Beruflich Dokumente
Kultur Dokumente
Yuan Sun
Zhejiang Gongshang University
Hangzhou, China 310018
ABSTRACT
Prior research suggests the need to incorporate the information
technology (IT) artifact within extant theories of IT usage, yet
little progress has been made to that end. This study addresses
this gap by incorporating the nature and purpose of the IT artifact
in terms of four characteristics: utilitarian value, hedonic value,
communication value, and technical complexity. The moderating
effects of these characteristics on individual-level IT usage were
tested using a meta-analysis method. Our findings demonstrate
how incorporating such variables can provide a richer and more
nuanced understanding of IT usage than that offered by generic
models of IT usage.
Keywords: IT Usage, IT Acceptance, Meta-Analysis, Tech
nology Effects, IT artifact
INTRODUCTION
In a 2001 commentary, Orlikowski and Iacono lamented that
the field of information systems (IS), which is premised on
the centrality of information technology in everyday life, has
not deeply engaged its core subject matter the information
technology (IT) artifact [116, p. 121]. The authors observed
that IS research has tended to focus on the context within which
IT is used, the processing capabilities of the IT, or its impact on
individual or organizational performance, but the technology
itself has generally remained unspecified, taken for granted,
unexamined, and under-theorized. Orlikowski and Iacono
suggested that if IS research is to make a significant contribution
to understanding a world increasingly suffused with ubiquitous,
interdependent, and emergent IT, IS researchers must theorize IT
artifacts and incorporate these ideas within our current theories in
IS research.
In a similar vein, Benbasat and Zmud [17, p. 183] opined that
the IS research community is making the disciplines central
identity ambiguous by, all too frequently, under-investigating
phenomena intimately associated with IT based systems, and
suggested that for the discipline to establish a central character
and identity, IS researchers should pay closer attention to the
IT artifact and its immediate nomological net. While prior IT
usage research has examined usage as one component of Benbasat and Zmud [17]s immediate nomological net, the IT
artifact itself has been lacking from such research. For instance,
IT usage research has examined a wide range of technologies,
such as word processing software [36], electronic mail [35],
spreadsheets [106], microcomputers [63], world wide web [3],
expert system [73], debugging software [15], telemedicine
[25], group support system [71], enterprise resource planning
system [59], computerized physician order entry systems [18],
online social networking [77], mobile technology [150] and
etc. However, these studies have not differentiated between
Winter 2014
Anol Bhattacherjee
University of South Florida
Tampa, Florida 33647
technologies, but instead, relied on user perceptions of technologies (such as their perceived usefulness and perceived ease of
use) as proxies to explain their usage across organizational
settings. Certainly, it makes a difference to a studys findings if
the technology under consideration is a spreadsheet or an enterprise resource planning system. A few studies, such as Venkatesh et al. [161], have pooled together different user groups (line
staff, financial analysts, accountants) in different organizations
and their perceptions of different technologies, such as online
meeting manager, product information system, portfolio analyzer,
and bookkeeping systems, for analysis of IT usage, further
abstracting from the IT artifact and making it further difficult to
isolate the individual effects of IT.
The lack of emphasis on the IT artifact in prior usage research
may be due to IT usage researchers over-reliance on social
psychology theories, such as the theory of reasoned action [42]
and the theory of planned behavior [7], which are generalized
theories of human behavior rather than theories of IT and
hence are not designed to explore technological differences.
Models of IT usage derived from such theories, such as the
technology acceptance model (TAM) [36] and the unified theory
of acceptance and usage of technology (UTAUT) [161], inherit
the limitations (i.e., lack of attention to technological details)
of their parent theories. Although these theories have provided
a generalized understanding of IT usage, explaining about 5060% of ones intention to use IT and 30-35% of their actual
usage behavior (e.g., [161]), they are often unable to explain
why some technologies are more accepted than others within
the same user population or why the same technology engenders different adoption patterns across different usage contexts
([82], [145]). We believe that incorporating technological
differences can help provide a more comprehensive understanding and build richer theories of IT usage than that accorded by
extant usage models.
This study attempts to delve into the IT artifact and its
relationship to IT usage, and incorporate IT characteristics within
our current theories of IT usage. It departs from the existing
tradition of treating IT as a black box, but rather seeks a
nuanced understanding of how technological differences shape
our IT usage patterns. We employ a meta-analytic technique
to investigate our problem of interest, because such technique
helps us take advantage of a large body of existing empirical
research on IT usage across a range of different technologies and
examine differences in effects potentially caused by technological
differences.
The rest of the paper proceeds as follows. The next section
presents prior meta-analytic findings of IT usage research. The
third section describes the theoretical rationale for our postulated
effects of IT characteristics. The fourth section describes our
meta-analytic methods, including sample selection and coding
process. The fifth section presents data analysis and findings. The
final section ends with the studys limitations, its implications for
research and practice, and concluding remarks.
PRIOR RESEARCH
Meta-analysis refers to the statistical integration of quantitative
results from independent studies [69]. It is a quantitative,
rigorous, and more precise alternative to traditional or narrative
literature reviews, because it takes into consideration sample
size and effect size differences across studies. By aggregating
findings across studies, meta-analysis allows reconciliation of
previously inconsistent results and generates a holistic view of the
overall landscape of research results. Meta-analysis can involve
exploratory analysis by permitting the search for moderator
variables, or can be used in a confirmatory manner for hypotheses
testing.
A literature review identified ten prior meta-analytic studies
on IT usage. Legris et al. [95] reviewed 22 empirical studies to
validate the structural relationships between key TAM constructs,
but found correlation matrices in only three of these studies,
which greatly limited the scope and interpretation of their results.
Ma and Liu [104] examined zero-order correlations between
three TAM constructs perceived usefulness, perceived ease of
use, and technology acceptance in 26 empirical papers. Their
meta-analysis reconfirmed the causal relationships expected from
TAM constructs, and noted that some of the differential findings
across studies was due to differences in measurement items
resulting from adapting TAM to different technologies. However,
neither of these two studies examined the issue of technological
differences.
King and He [82] conducted a meta-analysis of 88 TAM articles
and found TAM to be a robust model, although considerable
variability in correlations was observed across studies. A
moderator analysis involving user types (students, professionals,
and general) and usage types (job related use, office use, general
use, and Internet/electronic commerce use) as moderators found
no differential effects across usage types, and that students were
reasonable surrogates for working professionals but not for
general users (e.g., home users). Schepers and Wetzels [131]
conducted a meta-analysis of 51 TAM articles to investigate the
overall influence of subjective norm on TAM constructs, and
explored three additional moderators: respondent type (students
versus non-students), technology complexity (low versus high),
and respondent culture (Western versus non-Western). Results
indicated a significant influence of subjective norm on perceived
usefulness and intention to use IT, and that all three moderators had
significant effects on traditional TAM associations. Yousafzai et al.
[173] used meta analysis method to investigate four moderators:
subject type (students versus non-students), method type (lab
study versus field study), technology type (communications
systems versus general purpose systems versus office systems
versus specialized systems) and usage type (self-reported versus
measured) and found that all four moderators had significant
effects on TAM relationships . Wu and Lederer [169] conducted
a meta-analysis of 71 empirical studies to investigate the impact
of environment-based voluntariness on the relationships among
four TAM constructs, and found that voluntariness moderates
the effects of ease of use and usefulness on behavioral intention,
but not their effects on actual usage. Turner et al. [155] reported,
following a literature review and a vote-counting meta-analysis,
that behavioral intention is correlated with actual usage, but
perceived ease of use and perceived usefulness are not correlated
Winter 2014
Winter 2014
reactions (such as social approval) or avoid unfavorable reactions (such as abandonment) from their referent groups.
Identification occurs when they accept influence because they
wish to establish or maintain a satisfying self-defining relationship with their respective groups by engaging in the same behavior as their referents. Internalization occurs when they accept
influence because the content of the induced behavior is congruent with their value system and is therefore intrinsically
rewarding. While identification and internalization alter users
belief structure, compliance causes them to directly alter their
intention in response to the social pressure. Subjective norm
is therefore expected to have a direct effect on usage intention
by virtue of the compliance effect, as well as an indirect
effect mediated by perceived usefulness via identification and
internalization effects. In light of the above discussion, we
hypothesize:
H4. The effect of subjective norm on IT usage intention is
stronger for IT with high communication value than
for those with low communication value.
H5. The effect of subjective norm on perceived usefulness
is stronger for IT with high communication than for
that with low communication value.
Technology Complexity. Another IT attribute that has been
examined to some degree in the IT usage literature is technology complexity, defined as the extent to which an IT is easy
or difficult to use. Prior research has examined complexity
as a perceptual construct (i.e., inverse of perceived ease of
use). However, IT complexity can also be viewed as a technological attribute, which may subsequently shape individual
perceptions of this construct. While explaining the observed
non-significant effect of perceived ease of use on IT usage intention, Subramanian [142] suggested that this non-significance
may be due to the specific IT investigated in their study voice
mail and customer dial-up systems that were much easier
to use than utilitarian systems such as spreadsheets and graphics
packages. A similar explanation was advanced by Teo et al.
[152] while explaining the non-significance of the perceived
ease of use effect for Internet usage. Therefore, it appears that
perceived ease of use may play a more salient role shaping
user intentions when the IT in question is complex rather than
simple.
In exploring how technical complexity may moderate the
effects of perceived ease of use, we must first examine how
perceived ease of use influences IT usage intention. Davis et al.
[36] suggests that there are two basic mechanisms driving this
effect: self-efficacy and instrumentality. Self-efficacy [16] refers
to personal control regarding their ability to execute specific
sequences of behavior needed to operate the system. An ease to use
system improves users sense of self-efficacy, which is presumed
to operate autonomously from instrumental determinants of
behavior and influence behavior through intrinsic motivation.
This effect is captured as a direct relationship between perceived
ease of use and usage intention. In contrast, instrumentality
contributes to improved performance, wherein the effort saved
from an easy to use IT can enable users accomplish more work
for the same effort. This instrumentality effect is captured in a
direct association between perceived ease of use and perceived
usefulness, which indirectly influence behavioral intention. Both
the direct and indirect effects of perceived ease of use are more
Winter 2014
Winter 2014
PU
(k, N)
SN
(k, N)
PBC
(k, N)
PEJ
(k, N)
BI
(k, N)
U
(k, N)
Legend: PU: Perceived usefulness; PEOU: Perceived ease of use; SN: Subjective norm;
PBC: Perceived behavioral control; PEJ: Perceived enjoyment; BI: IT usage intention; U: IT usage.
k = number of correlations; N = combined sample size.
All correlations (p) are corrected for sampling and measurement errors and are significant at p<0.05.
Winter 2014
BI
0.54
(31, 11245)
Fail safe
Range of r
95% CI
SDp
Zp
Lowest
Highest
Lower
Upper
0.48
0.60
0.41
0.49
0.46
0.55
0.44
0.36
0.54
0.16
0.16
0.13
0.16
0.19
0.18
0.14
0.05
0.18
0.53
0.69
0.43
0.53
0.50
0.61
0.47
0.38
0.61
92
103
37
14
21
120
40
4
31
31777
35298
12864
4344
8920
40406
14377
1674
11245
351.20
515.51
114.48
54.05
75.87
536.94
134.11
10.35
137.73
0.10
0.09
0.13
0.14
0.16
-0.12
0.17
0.12
0.09
0.73
0.85
0.69
0.71
0.82
0.84
0.68
0.39
0.78
0.45
0.57
0.36
0.40
0.38
0.51
0.39
0.29
0.48
0.52
0.63
0.45
0.57
0.55
0.58
0.48
0.42
0.61
Legend: PU: Perceived usefulness; PEOU: Perceived ease of use; SN: Subjective norm; PBC: Perceived behavioral control;
PEJ: Perceived enjoyment; BI: IT usage intention; U: IT usage.
p = estimated corrected correlation for sampling error and measurement error; SDp = standard deviations of estimated p;
Zp = Fishers Z-transformed sample size weighted mean correlation; k = number of correlations; N = combined sample size;
95% CI = 95% confidence interval for Zp estimates.
found that perceived usefulness had the strongest association
with intention (p=0.60), followed by perceived behavioral control
(p=0.49), perceived ease of use (p=0.48), perceived enjoyment
(p=0.46), and subjective norm (p=0.41). Using Cohens [29]
guidelines of effect sizes (small effect=0.10, medium effect=0.30,
large effect=0.50), all of the above effects were in the mediumto-large range.
Particularly intriguing is the association between perceived
enjoyment and IT usage intention (p=0.46), which has been
overlooked in most prior IT usage models. To investigate this
association further, we divided our data set by into IT with high
and low hedonic value, and examined the enjoyment-intention
correlation separately for each subset. This effect size was larger
for IT with high hedonic value (p=0.51) than for those with low
hedonic value (p=0.40). However, even IT with low hedonic value
had a medium-to-large effect, suggesting that enjoyment plays a
substantive role in motivating IT usage intentions even for such
IT. Based on this observation, we recommend that future IT usage
models include perceived enjoyment as a formal predictor of IT
usage intention.
Table 2 shows that IT usage intention has a strong correlation
with IT usage (p=0.54), followed by perceived behavioral control
(p=0.36). However, a wide range of the correlation between
intention and usage (0.09 to 0.78), suggesting that this association varies widely across technologies. Among predictors of
perceived usefulness, perceived ease of use was strongly associated with the dependent variable (p=0.55) followed by subjective norm (p=0.44). While the relationship between subjective
norm and perceived usefulness has generally been ignored in
IT usage research, the medium-to-large magnitude of this
association is indicative of strong identification and internalization
effects, and should be considered as such in future models of
IT usage.
Table 2 reports the Fishers Z-transformed sample size
weighted mean correlation (Zp), a corrected estimate of effect
size. This value was positive and significantly different from zero
for all of our main effects of interest, as expected from prior IT
usage models. The 95% confidence interval of Zp values also
excludes zero for all associations, providing further evidence of
effect size significance. The number of null effects that must be
observed to bring these effect sizes estimate down to a level of
non-significance is called the fail safe N statistic. This statistic
Winter 2014
Zp
Lower
Upper
0.48
0.60
0.41
0.49
0.46
0.55
0.44
0.36
0.54
0.53
0.69
0.43
0.53
0.50
0.61
0.47
0.38
0.61
1258.75
1702.11
310.33
157.39
569.50
1952.39
364.59
7.71
429.73
0.28
0.39
0.24
0.28
0.21
0.32
0.26
0.30
0.32
0.69
0.81
0.58
0.69
0.71
0.78
0.61
0.42
0.77
PEOUBI
PUBI
SNBI
PBCBI
PEJBI
PEOUPU
SNPU
PBCU
BIU
80% CrI
Vart(%)
8.9%
6.7%
14.4%
10.8%
5.0%
6.7%
13.2%
57.8%
6.8%
Moderator
PUBI
Utilitarian Value
PEJBI
Hedonic Value
PEOUBI
Hedonic Value
SNBI
Communication Value
SNPU
Communication Value
PEOUBI
Technical complexity
PEOUPU
Technical complexity
Level
Z-value
Hypothesis
High
Low
High
Low
High
Low
High
Low
High
Low
High/Medium
Low
High/Medium
Low
0.61
0.54
0.51
0.40
0.55
0.46
0.45
0.36
0.45
0.41
0.50
0.46
0.58
0.49
93
10
11
10
15
77
24
11
25
13
50
41
72
44
32537
2761
4670
4250
6448
25329
7258
4628
7862
5537
15107
16337
21954
16885
4.61***
H1 supported
6.70***
H2 supported
8.04***
H3 supported
5.82***
H4 supported
2.45***
H5 supported
4.77***
H6 supported
12.15***
H7 supported
Legend: PU: Perceived usefulness; PEOU: Perceived ease of use; SN: Subjective norm; PEJ: Perceived enjoyment;
BI: Behavioral intention.
p = estimated corrected correlation for sampling error and measurement error; k = number of correlations; N = combined sample size;
Z-value = Fishers Z-test statistic.
Significance: *p<0.05, **p<0.01, ***p<0.001.
Winter 2014
Winter 2014
10
Winter 2014
Winter 2014
11
12
Winter 2014
[112] *Mun, Y.Y., Kirk, D.F. and Jae, S.P. Understanding the
role of individual innovativeness in the acceptance of itbased innovations: Comparative analyses of models and
measures, Decision Sciences, (37: 3), 2006, 393-426.
[113] *Myers, B.L. Moving beyond computer-based information
technology: A comparison of the technology acceptance
model with the theory of reasoned action and the theory
of planned behavior in an industry specifications context,
unpublished Doctoral Dissertation, New York University,
2004.
[114] *Neufeld, D., Dong, L. and Higgins, C. Charismatic
leadership and user acceptance of information technology,
European Journal of Information Systems, (16: 4), 2007,
494-510.
[115] *Or, K. Development of a model of consumer health
information technology acceptance of patients with
chronic illness, unpublished Doctoral Dissertation, The
University of Wisconsin - Madison, 2008.
[116] Orlikowski, W.J. and Iacono, C.S. Research commentary:
Desperately seeking the It in it research-A call to
theorizing the it artifact, Information Systems Research,
(12: 2), 2001, 121-134.
[117] *Pan, C.-C. System use of webct in the light of the
technology acceptance model: A student perspective,
unpublished Doctoral Dissertation, University of Central
Florida, 2003.
[118] *Park, N. User acceptance of computer-based voip phone
service: An application of the technology acceptance
model, unpublished Doctoral Dissertation, University of
Southern California, 2007.
[119] *Pavlou, P., Integrating trust in electronic commerce with
the technology acceptance model: Model development
and validation, Americas Conference on Information
Systems, 2001, 816-822.
[120] *Pavlou, P.A. and Fygenson, M. Understanding and
prediction electronic commerce adoption: An extension of
the theory of planned behavior, MIS Quarterly, (30: 1),
2006, 115-143.
[121] *Plouffe, C.R., Hulland, J.S. and Vandenbosch, M.
Research report: Richness versus parsimony in modeling
technology adoption decisions--understanding merchant
adoption of a smart card-based payment system,
Information Systems Research, (12: 2), 2001, 208-222.
[122] *Premkumar, G., Ramamurthy, K. and Liu, H.-N. Internet
messaging: An examination of the impact of attitudinal,
normative, and control belief systems, Information &
Management, (45: 7), 2008, 451-457.
[123] *Qiu, L. and Benbasat, I. Evaluating anthropomorphic
product recommendation agents: A social relationship
perspective to designing information systems, Journal
of Management Information Systems, (25: 4), 2009, 145181.
[124] Rogers, E.M., Diffusion of innovations, 4th ed., New York,
1995.
[125] *Rosen, P.A. The effect of personal innovativeness on
technology acceptance and use, unpublished Doctoral
Dissertation, Oklahoma State University, 2005.
[126] Rosenthal, R., Meta-analytic procedures for social
research, Beverly Hills, CA, 1984.
[127] *Saade, R. and Bahli, B. The impact of cognitive
absorption on perceived usefulness and perceived ease of
use in on-line learning: An extension of the technology
Winter 2014
13
14
Winter 2014
wi
Winter 2014
15