18
277 Chapter XV The Technology Acceptance Model and Other User Acceptance Theories Joseph Bradley University of Idaho, USA Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited. ABSTRACT As global business markets become increasingly competitive, firms look to information technology to manage and improve their performance. Timely and accurate information is a key to gaining performance efficiency. Yet, firms may invest in technology only to find that their users are not willing to accept and use the new technology. This chapter explores the technology acceptance model and other theories of user acceptance. INTRODUCTION There is nothing more difficult to plan, more doubtful of success, nor more dangerous to man- age than the creation of a new order of things… Whenever his enemies have the ability to attack the innovator, they do so with the passion of par- tisans, while others defend him sluggishly, so that the innovator and his party alike are vulnerable. (Machiavelli, 1513, from Rogers, E. M., Diffusion of Innovations, 2003) The above quote from the 16 th Century demon- strates that resistance to innovation is not unique to information systems, but has been with us for a long time with any type of innovation. Industry has turned to information systems technology to be- come more competitive in controlling resource use and costs to face increased global competition. The successful implementation of information systems ranging from simple applications, such as word processing and spreadsheets, to more complicated applications, such as enterprise resource planning systems, requires user acceptance. Yet, users are

Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

Embed Size (px)

Citation preview

Page 1: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

277

Chapter XVThe Technology Acceptance

Model and Other User Acceptance Theories

Joseph BradleyUniversity of Idaho, USA

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.

AbsTRAcT

As global business markets become increasingly competitive, firms look to information technology to manage and improve their performance. Timely and accurate information is a key to gaining performance efficiency. Yet, firms may invest in technology only to find that their users are not willing to accept and use the new technology. This chapter explores the technology acceptance model and other theories of user acceptance.

InTRODucTIOn

There is nothing more difficult to plan, more doubtful of success, nor more dangerous to man-age than the creation of a new order of things…Whenever his enemies have the ability to attack the innovator, they do so with the passion of par-tisans, while others defend him sluggishly, so that the innovator and his party alike are vulnerable. (Machiavelli, 1513, from Rogers, E. M., Diffusion of Innovations, 2003)

The above quote from the 16th Century demon-strates that resistance to innovation is not unique to information systems, but has been with us for a long time with any type of innovation. Industry has turned to information systems technology to be-come more competitive in controlling resource use and costs to face increased global competition. The successful implementation of information systems ranging from simple applications, such as word processing and spreadsheets, to more complicated applications, such as enterprise resource planning systems, requires user acceptance. Yet, users are

Page 2: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

278

The Technology Acceptance Model and Other User Acceptance Theories

not always willing to accept the new technology. Academics and practitioners will benefit from a better understanding user acceptance. With this knowledge, user response can be predicted and systems modified to improve acceptance. Davis et al. (1989) propose a model of how users deal with the adoption of new technologies.

Davis et al (1989) developed the Technology Acceptance Model (TAM) based on the Theory of Reasoned Action (Ajzen and Fishbein, 1980). The TAM uses two variables, perceived useful-ness (PU) and perceived ease of use (PEOU), as determinants of user acceptance. A key element of the TAM is behavioral intent which leads to the desired action, use of the system.

This article will first look at the theoretical development of the TAM beginning with the Expectancy-Value Theory and the Theory of Reasoned Actions. The TAM is introduced and described. A discussion of the impact of TAM on information systems research follows together with the limitations of the model. Extensions of TAM and alternative theories of user acceptance are then discussed. Lastly, a current discussion of the future of TAM is presented.

bAckgROunD

The theoretical roots of TAM can be found in the expectancy-value model and the theory of reasoned action.

expectancy-Value Theory

The expectancy value theory was developed to understand motivations underlying the behavior of individuals. Behavioral intent is posited as the immediate precursor of a particular behavior. If we understand the elements that influence inten-tion, we can better predict the likelihood of an individual engaging in a behavior. “Individuals choose behaviors based on the outcomes they ex-pect and the values they ascribe to those expected

outcomes” (Borders, Earleywine & Huey, 2004, p. 539). Expectancy is “the measurement of the likelihood that positive or negative outcomes will be associated with or follow from a particular act” (Mazis, Ahtola & Kippel, 1975, p. 38). The strength of the expectancy and the value attrib-uted to the outcome will determine the strength of the tendency to act (Mazis et al., 1975, p.38). A simple example demonstrated by Geiger and Cooper (1996) is that college students who val-ued increasing their grades were more willing to increase their effort in the course.

Theory of Reasoned Action

The theory of reasoned action (TRA), found in social psychology literature, improves the predic-tive and explanatory nature of the Expectancy Value Theory. The TRA explains the determinants of consciously intended behaviors (Fishbein and Ajzen, 1975; Ajzen and Fishbein, 1980). TRA is a general model which posits that an “a person’s performance of a specific behavior is determined by his or her behavioral intention (BI) to perform the behavior” (Davis et al., 1989). Eveland (1986) observes that “ultimately, technology transfer is a function of what individuals think – because what they do depends on those thoughts, feelings and interests” (p. 310).

TRA, shown in Figure 1, posits that a person’s beliefs and evaluations lead to their attitude (A) toward the behavior, which in turn leads to be-havioral intention (BI). Normative beliefs and motivation affect the subjective norm (SN) which also influences BI. The subjective norm is defined as the influence others will have on the acceptance decision. Beliefs in the model are defined as “the individual’s subjective probability that performing the target behavior will result in consequence i” (Davis et al., 1989, p. 984). Behavioral intention is determined by the person’s attitude (A) and subjective norm (SN) concerning the behavior in question (Davis et al., 1989). Attitude toward behavior is a function of individual’s “salient

Page 3: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

279

The Technology Acceptance Model and Other User Acceptance Theories

beliefs (bi) about consequences of performing the behavior multiplied by the evaluation (ei) of those consequences” (p. 984). Subjective norm (SN) is determined by the user’s normative beliefs (nbi) which are the perceived expectations of specific individuals and groups, and the user’s motivation to accept these expectations (mci).

1

TechnOlOgy AccepTAnce mODel

TAM evolved from the TRA with the goal “to provide an explanation of the determinates of computer acceptance that is general, capable of explaining user behavior across a broad range of end-user computing technologies and user populations, while at the same time being both parsimonious and theoretically justified” (Davis et al., 1989, p. 985). TAM, however, does not contain the subjective norm element of TRA. Davis states that, “It is difficult to disentangle direct effects of SN on BI from indirect effects via A” (p. 986). Like TRA, TAM postulates that actual technology usage is determined by behavioral intent (BI). The model is shown in Figure 2.

The perceived usefulness (PU) is based on the observation that “people tend to use or not use the application to the extent they believe it will help them perform their job better” (Davis, 1989, p. 320). PU directly influences the attitude toward use of the system and indirectly influences behavioral intention to use. Even if an applica-tion is perceived as useful, it will only be used if it is perceived as easy to use, that is, benefits of usage outweigh the effort of using the system. PEOU influences attitude toward use of the sys-tem. These two determinants, PU and PEOU, directly influence the user’s attitude toward using the new information technology, which in turn leads to the user’s behavioral intention to use. PEOU influences perceived usefulness (PU). PU also has a direct impact on behavioral intention (BI). Behavioral intention to use leads to actual system use.

The two key variables in TAM are perceived usefulness and perceived ease of use. Perceived usefulness (PU) is defined from the prospective user’s point of view. Will the application improve his or her job performance in the organization? Perceived ease of use (PEOU) is a variable that describes the perception of the user that the sys-tem will be easy to use. In the model, PU directly

Beliefs and Evaluations

Normative Beliefs and Motivation to Comply

Subjective Norm

Attitude toward

Behavior Behavioral Intention

Actual Behavior

Adapted with permission from Davis, F.D., Bagozzi, R.P., Warshaw, P.R., (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35(8) 982--1003. Copyright (1989), the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

Figure 1. Theory of reasoned action

Page 4: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

280

The Technology Acceptance Model and Other User Acceptance Theories

influences both attitude toward using attitude (A) and behavioral intention to use (BI). PEOU influ-ences both PU and A. Davis (1989) develops and validates a scale for these variables.

Theoretical support for the use of these vari-ables can be found in self-efficacy theory, the cost-benefit paradigm and adoption of innovation literature. Bandura (1982) defines self-efficacy as “judgments of how well one can execute courses of action required to deal with prospec-tive situations” (p. 122). Davis (1989) describes self-efficacy as similar to perceived ease of use. Self-efficacy beliefs are theorized as determinants of behavior. This theory does not offer a general measure sought by Davis, but is situationally-specific. Davis et al., (1989) differentiate TAM from TRA with respect to one’s salient beliefs. In TRA these beliefs are “elicited anew for each new context” (p. 988). TAM determines these variables for a population resulting in a more generalized view of systems and users. External effects on the model can be separately traced to each of these variables

The cost-benefit paradigm from the behavioral decision literature is also relevant to perceived use-fulness and perceived ease of use. The paradigm

describes decision-making strategies “in terms of a cognitive trade-off between the effort required to employ the strategy and the quality (accuracy) of the resulting decision” (Davis, 1989, p. 321).

Adoption of innovation literature finds that compatibility, relative advantage and complex-ity of the innovation are key factors. Rogers and Shoemaker’s (1971) definition of complexity is similar to PEOU: “the degree to which an in-novation is perceived as relatively difficult to understand and use” (p. 154). Davis (1989) points out the convergence of these and other theories to support the concepts of PU and PEOU.

Gefen and Straub (2000) describe PEOU and PU in terms of intrinsic and extrinsic characteris-tics. PEOU relates to the “intrinsic characteristics of IT, such as the ease of use, ease of learning, flexibility and clarity of its interface” (p. 1). PU results from a user’s assessment of IT’s “extrinsic, i.e., task-oriented, outcomes: how IT helps users achieve task-related objectives, such as task ef-ficiency and effectiveness” (p. 1-2). Using MBA students Gefen and Straub demonstrated that PEOU affects intrinsic tasks, i.e., using a Web site for inquiry, but not extrinsic tasks, i.e., using a Web site to make a purchase.

Figure 2. Technology acceptance model

Adapted with permission from Davis, F.D., Bagozzi, R.P., Warshaw, P.R., (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35(8) 982--1003. Copyright (1989), the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

Perceived Usefulness

(PU)

Perceived Ease of Use

(PEOU)

Attitude Toward use of

System

Behavioral Intention to

use

Actual Use

Page 5: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

281

The Technology Acceptance Model and Other User Acceptance Theories

Impact of TAm

The IS community has found the TAM to be a powerful model. Lee et al. (2003) found that the first two TAM articles, Davis (1989) and Davis et al. (1989), received 698 journal citations through 2003. A Google Scholar search on the term, “Technology Acceptance Model,” in June 2008 produced 7,330 hits.

Lee et al. (2003) examined a number of vari-ables related to TAM research, including types of information systems examined, external vari-ables tested, number of publications by year by journal, most prolific researchers, characteristics of research subjects, relationship between major TAM variables, major limitations, and research methodology.

Types of Information systems examined

TAM researchers have applied the model to a wide variety of information systems. In the area of communications systems, TAM has been applied in 25 articles to e-mail, v-mail, fax and dial-up systems. General purpose systems were examined in 34 articles, including Windows, PC, internet, workstations, computer resource centers and groupware. Office systems such as word processors, spread sheets, presentation software, database programs and groupware were the sub-

ject of 33 articles. Specialized business systems such as computerized models, case tools, hospital systems, decision support systems, expert support systems and MRP were examined in 30 articles (Lee et al., 2003).

external Variables Tested

Researchers have proposed and examined many external TAM variables. Lee et al. (2003) as-sembled the following list of external variables in TAM research which is summarized below. See Lee et al. (2003) for definitions, origin and referred articles.

TAm publications

Lee et al. (2003) found 101 studies involving TAM were published in what they defined as major journals and conferences between 1989 and 2003. MIS Quarterly led the group with 19 TAM articles; Information & Management, 12; Information Systems Research and Journal of Management Information Systems, 10 each. The peak of interest in TAM was the period from 1999 to 2001 when 41 articles appeared in a three year period. Subsequent to 2003 the pace of articles appears to have declined. MISQ ran two articles in 2004, one in 2005 and none since. However, a Journal of the Association for Information Sys-tems special issue in April 2007 included eight

Accessibility Anxiety Attitude

Compatibility Complexity Result demonstrability

Perceived enjoyment End user support Experience

Facilitating conditions Image Job relevance

Managerial Support Playfulness Personal Innovativeness

Relative Advantage Self-Efficacy Social Influence, Subjective Norms and Social Pressure

Social Presence Trialability Usability

Visibility Voluntariness

Table 1. TAM variables

Page 6: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

282

The Technology Acceptance Model and Other User Acceptance Theories

articles assessing the current status of technology acceptance research.

characteristics of TAm Research subjects

Research subjects used in the technology accep-tance literature cited by Lee et al. (2004) were composed of students (44 studies) and knowledge workers (60 studies). For example, Davis et al. (1989) used 107 students and word processing technology. Taylor and Todd (1995) used 786 students dealing with the use of a university computing center.

major limitations of the TAm model

Lee et al. (2003) found the major limitation of the TAM studies included in their research was self-reported usage. The studies did not measure actual usage, but relied on the research subject to indicate usage. A better approach would have been to employ an independent measure actual use. Another limitation was the use of a single IS system in each research project limiting the gen-eralizability of the conclusions. Student samples were heavily employed raising the questions of how representative this group was to the real working environment. Other limitations discuss in these papers include single subjects (i.e., one organization, one department, one student group, etc.), one-time cross sectional studies, measure-ment problems (for example, low validity of new measures), single task, low variance scores, and mandatory situations.

most published TAm Authors

Lee et al. (2003) found that 11 authors published 4 or more papers accounting for 50 of the 101 ar-ticles found in major IS journals. The most prolific TAM authors through 2003 include Viswanath Venkatesh (12), Fred D. Davis (9), Detmar W. Straub (8), Elena Karahanna (6), David Gefen (6), and Patrick Y.K. Chau (6).

Recent TAm Research

Although the appearance of TAM articles in major journal appears to be on a downturn, TAM research continues to appear in the literature. More recent research extends the TAM to ERP implementation (Amoako-Gyampah and Salam, 2004; Bradley and Lee, 2007; Hwang, 2005), cross cultural implementation studies (McCoy, Galleta and King, 2006; McCoy, S., Everard, A., and Jones, B.M., 2005), e-commerce participation among older consumers (McCloskey, 2006), and biometric devices (James et al., 2006). Pijpers and van Montfort (2006) investigate senior execu-tives’ acceptance of technology using the TAM and found that gender has no effect on perceived usefulness or perceived ease of use, but also found that gender affects positively actual usage frequency.

Following the introduction of the TAM in 1989 and validation period ranging from 1992 through 1996 and a period of model extension, a model elaboration period ensued “to develop the next generation TAM” model and “to resolve the limitations raised by previous studies” (Lee et al., 2003, p. 757).

TAm mODel elAbORATIOns

TAm2

Venkatesh and Davis (2000) developed and tested an extension to TAM which “explains the per-ceived usefulness and usage intentions in terms of social influence and cognitive instrumental processes” (p. 186). In the ten years following the publication of the TAM, empirical studies found that the model explained about 40% of the variance in usage intentions and behavior. In an effort to expand the explanatory impact of the model, TAM2 was developed. Figure 3 shows this model. TAM2 extended the TAM model to include seven additional variables. Five of

Page 7: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

283

The Technology Acceptance Model and Other User Acceptance Theories

these new variables directly influence perceived usefulness (PU). TAM2 considers both social influences (subjective norm, voluntariness and image) and cognitive instrumental processes (job relevance, output quality, result demonstrability and perceived ease of use. The expanded model accounts for 60% of the variance in the drivers of user intentions. While less parsimonious than the original TAM, the model is more powerful.

Unified Theory of Acceptance and use of Technology (uTAuT)

Venkatesh, Morris, Davis and Davis (2003) examine eight competing models of technology acceptance and formulate a unified model that integrates elements of these models. The eight models are: TRA, TAM, motivational model, TPA, TAM/TPB combined, a model of PC uti-

lization, innovation diffusion theory and social cognitive theory. UTAUT includes four variables, performance expectancy, effort expectancy, social influence and facilitating conditions, and up to four moderators of key behaviors, gender, age, experience and voluntariness. In an experiment, the eight models varied in explanatory power from 17 to 53 percent of the variance in user intentions to use information technology. UTAUT was tested on the same data and explained 69 percent of the variance.

Both TAM2 and UTAUT have stronger ex-planatory power than the original TAM model, but the additional number of variables raises the ques-tion of parsimony. What is the balance between the added explanatory power and the complexity introduced by the additional variables?

Job Relevance

Image

Subjective Norm

Experience Voluntariness

Output Quality

Result Demon-strability

Perceived Usefulness

Perceived Ease of Use

Intention To Use

Usage Behavior

Adapted with permission from Venkatesh, V. and Davis, F.D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies, Management Science, 46(2), 186-204. Copyright (1989), the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

Figure 3. TAM2-extension of the technology acceptance model

Page 8: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

284

The Technology Acceptance Model and Other User Acceptance Theories

OTheR TheORIes Of useR AccepTAnce

Theory of planned behavior (Tpb)

The Theory of Planned Behavior (Ajzen 1985, 1991) shown in figure 4 is an extension of the Theory of Reasoned Action (Fishbein and Ajzen, 1975). TPB addresses conditions where users do not have complete behavioral control. It introduces the variable perceived behavioral control (PBC). Behavioral intention (BI) is seen as a weighted function of attitude (A), subjective norm (SN) and perceived behavioral control. Behavior (B), that is actual use, is the weighted function of inten-tion and PBC2. Relationships among beliefs are determined using an expectancy-value model.

Decomposed Theory of planned behavior (DTpb)

The decomposed theory of planned behavior expands the TPB theory by deconstructing the elements of attitude into three variables: perceived usefulness, ease of use, compatibility (See Fig-

ure 5). The subjective norm is comprised of two variables: peer influence and superior’s influence. Perceived behavioral control is influenced by three variables: self-efficacy, resource facilitating con-ditions and technology facilitating conditions.

comparison of TAm, Tpb and Decomposed Tpb

Taylor and Todd (1995) compared the TAM, TPB and Decomposed TPD using student data from a computer resource center with structural equation modeling. In all three models behavioral inten-tion is the primary factor in the desired behavior, the use of technology. It was anticipated that the addition of the subjective norm and perceived behavioral control variables would give the TPB greater explanatory power, contrary to the find-ing of Davis (et al., 1989). Their results found that TAM explained 52% of the variance in BI while the pure TPB explained 57% of the vari-ance and decomposed TPB explained 60%. The improvement from the social norm and perceived behavior control may be due to the setting of the Taylor and Todd (1995) research. While in this

Perceived Behavioral Control (PBC)

Attitude (A)

Subjective Norm (SN)

Attitudinal Beliefs

Normative Beliefs

Control Beliefs

Behavioral Intention (BI)

Usage Behavior (B)

Adapted with permission from Taylor, S., and Todd, P.A. (1995). Understanding Information Technology Usage: A test of Competing Models. Information Systems Research, 6(2), 144-176. Copyright (1995), the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

Figure 4. Theory of planned behavior

Page 9: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

285

The Technology Acceptance Model and Other User Acceptance Theories

particular research setting the decomposed TPB proved superior in explanatory power, TAM may still be a more parsimonious model. Mulaik et al (1989) recommend as preferable a model that has good predicting power while using the fewest variables. The TAM explains over 50% of variance of BI with two variables. The decomposed TPB requires seven variables to explain 60%.

Innovation Diffusion Theory

Another line of research on the acceptance of new technology is examined by Rogers (1983, 2003). This perspective views such factors as individual user characteristics, information sources and communication channels and in-novation characteristics as determinants of IT usage and adoption. Rogers (2003) views the dif-

Perceived Usefulness

Compatibility

Ease of Use Attitude

Peer Influence

Superior’s Influence

Self- Efficacy

Subjective Norm

Technology Facilitating Conditions

Perceived Behavioral Control

Behavioral Intention

Usage Behavior

Resource Facilitating Conditions

Adapted with permission from Taylor, S., and Todd, P.A. (1995). Understanding Information Technology Usage: A test of Competing Models. Information Systems Research, 6(2), 144-176. Copyright (1995), the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

Figure 5. Decomposed theory of planned behavior

Page 10: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

286

The Technology Acceptance Model and Other User Acceptance Theories

fusion of innovation as “a social process in which subjectively perceived information about a new idea is communicated person to person” (p. xx). Communication channels distribute knowledge of the innovation, contribute to the prospective user forming attitudes about the innovation leading to a decision to accept or reject the innovation.

Knowledge occurs when a potential systems user is exposed to the existence and functional-ity of the technology. Persuasion is when a user forms an attitude toward the new system. The at-titude can be either favorable or unfavorable. The decision step is when a user decided to accept or reject the IS event. Implementation is putting to technology into use. The confirmation step oc-curs after the technology is in use. The user seeks confirmation and reinforcement of the decision he or she has made.

Task-Technology fit model

Dishaw, Strong and Bandy (2002) propose a combination of the TAM and the Task-Technology

Fit (TTF) Model (Goodhue & Thompson, 1995). The combined model is shown in Figure 7. The Task-Technology Fit Model is the “matching of the capabilities of the technology to the demands of the task, that is, the ability of IT to support a task” (p. 1022). The TTF model which is com-posed of four constructs: Task Characteristics, Technology Characteristics, Task-Technology Fit which leads to either performance or utilization. Task characteristics and

Technology characteristics are related to task-technology fit. Task-technology fit is related to both performance impacts and utilization. Uti-lization also is directly related to performance impacts. Dishaw et al. (2002) posit that “IT will be used if, and only if, the functions available to the user support (Fit) the activities of the user” (p. 1022). IT without any significant advantage will not be used.

coping model

Beaudry and Pinsonneault (2005) explore a cop-ing mode of user acceptance to understand user

Knowledge Persuasion Decision Implementation Confirmation

Prior Conditions

1. Previous practice 2. Felt needs/problems 3. Innovativeness 4. Norms of the social

systems

Adoption

Rejection

Communication Channels

Figure 6 - Technology diffusion process

Adapted from Rogers (2003)

Page 11: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

287

The Technology Acceptance Model and Other User Acceptance Theories

responses to information technology changes. User adaptation is defined as “the cognitive and behavioral efforts exerted by users to manage specific consequences” (p. 496). The model posits that users apply a variety of coping strategies based on their “assessment of the expected consequences of an IT event (p. 493)” and an assessment of their control over the situation. Users ask (p. 495), “What it at stake for me in this situation?” Four major coping strategies are identified: “benefits maximizing, benefits satisficing, disturbance handling and self-preservation” (p. 493). Apply-ing these coping mechanisms lead to one of three different individual level outcomes: 1) restoring emotional stability, 2) minimizing the perceived threats of the technology, and 3) improving user efficiency and effectiveness.

Beaudry and Pinsonneault (2005) tested the model at two North American banks. The case

studies supported their propositions. Although they observe that the benefits satisficing and self preservation strategies may “first appear subop-timal” (p. 517), the benefits of raising this level of acceptance may be outweighed by the costs. The model provides guidance to managers to under-stand how users evaluate IT events, which may help them guide users to adaptation strategies.

elaboration likelihood model

Bhattacherjee and Sanford (2006) examine how “external influences shape information technol-ogy acceptance among potential users, how such influence effects vary across a user population, and whether these effects are persistent over time” (p. 805). They are critical of prior research, including TAM, TRA, TPB, DTBP and UTAUT, which do not address external influence on user

From -Dishaw et al (2002)

Figure 7. TAM and TTF model

Page 12: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

288

The Technology Acceptance Model and Other User Acceptance Theories

acceptance beyond social norm. Drawing on social psychology literature, Bhattacherjee and Sanford examine dual-process theories “that suggest that external information is the primary driver of at-titude change and consequent behavior change” (p. 808). Within these dual process theories, they select the elaboration-likelihood model (ELM) as:”(1) it relates directly to influence processes and their impacts on human perception and be-havior and (2) it also explains why a given influ-ence process may lead to differential outcomes across different users in a given user setting” (p. 808). Attitude change can follow either a central or peripheral route, which result in different amounts of information processing by individu-als. The central route requires critical thinking about “potential benefits of system acceptance, comparison of alternative systems, availability and quality of system support, and/or costs of and returns from system acceptance” (p. 808). The peripheral route requires less effort, relying on endorsements from prior users and experts

and the likeability of experts. ELM supports the extension of the TAM and other models to include messages of external agents as primary external variables. This model is shown figure 9.

Wixon and Todd (2005) propose an integrated model to reconcile two major streams of research on IS success, technology acceptance literature and user satisfaction literature. This model is simi-lar to the TRA, TAM and UTAUT, but separates the concepts into object-based beliefs, object-based attitudes, behavioral beliefs and behavioral attitudes. Variables of completeness, accuracy, format and currency impact information quality which in turn influence information satisfaction. Information satisfaction influences usefulness which influences both attitude and intention. Reliability, flexibility, integration, accessibility, and timeliness influence systems quality which in turn influence systems satisfaction, ease of use, attitude and intention. Systems satisfaction influences information satisfaction. Ease of use influences usefulness.

Individual efficiency and effectiveness

Outcomes Adaptation Strategies Appraisal

Opportunity

Threat

Self Preservation

Disturbance Handling

Benefit Satisficing

Benefit Maximizing

Primary Secondary

High

Low

High C t l

Low

Minimization of the negative consequences of the IT event

Restoring personal emotional stability

EXIT

Figure 8. Coping model of user adaption

Adapted from Beaudry & Pinsonneault (2005), p. 499

Page 13: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

289

The Technology Acceptance Model and Other User Acceptance Theories

fuTuRe Of The TechnOlOgy AccepTAnce mODel

A special issue of the Journal of the Association for Information Systems in April 2007 focused on “Quo Vadis TAM-Issues and Reflections on Technology Acceptance Research.”

While acknowledging the significant contri-bution of the TAM, Benbasat and Barki (2007, p. 212) state:

the intense focus on TAM has led to several dys-functional outcomes: 1) the diversion of research-ers’ attention away from important phenomena. First, TAM-based research has paid scant atten-tion to the antecedents of its belief constructs: most importantly, IT artifact design and evalua-tion. Second, TAM-based research has provided a very limited investigation of the full range of the important consequences of IT adoption, 2) TAM-based research has led to the creation of an illusion of progress in knowledge accumulation, 3) The inability of TAM as a theory to provide a systematic means of expanding and adapting its core model has limited its usefulness in the con-stantly evolving IT adoption context, 4) The efforts

to “patch-up” TAM in evolving IT contexts have not been based on solid and commonly accepted foundations, resulting in a state of theoretical confusion and chaos.

Schwarz and Chin (2007) call for an expansion and broadening of technology acceptance research to include a “wider constellation of behavioral us-age and its psychological counterparts” (p.230).

Straub and Burton-Jones (2007) challenge the notion that TAM has been “established ‘almost to the point of certainty’” (p. 224). They state that the system usage construct has been understudied. Exploration of usage may open up possibilities to enrich the model. Straub and Burton-Jones (2007) point to a research flaw in TAM studies where respondents self-rated three key variables: PU and PEOU (IV’s) and usage level. This methodology results in a common methods bias. They suggest TAM researchers undertake “strenuous effort” to gather usage data independent of the source of PU and PEOU. Straub and Burton-Jones (2007) also challenge the parsimony of TAM. However, in this challenge they do not directly challenge the TAM but move forward in the TAM develop-ment stream to the UTAUT claiming that its 10

Figure 9. Elaboration likelihood model

Adapted from Bhattacherjee & Sanford (2006)

Argument Quality

Source

Credibility

Perceived Usefulness

IT Usage

Intention

Attitude

Job Relevance

User Expertise

Page 14: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

290

The Technology Acceptance Model and Other User Acceptance Theories

constructs are not parsimonious. They observe that Lee et al. (2003) enumerate “21 external variables that affect the four central variables in the model” (p. 227).

Silva (2007) examines TAM applying three criteria on what is scientific and what is a theory. He uses the perspective of three science philosophers: Karl Popper, Thomas Kuhn and Imre Lakatos. Popper’s principle of falsifiability suggests that “a good theory should ‘prohibit’ the occurrence of specific phenomena” (p. 264). Using Kuhn’s lens, Silva finds TAM to be a typical example of normal science as it provides an easily transferable and verifiable problem solving apparatus.

summARy AnD cOnclusIOn

Despite the large body of research on this topic, “user acceptance of information technology remains a complex, elusive, yet extremely im-

portant phenomenon” (Venkatesh and Davis, 2000). Organizations invest billions of dollars in new technology each year. If employees are not willing to accept this new technology, the return on this investment will be reduced.

This chapter has surveyed the literature on the development and extension of the technology acceptance model and explored other user accep-tance model. The TAM model is widely used and has been validated many times. Researchers have extended the model to encompass the impact of dozens of variables.

A central principle of the TAM model and its extensions is the measurement of behavioral intention to use and user attitude. Yet, most stud-ies rely on self reported measures of this variable which may be unreliable. Straub and Burton-Jones (2007) point out that reliance on self-reported key variables, like attitude and intention, open models based on these variables to significant questions. Researchers need to find more reliable method

Systems Quality

Ease of Use

Intention

Attitude

Usefulness Information Satisfaction

Information Quality

Completeness Accuracy Format Currency

Reliability Flexibility Integration Accessibility Timeliness

System Satisfaction

Object-based beliefs

Object-based attitudes

Behavioral beliefs

Behavioral Attitude

Adapted with permission from Wixom, B.H. and Todd, P. A. (2005). A Theoretical Integration of User Satisfaction and Technology Acceptance. Information Systems Research, 16(1), 85-102. Copyright (2005), the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

Figure 10. Wixon and Todd model

Page 15: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

291

The Technology Acceptance Model and Other User Acceptance Theories

to measure these variables. Limitations on data gathering need to be addressed.

Other models examined in the chapter do not rely on behavioral intention or attitude. The innovation diffusion model is described as a so-cial process which relys on communication and persuasion. The task technology fit relies on how well the technology fits the uses’ tasks. The coping model examines the reaction to new technology as an opportunity or threat.

A promising avenue for future development may be combining the TAM models with other approaches to user acceptance such as the com-bination of TAM with the task-technology fit model (Dishaw et al., 2002) and the combination of TAM research and user satisfaction research demonstrated in the integrated model developed by Wixom and Todd (2005). Combining the extensive work in user acceptance and user satisfaction with the smaller body of knowledge on user resistance may prove fruitful.

The profession needs to learn more about user acceptance, user resistance and user satisfaction. Research should better inform systems designers on the attributes which will make their products easier for users to accept. Opportunities abound for scholars to take new directions in technology acceptance research.

RefeRences

Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Engle-wood Cliffs, NJ: Prentice Hall.

Ajzen. I. (1985). From intentions to action: A theo-ry of planned behavior. In J. Kuhl & J. Bechmann (Eds.), Action control: From cognition to behavior (pp. 11-39). New York: Springer Verlag.

Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179-211.

Amoako-Gyampah, K., & Salam, A. F. (2003). An extension of the technology acceptance model in an ERP implementation environment. Information & Management, 41, 731-745.

Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122-147.

Beaudry, A., & Pinsonneault, A. (2005). Under-standing user responses to information technol-ogy: A coping model of user adaptation. MIS Quarterly, 29(3), 493-524.

Benbasat, I., & Barki, H. (2007). Quo vadis, TAM? Journal of the Association for Information Systems, 8(4), 211-218.

Bhattacherjee, A., & Sanford, C. (2006). Influence processes for information technology acceptance: An elaboration likelihood model. MIS Quarterly, 30(4), 805-825.

Borders, A., Earleywine, M., & Huey, S. (2004). Predicting problem behaviors with multiple ex-pectancies: Expanding expectancy value theory, Adolescence, 39, 539-551.

Bradley, J., & Lee, C. C. (2007). ERP training and user satisfaction: A case study. International Journal of Enterprise Information Systems, Spe-cial topic issue on Use of ERP in Education, 3(4), 33-50.

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Manage-ment Science, 35(8), 982-1003.

Dishaw, M. T., Strong, D. M., & Brandy, D. B. (2002). Extending the task-technology fit model of self-efficacy constructs. In R. Ramsower & J. Windso (Eds.), Proceedings of the 8th Americas Conference on Information Systems, Dallas, TX (pp. 1021-1027).

Page 16: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

292

The Technology Acceptance Model and Other User Acceptance Theories

Eveland, J. D. (1986). Diffusion, technology trans-fer, and implementation. Knowledge: Creation, Diffusion, Utilization, 8(2), 302-322.

Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.

Gefen, D., & Straub, D. (2000). The relative im-portance of perceived ease of use in IS adoption: A study of e-commerce adoption. Journal of the Association for Information Systems, 1(8), 1-28.

Geiger, M. A., & Cooper, E. A. (1996). Cross-cultural comparisons using expectancy theory to assess student motivation. Issues in Accounting Education, 11(1), 113-129.

Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS Quarterly, 19(2), 213-236.

Hwang, Y. (2005). Investigating enterprise sys-tems adoption: Uncertainty avoidance, intrinsic motivation and the technology acceptance model. European Journal of Information Systems, 14, 150-161.

James, T., Pirim, T., Boswell, K., Reithel, B., & Barkhi, R. (2006). Determining the intention to use biometric devices: An application and exten-sion of the technology acceptance model. Journal of Organizational and End User Computing, 18(3), 1-24.

Johnson, E. J., & Payne, J. W. (1985). Effort and accuracy in choice. Management Science, 31(4), 395-414.

Lee, Y., Kozar, K., & Larsen, K. R. T. (2003). The technology acceptance model: Past, present and future. Communications of the Association for Information Systems, 12(50), 752-780.

Mulaik, S., James, L. R., Van Alstine, J., Bennett, N., Lind, S., & Stillwell, C. D. (1989). Evaluation of goodness of fit indices in structural equation mod-els, Psychological Bulletin, 105(3), 430-445.

Mazis, M., Ahtola, O., & Kippel, R. (1975). A comparison of four multi attribute models in the prediction of consumer attitudes. Journal of Consumer Research, 2, 38-53.

McCloskey, D. W. (2006). The importance of ease of use, usefulness, and trust to online consumers: An examination of the technology acceptance model with older consumers. Journal of Organiza-tional and End User Computing, 18(3), 47-65.

McCoy, S., Galleta, D. F., & King, W. R. (2007). Applying TAM across cultures: The need for cau-tion. European Journal of Information Systems (2007), 16, 81-90.

McCoy, S., Everard, A., & Jones, B. M. (2005). An examination of the technology acceptance model in Uruguay and the US: A focus on cul-ture. Journal of Global Information Technology Management, 8(2), 27-45.

Payne, J. W. (1982). Contingent decision behavior. Psychological Bulletin, 92(2), 382-402.

Pijpers, G. G. M., & van Montfort, K. (2006). An investigation of factors that influence senior executives to accept innovations in information technology. International Journal of Manage-ment, 23(1), 11-23

Rogers, E. M. (2003). Diffusion of innovations (5th ed.). New York: Free Press.

Rogers, E. M. (1983). Diffusion of innovations. New York: Free Press.

Silva, L. (2007). Post-positivist review of technol-ogy acceptance model. Journal of the Association for Information Systems, 8(4), 255-266.

Straub, D. W., & Burton-Jones, A. (2007). Veni, vedi, vici: Breaking the TAM logjam. Journal of the Association for Information Systems, 8(4), 223-229.

Taylor, S., & Todd, P.A. (1995). Understanding information technology usage: A test of compet-

Page 17: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

293

The Technology Acceptance Model and Other User Acceptance Theories

ing models. Information Systems Research, 6(2), 144-176.

Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Sci-ence, 46(2), 186-204.

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis. F. D., (2003). User acceptance of infor-mation technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.

Venkatesh, V., Davis, F. D., & Morris, M. G. (2007). Dead or alive? The development, trajec-tory and future of technology adoption research. Journal of the Association for Information Sys-tems, 8(4), 267-286.

Wixom, B. H., & Todd, P. A. (2005). A theoreti-cal integration of user satisfaction and technol-ogy acceptance. Information Systems Research, 16(1), 85-102.

key TeRms AnD DefInITIOns

Coping Model: Adaptation strategies to significant information systems events consist-ing of benefits maximizing, benefits satisficing, disturbance handling, and self-preservation. Ex-pected outcomes of these strategies are restoring emotional stability, minimizing the perceived threats of the technology and improving user effectiveness and efficiency (Beaudry and Pin-sonneault, 2005).

Decomposed Theory of Planned Behavior: A variation of the theory of planned behavior which breaks down attitudinal, normative and control beliefs into a set of more measureable variables.

Innovation Diffusion Theory: A theory of adoption of new technology based on individual user characteristics, information sources and

communications channels, and innovation char-acteristics (Rogers, 1983).

Perceived Ease of Use (PEOU): One of the two key variables in the technology acceptance model. Perceived ease of use will lead to attitude toward use, behavioral intention to use and actual use. PEOU also influences the second key vari-able, perceived usefulness.

Perceived Usefulness (PU): One of the two key variables in the technology acceptance model. PU directly influences both attitude toward systems use and behavioral intention to use the system. PU is influenced by perceived ease of use.

Task-Technology Fit Model (TTF): A model of user acceptance that relates actual use to tool functionality and task characteristics (Dishaw et al., 2002).

Technology Acceptance Model (TAM): TAM is a model of user acceptance of informa-tion systems technology based on the theory of reasoned action. Two variables perceived useful-ness and perceived ease of use lead to attitude toward use, behavioral intention to use and use of the system.

Theory of Planned Behavior (TPB):. A theory which extends the theory of reasoned ac-tion to include users who do not have complete control over the use of an innovation. A variable of perceived behavioral control is added to the TRA.

Theory of Reasoned Action (TRA): A theory found in social psychology literature which ex-plains the determinants of consciously intended behaviors (Fishbein and Ajzen, 1975; Ajzen and Fishbein, 1980).

User Acceptance: This term describes the willingness of a user of information systems tech-nology to adopt and accept new IT initiatives.

Page 18: Chapter XV The Technology Acceptance Model and Other User ...biblio.uabcs.mx/html/libros/pdf/11/15.pdf · 278 The Technology Acceptance Model and Other User Acceptance Theories not

294

The Technology Acceptance Model and Other User Acceptance Theories

enDnOTes

1 Behavioral intention can be shown as BI = A + SN, attitude can be expressed as A = ∑ bi ei, and subjective norm as SN = ∑ nbi mci.

2 Taylor and Todd (1995) describe this model as: B = w1BI + w2PBC and BI = w3A + w4SN + w5PBC, where w is the weight of each factor.