1 Introduction
2 Theoretical Background
2.1 Smart Services and Proactive Smart Services
No automation | Recommendation | Customer-approved decision | Autonomous decision |
---|---|---|---|
×
|
×
|
×
|
×
|
– | Location recommender service: This form of PASS provides recommendations for suitable restaurants to the customer at lunchtime. Thereby, the service relies on the nutrition goals or eating habits of the customer and contextual information like waiting times or details about restaurant menus | Payment and return assistant: This form of PASS is connected to the email inboxes and online shopping accounts of a customer. This may allow PASS to notify the customer about upcoming deliveries, return deadlines, and upcoming payments. PASS not only proactively inform the customer (e.g., upcoming payments) but also support his/her in the enactment (e.g., autonomous payment handling) after his/her decision (e.g., payment approval by the customer) | Smart fridge: The smart fridge as a PASS buys groceries while following customer’s goals, preferences, and needs. It thereby adjusts the ordered products’ quantity and quality concerning the customer’s eating habits, preferred taste, holiday plans, and products’ expiry dates. On behalf of the customer, this form of PASS initiates individualized groceries deliveries to the customer’s home and handles respective payments while only updating the customer via push notifications on the smartphone |
2.2 Technology Acceptance Models in a Service Context
Acceptance theory | Service context | Source |
---|---|---|
Reasoned Action Approach | Digital proactive smart service | Leyer et al. (2017) |
Own model | Digital home service | Noh and Kim (2010) |
Own Model | Digital signage | Seol et al. (2013) |
Own model | Mobile data service | Kim and Oh (2011) |
Own Model | Self-service technology | Farah and Ramadan (2017) |
TPB; UTAUT + TAM | Smart home service | |
TAM | Digital health service | |
TAM | Restaurant based e‑service | Mozeik et al. (2009) |
TAM | Digital shipping | Nikitakos and Lambrou (2007) |
TAM | Human resource service | Huang and Martin-Taylor (2013) |
TAM | Voice assistants | Coskun-Setirek and Mardikyan (2017) |
TAM | Mobile shopping assistant service | Daraghmi (2016) |
TAM + Protection Motivation Theory | Location-based service | Erskine et al. (2012) |
TAM Own Model | Digital music service | |
TAM Own Model | Service of smart wearables | Kim and Shin (2015) |
TAM + Privacy Calculus | Privacy dashboards | Cabinakova et al. (2016) |
TAM + Technology Threat Avoidance Theory | Email authentication service | Herath et al. (2014) |
TAM; UTAUT | Digital television | |
TAM; UTAUT | E‑government service | |
UTAUT | Digital-learning service | Pynoo et al. (2011) |
UTAUT | Personal information and communication technology service | Thong et al. (2011) |
UTAUT | Recommender system | Wang et al. (2012) |
UTAUT + Divide Theory Innovation-Diffusion-Theory | Internet banking service | |
UTAUT Model of Adoption Technology in Households | Internet-based service delivery | |
UTAUT2 + Extended Privacy Calculus Theory; TAM | IoT-based service |
3 Method
Activity | Guideline | Description | Summary | Justification of methodological avenue taken and details on operationalization |
---|---|---|---|---|
Identify a General Theory | 1. Ground in a general theory | A general theory relevant to the domain of interest should be selected to guide the contextualization efforts | We adopted UTAUT2 to guide the development of a context-specific PASS model | |
When contextualizing such a theory for a certain context, such as PASS, the key question is whether the contextualization adds enough insights to justify the novel contextualized theory compared to using the more generalizable theoretical approach (i.e., UTAUT2). We will measure the contribution of the contextualized model by comparing it with the baseline model UTAUT2 in the following analyses. Specifically, we will compare the variance explained by each model and differences in the antecedents to challenge the degree of novelty of a contextualized model | ||||
Conduct Level 1 Context-ualization | 2. Contextualize and refine general theory | A general model needs to be contextualized to the specific research domain | We refined UTUAT2 to the PASS context via conducting exploratory factor analysis (EFA) | A general model is not always generalizable to different IS contexts (Hong et al. 2014; Lee and Baskerville 2003). Thus, the refinement of the general model is necessary to include a minimal set of core antecedents relevant to the context researchers focus on. We refined the model by removing and adding core antecedents based on the context (Hong et al. 2014; Lee and Baskerville 2003). Removing antecedents aims at scale purification. It results in a contextualized UTAUT2 model with antecedents that best account for the variations and interrelationships of the manifest variables (Matsunaga 2010) |
To yield a contextualized UTAUT2 model, we first developed context-specific antecedents (see Guideline 3 below) in addition to the already existing UTAUT2 antecedents. Second, we measured these context-specific antecedents by applying established guidelines for item development (Harrison und McLaughlin 1993; Hinkin 1998; MacKenzie et al. 2011; Tourangeau et al. 2000). We measured all items of the research model on a seven-point Likert scale. Third, we conducted an online survey on the crowdsourcing platform “Prolific” (https://prolific.ac) consisting of employees working in the service industry to collect data for the analysis. Finally, we performed an EFA on the data collected for all antecedents to identify which antecedents to add or remove | ||||
Conduct Level 2 Context-ualization | 3. Identify context-specific antecedents | Context-specific antecedents can be identified based on past research or in-depth analysis using qualitative methods such as interviews or focus groups | We used a focus group of 12 German participants to examine contextual antecedents added to the refined general model (i.e., UTAUT2) | Different focus groups may be of interest in the context of PASS. Specifically, a practitioners-focused group would certainly be of great value. However, access to such practitioners fulfilling respective requirements (e.g., decision-makers of PASS) is not trivial. Thus, we used personal contacts and selected academic researchers with expertise in service research, digital life, or customer relationship management, like others researching acceptance (e.g., the acceptance of energy efficiency-related technologies, see Wunderlich et al. 2019; Venkatesh 2008). We anticipate that individuals who accept PASS will typically be employed in related fields. We also anticipate that participants will be potential adopters or current digital or smart services customers |
Our focus group comprised 12 German participants working on the following question: What determines PASS acceptance? We provided a PASS definition and two concrete examples (see Appendix A). Once a shared perception of PASS had been established, we moderated a discussion about PASS’ key properties influencing acceptance | ||||
4. Model context-specific antecedents | Context-specific antecedents are modeled | We modeled PASS context-specific antecedents | Hong et al. (2014) suggest examining overlaps and separable aspects of core and context-specific antecedents | |
We examined these issues in the course of conducting EFA (see Guideline 2 above). Specifically, we developed scales for all context-specific antecedents and examined the correlations of the measurement items of core and context-specific antecedents. Further, we formulated hypotheses for all antecedents | ||||
5. Examine the interplay between the IT artifact and other antecedents | Context-specific antecedents are included in the refined general model | We included the context-specific antecedents as direct predictors in the refined UTAUT2 model | Adding contextual variables as direct predictors of dependent variables is the most common option of contextualization in extant research (Bagozzi 2007; Hong et al. 2014) and one of the main types of UTAUT extensions (Venkatesh et al. 2016). Examinations of possible interactions among context-specific antecedents should be grounded in theory and provide theoretical insights into the contextualized model’s mechanisms (Bagozzi 2007; Hong et al. 2014) | |
Following this guideline, we applied structural equation modeling (SEM) to test our research model, more precisely PLS-SEM, because of the exploratory nature of our research (Hair Jr. et al. 2011). When validating the UTAUT2-PASS model, we again gathered data for the analysis from the crowdsourcing platform “Prolific.” | ||||
6. Examine alternative models | Different alternative models may be examined to better understand the phenomenon | Not applied | Previous Guidelines (1–5) yield theory-grounded models that mostly reveal the direct influence of context-specific antecedents on a phenomenon of interest. Hong et al. (2014) propose this step as optional when the researchers’ objective is to examine indirect influences of context-specific antecedents | |
Our objective refers to taking a first step in investigating how a contextualized version of UTAUT2 adds understanding to PASS. As we do not change the general theory UTAUT2 fundamentally, we do theory testing in the context of PASS. We take the theory UTAUT2 and investigate how a contextualized version of this theory adds an understanding to this phenomenon. We do not test for alternative models and leave this step for further research |
4 Analysis and Results
4.1 Guideline 1: Ground in a General Theory
4.2 Guideline 2: Contextualize and Refine General Theory & Guideline 3: Identify Contextualized Antecedents
Antecedent | Reasoning of authors why the antecedent might be included (based on reflections of focus group input) | (If applicable) root antecedent | Definition |
---|---|---|---|
Adaptability | PASS need various ways and degrees of freedom to adapt to customer preferences and to successfully act on behalf of them. So, without adaptability, a PASS cannot unfold its full autonomy potential or at least not in line with customers’ dynamically changing preferences | NA | Adaptability describes the extent to which a service can be adapted to the changing demands of customers or circumstances |
Individualization | Individualization describes the extent to which a service identifies customers’ preferences and goals at a high degree of individualization by collecting and analyzing data on customer patterns. Furthermore, the service interprets customers’ everyday activities and derives predictive behavior | ||
Interaction | Interaction refers to the extent to which customers can participate in modifying the format and content of a mediated environment or transactions in real-time and give feedback | ||
Context Awareness | Context Awareness describes the extent to which a service can adapt to changing environmental circumstances | ||
Autonomy | The key feature of PASS differentiating it from ‘ordinary’ smart services is the autonomy feature. Thus, this feature may have a substantial influence on customers’ acceptance of PASS | NA | Autonomy describes the execution of tasks or decisions on behalf of a customer and without a human trigger |
Reversibility | The autonomous behavior of PASS might trigger questions about reversibility in cases of mistakes caused by the PASS (e.g., ordering too much or the wrong items). Thus, the question of whether actions of the PASS are reversible is likely an essential one for acceptance | NA | Reversibility describes the risks involved in decisions or actions, and the possibility of reversing them |
Trust | The autonomous behavior of PASS might trigger questions about the probability of losing control over PASS and associated consequences. Thus, being able to trust a PASS, especially if the service acts autonomously, is likely an essential for acceptance | NA | Trust describes a subjective belief that a party will fulfill their obligations and plays an important role in uncertain situations where customers of the systems are vulnerable |
Trust in Service | Trust in Service refers to customers’ belief that a service will be provided in line with their expectations, and customers’ willingness to disclose private information in order to access all functionality of a pervasive application | ||
Trust in Service Provider | Trust in Service Provider describes the extent to which customers believe that selling parties keep their promises and ensure data privacy and security. It determines whether the customer will maintain a relationship with the provider in the future, as well as the future value of the relationship |
Item ID | Antecedents | Cronbach’s Alpha | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | ||
IND_01a | 0.55 | 0.04 | 0.23 | −0.02 | 0.00 | 0.14 | 0.05 | 0.09 | −0.07 | 0.91 |
IND_02 | 0.60 | 0.02 | 0.12 | 0.11 | 0.01 | 0.05 | 0.09 | 0.04 | 0.10 | |
IND_03 | 0.65 | 0.00 | 0.24 | −0.07 | −0.05 | 0.09 | 0.12 | 0.01 | −0.11 | |
INT_01a | 0.34 | 0.09 | 0.19 | 0.02 | −0.07 | 0.13 | 0.03 | 0.14 | 0.14 | |
INT_02a | 0.47 | 0.32 | 0.05 | 0.10 | 0.15 | 0.00 | −0.04 | 0.02 | 0.08 | |
INT_03a | 0.46 | 0.35 | 0.01 | 0.07 | 0.20 | 0.02 | −0.09 | 0.00 | 0.08 | |
CA_01a | 0.50 | 0.04 | −0.11 | 0.04 | 0.14 | −0.02 | 0.05 | 0.11 | 0.23 | |
CA_02a | 0.58 | −0.06 | −0.02 | 0.04 | 0.14 | −0.03 | −0.01 | 0.11 | 0.13 | |
CA_03 | 0.60 | −0.14 | 0.06 | −0.04 | 0.10 | −0.03 | 0.10 | 0.11 | 0.04 | |
CA_04 | 0.65 | 0.00 | −0.17 | −0.04 | −0.02 | 0.03 | 0.12 | 0.05 | 0.14 | |
TS_01a | 0.23 | 0.07 | 0.36 | −0.30 | 0.16 | 0.12 | 0.01 | −0.01 | 0.04 | b |
TS_02a | 0.23 | 0.23 | 0.17 | −0.30 | 0.16 | 0.00 | 0.13 | 0.07 | 0.13 | |
TS_03a | 0.18 | 0.20 | 0.21 | −0.26 | 0.22 | −0.02 | 0.12 | −0.03 | 0.04 | |
TP_01 | −0.04 | 0.84 | 0.01 | −0.02 | 0.01 | 0.04 | 0.01 | 0.05 | −0.01 | 0.94 |
TP_02 | −0.07 | 0.74 | 0.03 | 0.10 | −0.03 | 0.04 | 0.08 | −0.05 | 0.15 | |
TP_03 | 0.03 | 0.92 | −0.03 | −0.03 | −0.05 | −0.01 | 0.01 | 0.00 | 0.04 | |
TP_04 | −0.01 | 0.92 | −0.03 | 0.04 | −0.03 | 0.00 | 0.01 | 0.03 | 0.00 | |
AU_01 | 0.06 | −0.07 | 0.77 | 0.07 | 0.03 | −0.04 | 0.04 | −0.01 | 0.04 | 0.84 |
AU_02 | 0.02 | −0.03 | 0.67 | 0.03 | 0.02 | 0.01 | 0.10 | 0.09 | −0.02 | |
AU_03 | 0.03 | 0.16 | 0.02 | 0.70 | 0.06 | 0.02 | 0.01 | 0.03 | 0.08 | 0.76 |
AU_04 | 0.03 | 0.01 | 0.15 | 0.68 | −0.04 | 0.04 | 0.07 | 0.07 | 0.06 | |
RE_01a | 0.10 | 0.34 | 0.00 | 0.37 | 0.17 | −0.01 | −0.08 | −0.03 | −0.02 | b |
RE_02a | 0.11 | 0.36 | −0.11 | 0.28 | 0.12 | 0.11 | −0.12 | −0.07 | 0.08 | |
PE_01 | −0.04 | −0.02 | 0.07 | 0.04 | 0.73 | 0.18 | 0.01 | 0.02 | 0.01 | 0.93 |
PE_02 | −0.04 | −0.01 | 0.09 | −0.04 | 0.74 | 0.00 | 0.12 | 0.06 | 0.03 | |
PE_03 | 0.01 | 0.00 | −0.02 | −0.01 | 0.79 | 0.03 | 0.05 | 0.02 | 0.07 | |
PE_04 | 0.10 | −0.06 | −0.08 | −0.03 | 0.76 | −0.07 | 0.13 | 0.03 | 0.16 | |
EE_01 | 0.01 | 0.05 | 0.03 | 0.03 | 0.02 | 0.80 | −0.04 | 0.03 | 0.03 | 0.93 |
EE_02 | 0.02 | 0.07 | −0.09 | 0.00 | 0.03 | 0.80 | 0.06 | 0.01 | 0.03 | |
EE_03 | −0.06 | −0.03 | 0.02 | 0.06 | 0.02 | 0.83 | −0.01 | −0.01 | 0.10 | |
EE_04 | 0.01 | −0.05 | 0.01 | −0.05 | −0.04 | 0.89 | 0.04 | 0.02 | 0.08 | |
SI_01 | 0.00 | −0.02 | 0.04 | 0.04 | 0.00 | 0.01 | 0.89 | 0.01 | 0.01 | 0.95 |
SI_02 | −0.02 | 0.02 | −0.02 | −0.02 | −0.01 | 0.01 | 0.98 | −0.04 | 0.01 | |
SI_03 | 0.03 | 0.01 | −0.02 | 0.03 | 0.03 | 0.00 | 0.90 | 0.04 | −0.04 | |
FC_01a | 0.11 | 0.06 | 0.12 | −0.01 | 0.45 | 0.26 | 0.09 | 0.03 | −0.19 | b |
FC_02a | 0.18 | 0.10 | −0.08 | 0.06 | 0.47 | 0.35 | 0.04 | −0.01 | −0.16 | |
FC_03a | 0.23 | 0.13 | −0.14 | −0.04 | 0.35 | 0.27 | 0.09 | 0.00 | −0.12 | |
FC_04a | 0.25 | 0.12 | 0.11 | 0.02 | 0.29 | 0.08 | 0.02 | 0.07 | −0.02 | |
HM_01 | 0.03 | 0.01 | 0.01 | 0.02 | −0.06 | 0.00 | −0.01 | 0.93 | 0.01 | 0.94 |
HM_02 | −0.02 | 0.04 | −0.02 | 0.02 | 0.03 | 0.04 | −0.03 | 0.90 | −0.02 | |
HM_03 | 0.00 | −0.05 | −0.03 | 0.02 | −0.01 | −0.01 | 0.02 | 0.96 | 0.00 | |
PV_01 | −0.02 | 0.06 | 0.01 | −0.05 | −0.04 | 0.14 | 0.00 | 0.00 | 0.77 | 0.93 |
PV_02 | 0.00 | 0.01 | 0.02 | 0.08 | 0.09 | 0.04 | −0.01 | −0.01 | 0.83 | |
PV_03 | 0.07 | 0.05 | −0.01 | 0.01 | 0.01 | 0.07 | 0.00 | 0.00 | 0.85 | |
HT_01a | −0.02 | 0.15 | 0.31 | −0.23 | 0.27 | −0.03 | 0.10 | 0.23 | 0.00 | b |
HT_02a | −0.03 | 0.07 | 0.27 | −0.30 | 0.13 | −0.09 | 0.11 | 0.29 | 0.01 | |
HT_03a | 0.04 | 0.14 | 0.17 | −0.27 | 0.31 | 0.02 | 0.21 | 0.17 | 0.08 | |
HT_04a | 0.07 | 0.03 | 0.10 | −0.30 | 0.27 | 0.04 | 0.10 | 0.27 | 0.09 |
4.3 Guideline 4: Model Context-Specific Antecedents
4.4 Guideline 5: Examine the Interplay Between the IT Artifact and Other Antecedents
Descriptive Statistics | Correlations | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ICR | MN | SD | AD | TR | AU | CO | PE | EE | SI | PV | HM | BI | Age | GDR | |
AD | 0.881 | 0.161 | 0.068 | 0.855 | – | – | – | – | – | – | – | – | – | – | – |
TR | 0.946 | −0.037 | 0.066 | 0.143 | 0.866 | – | – | – | – | – | – | – | – | – | – |
AU | 0.881 | 0.114 | 0.051 | 0.457 | 0.008 | 0.946 | – | – | – | – | – | – | – | – | – |
CO | 0.78 | −0.071 | 0.058 | 0.004 | 0.470 | −0.115 | 0.866 | – | – | – | – | – | – | – | – |
PE | 0.918 | 0.276 | 0.065 | 0.555 | 0.163 | 0.356 | 0.104 | 0.896 | – | – | – | – | – | – | – |
EE | 0.910 | 0.071 | 0.056 | 0.484 | 0.352 | 0.229 | 0.198 | 0.573 | 0.886 | – | – | – | – | – | – |
SI | 0.950 | 0.313 | 0.060 | 0.461 | −0.098 | 0.436 | −0.139 | 0.494 | 0.245 | 0.953 | – | – | – | – | – |
PV | 0.954 | 0.062 | 0.054 | 0.303 | 0.352 | 0.140 | 0.232 | 0.414 | 0.529 | 0.132 | 0.956 | – | – | – | – |
HM | 0.924 | 0.087 | 0.054 | 0.371 | −0.035 | 0.249 | −0.036 | 0.394 | 0.219 | 0.480 | 0.169 | 0.932 | – | – | – |
BI | 0.965 | – | – | 0.546 | −0.053 | 0.476 | −0.132 | 0.595 | 0.362 | 0.654 | 0.179 | 0.444 | 0.983 | – | – |
Age | 1.000 | 0.007 | 0.043 | −0.057 | 0.068 | −0.048 | −0.039 | −0.097 | 0.018 | −0.108 | 0.023 | −0.010 | −0.070 | NA | – |
GDR | 1.000 | 0.052 | 0.038 | 0.038 | −0.086 | 0.149 | −0.071 | −0.008 | −0.054 | 0.131 | −0.097 | 0.071 | 0.130 | −0.065 | NA |