusion systems can be centralized or decentralized. The innovation-development process has five steps passing from recognition of a need, through R&D, commercialization, diffusions and adoption, to consequences. Time enters the diffusion process in three ways: (1) innovation-decision process, (2) innovativeness, and (3) rate of the innovation's adoption. The innovation-decision process is an information-seeking and information-processing activity that motivates an individual to reduce uncertainty about the (dis)advantages of the innovation. There are five steps in the process: (1) knowledge for an adoption/rejection/implementation decision; (2) persuasion to form an attitude, (3) decision, (4) implementation, and (5) confirmation (reinforcement or rejection). Innovations can also be re-invented (changed or modified) by the user. The innovation-decision period is the time required to pass through the innovation-decision process. Rates of adoption of an innovation depend on (and can be predicted by) how its characteristics are perceived in terms of relative advantage, compatibility, complexity, trialability, and observability. The diffusion effect is the increasing, cumulative pressure from interpersonal networks to adopt (or reject) an innovation. Overadoption is an innovation's adoption when experts suggest its rejection. Diffusion networks convey innovation-evaluation information to decrease uncertainty about an idea's use. The heart of the diffusion process is the modeling and imitation by potential adopters of their network partners who have adopted already. Change agents influence innovation decisions in a direction deemed desirable. Opinion leadership is the degree individuals influence others' attitudes
Article
From the Publisher:This book provides a straightforward guide to the economic issues behind the debates about the role of computers in the nation's economy. To set the stage, Daniel Sichel reviews the essential facts about computers in the economy, with a particular emphasis on software. Using quantitative and historical analysis, supplemented by interviews with business leaders and other professionals, Sichel assesses the aggregate economic impact of computers in recent decades and looks ahead to their future impact. When compared with the size of the slowdown in productivity growth in the 1970s, he finds that recent contributions of computers to growth seem relatively modest. And, looking ahead, Sichel suggests it is doubtful that these contributions will surge in coming years. Thus, despite the importance of information technology, some caution is in order; computers may not be a magic bullet for productivity growth.
Article
This paper presents an extension to the technology acceptance model (TAM) and empirically examines it in an enterprise resource planning (ERP) implementation environment. The study evaluated the impact of one belief construct (shared beliefs in the benefits of a technology) and two widely recognized technology implementation success factors (training and communication) on the perceived usefulness and perceived ease of use during technology implementation. Shared beliefs refer to the beliefs that organizational participants share with their peers and superiors on the benefits of the ERP system.Using data gathered from the implementation of an ERP system, we showed that both training and project communication influence the shared beliefs that users form about the benefits of the technology and that the shared beliefs influence the perceived usefulness and ease of use of the technology. Thus, we provided empirical and theoretical support for the use of managerial interventions, such as training and communication, to influence the acceptance of technology, since perceived usefulness and ease of use contribute to behavioral intention to use the technology.
Article
This paper reflects upon the technology acceptance model (TAM) from the perspective of the post positivistic philosophy of science. I explore what it is to know, what a theory is, and what it means to be scientific in the context of TAM. In particular, I review criteria for determining whether TAM is scientific or not in light of post-positivistic debates about the nature of science. For this purpose, I apply Popper's principle of demarcation, which determines whether a theory-like TAM-is falsifiable and the logical connection argument to show that connections between actions and intentions cannot be subjected to empirical testing similar to connections between chemical entities. I also draw on Kuhn's notion of scientific revolutions to observe the degree to which TAM has become normal science. Finally, I review TAM from the Lakatosian perspective of scientific research programs to evaluate whether the program is advancing or declining. My main objective is not to provide a conclusive evaluation of TAM as a research program or a paradigm, but to open the philosophical foundations of TAM for scrutiny so that it can be evaluated not only within the validation rules followed by its proponents, but by applying a set of well known criteria established in the post-positivistic views of science.
Article
In the past two decades the Technology Acceptance Model ( TAM) has successfully catalyzed a large number of studies related to IT usage or intentions toward that usage. However, we argue that the focus of these studies has been on a narrow aspect of usage ( typically, extent or frequency of use). Moreover, we suggest that, these studies implicitly include the notion that "IT acceptance" be construed as simply the relationship between antecedent factors such as perceived usefulness and ease of use that target or predict that particular type of intention connected to amount of IT usage. Rather than continuing studies for additional antecedents or contexts that moderate this particular mode of use, we suggest a reflexive pause regarding the notion of IT acceptance itself. Specifically, we encourage broadening our understanding of IT acceptance toward a wider constellation of behavioral usage and its psychological counterparts. Other aspects of usage behavior or post hoc usage evaluation such as infusion, routinization, substantive use, exploitive usage, or faithfulness of appropriation have recently emerged and will likely require/involve other psychological notions of acceptance ( Sundaram et al, forthcoming; Jones et al. 2002; Jasperson et al. 2005; Burton-Jones and Straub, 2006; Chin, et al. 1997). The call for this expansion is only made more salient by recent studies that indicate that the traditional TAM antecedents do not necessarily relate to these other forms of usage ( Jones et al. 2002) and, furthermore, that these alternative notions of usage such as routinization or infusion may have stronger connection to performance outcomes ( Sundaram et al., forthcoming).
Article
The technology acceptance model (TAM) is one of the most widely used behavioural models in the information systems (IS) field. Researchers have used the model to study many different IS adoption situations and contexts, and it usually demonstrates validity and reliability. Although TAM was developed in the U.S., the TAM model has also been used in other countries. Transferring a model to another cultural context should be subjected to rigorous testing, and a few studies have begun to examine the applicability of TAM in a small variety of cultures. This study contributes to the growing multi-cultural examination of TAM, and demonstrates that although the model has been successful in predicting adoption behaviours in some international settings, it might not hold in all cultures. Almost 4000 students from several universities around the world provided the data for the study. Data analysis revealed that the TAM model does not hold for certain cultural orientations. Most significantly, low Uncertainty Avoidance, high Masculinity, high-Power Distance, and high Collectivism seem to nullify the effects of Perceived Ease of Use and/or Perceived Usefulness. Since TAM has been shown to be widely applicable to various technological innovations, it is likely to continue to be applied broadly and globally. However, the results of this study suggest the need for caution in applying TAM in at least 20 countries.
Article
The technology acceptance model (TAM) asserts that ease of use and usefulness are two primary determinants of behavioral intention and usage. A parallel research stream emphasizes voluntariness, a key social influence and contextual variable, as a critical factor in information technology (IT) adoption, but pays little attention to its role in TAM. This paper addresses this particular absence by investigating the impact of environment-based voluntariness on the relationships among the four primary TAM constructs. A meta-analysis of 71 empirical studies provides strong support for the hypotheses that environment-based voluntariness moderates the effects of ease of use and usefulness on behavioral intention, but not the effect of ease of use on usefulness. Moreover, inconsistent with our expectations, environment-based voluntariness does not moderate the effects of ease of use and usefulness on usage. By further analyzing the data set, we suggest this may be because of the relatively small sample size, the presence of other factors, or the inappropriate measurement of usage in previous studies. The current study contributes not only to the distinction between user-based and environment-based voluntariness but also to a more complete understanding of user acceptance of IT across system-use environments.
Article
A key concern in Information Systems (IS) research has been to better understand the linkage between information systems and individual performance. The research reported in this study has two primary objectives: (1) to propose a comprehensive theoretical model that incorporates valuable insights from two complementary streams of research, and (2) to empirically test the core of the model. At the heart of the new model is the assertion that for an information technology to have a positive impact on individual performance, the technology: (1) must be utilized and (2) must be a good fit with the tasks it supports. This new model is moderately supported by an analysis of data from over 600 individuals in two companies. This research highlights the importance of the fit between technologies and users' tasks in achieving individual performance impacts from information technology. It also suggests that task-technology fit when decomposed into its more detailed components, could be the basis for a strong diagnostic tool to evaluate whether information systems and services in a given organization are meeting user needs.
Article
The high level of investigative activity to date into information systems and information technology acceptance and diffusion has witnessed the use of a wide range of exploratory techniques, examining many different systems and technologies in countless different contexts and geographical locations. The aim of this paper is to provide a comprehensive and systematic review of the literature pertaining to such adoption and diffusion issues in order to observe trends, ascertain the current ‘state of play’, and to highlight promising lines of inquiry including those lacking investigative activity or simply being in need of renewed interest. Previous research activity was analysed along a number dimensions including units of analysis, research paradigms, methodologies, and methods, theories and theoretical constructs, and technologies/contexts examined. Information on these and other variables was extracted during an examination of 345 papers on innovation adoption, acceptance and diffusion appearing in 19 peer-reviewed journals between 1985 and 2007. Findings suggest that the positivist paradigm, empirical and quantitative research, the survey method and Technology Acceptance Model theory (and its associated constructs) were predominantly used in the body of work examined, revealing clear opportunities for researchers to make original contributions by making greater use of the theoretical and methodological variety available to them, and consequently reducing the risk of research in the area moving toward overall homogeneity.Journal of Information Technology (2009) 24, 1–10; doi:10.1057/jit.2008.30 Published online 20 January 2009
Article
In general, perceptions of information systems (IS) success have been investigated within two primary research streams--the user satisfaction literature and the technology acceptance literature. These two approaches have been developed in parallel and have not been reconciled or integrated. This paper develops an integrated research model that distinguishes beliefs and attitudes about the system (i.e., object-based beliefs and attitudes) from beliefs and attitudes about using the system (i.e., behavioral beliefs and attitudes) to build the theoretical logic that links the user satisfaction and technology acceptance literature. The model is then tested using a sample of 465 users from seven different organizations who completed a survey regarding their use of data warehousing software. The proposed model was supported, providing preliminary evidence that the two perspectives can and should be integrated. The integrated model helps build the bridge from design and implementation decisions to system characteristics (a core strength of the user satisfaction literature) to the prediction of usage (a core strength of the technology acceptance literature).
Article
Protection of physical assets and digital information is of growing importance to society. The need for development and use of security technologies is ever increasing. As with any new technology, user acceptance of new software and hardware devices is often hard to gauge, and policies to introduce and ensure adequate and correct usage of such technologies are often lacking. Security technologies have widespread applicability to different organizational contexts that may present unusual and varied adoption considerations. This study adapts the technology acceptance model and extends it to study the intention to use security devices, more specifically biometrics, across a wide variety of organizational contexts. Due to the use of physiological characteristics, biometrics present unique adoption concerns. The extension of the technology acceptance model for biometrics is useful, as biometrics encompass many of the same adoption concerns as traditional security devices, but include a level of invasiveness that is obvious to the user. Through the use of vignettes, this study encompasses a systematically varied set of usage contexts for biometric devices to provide a generalizable view of the factors impacting intention to use over all categories of situational contexts of the device's use. The technology acceptance model is extended in this study to include constructs for perceived need for privacy, perceived need for security, and perceived physical invasiveness of biometric devices as factors that influence intention to use. The model is shown to be a good predictor of intention to use biometric devices and implications of the results for biometric and security technology acceptance is discussed.
Article
Three experiments were conducted on the predictability of four multi-attribute models. Results support using the “adequacy” formulation over the Fishbein and Rosenberg models if the investigator's goal is maximization of explained variance. The utility of eliciting salient beliefs and the nonequivalence of value and prominence components is shown also.
Quo vadis, TAM? Journal of the Association for
  • I Benbasat
  • H Barki
Benbasat, I., & Barki, H. (2007). Quo vadis, TAM? Journal of the Association for Information Systems, 8(4), 211–218. 3.
Diffusion, technology transfer, and implementation. Knowledge: Creation, Diffusion Utilization
  • J D Eveland
Eveland, J. D. (1986). Diffusion, technology transfer, and implementation. Knowledge: Creation, Diffusion Utilization, 8(2), 302-322.
An investigation of factors that influence senior executives to accept innovations in information technology
  • G G M Pijpers
  • K Van Montfort
Pijpers, G. G. M., & van Montfort, K. (2006). An investigation of factors that influence senior executives to accept innovations in information technology. International Journal of Management, 23(1), 11-23.