Vous êtes sur la page 1sur 18

277

Chapter XV
The Technology Acceptance
Model and Other User
Acceptance Theories
Joseph Bradley
University of Idaho, USA

AbsTRAcT

As global business markets become increasingly competitive, firms look to information technology to
manage and improve their performance. Timely and accurate information is a key to gaining performance
efficiency. Yet, firms may invest in technology only to find that their users are not willing to accept and
use the new technology. This chapter explores the technology acceptance model and other theories of
user acceptance.

InTRODucTIOn The above quote from the 16th Century demon-


strates that resistance to innovation is not unique
There is nothing more difficult to plan, more to information systems, but has been with us for a
doubtful of success, nor more dangerous to man- long time with any type of innovation. Industry has
age than the creation of a new order of things… turned to information systems technology to be-
Whenever his enemies have the ability to attack come more competitive in controlling resource use
the innovator, they do so with the passion of par- and costs to face increased global competition. The
tisans, while others defend him sluggishly, so that successful implementation of information systems
the innovator and his party alike are vulnerable. ranging from simple applications, such as word
(Machiavelli, 1513, from Rogers, E. M., Diffusion processing and spreadsheets, to more complicated
of Innovations, 2003) applications, such as enterprise resource planning
systems, requires user acceptance. Yet, users are

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Technology Acceptance Model and Other User Acceptance Theories

not always willing to accept the new technology. outcomes” (Borders, Earleywine & Huey, 2004,
Academics and practitioners will benefit from a p. 539). Expectancy is “the measurement of the
better understanding user acceptance. With this likelihood that positive or negative outcomes will
knowledge, user response can be predicted and be associated with or follow from a particular
systems modified to improve acceptance. Davis act” (Mazis, Ahtola & Kippel, 1975, p. 38). The
et al. (1989) propose a model of how users deal strength of the expectancy and the value attrib-
with the adoption of new technologies. uted to the outcome will determine the strength
Davis et al (1989) developed the Technology of the tendency to act (Mazis et al., 1975, p.38).
Acceptance Model (TAM) based on the Theory A simple example demonstrated by Geiger and
of Reasoned Action (Ajzen and Fishbein, 1980). Cooper (1996) is that college students who val-
The TAM uses two variables, perceived useful- ued increasing their grades were more willing to
ness (PU) and perceived ease of use (PEOU), as increase their effort in the course.
determinants of user acceptance. A key element
of the TAM is behavioral intent which leads to Theory of Reasoned Action
the desired action, use of the system.
This article will first look at the theoretical The theory of reasoned action (TRA), found in
development of the TAM beginning with the social psychology literature, improves the predic-
Expectancy-Value Theory and the Theory of tive and explanatory nature of the Expectancy
Reasoned Actions. The TAM is introduced and Value Theory. The TRA explains the determinants
described. A discussion of the impact of TAM of consciously intended behaviors (Fishbein and
on information systems research follows together Ajzen, 1975; Ajzen and Fishbein, 1980). TRA is
with the limitations of the model. Extensions of a general model which posits that an “a person’s
TAM and alternative theories of user acceptance performance of a specific behavior is determined
are then discussed. Lastly, a current discussion by his or her behavioral intention (BI) to perform
of the future of TAM is presented. the behavior” (Davis et al., 1989). Eveland (1986)
observes that “ultimately, technology transfer is a
function of what individuals think – because what
bAckgROunD they do depends on those thoughts, feelings and
interests” (p. 310).
The theoretical roots of TAM can be found in TRA, shown in Figure 1, posits that a person’s
the expectancy-value model and the theory of beliefs and evaluations lead to their attitude (A)
reasoned action. toward the behavior, which in turn leads to be-
havioral intention (BI). Normative beliefs and
expectancy-Value Theory motivation affect the subjective norm (SN) which
also influences BI. The subjective norm is defined
The expectancy value theory was developed to as the influence others will have on the acceptance
understand motivations underlying the behavior decision. Beliefs in the model are defined as “the
of individuals. Behavioral intent is posited as the individual’s subjective probability that performing
immediate precursor of a particular behavior. If the target behavior will result in consequence i”
we understand the elements that influence inten- (Davis et al., 1989, p. 984). Behavioral intention
tion, we can better predict the likelihood of an is determined by the person’s attitude (A) and
individual engaging in a behavior. “Individuals subjective norm (SN) concerning the behavior
choose behaviors based on the outcomes they ex- in question (Davis et al., 1989). Attitude toward
pect and the values they ascribe to those expected behavior is a function of individual’s “salient

278
The Technology Acceptance Model and Other User Acceptance Theories

Figure 1. Theory of reasoned action

Attitude
Beliefs and
toward
Evaluations
Behavior
Behavioral Actual
Intention Behavior

Normative
Beliefs and Subjective
Motivation Norm
to Comply

Adapted with permission from Davis, F.D., Bagozzi, R.P., Warshaw, P.R., (1989). User Acceptance of Computer
Technology: A Comparison of Two Theoretical Models. Management Science 35(8) 982--1003. Copyright (1989),
the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover,
Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

beliefs (bi) about consequences of performing the The perceived usefulness (PU) is based on
behavior multiplied by the evaluation (ei) of those the observation that “people tend to use or not
consequences” (p. 984). Subjective norm (SN) is use the application to the extent they believe it
determined by the user’s normative beliefs (nbi) will help them perform their job better” (Davis,
which are the perceived expectations of specific 1989, p. 320). PU directly influences the attitude
individuals and groups, and the user’s motivation toward use of the system and indirectly influences
to accept these expectations (mci).1 behavioral intention to use. Even if an applica-
tion is perceived as useful, it will only be used
if it is perceived as easy to use, that is, benefits
TechnOlOgy AccepTAnce of usage outweigh the effort of using the system.
mODel PEOU influences attitude toward use of the sys-
tem. These two determinants, PU and PEOU,
TAM evolved from the TRA with the goal “to directly influence the user’s attitude toward using
provide an explanation of the determinates of the new information technology, which in turn
computer acceptance that is general, capable of leads to the user’s behavioral intention to use.
explaining user behavior across a broad range PEOU influences perceived usefulness (PU). PU
of end-user computing technologies and user also has a direct impact on behavioral intention
populations, while at the same time being both (BI). Behavioral intention to use leads to actual
parsimonious and theoretically justified” (Davis et system use.
al., 1989, p. 985). TAM, however, does not contain The two key variables in TAM are perceived
the subjective norm element of TRA. Davis states usefulness and perceived ease of use. Perceived
that, “It is difficult to disentangle direct effects usefulness (PU) is defined from the prospective
of SN on BI from indirect effects via A” (p. 986). user’s point of view. Will the application improve
Like TRA, TAM postulates that actual technology his or her job performance in the organization?
usage is determined by behavioral intent (BI). The Perceived ease of use (PEOU) is a variable that
model is shown in Figure 2. describes the perception of the user that the sys-
tem will be easy to use. In the model, PU directly

279
The Technology Acceptance Model and Other User Acceptance Theories

Figure 2. Technology acceptance model

Perceived
Usefulness
(PU)
Attitude Behavioral Actual
Toward Intention to Use
use of use
System
Perceived
Ease of Use
(PEOU)

Adapted with permission from Davis, F.D., Bagozzi, R.P., Warshaw, P.R., (1989). User Acceptance of Computer
Technology: A Comparison of Two Theoretical Models. Management Science 35(8) 982--1003. Copyright (1989),
the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover,
Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

influences both attitude toward using attitude (A) describes decision-making strategies “in terms of
and behavioral intention to use (BI). PEOU influ- a cognitive trade-off between the effort required
ences both PU and A. Davis (1989) develops and to employ the strategy and the quality (accuracy)
validates a scale for these variables. of the resulting decision” (Davis, 1989, p. 321).
Theoretical support for the use of these vari- Adoption of innovation literature finds that
ables can be found in self-efficacy theory, the compatibility, relative advantage and complex-
cost-benefit paradigm and adoption of innovation ity of the innovation are key factors. Rogers and
literature. Bandura (1982) defines self-efficacy Shoemaker’s (1971) definition of complexity is
as “judgments of how well one can execute similar to PEOU: “the degree to which an in-
courses of action required to deal with prospec- novation is perceived as relatively difficult to
tive situations” (p. 122). Davis (1989) describes understand and use” (p. 154). Davis (1989) points
self-efficacy as similar to perceived ease of use. out the convergence of these and other theories to
Self-efficacy beliefs are theorized as determinants support the concepts of PU and PEOU.
of behavior. This theory does not offer a general Gefen and Straub (2000) describe PEOU and
measure sought by Davis, but is situationally- PU in terms of intrinsic and extrinsic characteris-
specific. Davis et al., (1989) differentiate TAM tics. PEOU relates to the “intrinsic characteristics
from TRA with respect to one’s salient beliefs. of IT, such as the ease of use, ease of learning,
In TRA these beliefs are “elicited anew for each flexibility and clarity of its interface” (p. 1). PU
new context” (p. 988). TAM determines these results from a user’s assessment of IT’s “extrinsic,
variables for a population resulting in a more i.e., task-oriented, outcomes: how IT helps users
generalized view of systems and users. External achieve task-related objectives, such as task ef-
effects on the model can be separately traced to ficiency and effectiveness” (p. 1-2). Using MBA
each of these variables students Gefen and Straub demonstrated that
The cost-benefit paradigm from the behavioral PEOU affects intrinsic tasks, i.e., using a Web
decision literature is also relevant to perceived use- site for inquiry, but not extrinsic tasks, i.e., using
fulness and perceived ease of use. The paradigm a Web site to make a purchase.

280
The Technology Acceptance Model and Other User Acceptance Theories

Impact of TAm ject of 33 articles. Specialized business systems


such as computerized models, case tools, hospital
The IS community has found the TAM to be a systems, decision support systems, expert support
powerful model. Lee et al. (2003) found that the systems and MRP were examined in 30 articles
first two TAM articles, Davis (1989) and Davis et (Lee et al., 2003).
al. (1989), received 698 journal citations through
2003. A Google Scholar search on the term, external Variables Tested
“Technology Acceptance Model,” in June 2008
produced 7,330 hits. Researchers have proposed and examined many
Lee et al. (2003) examined a number of vari- external TAM variables. Lee et al. (2003) as-
ables related to TAM research, including types sembled the following list of external variables
of information systems examined, external vari- in TAM research which is summarized below.
ables tested, number of publications by year by See Lee et al. (2003) for definitions, origin and
journal, most prolific researchers, characteristics referred articles.
of research subjects, relationship between major
TAM variables, major limitations, and research TAm publications
methodology.
Lee et al. (2003) found 101 studies involving
Types of Information systems TAM were published in what they defined as
examined major journals and conferences between 1989
and 2003. MIS Quarterly led the group with 19
TAM researchers have applied the model to a TAM articles; Information & Management, 12;
wide variety of information systems. In the area Information Systems Research and Journal of
of communications systems, TAM has been Management Information Systems, 10 each. The
applied in 25 articles to e-mail, v-mail, fax and peak of interest in TAM was the period from 1999
dial-up systems. General purpose systems were to 2001 when 41 articles appeared in a three year
examined in 34 articles, including Windows, PC, period. Subsequent to 2003 the pace of articles
internet, workstations, computer resource centers appears to have declined. MISQ ran two articles
and groupware. Office systems such as word in 2004, one in 2005 and none since. However, a
processors, spread sheets, presentation software, Journal of the Association for Information Sys-
database programs and groupware were the sub- tems special issue in April 2007 included eight

Table 1. TAM variables


Accessibility Anxiety Attitude
Compatibility Complexity Result demonstrability
Perceived enjoyment End user support Experience
Facilitating conditions Image Job relevance
Managerial Support Playfulness Personal Innovativeness
Social Influence, Subjective Norms
Relative Advantage Self-Efficacy
and Social Pressure
Social Presence Trialability Usability
Visibility Voluntariness

281
The Technology Acceptance Model and Other User Acceptance Theories

articles assessing the current status of technology Recent TAm Research


acceptance research.
Although the appearance of TAM articles in
characteristics of TAm Research major journal appears to be on a downturn, TAM
subjects research continues to appear in the literature.
More recent research extends the TAM to ERP
Research subjects used in the technology accep- implementation (Amoako-Gyampah and Salam,
tance literature cited by Lee et al. (2004) were 2004; Bradley and Lee, 2007; Hwang, 2005),
composed of students (44 studies) and knowledge cross cultural implementation studies (McCoy,
workers (60 studies). For example, Davis et al. Galleta and King, 2006; McCoy, S., Everard, A.,
(1989) used 107 students and word processing and Jones, B.M., 2005), e-commerce participation
technology. Taylor and Todd (1995) used 786 among older consumers (McCloskey, 2006), and
students dealing with the use of a university biometric devices (James et al., 2006). Pijpers and
computing center. van Montfort (2006) investigate senior execu-
tives’ acceptance of technology using the TAM
major limitations of the TAm model and found that gender has no effect on perceived
usefulness or perceived ease of use, but also
Lee et al. (2003) found the major limitation of found that gender affects positively actual usage
the TAM studies included in their research was frequency.
self-reported usage. The studies did not measure Following the introduction of the TAM in
actual usage, but relied on the research subject 1989 and validation period ranging from 1992
to indicate usage. A better approach would have through 1996 and a period of model extension, a
been to employ an independent measure actual model elaboration period ensued “to develop the
use. Another limitation was the use of a single IS next generation TAM” model and “to resolve the
system in each research project limiting the gen- limitations raised by previous studies” (Lee et
eralizability of the conclusions. Student samples al., 2003, p. 757).
were heavily employed raising the questions of
how representative this group was to the real
working environment. Other limitations discuss TAm mODel elAbORATIOns
in these papers include single subjects (i.e., one
organization, one department, one student group, TAm2
etc.), one-time cross sectional studies, measure-
ment problems (for example, low validity of new Venkatesh and Davis (2000) developed and tested
measures), single task, low variance scores, and an extension to TAM which “explains the per-
mandatory situations. ceived usefulness and usage intentions in terms
of social influence and cognitive instrumental
most published TAm Authors processes” (p. 186). In the ten years following
the publication of the TAM, empirical studies
Lee et al. (2003) found that 11 authors published found that the model explained about 40% of the
4 or more papers accounting for 50 of the 101 ar- variance in usage intentions and behavior. In an
ticles found in major IS journals. The most prolific effort to expand the explanatory impact of the
TAM authors through 2003 include Viswanath model, TAM2 was developed. Figure 3 shows
Venkatesh (12), Fred D. Davis (9), Detmar W. this model. TAM2 extended the TAM model
Straub (8), Elena Karahanna (6), David Gefen to include seven additional variables. Five of
(6), and Patrick Y.K. Chau (6).

282
The Technology Acceptance Model and Other User Acceptance Theories

these new variables directly influence perceived lization, innovation diffusion theory and social
usefulness (PU). TAM2 considers both social cognitive theory. UTAUT includes four variables,
influences (subjective norm, voluntariness and performance expectancy, effort expectancy, social
image) and cognitive instrumental processes (job influence and facilitating conditions, and up to
relevance, output quality, result demonstrability four moderators of key behaviors, gender, age,
and perceived ease of use. The expanded model experience and voluntariness. In an experiment,
accounts for 60% of the variance in the drivers of the eight models varied in explanatory power from
user intentions. While less parsimonious than the 17 to 53 percent of the variance in user intentions
original TAM, the model is more powerful. to use information technology. UTAUT was tested
on the same data and explained 69 percent of the
Unified Theory of Acceptance and variance.
use of Technology (uTAuT) Both TAM2 and UTAUT have stronger ex-
planatory power than the original TAM model, but
Venkatesh, Morris, Davis and Davis (2003) the additional number of variables raises the ques-
examine eight competing models of technology tion of parsimony. What is the balance between
acceptance and formulate a unified model that the added explanatory power and the complexity
integrates elements of these models. The eight introduced by the additional variables?
models are: TRA, TAM, motivational model,
TPA, TAM/TPB combined, a model of PC uti-

Figure 3. TAM2-extension of the technology acceptance model

Experience Voluntariness

Subjective
Norm

Image

Job
Perceived
Relevance
Usefulness

Output Intention Usage


Quality To Use Behavior

Result Perceived
Demon- Ease of Use
strability

Adapted with permission from Venkatesh, V. and Davis, F.D. (2000). A Theoretical Extension of the Technology
Acceptance Model: Four Longitudinal Field Studies, Management Science, 46(2), 186-204. Copyright (1989),
the Institute for Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover,
Maryland 21076. INFORMS is not responsible for errors introduced in the adaption of the original article.

283
The Technology Acceptance Model and Other User Acceptance Theories

OTheR TheORIes Of useR ure 5). The subjective norm is comprised of two
AccepTAnce variables: peer influence and superior’s influence.
Perceived behavioral control is influenced by three
Theory of planned behavior (Tpb) variables: self-efficacy, resource facilitating con-
ditions and technology facilitating conditions.
The Theory of Planned Behavior (Ajzen 1985,
1991) shown in figure 4 is an extension of the comparison of TAm, Tpb and
Theory of Reasoned Action (Fishbein and Ajzen, Decomposed Tpb
1975). TPB addresses conditions where users do
not have complete behavioral control. It introduces Taylor and Todd (1995) compared the TAM, TPB
the variable perceived behavioral control (PBC). and Decomposed TPD using student data from a
Behavioral intention (BI) is seen as a weighted computer resource center with structural equation
function of attitude (A), subjective norm (SN) and modeling. In all three models behavioral inten-
perceived behavioral control. Behavior (B), that tion is the primary factor in the desired behavior,
is actual use, is the weighted function of inten- the use of technology. It was anticipated that the
tion and PBC2. Relationships among beliefs are addition of the subjective norm and perceived
determined using an expectancy-value model. behavioral control variables would give the TPB
greater explanatory power, contrary to the find-
Decomposed Theory of planned ing of Davis (et al., 1989). Their results found
behavior (DTpb) that TAM explained 52% of the variance in BI
while the pure TPB explained 57% of the vari-
The decomposed theory of planned behavior ance and decomposed TPB explained 60%. The
expands the TPB theory by deconstructing the improvement from the social norm and perceived
elements of attitude into three variables: perceived behavior control may be due to the setting of the
usefulness, ease of use, compatibility (See Fig- Taylor and Todd (1995) research. While in this

Figure 4. Theory of planned behavior

Attitudinal Attitude (A)


Beliefs

Normative Subjective Behavioral Usage


Beliefs Norm (SN) Intention Behavior
(BI) (B)

Perceived
Control Behavioral
Beliefs Control
(PBC)

Adapted with permission from Taylor, S., and Todd, P.A. (1995). Understanding Information Technology Usage:
A test of Competing Models. Information Systems Research, 6(2), 144-176. Copyright (1995), the Institute for
Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076.
INFORMS is not responsible for errors introduced in the adaption of the original article.

284
The Technology Acceptance Model and Other User Acceptance Theories

Figure 5. Decomposed theory of planned behavior

Perceived
Usefulness

Attitude
Ease of Use

Compatibility

Peer
Influence Usage
Subjective Behavioral
Behavior
Norm Intention

Superior’s
Influence

Self-
Efficacy
Perceived
Behavioral
Resource Control
Facilitating
Conditions

Technology
Facilitating
Conditions

Adapted with permission from Taylor, S., and Todd, P.A. (1995). Understanding Information Technology Usage:
A test of Competing Models. Information Systems Research, 6(2), 144-176. Copyright (1995), the Institute for
Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076.
INFORMS is not responsible for errors introduced in the adaption of the original article.

particular research setting the decomposed TPB Innovation Diffusion Theory


proved superior in explanatory power, TAM may
still be a more parsimonious model. Mulaik et Another line of research on the acceptance of
al (1989) recommend as preferable a model that new technology is examined by Rogers (1983,
has good predicting power while using the fewest 2003). This perspective views such factors as
variables. The TAM explains over 50% of variance individual user characteristics, information
of BI with two variables. The decomposed TPB sources and communication channels and in-
requires seven variables to explain 60%. novation characteristics as determinants of IT
usage and adoption. Rogers (2003) views the dif-

285
The Technology Acceptance Model and Other User Acceptance Theories

fusion of innovation as “a social process in which Fit (TTF) Model (Goodhue & Thompson, 1995).
subjectively perceived information about a new The combined model is shown in Figure 7. The
idea is communicated person to person” (p. xx). Task-Technology Fit Model is the “matching of
Communication channels distribute knowledge of the capabilities of the technology to the demands
the innovation, contribute to the prospective user of the task, that is, the ability of IT to support a
forming attitudes about the innovation leading to task” (p. 1022). The TTF model which is com-
a decision to accept or reject the innovation. posed of four constructs: Task Characteristics,
Knowledge occurs when a potential systems Technology Characteristics, Task-Technology Fit
user is exposed to the existence and functional- which leads to either performance or utilization.
ity of the technology. Persuasion is when a user Task characteristics and
forms an attitude toward the new system. The at- Technology characteristics are related to task-
titude can be either favorable or unfavorable. The technology fit. Task-technology fit is related to
decision step is when a user decided to accept or both performance impacts and utilization. Uti-
reject the IS event. Implementation is putting to lization also is directly related to performance
technology into use. The confirmation step oc- impacts. Dishaw et al. (2002) posit that “IT will
curs after the technology is in use. The user seeks be used if, and only if, the functions available to
confirmation and reinforcement of the decision the user support (Fit) the activities of the user”
he or she has made. (p. 1022). IT without any significant advantage
will not be used.
Task-Technology fit model
coping model
Dishaw, Strong and Bandy (2002) propose a
combination of the TAM and the Task-Technology Beaudry and Pinsonneault (2005) explore a cop-
ing mode of user acceptance to understand user

Figure 6 - Technology diffusion process


Prior
Conditions
1. Previous practice
2. Felt needs/problems
3. Innovativeness
4. Norms of the social
systems
Communication Channels

Knowledge Persuasion Decision Implementation Confirmation

Adoption

Rejection

Adapted from Rogers (2003)

286
The Technology Acceptance Model and Other User Acceptance Theories

responses to information technology changes. studies supported their propositions. Although


User adaptation is defined as “the cognitive and they observe that the benefits satisficing and self
behavioral efforts exerted by users to manage preservation strategies may “first appear subop-
specific consequences” (p. 496). The model posits timal” (p. 517), the benefits of raising this level of
that users apply a variety of coping strategies based acceptance may be outweighed by the costs. The
on their “assessment of the expected consequences model provides guidance to managers to under-
of an IT event (p. 493)” and an assessment of their stand how users evaluate IT events, which may
control over the situation. Users ask (p. 495), help them guide users to adaptation strategies.
“What it at stake for me in this situation?” Four
major coping strategies are identified: “benefits elaboration likelihood model
maximizing, benefits satisficing, disturbance
handling and self-preservation” (p. 493). Apply- Bhattacherjee and Sanford (2006) examine how
ing these coping mechanisms lead to one of three “external influences shape information technol-
different individual level outcomes: 1) restoring ogy acceptance among potential users, how such
emotional stability, 2) minimizing the perceived influence effects vary across a user population,
threats of the technology, and 3) improving user and whether these effects are persistent over
efficiency and effectiveness. time” (p. 805). They are critical of prior research,
Beaudry and Pinsonneault (2005) tested the including TAM, TRA, TPB, DTBP and UTAUT,
model at two North American banks. The case which do not address external influence on user

Figure 7. TAM and TTF model

From -Dishaw et al (2002)

287
The Technology Acceptance Model and Other User Acceptance Theories

Figure 8. Coping model of user adaption

Appraisal Adaptation Strategies Outcomes

Primary Secondary

High Benefit
Maximizing Individual efficiency
Opportunity and effectiveness

Benefit
Low Satisficing Minimization of the
negative consequences of
High the IT event
Threat C t l Disturbance
Handling Restoring personal
emotional stability

Low Self
Preservation EXIT
Adapted from Beaudry & Pinsonneault (2005), p. 499

acceptance beyond social norm. Drawing on social and the likeability of experts. ELM supports the
psychology literature, Bhattacherjee and Sanford extension of the TAM and other models to include
examine dual-process theories “that suggest that messages of external agents as primary external
external information is the primary driver of at- variables. This model is shown figure 9.
titude change and consequent behavior change” Wixon and Todd (2005) propose an integrated
(p. 808). Within these dual process theories, they model to reconcile two major streams of research
select the elaboration-likelihood model (ELM) on IS success, technology acceptance literature
as:”(1) it relates directly to influence processes and user satisfaction literature. This model is simi-
and their impacts on human perception and be- lar to the TRA, TAM and UTAUT, but separates
havior and (2) it also explains why a given influ- the concepts into object-based beliefs, object-
ence process may lead to differential outcomes based attitudes, behavioral beliefs and behavioral
across different users in a given user setting” (p. attitudes. Variables of completeness, accuracy,
808). Attitude change can follow either a central format and currency impact information quality
or peripheral route, which result in different which in turn influence information satisfaction.
amounts of information processing by individu- Information satisfaction influences usefulness
als. The central route requires critical thinking which influences both attitude and intention.
about “potential benefits of system acceptance, Reliability, flexibility, integration, accessibility,
comparison of alternative systems, availability and timeliness influence systems quality which
and quality of system support, and/or costs of in turn influence systems satisfaction, ease of
and returns from system acceptance” (p. 808). use, attitude and intention. Systems satisfaction
The peripheral route requires less effort, relying influences information satisfaction. Ease of use
on endorsements from prior users and experts influences usefulness.

288
The Technology Acceptance Model and Other User Acceptance Theories

fuTuRe Of The TechnOlOgy to “patch-up” TAM in evolving IT contexts have


AccepTAnce mODel not been based on solid and commonly accepted
foundations, resulting in a state of theoretical
A special issue of the Journal of the Association confusion and chaos.
for Information Systems in April 2007 focused
on “Quo Vadis TAM-Issues and Reflections on Schwarz and Chin (2007) call for an expansion
Technology Acceptance Research.” and broadening of technology acceptance research
While acknowledging the significant contri- to include a “wider constellation of behavioral us-
bution of the TAM, Benbasat and Barki (2007, age and its psychological counterparts” (p.230).
p. 212) state: Straub and Burton-Jones (2007) challenge the
notion that TAM has been “established ‘almost to
the intense focus on TAM has led to several dys- the point of certainty’” (p. 224). They state that
functional outcomes: 1) the diversion of research- the system usage construct has been understudied.
ers’ attention away from important phenomena. Exploration of usage may open up possibilities to
First, TAM-based research has paid scant atten- enrich the model. Straub and Burton-Jones (2007)
tion to the antecedents of its belief constructs: point to a research flaw in TAM studies where
most importantly, IT artifact design and evalua- respondents self-rated three key variables: PU and
tion. Second, TAM-based research has provided PEOU (IV’s) and usage level. This methodology
a very limited investigation of the full range of results in a common methods bias. They suggest
the important consequences of IT adoption, 2) TAM researchers undertake “strenuous effort”
TAM-based research has led to the creation of an to gather usage data independent of the source of
illusion of progress in knowledge accumulation, PU and PEOU. Straub and Burton-Jones (2007)
3) The inability of TAM as a theory to provide a also challenge the parsimony of TAM. However,
systematic means of expanding and adapting its in this challenge they do not directly challenge
core model has limited its usefulness in the con- the TAM but move forward in the TAM develop-
stantly evolving IT adoption context, 4) The efforts ment stream to the UTAUT claiming that its 10

Figure 9. Elaboration likelihood model

Job User
Relevance Expertise

Argument Perceived
Quality Usefulness

IT Usage

Intention

Source Attitude

Credibility

Adapted from Bhattacherjee & Sanford (2006)

289
The Technology Acceptance Model and Other User Acceptance Theories

Figure 10. Wixon and Todd model


Object-based Object-based Behavioral Behavioral
beliefs attitudes beliefs Attitude

Completeness
Accuracy Information Information Usefulness
Format Quality Satisfaction
Currency
Intention

Attitude
Reliability
Flexibility
Integration
Systems System Ease of Use
Accessibility Quality Satisfaction
Timeliness

Adapted with permission from Wixom, B.H. and Todd, P. A. (2005). A Theoretical Integration of User Satisfaction
and Technology Acceptance. Information Systems Research, 16(1), 85-102. Copyright (2005), the Institute for
Operations Research and the Management Sciences, 7240 Parkway Drive, Suite 300, Hanover, Maryland 21076.
INFORMS is not responsible for errors introduced in the adaption of the original article.

constructs are not parsimonious. They observe portant phenomenon” (Venkatesh and Davis,
that Lee et al. (2003) enumerate “21 external 2000). Organizations invest billions of dollars in
variables that affect the four central variables in new technology each year. If employees are not
the model” (p. 227). willing to accept this new technology, the return
Silva (2007) examines TAM applying three on this investment will be reduced.
criteria on what is scientific and what is a theory. He This chapter has surveyed the literature on
uses the perspective of three science philosophers: the development and extension of the technology
Karl Popper, Thomas Kuhn and Imre Lakatos. acceptance model and explored other user accep-
Popper’s principle of falsifiability suggests that tance model. The TAM model is widely used and
“a good theory should ‘prohibit’ the occurrence has been validated many times. Researchers have
of specific phenomena” (p. 264). Using Kuhn’s extended the model to encompass the impact of
lens, Silva finds TAM to be a typical example of dozens of variables.
normal science as it provides an easily transferable A central principle of the TAM model and
and verifiable problem solving apparatus. its extensions is the measurement of behavioral
intention to use and user attitude. Yet, most stud-
ies rely on self reported measures of this variable
summARy AnD cOnclusIOn which may be unreliable. Straub and Burton-Jones
(2007) point out that reliance on self-reported key
Despite the large body of research on this topic, variables, like attitude and intention, open models
“user acceptance of information technology based on these variables to significant questions.
remains a complex, elusive, yet extremely im- Researchers need to find more reliable method

290
The Technology Acceptance Model and Other User Acceptance Theories

to measure these variables. Limitations on data Amoako-Gyampah, K., & Salam, A. F. (2003). An
gathering need to be addressed. extension of the technology acceptance model in
Other models examined in the chapter do an ERP implementation environment. Information
not rely on behavioral intention or attitude. The & Management, 41, 731-745.
innovation diffusion model is described as a so-
Bandura, A. (1982). Self-efficacy mechanism in
cial process which relys on communication and
human agency. American Psychologist, 37(2),
persuasion. The task technology fit relies on how
122-147.
well the technology fits the uses’ tasks. The coping
model examines the reaction to new technology Beaudry, A., & Pinsonneault, A. (2005). Under-
as an opportunity or threat. standing user responses to information technol-
A promising avenue for future development ogy: A coping model of user adaptation. MIS
may be combining the TAM models with other Quarterly, 29(3), 493-524.
approaches to user acceptance such as the com-
Benbasat, I., & Barki, H. (2007). Quo vadis,
bination of TAM with the task-technology fit
TAM? Journal of the Association for Information
model (Dishaw et al., 2002) and the combination
Systems, 8(4), 211-218.
of TAM research and user satisfaction research
demonstrated in the integrated model developed by Bhattacherjee, A., & Sanford, C. (2006). Influence
Wixom and Todd (2005). Combining the extensive processes for information technology acceptance:
work in user acceptance and user satisfaction with An elaboration likelihood model. MIS Quarterly,
the smaller body of knowledge on user resistance 30(4), 805-825.
may prove fruitful.
Borders, A., Earleywine, M., & Huey, S. (2004).
The profession needs to learn more about user
Predicting problem behaviors with multiple ex-
acceptance, user resistance and user satisfaction.
pectancies: Expanding expectancy value theory,
Research should better inform systems designers
Adolescence, 39, 539-551.
on the attributes which will make their products
easier for users to accept. Opportunities abound Bradley, J., & Lee, C. C. (2007). ERP training
for scholars to take new directions in technology and user satisfaction: A case study. International
acceptance research. Journal of Enterprise Information Systems, Spe-
cial topic issue on Use of ERP in Education,
3(4), 33-50.
RefeRences
Davis, F. D. (1989). Perceived usefulness, perceived
ease of use, and user acceptance of information
Ajzen, I., & Fishbein, M. (1980). Understanding
technology. MIS Quarterly, 13(3), 319-340.
attitudes and predicting social behavior. Engle-
wood Cliffs, NJ: Prentice Hall. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R.
(1989). User acceptance of computer technology:
Ajzen. I. (1985). From intentions to action: A theo-
A comparison of two theoretical models. Manage-
ry of planned behavior. In J. Kuhl & J. Bechmann
ment Science, 35(8), 982-1003.
(Eds.), Action control: From cognition to behavior
(pp. 11-39). New York: Springer Verlag. Dishaw, M. T., Strong, D. M., & Brandy, D. B.
(2002). Extending the task-technology fit model
Ajzen, I. (1991). The theory of planned behavior.
of self-efficacy constructs. In R. Ramsower & J.
Organizational Behavior and Human Decision
Windso (Eds.), Proceedings of the 8th Americas
Processes, 50, 179-211.
Conference on Information Systems, Dallas, TX
(pp. 1021-1027).

291
The Technology Acceptance Model and Other User Acceptance Theories

Eveland, J. D. (1986). Diffusion, technology trans- Mazis, M., Ahtola, O., & Kippel, R. (1975). A
fer, and implementation. Knowledge: Creation, comparison of four multi attribute models in
Diffusion, Utilization, 8(2), 302-322. the prediction of consumer attitudes. Journal of
Consumer Research, 2, 38-53.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude,
intention and behavior: An introduction to theory McCloskey, D. W. (2006). The importance of ease
and research. Reading, MA: Addison-Wesley. of use, usefulness, and trust to online consumers:
An examination of the technology acceptance
Gefen, D., & Straub, D. (2000). The relative im-
model with older consumers. Journal of Organiza-
portance of perceived ease of use in IS adoption:
tional and End User Computing, 18(3), 47-65.
A study of e-commerce adoption. Journal of the
Association for Information Systems, 1(8), 1-28. McCoy, S., Galleta, D. F., & King, W. R. (2007).
Applying TAM across cultures: The need for cau-
Geiger, M. A., & Cooper, E. A. (1996). Cross-
tion. European Journal of Information Systems
cultural comparisons using expectancy theory to
(2007), 16, 81-90.
assess student motivation. Issues in Accounting
Education, 11(1), 113-129. McCoy, S., Everard, A., & Jones, B. M. (2005).
An examination of the technology acceptance
Goodhue, D. L., & Thompson, R. L. (1995). Task-
model in Uruguay and the US: A focus on cul-
technology fit and individual performance. MIS
ture. Journal of Global Information Technology
Quarterly, 19(2), 213-236.
Management, 8(2), 27-45.
Hwang, Y. (2005). Investigating enterprise sys-
Payne, J. W. (1982). Contingent decision behavior.
tems adoption: Uncertainty avoidance, intrinsic
Psychological Bulletin, 92(2), 382-402.
motivation and the technology acceptance model.
European Journal of Information Systems, 14, Pijpers, G. G. M., & van Montfort, K. (2006).
150-161. An investigation of factors that influence senior
executives to accept innovations in information
James, T., Pirim, T., Boswell, K., Reithel, B., &
technology. International Journal of Manage-
Barkhi, R. (2006). Determining the intention to
ment, 23(1), 11-23
use biometric devices: An application and exten-
sion of the technology acceptance model. Journal Rogers, E. M. (2003). Diffusion of innovations
of Organizational and End User Computing, (5th ed.). New York: Free Press.
18(3), 1-24.
Rogers, E. M. (1983). Diffusion of innovations.
Johnson, E. J., & Payne, J. W. (1985). Effort and New York: Free Press.
accuracy in choice. Management Science, 31(4),
Silva, L. (2007). Post-positivist review of technol-
395-414.
ogy acceptance model. Journal of the Association
Lee, Y., Kozar, K., & Larsen, K. R. T. (2003). The for Information Systems, 8(4), 255-266.
technology acceptance model: Past, present and
Straub, D. W., & Burton-Jones, A. (2007). Veni,
future. Communications of the Association for
vedi, vici: Breaking the TAM logjam. Journal
Information Systems, 12(50), 752-780.
of the Association for Information Systems, 8(4),
Mulaik, S., James, L. R., Van Alstine, J., Bennett, 223-229.
N., Lind, S., & Stillwell, C. D. (1989). Evaluation of
Taylor, S., & Todd, P.A. (1995). Understanding
goodness of fit indices in structural equation mod-
information technology usage: A test of compet-
els, Psychological Bulletin, 105(3), 430-445.

292
The Technology Acceptance Model and Other User Acceptance Theories

ing models. Information Systems Research, 6(2), communications channels, and innovation char-
144-176. acteristics (Rogers, 1983).
Venkatesh, V., & Davis, F. D. (2000). A theoretical Perceived Ease of Use (PEOU): One of the
extension of the technology acceptance model: two key variables in the technology acceptance
Four longitudinal field studies. Management Sci- model. Perceived ease of use will lead to attitude
ence, 46(2), 186-204. toward use, behavioral intention to use and actual
use. PEOU also influences the second key vari-
Venkatesh, V., Morris, M. G., Davis, G. B., &
able, perceived usefulness.
Davis. F. D., (2003). User acceptance of infor-
mation technology: Toward a unified view. MIS Perceived Usefulness (PU): One of the two key
Quarterly, 27(3), 425-478. variables in the technology acceptance model. PU
directly influences both attitude toward systems
Venkatesh, V., Davis, F. D., & Morris, M. G.
use and behavioral intention to use the system.
(2007). Dead or alive? The development, trajec-
PU is influenced by perceived ease of use.
tory and future of technology adoption research.
Journal of the Association for Information Sys- Task-Technology Fit Model (TTF): A model
tems, 8(4), 267-286. of user acceptance that relates actual use to tool
functionality and task characteristics (Dishaw
Wixom, B. H., & Todd, P. A. (2005). A theoreti-
et al., 2002).
cal integration of user satisfaction and technol-
ogy acceptance. Information Systems Research, Technology Acceptance Model (TAM):
16(1), 85-102. TAM is a model of user acceptance of informa-
tion systems technology based on the theory of
reasoned action. Two variables perceived useful-
ness and perceived ease of use lead to attitude
key TeRms AnD DefInITIOns
toward use, behavioral intention to use and use
of the system.
Coping Model: Adaptation strategies to
significant information systems events consist- Theory of Planned Behavior (TPB):. A
ing of benefits maximizing, benefits satisficing, theory which extends the theory of reasoned ac-
disturbance handling, and self-preservation. Ex- tion to include users who do not have complete
pected outcomes of these strategies are restoring control over the use of an innovation. A variable
emotional stability, minimizing the perceived of perceived behavioral control is added to the
threats of the technology and improving user TRA.
effectiveness and efficiency (Beaudry and Pin-
Theory of Reasoned Action (TRA): A theory
sonneault, 2005).
found in social psychology literature which ex-
Decomposed Theory of Planned Behavior: plains the determinants of consciously intended
A variation of the theory of planned behavior behaviors (Fishbein and Ajzen, 1975; Ajzen and
which breaks down attitudinal, normative and Fishbein, 1980).
control beliefs into a set of more measureable
User Acceptance: This term describes the
variables.
willingness of a user of information systems tech-
Innovation Diffusion Theory: A theory of nology to adopt and accept new IT initiatives.
adoption of new technology based on individual
user characteristics, information sources and

293
The Technology Acceptance Model and Other User Acceptance Theories

enDnOTes 2
Taylor and Todd (1995) describe this model
as: B = w1BI + w2PBC and BI = w3A + w4SN
1
Behavioral intention can be shown as BI = + w5PBC, where w is the weight of each
A + SN, attitude can be expressed as A = factor.
∑ bi ei, and subjective norm as SN = ∑ nbi
mci.

294

Vous aimerez peut-être aussi