Skip to main content
Top
Published in: Information Systems Frontiers 3/2019

Open Access 08-06-2017

Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model

Authors: Yogesh K. Dwivedi, Nripendra P. Rana, Anand Jeyaraj, Marc Clement, Michael D. Williams

Published in: Information Systems Frontiers | Issue 3/2019

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Based on a critical review of the Unified Theory of Acceptance and Use of Technology (UTAUT), this study first formalized an alternative theoretical model for explaining the acceptance and use of information system (IS) and information technology (IT) innovations. The revised theoretical model was then empirically examined using a combination of meta-analysis and structural equation modelling (MASEM) techniques. The meta-analysis was based on 1600 observations on 21 relationships coded from 162 prior studies on IS/IT acceptance and use. The SEM analysis showed that attitude: was central to behavioural intentions and usage behaviours, partially mediated the effects of exogenous constructs on behavioural intentions, and had a direct influence on usage behaviours. A number of implications for theory and practice are derived based on the findings.

1 Introduction

The acceptance and use of information system (IS) and information technology (IT) innovations has been a major concern for research and practice. Over the last several decades, a plethora of theoretical models have been proposed and used to examine IS/IT acceptance and usage. These include the Theory of Reasoned Action, the Technology Acceptance Model, the Theory of Planned Behaviour, and Model of Personal Computer Utilization (Ajzen 1991; Davis 1989; Davis et al. 1989; Fishbein and Ajzen 1975; Thompson et al. 1991). Cumulatively, these theories offered different explanations of IS/IT acceptance and usage based on different factors such as technology attributes and contextual factors.
Based on a comprehensive review and synthesis of several theoretical models, Venkatesh et al. (2003) proposed the Unified Theory of Acceptance and Use of Technology (UTAUT), which has since been used extensively by researchers in their quest to explain IS/IT acceptance and use. While the original UTAUT model explained a considerable amount of variance in behavioural intention and usage behaviour, the model theorized some relationships that may not be applicable to all contexts, omitted some relationships that may be potentially important, and also excluded some constructs that may be crucial for explaining IS/IT acceptance and use.
In order to advance theory and identifying future research directions, we have attempted to critically review and refine the original UTAUT model. Specifically, we argue that the moderators specified in the original UTAUT model may not be applicable in all contexts, the path from facilitating conditions to behavioural intention missing in the original UTAUT model should be included, and individual characteristics such as attitude not theorized in the original UTAUT model should be introduced. We empirically examine our revised model using a combination of meta-analysis and structural equation modelling techniques.
The remainder of the paper is organized as follows. The next section introduces the alternative theories of IS/IT acceptance with attention to the UTAUT model and formalizes the revised theoretical model. The subsequent two sections describe the research methods and the results of our empirical analysis using meta-analysis and structural equation modelling. The paper ends with discussion and conclusion sections.

2 Theoretical Reframing of Research on IS/IT Acceptance and Use

2.1 Alternative Theories on IS/IT Acceptance and Use

User acceptance of new IS/IT innovation is often portrayed as one of the most mature areas of research in contemporary IS literature (e.g., Hu et al. 1999; Williams et al. 2009). Research in this area has resulted in various theoretical models for explaining individuals’ intention to use innovations, which have their origins in information systems, psychology, and sociology (e.g., Davis et al. 1989; Taylor and Todd 1995b; Venkatesh and Davis 2000; Venkatesh et al. 2003).
Drawn from social psychology, the theory of reasoned action (TRA) (Ajzen and Fishbein 1980; Fishbein and Ajzen 1975) is a precursor to many models and a frequently-used theory of human behaviour for explaining technology adoption (Venkatesh et al. 2003). TRA posits that individual behaviour is driven by the individual’s own behavioural intention, which is in turn a function of an individual’s attitude toward the behaviour and subjective norms (Fishbein and Ajzen 1975). Sheppard et al. (1988) indicated that the predictive validity of the model remained high although many researchers extended this model beyond its stated boundary conditions.
TRA was the basis for two important theoretical directions: to develop a more comprehensive Theory of Planned Behaviour (TPB) (Ajzen 1991); and to develop a more parsimonious and widely used Technology Acceptance Model (TAM) (Davis 1989; Davis et al. 1989). Davis et al. (1989) used TRA to explain individual acceptance of technology and found that the variance explained was largely consistent with studies that had employed TRA in the context of other behaviours. Thus, Davis et al. (1989) and Davis (1989) developed TAM to explain the acceptance of IS/IT and found two important beliefs to influence the usage of IS: perceived usefulness and perceived ease of use.
According to TPB, user’s actions are determined by their intentions and perceptions of control, while their intentions are influenced by their attitudes toward behaviour, subjective norms, and perceptions of behavioural control (Ajzen 1991, 2001). Ajzen (1991, 2001) also showed the ability of the TPB in providing a very useful theoretical framework for understanding and predicting the acceptance of new innovations including IS/IT based innovations (e.g., Harrison et al. 1997; Mathieson 1991; Taylor and Todd 1995b).
The Decomposed Theory of Planned Behaviour (DTPB) (Taylor and Todd 1995b) combined elements and characteristics from both TPB and TAM in order to provide a more comprehensive understanding of technology adoption. Although DTPB is identical to TPB in predicting intention, DTPB “decomposes” attitude, subjective norm, and behavioural control into its essential belief structure in the context of technology adoption (Venkatesh et al. 2003). A combined model of TAM and TPB (C-TAM-TPB) incorporates predictors from TPB and perceived usefulness from TAM (Taylor and Todd 1995a).
An extensive body of research in psychology has employed general motivation theory to examine individual behaviour. A number of studies (e.g., Igbaria et al. 1996; Venkatesh and Brown 2001) have adapted motivational theories for specific contexts (Venkatesh et al. 2003); see Vallerand (1997) for an exhaustive review of motivational theories. Within the IS/IT domain, Davis et al. (1992) used motivational theory to understand the adoption and use of new technology (see also Venkatesh and Speier 1999).
The model of PC utilization (MPCU) was derived largely from Triandis’ (1977) theory of human behaviour. It presents a competing context to that proposed by TRA and TPB. Thompson et al. (1991) adapted and refined Triandis’ model with attention to the IS/IT context and formulated MPCU for predicting usage behaviour rather than intention.
Rooted in sociology, the innovation diffusion theory (IDT) (Rogers 1995) has been used to study a number of innovations ranging from agricultural tools to organizational innovation (Tornatzky and Klein 1982). Further, Moore and Benbasat (1991) tailored the characteristics of innovations presented by Rogers and refined a set of constructs to use it for individual technology acceptance.
Social cognitive theory (SCT) has been used extensively to explain human behaviour (see Bandura 1986). Compeau and Higgins (1995) implemented and extended this theory from the perspective of computer utilization, but the nature of the model and the basic theory allowed it to be extended to acceptance and use of IS/IT in general (Venkatesh et al. 2003).

2.2 Unified Theory of Acceptance and Use of Technology (UTAUT, Venkatesh et al. 2003)

Based on an analysis of the alternative models explained above, Venkatesh et al. (2003) argued that researchers were faced with a large number of similar constructs offered by many theories and found that they “pick and choose” constructs from the models or opt for a “favoured model”, with the result that the other models were largely ignored. Consequently, they synthesized the propositions put forth by different models of acceptance, including TRA, TAM, TPB, C-TAM-TPB, MM, MPCU, SCT and IDT) and proposed the Unified Theory of Acceptance and Use of Technology (UTAUT; Venkatesh et al. 2003). Using data from four organizations with three points of measurement, Venkatesh et al. (2003) found that the eight models explained between 17 and 53% of the variance in users’ intention to use IS/IT. However, the UTAUT outperformed all the eight models using the same data explaining about 70% of variance in behavioural intention (Venkatesh et al. 2003) and 50% in technology use (Venkatesh et al. 2012). One major difference between UTAUT and its precursors was that UTAUT proposed four moderators (i.e., gender, age, experience, and voluntariness) to further enhance the predictive power of the model. Since its inception, UTAUT has been used extensively in explaining the adoption of technologies by individuals.
While it has been tested and modified in various ways, studies that utilised UTAUT have illustrated (explicitly or implicitly) certain limitations—this suggests that there may be an opportunity to systematically reconsider the relationships proposed by UTAUT. First, the moderators proposed in the original UTAUT model may be reconsidered. Prior studies have generally not applied the complete UTAUT model as found in Venkatesh et al. (2003). A similar observation was made by Venkatesh et al. (2012), who noted that most studies employed only a subset of the model and that moderators were typically dropped. Among the studies that included moderators, few studies (e.g., Bandyopadhyay and Barnes 2012; Bhattarai et al. 2010; Fadel 2007; Venkatesh et al. 2011b) modeled the same four moderators as proposed by the original UTAUT model. A potential reason why prior studies may not have utilized moderators is because there may not be any variation in the moderator for the adoption and use context. For instance, the adoption and use of a specific IS/IT may have been mandated by the organization such that all individuals will have to adopt the technology—this results in a situation in which voluntariness as a moderator may not be readily applicable. Second, the relationships proposed in the original UTAUT model may be reconsidered for completeness. In formulating the UTAUT model, Venkatesh et al. (2003) argued that one would expect facilitating conditions to predict behavioural intention only if effort expectancy was not included in the model. This was a departure from prior theories of technology acceptance that explicitly modeled the relationship between facilitating conditions and behavioural intention. Prior studies (e.g., Duyck et al. 2010; Foon and Fah 2011; Yeow and Loo 2009) suggest that facilitating conditions influence behavioural intention even in the presence of effort expectancy. Finally, the original UTAUT model may be reconsidered from the light of other constructs that may explain adoption and usage behaviours of individuals. The four exogenous constructs in the UTAUT model may be viewed as representing technology attributes (i.e., performance expectancy and effort expectancy) and contextual factors (i.e., facilitating conditions and social influence) even when they may be viewed as perceptions held by individuals regarding the technology and the context. Despite the evidence that these four constructs explain a significant proportion of variance in the adoption and usage behaviours, a key element missing from the UTAUT model is the “individual” engaging in the behaviour—i.e., individual characteristics that describe the dispositions of the users may be influential in explaining their behaviours. Prior literature highlights several individual characteristics including attitude, computer self-efficacy, and personal innovativeness (e.g., Carter and Schaupp 2008; Chong 2013; Venkatesh et al. 2011a). Our literature review showed that only about 25% of studies that employed the UTAUT model did not include other constructs not in the original UTAUT model.
Table 1 presents prior literature examining theories and models of the IS/IT acceptance and use with an indication for the role of attitude in those studies. Our analysis indicates that that out of 16 theories/models explored, only five demonstrated a role for attitude in their theories/ models. Realising the significance of attitude in the acceptance of new technologies by individuals, it may be worthwhile to reconsider the inclusion of attitude in the models of technology adoption.
Table 1
Role of attitude in prior literature
Model
Dependent variables (DV)
Role of attitude
Additional independent variables affecting DV
Study
Theory of Reasoned Action
Behavioural intention, Behaviour
Attitude → Behavioural intention
Subjective norm
Fishbein and Ajzen (1975)
Technology Acceptance Model
Behaviour
NONE
Perceived usefulness
Perceived ease of use
Davis (1989)
IS Success Model
Use,
User satisfaction
NONE
System quality
Information quality
DeLone & McLean (1992)
Theory of Planned Behaviour
Behavioural intention, Behaviour
Attitude → Behavioural intention
Subjective norm
Perceived behavioural control
Ajzen (1991)
Model of PC Utilization
Utilization
Affect → Utilization
Long term consequences
Job fit
Complexity
Social factors
Facilitating conditions
Thompson et al. (1991)
Perceived Characteristics of Innovating
Behavioural intention, Behaviour
NONE
Relative advantage
Compatibility
Ease of use
Result demonstrability
Image
Visibility
Trialability
Voluntariness
Moore and Benbasat (1991)
Task-Technology Fit Model
Utilization
NONE
Task-technology fit
Goodhue & Thompson (1995)
Social Cognitive Theory
Performance
NONE
Behaviour modelling
Computer self-efficacy
Performance outcome expectations
Personal outcome expectations
Compeau and Higgins (1995)
Innovation Diffusion Theory
Adoption
NONE
Relative advantage
Compatibility
Complexity
Trialability
Observability
Rogers (1995)
TAM Extension (TAME)
Behavioural Intention
Attitude → Behavioural Intention
Situational involvement
Intrinsic involvement
Perceived usefulness
Jackson et al. (1997)
Extended TAM (TAM2)
Intention to use,
Usage Behaviour
NONE
Subjective norm
Image
Job relevance
Result demonstrability
Perceived usefulness
Perceived ease of use
Venkatesh and Davis (2000)
Unified Theory of Acceptance and Use of Technology
Behavioural intention, Behaviour
NONE
Performance expectancy
Effort expectancy
Social influence
Facilitating conditions
Venkatesh et al. (2003)
Extended IS Success Model
System use
Attitude → Satisfaction
Attitude → System use
Top management support
User experience
User participation
System quality
User training
Sabherwal et al. (2006)
TAM3
Behavioural intention,
Behaviour
NONE
Perceived usefulness
Perceived ease of use
Subjective norm
Image
Job relevance
Output quality
Result demonstrability
Computer self-efficacy
Perceptions of external control
Computer anxiety
Computer playfulness
Perceived enjoyment
Objective usability
Venkatesh & Bala (2008)
Model of Acceptance with Peer Support (MAPS)
System use
NONE
Network density
Network centrality
Sykes et al. (2009)
UTAUT2
Behavioural intention, Behaviour
NONE
Performance expectancy
Effort expectancy
Social influence
Facilitating conditions
Hedonic motivation
Price value
Habit
Venkatesh et al. (2012)

2.3 Proposed Model of IS/IT Acceptance and Use

Based on the foregoing, we first exclude the four moderators from the original UTAUT model and identify the remaining relationships in the original UTAUT model as the basic UTAUT model. We next include the relationship between facilitating conditions and behavioural intention to the basic UTAUT model. This is based on appropriate theoretical foundations (Ajzen 1991; Taylor and Todd 1995b) and empirical findings (e.g., Eckhardt et al. 2009; Foon and Fah 2011; Yeow and Loo 2009) that support the effect of facilitating conditions and behavioural intention even in the presence of effort expectancy—in contrast to original model. Further, we include user attitude as a mediating construct in the basic UTAUT model. The role of attitude in explaining technology acceptance has been acknowledged in prior literature (e.g., Bobbitt and Dabholkar 2001; Kim et al. 2009; Taylor and Todd 1995b; Yang and Yoo 2004).
The inclusion of attitude in models of IS/IT acceptance is consistent with TRA (Ajzen and Fishbein 1980; Fishbein and Ajzen 1975), TPB (Ajzen 1991) and DTPB (Taylor and Todd 1995b). TAM can be considered as a special case of the TRA with only two beliefs comprising attitude. The TRA model claims that attitude completely mediates the relationship between these types of beliefs and intention (Taylor and Todd 1995b). Further, TAM postulates that the easier a technology is to use and the more useful it is perceived to be, the more positive one’s attitude and intention toward using the technology will develop (Davis et al. 1989; Taylor and Todd 1995b). The relationship between attitude and behavioural intention represented in TAM implies that, all else being equal, people form intentions to perform behaviours toward which they have positive attitude. This relationship is central to TRA and related models presented by Triandis (1977) and Bagozzi (1981) (Davis et al. 1989).
While devising the TAM extension (TAME) model, Jackson et al. (1997) called the researchers to investigate whether perceived usefulness and perceived ease of use influence attitude. We position attitude as a mediator between performance expectancy and behavioural intention and between effort expectancy and behavioural intention. This is because the extent to which the IS/IT is useful and consistent with performance expectations and is easy to use can influence the individual’s attitude leading to intention. A number of empirical studies (e.g., Aboelmaged 2010; Aggelidis and Chatzoglou 2009; Kim et al. 2010) have advocated the use of attitude as a mediating variable along with perceived usefulness and perceived ease of use of the TAM model. Attitude has also been used as a mediating variable of performance expectancy and effort expectancy in several studies that had used UTAUT (e.g., Alshare and Lane 2011; Knutsen 2005; Koh et al. 2010; Rana et al. 2017; Sumak et al. 2010). We also propose that attitude would influence behavioural intention (i.e., Ajzen 1991; Davis 1989; Dwivedi et al. 2017; Fishbein and Ajzen 1975; Rana et al. 2016; 2017, Taylor and Todd 1995b) based on prior empirical research (e.g., Chen and Lu 2011; Zhang and Gutierrez 2007). Figure 1 shows the proposed model of IS/IT acceptance and use whereas Table 2 presents the definition for the constructs used in our theoretical model.
Table 2
Definitions for constructs used in the proposed theoretical model
Construct
Definition
Performance Expectancy (PE)
Performance expectancy is defined as the degree to which an individual believes that using the system will help him or her to attain gains in job performance (Venkatesh et al. 2003).
Effort Expectancy (EE)
Effort expectancy is defined as the degree of ease associated with the use of the system (Venkatesh et al. 2003).
Social Influence (SI)
Social influence is defined as the degree to which an individual perceives that important others believe he or she should use the new system (Venkatesh et al. 2003).
Facilitating Conditions (FC)
Facilitating conditions are defined as the degree to which an individual believes that an organizational and technical infrastructure exists to support use of the system (Venkatesh et al. 2003).
Attitude (AT)
An individual’s positive or negative feelings about performing the target behaviour (Davis et al. 1989; Fishbein and Ajzen 1975; Taylor and Todd 1995a, b).
Behavioural Intention (BI)
Behavioural intention is defined as a measure of the strength of one’s intention to perform a specific behaviour (Fishbein and Ajzen 1975).

3 Research methods

We employed a combination of meta-analysis and structural equation modelling (SEM) techniques to examine our research model.

3.1 Meta-Analysis

Meta-analysis enables results from multiple studies (Glass 1976; Hunter and Schmidt 1990; Rana et al. 2015a; Wu and Du 2012; Wu and Lederer 2009) to be accumulated for estimates of the true effect sizes of relationships. Prior research shows that meta-analysis is a valuable tool for research synthesis (Hwang 1996; Lee et al. 2003; Ma and Liu 2004; Wu and Lederer 2009) and an operative instrument for hypothesis testing (Dennis et al. 2001; Sabherwal et al. 2006; Sharma and Yetton 2003; Wu and Lederer 2009). It allows the application of statistical procedures for correcting sampling and measurement errors typically found in research studies (Hunter and Schmidt 1990) and the inclusion of non-significant or inconsistent results for collective inference (Sabherwal et al. 2006). In comparison to the narrative review i.e., traditional way of drawing common inferences from the related studies, meta-analysis provides relatively unbiased, rigorous, and trustworthy (Glass 1976; Sharma and Yetton 2003) inferences. It has been used in IS/IT research to examine various issues (e.g., King and He 2006; Lee et al. 2003; Sabherwal et al. 2006; Sharma et al. 2009; Wu and Du 2012; Wu and Lederer 2009).

3.1.1 Sample

To identify studies for the meta-analysis, we searched the bibliographic databases such as Scopus, Web of Knowledge and EBSCOHost, and the AIS Electronic Library. In addition, we also searched the Google Scholar database. We used the keywords such as Unified Theory of Acceptance and Use of Technology, Unified Theory of Acceptance & Use of Technology, and UTAUT in the article title, abstract, and the keyword sections. As journals are typically known to publish studies with significant results (Rosenthal 1979; Sharma and Yetton 2003), it is important to consider studies from the non-journal sources (Wu and Du 2012) as well. Hence, we also searched for other potential sources of research findings including books and book chapters, doctoral dissertations, and conference proceedings. Our search spanned the period from 2003 to 2012.
Our search resulted in more than 525 articles across all electronic databases. Studies were chosen for meta-analysis only when they met the following criteria: 1) they were empirical studies and not conceptual studies; 2) they operationalized at least one construct from the originating article on UTAUT by Venkatesh et al. (2003); and 3) they reported Pearson correlations or other statistics that may be converted to Pearson correlations (see Wu and Lederer 2009). To ensure the independence of studies included in the meta-analysis, we carefully compared the description and statistical data of each study with those of others (Ma and Liu 2004; Wu and Du 2012). When two or more studies reported findings using the same data set, we included only one study in our analysis. When a study reported a multiple datasets gathered from the different samples, each dataset was treated as an independent study (Hunter et al. 1982; Wu and Du 2012).
After discarding articles that were not empirical in nature or did not report correlations between relationships and duplicate articles across the electronic databases, we identified 162 articles, which were unique, empirical, and correlation-based in nature. These include 96 articles from journals, 49 conference proceedings, 16 dissertations, and one book chapter. This comprehensive search strategy allowed us to minimize the source bias, maximize the number of studies, and therefore increase the quality of the meta-analysis (Ma and Liu 2004) to be performed.

3.1.2 Coding

We coded a total of 1600 observations for the 21 relationships involving the seven constructs in our research model (See Table 3 for a distribution). For each observation, we coded the sample size, the reliabilities for both constructs in the relationship, and the effect size (i.e., Pearson correlation) from the original study. In addition, we also coded the means, standard deviations, and the range of the Likert scale reported in the original study.
Table 3
Meta-analysis results
 
PE
EE
FC
SI
AT
BI
UB
PE
 
39,048 (129)
33,962 (98)
38,661 (111)
4706 (20)
43,388 (134)
22,282 (61)
EE
0.543
 
32,239 (99)
35,563 (107)
4413 (20)
41,450 (131)
20,662 (60)
FC
0.424
0.565
 
32,218 (92)
4319 (19)
36,223 (109)
21,723 (58)
SI
0.460
0.363
0.417
 
4752 (20)
42,397 (126)
22,378 (63)
AT
0.685
0.566
0.499
0.455
 
16,012 (56)
5098 (19)
BI
0.542
0.506
0.453
0.415
0.626
 
24,963 (68)
UB
0.389
0.314
0.359
0.248
0.475
0.437
 
rc in lower triangle and N (k) in upper triangle

3.1.3 Accumulation

First, each coded effect size was corrected for any measurement errors based on the reliabilities of the two constructs involved in a relationship, as: \( {r}_m=\frac{r_o}{\sqrt{r_{xx}}\sqrt{r_{yy}}} \) where, rm is the effect size corrected for measurement error, rxx and ryy are the reliabilities of the first and second constructs in the relationship respectively. For relationships where reliabilities were not reported in the original studies, we used the mean reliability for the constructs computed using the reliabilities reported across all studies in our sample. Then, the cumulative effect size for each relationship was obtained using the measurement-error corrected effect size and correcting for sampling error, as: \( {r}_c=\frac{\sum \left[{N}_i{r}_{m, i}\right]}{\sum {N}_i} \) where, rc is the corrected mean effect size, rm , i is the effect size corrected for measurement error in study i, and Ni is the sample size from study i.
Table 3 shows the results of the meta-analysis for all relationships: k refers to the number of studies contributing an effect size; N represents the total number of respondents across all studies, and rc is the mean effect size corrected for measurement and sampling errors.

3.2 Meta-Analytic Structural Equation Modelling (MASEM)

MASEM involves the techniques of synthesizing correlation matrices to create a pooled correlation matrix, which can be analysed using SEM (Viswesvaran and Ones 1998). It refers to methods focused on contrasting and combining outcomes of various studies, in the hope of measuring patterns among study results, sources of divergence among those results, and other interesting relationships that may come to light in the perspective of multiple studies (Cheung and Chan 2005). MASEM technique allows the researchers to conduct a more precise and theory-driven quantitative review. A major advantage of this technique is that not all relationships specified by the theory need to be examined in each primary study, as the population correlations required can be meta-analytically computed (Joseph et al. 2007; Viswesvaran and Ones 1998).

3.2.1 Preparation

Before the SEM analysis can be done, the data need to be prepared. First, the SEM requires a single sample size for the entire model whereas meta-analysis yields a sample size for each relationship in the model (Carr et al. 2003; Sabherwal et al. 2006). Prior literature suggests various possibilities such as using the minimum sample size, average sample size and harmonic mean sample size (e.g., Tett and Meyer 1993; Viswesvaran and Ones 1998).
Second, the SEM requires the standard deviation for the constructs in the research model. We computed the standard deviation for each construct across all studies for which it was reported (see Table 4). Since individual studies differed in the measurement scale used (e.g., some studies employed a 5-point Likert scale whereas other studies utilized a 7-point Likert scale), we transformed all standard deviations into a common scale.
Table 4
Descriptive statistics of constructs
Construct
Mean
SD
Reliability
UB
4.275
2.678
0.864
BI
4.487
1.938
0.886
PE
4.499
1.890
0.859
EE
4.399
1.905
0.869
FC
4.750
1.531
0.793
SI
4.274
1.612
0.824
AT
4.415
1.934
0.879

3.2.2 Analysis

Taking a more conventional approach, we utilized the minimum sample size (Carr et al. 2003; Sabherwal et al. 2006) for examining our research model. We performed path analyses on the matrix of corrected correlations obtained through the meta-analysis using AMOS 21 (Arbuckle and Wothke 1999). AMOS is a covariance based approach in which the covariance structure derived from the observed data is used to simultaneously fit both measurement and structural equations contained within the model.
We adopted the following general approach in examining our research models. In each case, we first began the analysis with the theoretical model. The significance of model paths was assessed using the critical ratios (CRs) (Byrne 2010) and the presence of unexpected paths was identified using the modification indices (MIs) (Denison et al. 1996; Sabherwal et al. 2006). The model fit was assessed using Chi-square goodness of fit test, root mean square error of approximation (RMSEA) (Steiger 1990), normed fit index (NFI) (Bentler and Bonett 1980), and comparative fit index (CFI) (Bentler 1990). We dropped non-significant paths from the model when CRs were below recommended levels of greater than 1.96 (Byrne 2010). We included emergent paths in our model based on theoretical considerations (Marcoulides and Heck 1993) and MIs of 10.0 or more (Denison et al. 1996).
We examined the research model using the harmonic sample size and the average sample size for the purposes of validating the main results. We found the results of the validation analyses were consistent with the findings of the main SEM analysis.

4 Results

4.1 MASEM Model for Basic UTAUT

We first examined the basic UTAUT model with the fundamental constructs in the original UTAUT model (Venkatesh et al. 2003), i.e., the four exogenous variables: PE, EE, SI, and FC and the two endogenous variables: BI and UB. Table 5 (in the Basic UTAUT column) shows the results of this model. All hypothesized paths in the model were significant and none of the paths were dropped. The model fit was reasonable: GFI, CFI, and NFI were above the recommended minimum threshold of 0.90 whereas RMSEA was somewhat high (i.e., 0.111). The MIs did not show other paths for inclusion. The model explained 21% of variance in UB and 38% of variance in BI.
Table 5
Results of the structural equation models
Relationship
Path status
Basic UTAUT
Proposed model
Emergent model
UB ← BI
H
0.35***
0.34***
0.12***
UB ← FC
H
0.20***
0.20***
0.10***
UB ← AT
E (MI = 138.47)
  
0.37***
BI ← PE
H
0.32***
0.13***
0.11***
BI ← EE
H
0.27***
0.14***
0.29***
BI ← SI
H
0.17***
0.10***
0.13***
BI ← FC
H
 
0.10***
0.14***
BI ← AT
H
 
0.37***
0.10***
AT ← PE
H
 
0.54***
0.47***
AT ← EE
H
 
0.28***
0.19***
AT ← FC
E (MI = 122.63)
  
0.20***
AT ← SI
E (MI = 59.17)
  
0.15***
N
 
4319
4319
4319
Model χ2 (df)
 
215.20*** (4)
555.62*** (6)
24.43*** (3)
GFI
 
0.984
0.967
0.998
CFI
 
0.974
0.955
0.998
NFI
 
0.973
0.954
0.998
RMSEA
 
0.111
0.146
0.041
R2 for UB
 
0.21
0.22
0.27
R2 for BI
 
0.38
0.45
0.45
R2 for AT
  
0.52
0.55
H Hypothesized, E Emergent, ***p < 0.01, **p < 0.05, *p < 0.10

4.2 MASEM Model for Proposed Theoretical Model

We examined our proposed research model with four exogenous (i.e., PE, EE, SI, and FC) and three endogenous constructs (i.e., AT, BI, and UB). Table 5 (in the Proposed Model column) identifies the results of this model. All hypothesized paths in the model were found to be significant and hence none of the paths were dropped. The model fit was reasonable: GFI, CFI, and NFI were above the recommended minimum threshold of 0.90 whereas RMSEA was somewhat high (i.e., 0.146). However, the MIs showed several unexpected paths. Considering our proposed model as initial point of reference, we considered the paths suggested by MIs based on theoretical reasoning and added such paths where it was appropriate.
First, we considered the highest MI (i.e., 138.47) for the path AT → UB and included it in our model. Davis (1989) showed that attitude towards use had a direct effect on actual use. Further studies on TAM also revealed a strong theoretical support for a positive relationship between attitude towards use and actual use (Adams et al. 1992; Davis et al. 1989; Mathieson 1991). Surveying the attitudes of 118 respondents from 10 different organizations for their attitude toward two messaging systems (i.e., voice and electronic mail), Adams et al. (1992) emphasized the need of further research that directly addresses the influence of attitude on behaviour toward IS/IT use. This path has also been empirically supported in other studies (e.g., Bajaj and Nidumolu 1998; George 2004; Kim et al. 2008; Pijpers et al. 2001) of IS/IT adoption. The direct path from user’s attitude to usage behaviour indicates that users with a positive attitude are more likely to use the given IS/IT, beyond the indirect effect on usage behaviour through intention to use.
Second, we considered the next highest MI (i.e., 122.63) for the path FC → AT and included this unexpected path in our model. This path has been hypothesized and explored in prior studies (e.g., Chen et al. 2011; Chiu et al. 2012; Park et al. 2007; Pynoo et al. 2007; Sahu and Gupta 2007) on IS/IT adoption. For example, analysing if attitude or behavioural intention is a better measure of technology acceptance, Pynoo et al. (2007) showed FC to be a significant predictor of AT in a mandatory setting. Facilitating conditions describes the perceived importance of organizational and technical infrastructure to support systems use (Venkatesh et al. 2003; Dwivedi et al. 2016). The direct path from FC to AT can also imply that the technical and organizational infrastructure relating to an IS/IT such as help desks and training programs may shape the user’s attitude tow.ard the IS/IT.
Finally, we considered the next highest MI (i.e., 59.17) for the path SI → AT and included it in our model as well. Venkatesh et al. (2003) defined social influence as the individual’s perception where the referents desire the individual to perform or not perform a behaviour in question. Davis (1986) observed that the individual may want to do what a referent thinks he or she should do, not because of referent’s influence, but because the act is consistent with the individual’s own attitude. It has been argued that social influence has an impact on individual behaviour through three mechanisms such as compliance, internalization, and identification (see Venkatesh and Davis 2000; Warshaw 1980). Venkatesh et al. (2003) argued that latter two mechanisms relate to altering an individual’s belief structure, and causing an individual to reply to potential social status gains, which leads to individual’s positive attitude toward behaviour (Fishbein and Ajzen 1975). Based on these, it is possible that social influence may influence an individual’s attitude. This unexpected path has been hypothesized and empirically examined in other studies (e.g., Chen et al. 2011; Chiu et al. 2012; Park et al. 2007; Pynoo et al. 2007; Sahu and Gupta 2007; Sumak et al. 2010) of IS/IT acceptance as well.
The inclusion of each unexpected path progressively resulted in better fit statistics. Table 5 (in the Emergent Model column) shows the results of the final model. The final emergent model had excellent fit statistics: GFI, CFI, and NFI were above 0.90 and RMSEA was below 0.05. The MIs did not show other paths for inclusion. The emergent model explained 27% of the variance in UB and 45% of the variance in BI - which are considerably greater than the basic UTAUT model, and also 55% of the variance in AT (Fig. 2).

5 Discussion

5.1 Findings

This research critically reviewed the UTAUT model and proposed a revised theoretical model, which was tested using a combination of meta-analysis and structural equation modelling.
We found that attitude played a central role in acceptance and use of IS/IT innovations. More specifically: a) attitude was also influenced by facilitating conditions and social influence, b) attitude had a direct effect on behavioural intention, which implies that attitude partially mediated the effects of performance expectancy, effort expectancy, facilitating conditions, and social influence, and c) by attitude exerted a direct influence on usage behaviour. These findings are crucial since they underscore the importance of explicitly modelling individual characteristics in theories of IS/IT acceptance and use.
We had hypothesized performance expectancy and effort expectancy to influence attitude in our theoretical model (Dwivedi et al. 2017; Khalilzadeh et al. 2017; Rana et al. 2016). This was because an individual’s attitude may be shaped by the extent to which the technology may be easy to use (i.e., less complex) and the extent to which the technology may prove to be useful (i.e., greater performance)—in other words, the technology capabilities may influence the attitudes of individuals. However, we found that attitude may be influenced by facilitating conditions and social influence, which are the contextual factors in our model. This is perhaps not completely surprising—facilitating conditions such as training programs and help desks may be instrumental in enabling individuals to form positive attitudes about the technology (e.g., Chiu et al. 2012; Pynoo et al. 2007; Ravishankar 2008; Sahu and Gupta 2007; Sandeep and Ravishankar 2014) whereas individuals may also refine their attitudes based on information or stories shared by others who have already adopted the technology (e.g., Abubakre et al. 2015; Chiu et al. 2012; Pynoo et al. 2007; Sumak et al. 2010).
We had expected attitude to have a direct effect on behavioural intention and to partially mediate the effects of performance expectancy and effort expectancy on behavioural intention (Dwivedi et al. 2017; Rana et al. 2016). However, we found that attitude partially mediated the effects of facilitating conditions and social influence on behavioural intention as well. It may be tempting to relegate attitude from theoretical models due to partial mediation since it is still possible to account for the direct effects of performance expectancy, effort expectancy, facilitating conditions, and social influence. However, explicit modelling of attitude significantly improves the explanatory power of the theoretical model—i.e., 38% to 45% without and with attitude respectively for behavioural intention. The standardized path coefficients also show that the four exogenous constructs had stronger direct effects on attitude than on behavioural intention (e.g., the effect on performance expectancy on behavioural intention was 0.11 whereas on attitude was 0.47). Moreover, it places considerable emphasis on the individual intending to use or actually using the IS/IT innovation.
Finally, we had expected behavioural intention to fully mediate the effect of attitude on usage behaviour but we found that attitude had a direct effect on usage behaviour as well. This implies that individuals may use the IS/IT innovation based on the strength of their attitudes even when they may not consciously intend to use the innovation. Prior studies have demonstrated that the influence of behavioural intention on usage behaviour may not be particularly strong or predictable (e.g., Duyck et al. 2010; Gupta et al. 2008; Pardamean and Susanto 2012; Weerakkody et al. 2013), which further highlights the importance of the relationship between attitude and usage behaviour. Our findings also showed that the explanatory power of the theoretical model improved significantly when attitude is explicitly theorized (i.e., 21% and 27% of variance in usage behaviour explained without and with attitude respectively in the model).

5.2 Limitations and Directions for Future Research

Similar to the other meta-analytic studies (e.g., King and He 2006; Sabherwal et al. 2006; Wu and Du 2012), this study also assumes that it is meaningful to combine results for a set of similar variables and measures across different studies. Although we have taken appropriate precautions in conducting the meta-analysis, the findings of our research should be interpreted in the light of some limitations. First, the meta-analysis in our study is limited to those studies in prior literature that reported Pearson correlations or other statistics that may be converted to Pearson correlations. Consequently, prior studies that may have only reported results based on linear regression or structural equation modelling were not included in our meta-analysis. The future research can also gather such statistics between the UTAUT variables to perform weight analysis. Second, we found that a moderate number of studies did not report relevant statistics such as reliabilities of the constructs, means, standard deviations, and Likert scale anchors. Since the combination of meta-analysis and MASEM requires such statistics, we computed the average and substituted them in case of missing values (e.g., reliability) or used only those values that were available (e.g., standard deviation). Such treatments may partially affect our meta-analytic and MASEM results. Finally, our research model did not include the four moderators (i.e., gender, age, experience, and voluntariness) found in the original UTAUT model (Venkatesh et al. 2003). This is partly because prior studies had not examined those moderators or not reported information about those moderators. While the absence of these moderators does not completely undermine the results of our theoretical model based on direct effects, it may be viewed as a limitation that prevented us from examining the original UTAUT model in its entirety. The future research would be considering the Pearson’s correlations between the constructs of the UTAUT model under the influence of these moderators to understand whether the meta-analysis outcomes between these variables are different when seen under the direct effect and moderating impacts separately. The future researchers can also think of performing meta-analysis and MASEM for some other more frequently occurring additional variables including self-efficacy, perceived trust, perceived risk and anxiety along the UTAUT model as informed by the most recent and comprehensive literature review (i.e. Williams et al. 2015) on UTAUT.

5.3 Implications for Theory

The original UTAUT model proposed a parsimonious collection of four constructs that may explain individuals’ acceptance and use of IS/IT. Two constructs (i.e., PE and EE) may be considered as IS/IT or technology attributes whereas the remaining two constructs (i.e., FC and SI) may be viewed as contextual or organizational factors that influence individuals’ behaviour. A significant omission in the conceptualization of the original UTAUT model is the individual who intends to engage or actually engages with the IS/IT—i.e., the individual characteristics are not included in the original UTAUT model. In our synthesis of prior research, we determined that prior research had attached significant importance to the individual’s attitude toward IS/IT (e.g., Aboelmaged 2010; Alshare and Lane 2011; Chen et al. 2011; Kim et al. 2008; Koh et al. 2010; Sumak et al. 2010; Yang and Yoo 2004). Therefore, this research also proposed and tested a theoretical model with attitude as one of the constructs along the basic UTAUT model. The analyses revealed that our proposed theoretical model performed better than the basic UTAUT model alone. Based on evidence from the existing research and our MASEM findings, we propose attitude as integral part of the UTAUT model in future research.
Moreover, our research uncovered certain relationships that were not found in the original UTAUT model. Several of these paths identified in our research were due to the introduction of a new construct (i.e., attitude) not found in the original model. These paths include EE → AT, PE→, FC → AT, SI → AT, AT → BI, and AT → UB, and offer new insights regarding the intentions and behaviours of individuals relating to the acceptance of IS/IT. However, our research showed that FC → BI, which is not found in the original UTAUT model, may be an important consideration in explaining the acceptance of IS/IT by individuals.
Finally, the original UTAUT model included four moderators (i.e., gender, age, experience, and voluntariness), which was a significant departure from the then models of acceptance and use such as TRA, TPB, and TAM. Although moderators can be valuable, they may be applicable and become relevant only when there is significant variation in those moderators across individuals within the same context. Voluntariness, for instance, assumes that individuals coming in contact with an IS/IT have considerable latitude in their adoption and usage decisions—this need not be true in settings where the senior management may mandate the adoption and use of an IS/IT by all individuals. In other words, moderators may not be universally applicable to all contexts and hence run the danger of being non-relevant in certain settings. Perhaps, this is one reason why a majority of the studies we included in our meta-analysis did not consider these moderators in their research models. Our MASEM analysis shows that it may be beneficial and momentous to theorize on direct effects that are currently missing in the original UTAUT model.

5.4 Implications for Practice

Our findings show that attitude played a central role in an individual’s intention to use and usage of IS/IT innovations. Specifically, attitude had direct effects on both behavioural intention and usage behaviour—which implies that organizational managers may find it beneficial to shape the attitudes of individuals for influencing intentions and behaviours.
We found that the technology attributes (i.e., performance expectancy and effort expectancy) had direct effects on attitude and behavioural intention (Rana et al. 2017; Weerakkody et al. 2017). This implies that the individuals attribute considerable importance to the extent to which the technology in question may be useful and easy to use. Therefore, managers should concentrate on enhancing the ease of use and usefulness of the system such that acceptance and use of innovations may be managed more successfully. Possible ways to accomplish these objectives may include more accurate representation of user requirements to software developers or selection of technologies that are more consistent with user requirements, emphasis on clean design or selection of technologies that embrace clean design, and effective communication of the technology’s capabilities through product brochures, live demonstrations, and success stories (e.g., Alshare and Lane 2011; Dwivedi et al. 2015; Koh et al. 2010; Martin and Herrero 2012; Pynoo et al. 2011; Rana et al. 2015b; Yang 2010; Zuiderwijk et al. 2015).
We also found that contextual factors (i.e., facilitating conditions and social influence) had direct effects on attitude and behavioural intention. This suggests that individuals may associate importance to the facilitating conditions such as help desks and training programs as well as to the experiences of other individuals in using the technology. Hence, organizations should consider providing adequate infrastructural facilities and proper training to users so that they can be positively inclined to use new technologies. For instance, managers can organize users in-house and vendor-based IS/IT training (Sabherwal et al. 2006) and help desks on premises or at vendor sites to offer technical assistance to individuals to aspiring users (e.g., Chiu et al. 2012; Pynoo et al. 2007; Sahu and Gupta 2007). Managers may proactively manage social influence that may be exerted on individuals by organizing forums for sharing best use practices, instituting champions who are enthused about new technologies and can generate positive word-of-mouth, and planning counter-measures for any negative feedback (e.g., Chiu et al. 2012; Pynoo et al. 2007; Sumak et al. 2010).

6 Conclusion

This research critically reviewed the original UTAUT model and proposed an alternative theoretical model that emphasized the need to explicitly theorize individual characteristics. Specifically, we modelled attitude to mediate the effects of exogenous constructs on behavioural intention. We tested the revised model using a combination of meta-analysis and structural equation modelling techniques, with data on 1600 observations involving 21 relationships gathered from 162 prior studies on IS/IT acceptance and use. Our findings showed that attitude partially mediates the effects of performance expectancy, effort expectancy, facilitating conditions, and social influence on behavioural intention, and also has a direct effect on usage behaviour. Thus, our empirical investigation shows that our proposed theoretical model that reframed the propositions of the original UTAUT model may serve as a meaningful alternative for understanding IS/IT acceptance and usage.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Literature
go back to reference Aboelmaged, M. G. (2010). Predicting e-procurement adoption in a developing country: An empirical integration of technology acceptance model and theory of planned behaviour. Industrial Management & Data Systems, 110(3), 392–414.CrossRef Aboelmaged, M. G. (2010). Predicting e-procurement adoption in a developing country: An empirical integration of technology acceptance model and theory of planned behaviour. Industrial Management & Data Systems, 110(3), 392–414.CrossRef
go back to reference Abubakre, M., Ravishankar, M. N., & Coombs, C. R. (2015). The role of formal controls in facilitating IS diffusion. Information Management, 52(5), 599–609.CrossRef Abubakre, M., Ravishankar, M. N., & Coombs, C. R. (2015). The role of formal controls in facilitating IS diffusion. Information Management, 52(5), 599–609.CrossRef
go back to reference Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly, 16(2), 227–247.CrossRef Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly, 16(2), 227–247.CrossRef
go back to reference Aggelidis, V. P., & Chatzoglou, P. D. (2009). Using a modified technology acceptance model in hospitals. International Journal of Medical Informatics, 78(2), 115–126.CrossRef Aggelidis, V. P., & Chatzoglou, P. D. (2009). Using a modified technology acceptance model in hospitals. International Journal of Medical Informatics, 78(2), 115–126.CrossRef
go back to reference Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.CrossRef Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.CrossRef
go back to reference Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52(1), 27–58.CrossRef Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52(1), 27–58.CrossRef
go back to reference Ajzen, I., & Fishbein, M.M. (1980). Understanding attitudes and predicting social behavior. Eaglewood Cliffs: Prentice-Hall. Ajzen, I., & Fishbein, M.M. (1980). Understanding attitudes and predicting social behavior. Eaglewood Cliffs: Prentice-Hall.
go back to reference Alshare, K. A., & Lane, P. L. (2011). Predicting student-perceived learning outcomes and satisfaction in ERP courses: An empirical investigation. Communications of the Association for Information Systems, 28(1), 571–584. Alshare, K. A., & Lane, P. L. (2011). Predicting student-perceived learning outcomes and satisfaction in ERP courses: An empirical investigation. Communications of the Association for Information Systems, 28(1), 571–584.
go back to reference Arbuckle, J. L., & Wothke, W. (1999). AMOS 4.0 user’s guide. Chicago: Small Waters. Arbuckle, J. L., & Wothke, W. (1999). AMOS 4.0 user’s guide. Chicago: Small Waters.
go back to reference Bagozzi, R. P. (1981). Attitudes, intentions, and behavior: A test of some key hypotheses. Journal of Personality and Social Psychology, 41(4), 607–627.CrossRef Bagozzi, R. P. (1981). Attitudes, intentions, and behavior: A test of some key hypotheses. Journal of Personality and Social Psychology, 41(4), 607–627.CrossRef
go back to reference Bajaj, A., & Nidumolu, S. R. (1998). A feedback model to understand information system usage. Information Management, 33(4), 213–224.CrossRef Bajaj, A., & Nidumolu, S. R. (1998). A feedback model to understand information system usage. Information Management, 33(4), 213–224.CrossRef
go back to reference Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice Hall, Englewood Cliffs, 1986. Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice Hall, Englewood Cliffs, 1986.
go back to reference Bandyopadhyay, K., & Barnes, C. (2012). An analysis of factors affecting user acceptance of ERP Systems in the United States. International Journal of Human Capital and Information Technology Professionals, 3(1), 1–14.CrossRef Bandyopadhyay, K., & Barnes, C. (2012). An analysis of factors affecting user acceptance of ERP Systems in the United States. International Journal of Human Capital and Information Technology Professionals, 3(1), 1–14.CrossRef
go back to reference Bentler, P. M. (1990). Comparative fit indices in structural models. Psychological Bulletin, 107(2), 238–246.CrossRef Bentler, P. M. (1990). Comparative fit indices in structural models. Psychological Bulletin, 107(2), 238–246.CrossRef
go back to reference Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88(3), 588–606.CrossRef Bentler, P. M., & Bonett, D. G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88(3), 588–606.CrossRef
go back to reference Bhattarai, S., Zhao, Z., & Crespi, N. (2010). Consumer mashups: End-user perspectives and acceptance model. In Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, 930–933. Bhattarai, S., Zhao, Z., & Crespi, N. (2010). Consumer mashups: End-user perspectives and acceptance model. In Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services, 930–933.
go back to reference Bobbitt, L. M., & Dabholkar, P. A. (2001). Integrating attitudinal theories to understand and predict use of technology-based self-service. The Internet as an illustration. International Journal of Service Industry Management, 12(5), 423–450.CrossRef Bobbitt, L. M., & Dabholkar, P. A. (2001). Integrating attitudinal theories to understand and predict use of technology-based self-service. The Internet as an illustration. International Journal of Service Industry Management, 12(5), 423–450.CrossRef
go back to reference Byrne, B. M. (2010). Structural equation modelling with AMOS: Basic concepts, applications, and programming (Second ed.). New York: Multivariate Application Series, Routledge. Byrne, B. M. (2010). Structural equation modelling with AMOS: Basic concepts, applications, and programming (Second ed.). New York: Multivariate Application Series, Routledge.
go back to reference Carr, J. Z., Schmidt, A. M., Ford, J. K., & DeShon, R. P. (2003). Climate perceptions matter: A meta-analytic path analysis relating molar climate, cognitive and affective states, and individual level work outcomes. Journal of Applied Psychology, 88(4), 605–619.CrossRef Carr, J. Z., Schmidt, A. M., Ford, J. K., & DeShon, R. P. (2003). Climate perceptions matter: A meta-analytic path analysis relating molar climate, cognitive and affective states, and individual level work outcomes. Journal of Applied Psychology, 88(4), 605–619.CrossRef
go back to reference Carter, L., & Schaupp, L.C. (2008). Efficacy and acceptance in E-File adoption. Fourteenth Americas Conference on Information Systems, Toronto, ON, Canada August 14th–17th, 2008. Carter, L., & Schaupp, L.C. (2008). Efficacy and acceptance in E-File adoption. Fourteenth Americas Conference on Information Systems, Toronto, ON, Canada August 14th–17th, 2008.
go back to reference Chen, L. L., Kuan, C. J., Lee, Y. H., & Huang, H. L. (2011). Applicability of the UTAUT model in playing online game through mobile phones: Moderating effects of user experience. IEEE International Conference on Technology Management, San Jose, CA, USA, 27-30 June 2011. 625–629. doi:10.1109/ITMC.2011.5996035. Chen, L. L., Kuan, C. J., Lee, Y. H., & Huang, H. L. (2011). Applicability of the UTAUT model in playing online game through mobile phones: Moderating effects of user experience. IEEE International Conference on Technology Management, San Jose, CA, USA, 27-30 June 2011. 625–629. doi:10.​1109/​ITMC.​2011.​5996035.
go back to reference Chen, M. F., & Lu, M. T. Y. (2011). Modeling e-coupon proneness as a mediator in the extended TPB model to predict consumers’ usage intentions. Internet Research, 21(5), 508–526.CrossRef Chen, M. F., & Lu, M. T. Y. (2011). Modeling e-coupon proneness as a mediator in the extended TPB model to predict consumers’ usage intentions. Internet Research, 21(5), 508–526.CrossRef
go back to reference Cheung, M. W. L., & Chan, W. (2005). Meta-analytic structural equation modeling: A two-stage approach. Psychological Methods, 10(1), 40–64.CrossRef Cheung, M. W. L., & Chan, W. (2005). Meta-analytic structural equation modeling: A two-stage approach. Psychological Methods, 10(1), 40–64.CrossRef
go back to reference Chiu, Y. T. H., Lee, W. I., Liu, C. C., & Liu, L. Y. (2012). Internet lottery commerce: An integrated view of online sport lottery adoption. Journal of Internet Commerce, 11(1), 68–80.CrossRef Chiu, Y. T. H., Lee, W. I., Liu, C. C., & Liu, L. Y. (2012). Internet lottery commerce: An integrated view of online sport lottery adoption. Journal of Internet Commerce, 11(1), 68–80.CrossRef
go back to reference Chong, A. Y. L. (2013). Predicting m-commerce adoption determinants: A neural network approach. Expert Systems with Applications, 40, 523–530.CrossRef Chong, A. Y. L. (2013). Predicting m-commerce adoption determinants: A neural network approach. Expert Systems with Applications, 40, 523–530.CrossRef
go back to reference Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189–211.CrossRef Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189–211.CrossRef
go back to reference Davis, F.D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. Doctoral Dissertation, Sloan School of Management, Massachusetts Institute of Technology. Davis, F.D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. Doctoral Dissertation, Sloan School of Management, Massachusetts Institute of Technology.
go back to reference Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 318–339.CrossRef Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 318–339.CrossRef
go back to reference Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003.CrossRef Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003.CrossRef
go back to reference Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and Intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111–1132.CrossRef Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and Intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111–1132.CrossRef
go back to reference DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60–95.CrossRef DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60–95.CrossRef
go back to reference Denison, D. R., Hart, S. L., & Kahn, J. A. (1996). From chimneys to cross-functional teams: Developing and validating a diagnostic model. Academy of Management Journal, 39(4), 1005–1024. Denison, D. R., Hart, S. L., & Kahn, J. A. (1996). From chimneys to cross-functional teams: Developing and validating a diagnostic model. Academy of Management Journal, 39(4), 1005–1024.
go back to reference Dennis, A. R., Wixom, B. H., & Vandenberg, R. J. (2001). Understanding fit and appropriation effects in group support systems via meta-analysis. MIS Quarterly, 25(2), 167–193.CrossRef Dennis, A. R., Wixom, B. H., & Vandenberg, R. J. (2001). Understanding fit and appropriation effects in group support systems via meta-analysis. MIS Quarterly, 25(2), 167–193.CrossRef
go back to reference Duyck, P., Pynoo, B., Devolder, P., Voet, T., Adang, L., Ovaere, D., & Vercruysse, J. (2010). Monitoring the PACS implementation process in a large university hospital-discrepancies between radiologists and physicians. Journal of Digital Imaging, 23(1), 73–80.CrossRef Duyck, P., Pynoo, B., Devolder, P., Voet, T., Adang, L., Ovaere, D., & Vercruysse, J. (2010). Monitoring the PACS implementation process in a large university hospital-discrepancies between radiologists and physicians. Journal of Digital Imaging, 23(1), 73–80.CrossRef
go back to reference Dwivedi, Y. K., Janssen, M., Slade, E. L., Rana, N. P., Weerakkody, V., Millard, J., Hidders, J., & Snijders, D. (2016). Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling. Information Systems Frontiers, 19(2), 197–212. doi:10.1007/s10796-016-9675-5. Dwivedi, Y. K., Janssen, M., Slade, E. L., Rana, N. P., Weerakkody, V., Millard, J., Hidders, J., & Snijders, D. (2016). Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling. Information Systems Frontiers, 19(2), 197–212. doi:10.​1007/​s10796-016-9675-5.
go back to reference Dwivedi, Y.K., Rana, N.P., Janssen, M., Lal, B., Williams, M.D., & Clement, M. (2017). An empirical validation of a unified model of electronic government adoption (UMEGA). Government Information Quarterly, 1–20. doi:10.1016/j.giq.2017.03.001. Dwivedi, Y.K., Rana, N.P., Janssen, M., Lal, B., Williams, M.D., & Clement, M. (2017). An empirical validation of a unified model of electronic government adoption (UMEGA). Government Information Quarterly, 1–20. doi:10.​1016/​j.​giq.​2017.​03.​001.
go back to reference Dwivedi, Y. K., Wastell, D., Laumer, S., Henriksen, H. Z., Myers, M. D., Bunker, D., et al. (2015). Research on information systems failures and successes: Status update and future directions. Information Systems Frontiers, 17(1), 143–157.CrossRef Dwivedi, Y. K., Wastell, D., Laumer, S., Henriksen, H. Z., Myers, M. D., Bunker, D., et al. (2015). Research on information systems failures and successes: Status update and future directions. Information Systems Frontiers, 17(1), 143–157.CrossRef
go back to reference Eckhardt, A., Laumer, S., & Weitzel, T. (2009). Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption. Journal of Information Technology, 24(1), 11–24.CrossRef Eckhardt, A., Laumer, S., & Weitzel, T. (2009). Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption. Journal of Information Technology, 24(1), 11–24.CrossRef
go back to reference Fadel, K.J. (2007). Infusion of information systems: The role of adaptation and individual cognitions. PhD Dissertation, The University of Arizona, USA. Fadel, K.J. (2007). Infusion of information systems: The role of adaptation and individual cognitions. PhD Dissertation, The University of Arizona, USA.
go back to reference Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading: Addison-Wesley Publication Company. Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading: Addison-Wesley Publication Company.
go back to reference Foon, Y. S., & Fah, B. C. Y. (2011). Internet banking adoption in Kuala Lumpur: An application of UTAUT model. International Journal of Business and Management, 6(4), 161–167. Foon, Y. S., & Fah, B. C. Y. (2011). Internet banking adoption in Kuala Lumpur: An application of UTAUT model. International Journal of Business and Management, 6(4), 161–167.
go back to reference George, J. F. (2004). The theory of planned behavior and Internet purchasing. Internet Research, 14(3), 198–212.CrossRef George, J. F. (2004). The theory of planned behavior and Internet purchasing. Internet Research, 14(3), 198–212.CrossRef
go back to reference Glass, G. V. (1976). Primary, secondary, and meta-analysis of research. Educational Researcher, 5(9), 3–8.CrossRef Glass, G. V. (1976). Primary, secondary, and meta-analysis of research. Educational Researcher, 5(9), 3–8.CrossRef
go back to reference Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS Quarterly, 19(2), 213–236.CrossRef Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS Quarterly, 19(2), 213–236.CrossRef
go back to reference Gupta, B., Dasgupta, S., & Gupta, A. (2008). Adoption of ICT in a government organization in a developing country: An empirical study. The Journal of Strategic Information Systems, 17(2), 140–154.CrossRef Gupta, B., Dasgupta, S., & Gupta, A. (2008). Adoption of ICT in a government organization in a developing country: An empirical study. The Journal of Strategic Information Systems, 17(2), 140–154.CrossRef
go back to reference Harrison, D. A., Mykytyn, P. P., & Riemenschneider, C. K. (1997). Executive decisions about adoption of information Technology in Small Business: Theory and empirical tests. Information Systems Research, 8(2), 171–195.CrossRef Harrison, D. A., Mykytyn, P. P., & Riemenschneider, C. K. (1997). Executive decisions about adoption of information Technology in Small Business: Theory and empirical tests. Information Systems Research, 8(2), 171–195.CrossRef
go back to reference Hu, P. J., Chau, P. Y., Sheng, O. R. L., & Tam, K. Y. (1999). Examining the technology acceptance model using physician acceptance of telemedicine technology. Journal of Management Information Systems, 16(2), 91–112.CrossRef Hu, P. J., Chau, P. Y., Sheng, O. R. L., & Tam, K. Y. (1999). Examining the technology acceptance model using physician acceptance of telemedicine technology. Journal of Management Information Systems, 16(2), 91–112.CrossRef
go back to reference Hunter, J. E., & Schmidt, F. (1990). Methods of meta-analysis: Correcting error and bias in research findings. Newbury Park: Sage Publications. Hunter, J. E., & Schmidt, F. (1990). Methods of meta-analysis: Correcting error and bias in research findings. Newbury Park: Sage Publications.
go back to reference Hunter, J. E., Schmidt, F., & Jackson, G. B. (1982). Meta-analysis: Cumulating research findings across studies. Beverly Hills: Sage. Hunter, J. E., Schmidt, F., & Jackson, G. B. (1982). Meta-analysis: Cumulating research findings across studies. Beverly Hills: Sage.
go back to reference Hwang, M. I. (1996). The use of meta-analysis in MIS research: Promises and problems. The DATA BASE for Advances in Information Systems, 27(3), 35–48.CrossRef Hwang, M. I. (1996). The use of meta-analysis in MIS research: Promises and problems. The DATA BASE for Advances in Information Systems, 27(3), 35–48.CrossRef
go back to reference Igbaria, M., Parasuraman, S., & Baroudi, J. J. (1996). A motivational model of microcomputer usage. Journal of Management Information Systems, 13(1), 127–143.CrossRef Igbaria, M., Parasuraman, S., & Baroudi, J. J. (1996). A motivational model of microcomputer usage. Journal of Management Information Systems, 13(1), 127–143.CrossRef
go back to reference Jackson, C. M., Chow, S., & Leitch, R. A. (1997). Toward an understanding of the behavioral intention to use an information system. Decision Sciences, 28(2), 357–389.CrossRef Jackson, C. M., Chow, S., & Leitch, R. A. (1997). Toward an understanding of the behavioral intention to use an information system. Decision Sciences, 28(2), 357–389.CrossRef
go back to reference Joseph, D., Ng, K. Y., Koh, C., & Ang, S. (2007). Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly, 31(3), 547–577.CrossRef Joseph, D., Ng, K. Y., Koh, C., & Ang, S. (2007). Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly, 31(3), 547–577.CrossRef
go back to reference Khalilzadeh, J., Ozturk, A. B., & Bilgihan, A. (2017). Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Computers in Human Behavior, 70, 460–474.CrossRef Khalilzadeh, J., Ozturk, A. B., & Bilgihan, A. (2017). Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Computers in Human Behavior, 70, 460–474.CrossRef
go back to reference Kim, Y. J., Chun, J. U., & Song, J. (2009). Investigating the role of attitude in technology acceptance from an attitude strength perspective. International Journal of Information Management, 29(1), 67–77.CrossRef Kim, Y. J., Chun, J. U., & Song, J. (2009). Investigating the role of attitude in technology acceptance from an attitude strength perspective. International Journal of Information Management, 29(1), 67–77.CrossRef
go back to reference Kim, T. G., Lee, J. H., & Law, R. (2008). An empirical examination of the acceptance behaviour of hotel front office systems: An extended technology acceptance model. Tourism Management, 29(3), 500–513.CrossRef Kim, T. G., Lee, J. H., & Law, R. (2008). An empirical examination of the acceptance behaviour of hotel front office systems: An extended technology acceptance model. Tourism Management, 29(3), 500–513.CrossRef
go back to reference Kim, T. T., Suh, Y. K., Lee, G., & Choi, B. G. (2010). Modelling roles of task-technology fit and self-efficacy in hotel employees' usage behaviours of hotel information systems. International Journal of Tourism Research, 12(6), 709–725.CrossRef Kim, T. T., Suh, Y. K., Lee, G., & Choi, B. G. (2010). Modelling roles of task-technology fit and self-efficacy in hotel employees' usage behaviours of hotel information systems. International Journal of Tourism Research, 12(6), 709–725.CrossRef
go back to reference King, W. R., & He, J. (2006). A meta-analysis of the technology acceptance model. Information Management, 43(6), 740–755.CrossRef King, W. R., & He, J. (2006). A meta-analysis of the technology acceptance model. Information Management, 43(6), 740–755.CrossRef
go back to reference Knutsen, L.A. (2005). M-service expectancies and attitudes: Linkages and effects of first impressions. Proceedings of the 38 th Hawaii International Conference on System Sciences. HI, USA, 6th January 2005, doi:10.1109/HICSS.2005.395. Knutsen, L.A. (2005). M-service expectancies and attitudes: Linkages and effects of first impressions. Proceedings of the 38 th Hawaii International Conference on System Sciences. HI, USA, 6th January 2005, doi:10.​1109/​HICSS.​2005.​395.​
go back to reference Koh, C. E., Prybutok, V. R., Ryan, S. D., & Wu, Y. A. (2010). A model for mandatory use of software technologies: An integrative approach by applying multiple levels of abstraction of informing science. Informing Science: The International Journal of an Emerging Transdiscipline, 13, 177–203.CrossRef Koh, C. E., Prybutok, V. R., Ryan, S. D., & Wu, Y. A. (2010). A model for mandatory use of software technologies: An integrative approach by applying multiple levels of abstraction of informing science. Informing Science: The International Journal of an Emerging Transdiscipline, 13, 177–203.CrossRef
go back to reference Lee, Y., Kozar, K. A., & Larsen, K. R. T. (2003). The technology acceptance model: Past, present, and future. Communications of the Association for Information Systems, 12(1), 752–780. Lee, Y., Kozar, K. A., & Larsen, K. R. T. (2003). The technology acceptance model: Past, present, and future. Communications of the Association for Information Systems, 12(1), 752–780.
go back to reference Ma, Q., & Liu, L. (2004). The technology acceptance model: A meta-analysis of empirical findings. Journal of Organizational and End User Computing, 16(1), 59–72.CrossRef Ma, Q., & Liu, L. (2004). The technology acceptance model: A meta-analysis of empirical findings. Journal of Organizational and End User Computing, 16(1), 59–72.CrossRef
go back to reference Marcoulides, G. A., & Heck, R. H. (1993). Organizational culture and performance: Proposing and testing a model. Organization Science, 4(2), 209–225.CrossRef Marcoulides, G. A., & Heck, R. H. (1993). Organizational culture and performance: Proposing and testing a model. Organization Science, 4(2), 209–225.CrossRef
go back to reference Martin, H. S., & Herrero, A. (2012). Influence of the user’s psychological factors on the online purchase intention in rural tourism: Integrating innovativeness to the UTAUT framework. Tourism Management, 33(2), 341–350.CrossRef Martin, H. S., & Herrero, A. (2012). Influence of the user’s psychological factors on the online purchase intention in rural tourism: Integrating innovativeness to the UTAUT framework. Tourism Management, 33(2), 341–350.CrossRef
go back to reference Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173–191.CrossRef Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2(3), 173–191.CrossRef
go back to reference Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.CrossRef Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222.CrossRef
go back to reference Pardamean, B., & Susanto, M. (2012). Assessing user acceptance toward blog technology using the UTAUT model. International Journal of Mathematics and Computers in Simulation, 1(6), 203–216. Pardamean, B., & Susanto, M. (2012). Assessing user acceptance toward blog technology using the UTAUT model. International Journal of Mathematics and Computers in Simulation, 1(6), 203–216.
go back to reference Park, J., Yang, S., & Lehto, X. (2007). Adoption of mobile technologies for Chinese consumers. Journal of Electronic Commerce Research, 8(3), 196–206. Park, J., Yang, S., & Lehto, X. (2007). Adoption of mobile technologies for Chinese consumers. Journal of Electronic Commerce Research, 8(3), 196–206.
go back to reference Pijpers, G. G. M., Bemelmans, T. M. A., Heemstra, F. J., & Montfort, K. A. G. M. (2001). Senior executives’ use of information technology. Information and Software Technology, 43(15), 959–971.CrossRef Pijpers, G. G. M., Bemelmans, T. M. A., Heemstra, F. J., & Montfort, K. A. G. M. (2001). Senior executives’ use of information technology. Information and Software Technology, 43(15), 959–971.CrossRef
go back to reference Pynoo, B., Devolder, P., Voet, T., Vercruysse, J., Adang, L., & Duyck, P. (2007). Attitude as a measure for acceptance: Monitoring IS implementation in a hospital setting. Proceedings of the Sixth Annual Workshop on HCI Research in MIS, Montreal, Canada, December 8, 2007, 20–24. Pynoo, B., Devolder, P., Voet, T., Vercruysse, J., Adang, L., & Duyck, P. (2007). Attitude as a measure for acceptance: Monitoring IS implementation in a hospital setting. Proceedings of the Sixth Annual Workshop on HCI Research in MIS, Montreal, Canada, December 8, 2007, 20–24.
go back to reference Pynoo, B., Devolder, P., Tondeur, J., Van Braak, J., Duyck, W., & Duyck, P. (2011). Predicting secondary school teachers’ acceptance and use of a digital learning environment: A cross-sectional study. Computers in Human Behavior, 27(1), 568–575.CrossRef Pynoo, B., Devolder, P., Tondeur, J., Van Braak, J., Duyck, W., & Duyck, P. (2011). Predicting secondary school teachers’ acceptance and use of a digital learning environment: A cross-sectional study. Computers in Human Behavior, 27(1), 568–575.CrossRef
go back to reference Rana, N. P., Dwivedi, Y. K., & Williams, M. D. (2015a). A meta-analysis of existing research on citizen adoption of e-government. Information Systems Frontiers, 17(3), 547–563.CrossRef Rana, N. P., Dwivedi, Y. K., & Williams, M. D. (2015a). A meta-analysis of existing research on citizen adoption of e-government. Information Systems Frontiers, 17(3), 547–563.CrossRef
go back to reference Rana, N. P., Dwivedi, Y. K., Williams, M. D., & Weerakkody, V. (2015b). Investigating success of an e-government initiative: Validation of an integrated IS success model. Information Systems Frontiers, 17(1), 127–142.CrossRef Rana, N. P., Dwivedi, Y. K., Williams, M. D., & Weerakkody, V. (2015b). Investigating success of an e-government initiative: Validation of an integrated IS success model. Information Systems Frontiers, 17(1), 127–142.CrossRef
go back to reference Rana, N. P., Dwivedi, Y. K., Williams, M. D., & Weerakkody, V. (2016). Adoption of online public grievance redressal system in India: Toward developing a unified view. Computers in Human Behavior, 59, 265–282.CrossRef Rana, N. P., Dwivedi, Y. K., Williams, M. D., & Weerakkody, V. (2016). Adoption of online public grievance redressal system in India: Toward developing a unified view. Computers in Human Behavior, 59, 265–282.CrossRef
go back to reference Rana, N. P., Dwivedi, Y. K., Lal, B., Williams, M. D., & Clement, M. (2017). Citizens’ adoption of an electronic government system: Towards a Unified View. Information Systems Frontiers, 19(3), 549–568. doi:10.1007/s10796-015-9613-y. Rana, N. P., Dwivedi, Y. K., Lal, B., Williams, M. D., & Clement, M. (2017). Citizens’ adoption of an electronic government system: Towards a Unified View. Information Systems Frontiers, 19(3), 549–568. doi:10.​1007/​s10796-015-9613-y.​
go back to reference Ravishankar, M. N. (2008). Rewarding end-users for participating in organizational KM: A case study. Journal of Organizational and End User Computing, 20(1), 35–49.CrossRef Ravishankar, M. N. (2008). Rewarding end-users for participating in organizational KM: A case study. Journal of Organizational and End User Computing, 20(1), 35–49.CrossRef
go back to reference Rogers, E.M. (1995). Diffusion of innovations. Fourth Edition. The New York Free Press. Rogers, E.M. (1995). Diffusion of innovations. Fourth Edition. The New York Free Press.
go back to reference Rosenthal, R. (1979). The ‘file drawer problem’ and tolerance for null results. Psychological Bulletin, 30(3), 638–641.CrossRef Rosenthal, R. (1979). The ‘file drawer problem’ and tolerance for null results. Psychological Bulletin, 30(3), 638–641.CrossRef
go back to reference Sabherwal, R., Jeyaraj, A., & Chowa, C. (2006). Information system success: Individual and organizational determinants. Management Science, 52(12), 1849–1864.CrossRef Sabherwal, R., Jeyaraj, A., & Chowa, C. (2006). Information system success: Individual and organizational determinants. Management Science, 52(12), 1849–1864.CrossRef
go back to reference Sahu, G. P., & Gupta, M. P. (2007). Users' acceptance of e-government: A study of Indian central excise. International Journal of Electronic Government Research, 3(3), 1–21.CrossRef Sahu, G. P., & Gupta, M. P. (2007). Users' acceptance of e-government: A study of Indian central excise. International Journal of Electronic Government Research, 3(3), 1–21.CrossRef
go back to reference Sandeep, M. S., & Ravishankar, M. N. (2014). The continuity of underperforming ICT projects in the public sector. Information Management, 51(6), 700–711.CrossRef Sandeep, M. S., & Ravishankar, M. N. (2014). The continuity of underperforming ICT projects in the public sector. Information Management, 51(6), 700–711.CrossRef
go back to reference Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS Quarterly, 27(4), 533–555.CrossRef Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS Quarterly, 27(4), 533–555.CrossRef
go back to reference Sharma, R., Yetton, P., & Crawford, J. (2009). Estimating the effect of common method variance: The method-method pair technique with an illustration from TAM research. MIS Quarterly, 33(3), 473–490.CrossRef Sharma, R., Yetton, P., & Crawford, J. (2009). Estimating the effect of common method variance: The method-method pair technique with an illustration from TAM research. MIS Quarterly, 33(3), 473–490.CrossRef
go back to reference Sheppard, B. H., Hartwick, I., & Warshaw, P. R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15(3), 325–343.CrossRef Sheppard, B. H., Hartwick, I., & Warshaw, P. R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15(3), 325–343.CrossRef
go back to reference Sykes, T. A., Venkatesh, V., & Gosain, S. (2009). Model of acceptance with peer support: A social network perspective to understand employees’ system use. MIS Quarterly, 33(2), 371–393.CrossRef Sykes, T. A., Venkatesh, V., & Gosain, S. (2009). Model of acceptance with peer support: A social network perspective to understand employees’ system use. MIS Quarterly, 33(2), 371–393.CrossRef
go back to reference Steiger, J. H. (1990). Structural model evaluation and modification: An interval estimation approach. Multivariate Behavioural Research, 25, 173–180.CrossRef Steiger, J. H. (1990). Structural model evaluation and modification: An interval estimation approach. Multivariate Behavioural Research, 25, 173–180.CrossRef
go back to reference Sumak, B., Polancic, G., & Hericko, M. (2010). An empirical study of virtual learning environment adoption using UTAUT. Second International Conference on Mobile, Hybrid, and On-Line Learning, St Maarten, Netherlands Antilles, 17–22. doi: 10.1109/eLmL.2010.11. Sumak, B., Polancic, G., & Hericko, M. (2010). An empirical study of virtual learning environment adoption using UTAUT. Second International Conference on Mobile, Hybrid, and On-Line Learning, St Maarten, Netherlands Antilles, 17–22. doi: 10.​1109/​eLmL.​2010.​11.
go back to reference Taylor, S., & Todd, P. A. (1995a). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(2), 561–570.CrossRef Taylor, S., & Todd, P. A. (1995a). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(2), 561–570.CrossRef
go back to reference Taylor, S., & Todd, P. A. (1995b). Understanding information technology usage: A test of competing models. Information Systems Research, 6(4), 144–176.CrossRef Taylor, S., & Todd, P. A. (1995b). Understanding information technology usage: A test of competing models. Information Systems Research, 6(4), 144–176.CrossRef
go back to reference Tett, R. P., & Meyer, J. P. (1993). Job satisfaction, organizational commitment, turnover intention, and turnover: Path analyses based on meta-analytic findings. Personnel Psychology, 46, 259–293.CrossRef Tett, R. P., & Meyer, J. P. (1993). Job satisfaction, organizational commitment, turnover intention, and turnover: Path analyses based on meta-analytic findings. Personnel Psychology, 46, 259–293.CrossRef
go back to reference Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 124–143.CrossRef Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 124–143.CrossRef
go back to reference Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. IEEE Transactions on Engineering Management, 29(1), 28–45.CrossRef Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. IEEE Transactions on Engineering Management, 29(1), 28–45.CrossRef
go back to reference Triandis, H. C. (1977). Interpersonal behavior. Monterey: Brooke Cole. Triandis, H. C. (1977). Interpersonal behavior. Monterey: Brooke Cole.
go back to reference Vallerand, R.J. (1997). Toward a hierarchical model of Intrinsic and extrinsic motivation. Advances in Experimental Social Psychology (29), M. Zanna (ed.), Academic Press, New York, 1997, 271–360. Vallerand, R.J. (1997). Toward a hierarchical model of Intrinsic and extrinsic motivation. Advances in Experimental Social Psychology (29), M. Zanna (ed.), Academic Press, New York, 1997, 271–360.
go back to reference Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315.CrossRef Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315.CrossRef
go back to reference Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges. MIS Quarterly, 25(1), 71–102.CrossRef Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges. MIS Quarterly, 25(1), 71–102.CrossRef
go back to reference Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.CrossRef
go back to reference Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.CrossRef Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.CrossRef
go back to reference Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigation of the effect of the mood. Organizational Behavior and Human Decision Processes, 79(1), 1–28.CrossRef Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigation of the effect of the mood. Organizational Behavior and Human Decision Processes, 79(1), 1–28.CrossRef
go back to reference Venkatesh, V., Sykes, T.A., & Zhang, X. (2011b). ‘Just what the doctor ordered’: A revised UTAUT for EMR system adoption and use by doctors. In 44 th Hawaii International Conference on System Sciences (HICSS), Kauai, HI, USA, 4–7 January 2011, 1–10. doi:10.1109/HICSS.2011.1 Venkatesh, V., Sykes, T.A., & Zhang, X. (2011b). ‘Just what the doctor ordered’: A revised UTAUT for EMR system adoption and use by doctors. In 44 th Hawaii International Conference on System Sciences (HICSS), Kauai, HI, USA, 4–7 January 2011, 1–10. doi:10.​1109/​HICSS.​2011.​1
go back to reference Venkatesh, V., Thong, J. Y., Chan, F. K., Hu, P. J. H., & Brown, S. A. (2011a). Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Information Systems Journal, 21(6), 527–555.CrossRef Venkatesh, V., Thong, J. Y., Chan, F. K., Hu, P. J. H., & Brown, S. A. (2011a). Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Information Systems Journal, 21(6), 527–555.CrossRef
go back to reference Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.CrossRef Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.CrossRef
go back to reference Viswesvaran, C., & Ones, D. S. (1998). Theory testing: Combining psychometric meta-analysis and structural equations modeling. Personnel Psychology, 48(4), 865–885.CrossRef Viswesvaran, C., & Ones, D. S. (1998). Theory testing: Combining psychometric meta-analysis and structural equations modeling. Personnel Psychology, 48(4), 865–885.CrossRef
go back to reference Warshaw, P. R. (1980). A new model for predicting behavioral intentions: An alternative to Fishbein. Journal of Marketing Research, 17(2), 153–172.CrossRef Warshaw, P. R. (1980). A new model for predicting behavioral intentions: An alternative to Fishbein. Journal of Marketing Research, 17(2), 153–172.CrossRef
go back to reference Weerakkody, V., El-Haddadeh, R., Al-Sobhi, F., Shareef, M. A., & Dwivedi, Y. K. (2013). Examining the influence of intermediaries in facilitating e-government adoption: An empirical investigation. International Journal of Information Management, 33(5), 716–725.CrossRef Weerakkody, V., El-Haddadeh, R., Al-Sobhi, F., Shareef, M. A., & Dwivedi, Y. K. (2013). Examining the influence of intermediaries in facilitating e-government adoption: An empirical investigation. International Journal of Information Management, 33(5), 716–725.CrossRef
go back to reference Weerakkody, V., Irani, Z., Kapoor, K., Sivarajah, U., & Dwivedi, Y. K. (2017). Open data and its usability: An empirical view from the Citizen’s perspective. Information Systems Frontiers, 19(2), 285–300. Weerakkody, V., Irani, Z., Kapoor, K., Sivarajah, U., & Dwivedi, Y. K. (2017). Open data and its usability: An empirical view from the Citizen’s perspective. Information Systems Frontiers, 19(2), 285–300.
go back to reference Williams, M. D., Dwivedi, Y. K., Lal, B., & Schwarz, A. (2009). Contemporary trends and issues in IT adoption and diffusion research. Journal of Information Technology, 24(1), 1–10.CrossRef Williams, M. D., Dwivedi, Y. K., Lal, B., & Schwarz, A. (2009). Contemporary trends and issues in IT adoption and diffusion research. Journal of Information Technology, 24(1), 1–10.CrossRef
go back to reference Williams, M. D., Rana, N. P., & Dwivedi, Y. K. (2015). The unified theory of acceptance and use of technology: A systematic review. Journal of Enterprise Information Management, 28(3), 443–488.CrossRef Williams, M. D., Rana, N. P., & Dwivedi, Y. K. (2015). The unified theory of acceptance and use of technology: A systematic review. Journal of Enterprise Information Management, 28(3), 443–488.CrossRef
go back to reference Wu, J., & Du, H. (2012). Toward a better understanding of behavioral intention and system usage constructs. European Journal of Information Systems, 21(6), 680–698.CrossRef Wu, J., & Du, H. (2012). Toward a better understanding of behavioral intention and system usage constructs. European Journal of Information Systems, 21(6), 680–698.CrossRef
go back to reference Wu, J., & Lederer, A. (2009). A meta-analysis of the role of environment-based voluntariness in IT acceptance. MIS Quarterly, 33(2), 419–432.CrossRef Wu, J., & Lederer, A. (2009). A meta-analysis of the role of environment-based voluntariness in IT acceptance. MIS Quarterly, 33(2), 419–432.CrossRef
go back to reference Yang, K. (2010). Determinants of US consumer mobile shopping services adoption: Implications for designing mobile shopping services. Journal of Consumer Marketing, 27(3), 262–270.CrossRef Yang, K. (2010). Determinants of US consumer mobile shopping services adoption: Implications for designing mobile shopping services. Journal of Consumer Marketing, 27(3), 262–270.CrossRef
go back to reference Yang, H. D., & Yoo, Y. (2004). It's all about attitude: Revisiting the technology acceptance model. Decision Support Systems, 38(1), 19–31.CrossRef Yang, H. D., & Yoo, Y. (2004). It's all about attitude: Revisiting the technology acceptance model. Decision Support Systems, 38(1), 19–31.CrossRef
go back to reference Yeow, P. H., & Loo, W. H. (2009). Acceptability of ATM and transit applications embedded in multipurpose smart identity card: An exploratory study in Malaysia. International Journal of Electronic Government Research, 5(2), 37–56.CrossRef Yeow, P. H., & Loo, W. H. (2009). Acceptability of ATM and transit applications embedded in multipurpose smart identity card: An exploratory study in Malaysia. International Journal of Electronic Government Research, 5(2), 37–56.CrossRef
go back to reference Zhang, W., & Gutierrez, O. (2007). Information technology acceptance in the social services sector context: An exploration. Social Work, 52(3), 221–231.CrossRef Zhang, W., & Gutierrez, O. (2007). Information technology acceptance in the social services sector context: An exploration. Social Work, 52(3), 221–231.CrossRef
go back to reference Zuiderwijk, A., Janssen, M., & Dwivedi, Y. K. (2015). Acceptance and use predictors of open data technologies: Drawing upon the unified theory of acceptance and use of technology. Government Information Quarterly, 32(4), 429–440.CrossRef Zuiderwijk, A., Janssen, M., & Dwivedi, Y. K. (2015). Acceptance and use predictors of open data technologies: Drawing upon the unified theory of acceptance and use of technology. Government Information Quarterly, 32(4), 429–440.CrossRef
Metadata
Title
Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model
Authors
Yogesh K. Dwivedi
Nripendra P. Rana
Anand Jeyaraj
Marc Clement
Michael D. Williams
Publication date
08-06-2017
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 3/2019
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-017-9774-y

Other articles of this Issue 3/2019

Information Systems Frontiers 3/2019 Go to the issue

Premium Partner