skip to main content
article

Social influence on technology acceptance behavior: self-identity theory perspective

Published: 19 September 2006 Publication History

Abstract

Social influence on technology acceptance behavior has been acknowledged but needs to be further articulated. While Subjective Norm (SN) has been dominantly used to capture the essence of social influence, the findings to date has led some researchers to question whether it captures the full extent of social influence. Recently, social psychologists have examined Self-Identity as a construct reflecting social influence on behavior. In particular, Self-Identity has been shown to have significant influence on voluntary behavior and have enduring effects, situations where the Subjective Norm had little effect. This study examines the effect of Self-Identity on technology acceptance decision in the context of a web-based class support system under the Technology Acceptance Model (TAM). The result demonstrates a significant direct and indirect effect of Self-Identity on technology acceptance. The result also confirms that Self-Identity has significant direct effect on the acceptance in voluntary and experienced situations, while Subjective Norm has no significant effect in both situations. Key implications for theory and practice are discussed.

References

[1]
Ashforth, B. and Mael, F. (1989), "Social Identity Theory and the Organisation", Academy of Management Review, Vol.14 No.1, pp.20--39.
[2]
Barclay, D., Higgins, C., and Thompson, R. (1995). "The Partial Least Squares (PLS) Approach to Causal Modeling: Personal Computer Adoption and Use as an Illustration," Technology Studies, Vol.2, No.2, pp.285--324.
[3]
Berger, P.L. (1966). The Social Construction of Reality, Garden City, NY: Doubleday.
[4]
Boomsma, A. (1982). "The Robustness of LISREL against Small Sample Sizes in Factor Analysis," in Joreskog, K.G., and Wold, H. (Eds.), Systems under Indirect Observation: Causality - Structure - Prediction, Part I, Amsterdam:North-Holland, pp. 143--173.
[5]
Charng, H.W., Piliavin, J.A., and Callero, P.L. (1988). "Role Identity and Reasoned Action in the Prediction of Repeated Behavior," Social Psychology Quarterly, Vol.51, pp. 303--317.
[6]
Compeau, D. R., and Higgins, C. A. (1995). "Application of Social Cognitive Theory to Training for Computer Skills," Information Systems Research, Vol. 6, No. 2, pp. 118--143.
[7]
Conner, M. and Armitage, C.J. (1998). "Extending the Theory of Planned Behavior: A Review and Avenues for Further Research," Journal of Applied Social Psychology, Vol.28 No.15, pp. 1429--1464.
[8]
Davis, F.D., Bagozzi, R. P., and Warshaw, P. R. (1989). "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, Vol.35, No.8, pp. 982--1003.
[9]
DeBono, K.G. and Snyder, M. (1995). "Acting on One's Attitudes: the Role of a History of Choosing Situations," Personality and Social Psychology Bulletin, Vol.21, pp. 629--636.
[10]
Deci, E. L. (1972). "Intrinsic Motivation, Extrinsic Reinforcement, and Inequity," Journal of Personality and Social Psychology, Vol.22, pp. 113--120.
[11]
Fekadu, Z., and Kraft, P. (2001). "Self-identity in Planned Behavior Perspective: Past Behavior and Its Moderating Effects on Self-identity-intention Relations," Social Behavior and Personality, Vol.29, pp. 671--686.
[12]
Fishbein, M., and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
[13]
Fornell, C. and Larcker, V. F. (1981). "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol.18, pp. 39--50.
[14]
Granberg, D. and Holmberg, S. (1990). "The Intention-Behavior Relationship among U.S. and Swedish Voters," Social Psychology Quarterly, Vol.53, No.1, pp. 44--54.
[15]
Hair, J.F., Anderson, R.E., Tatham, R.L., and Black, W.C. (1998). Multivariate Data Analysis, (5th ed.), Upper Saddle River, NJ: Prentice Hall.
[16]
Harrision, D.A., Mykytyn, P.P., and Riemenschneider, C.K. (1997). "Executive Decisions about Adoption of Information Technology in Small Business: Theory and Empirical Tests," Information Systems Research, Vol.8, No.2, pp. 171--195.
[17]
Hartwick, J. and Barki, H. (1994). "Explaining the Role of User Participation in Information System Use," Management Science, Vol.40, No.4, pp. 440--465.
[18]
Hogg, M.A. and Terry, D.J. (2000). "Social Identity and Self-categorization Processes in Organizational Contexts," Academy of Management Review, Vol.25, No.1, pp. 121--140.
[19]
Igbaria, M., Parasuraman, S., and Baroudi, J.J. (1996). "A Motivational Model of Microcomputer Usage," Journal of Management Information Systems, Vol.13, No.1, pp.127--143.
[20]
Joreskog, K. G., and Sorbom, D. (1993). LISREL 8: Structural Equation Modeling with the SIMPLIS Command Language., Hillsdale, NJ: Lawrence Erlbaum Associates.
[21]
Karahanna, E. and Limayem, M. (2000). "E-mail and V-mail Usage: Generalizing across Technologies," Journal of Organizational Computing and Electronic Commerce, Vol.10, No.1, pp. 49--66.
[22]
Karahanna, E., Straub, D.W., and Chervany, N.L. (1999). "Information Technology Adoption across Time: A Cross-sectional Comparison of Pre-adoption and Post-adoption Beliefs," MIS Quarterly, Vol.23, No.2, pp. 183--213.
[23]
Lucas, H.C. and Spitler, V.K. (1999). "Technology Use and Performance: A Field Study of Broker Workstations," Decision Science, Vol.30, No.2, pp. 291--331.
[24]
Mathieson, K. (1991). "Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior," Information Systems Research, Vol.2, No.3, pp. 173--191.
[25]
McCall, G.J., and Simmons, J.L. (1978). Identities and Interactions, New York: Free Press.
[26]
Segars, A. H. (1997). "Assessing the Unidimensionality of Measurement: A Paradigm and Illustration Within the Context of Information Systems Research," Omega, Vol.25, No.1, pp. 107--121.
[27]
Segars, A. H. and Grover, V. (1993). "Re-examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis," MIS Quarterly, Vol.17, No.4, pp. 517--525.
[28]
Sparks, P. (2000). "Subjective Expected Utility-based Attitude-Behavior Models: the Utility of Self-identity," in Terry, D.J., and Hogg, M.A. (Eds.), Attitudes, Behaviour and Social Context: The Role of Norms and Group Membership, Mahwah, NJ: Laurence Erlbaum Associates, pp. 11--30.
[29]
Sparks, P. and Guthrie, C.A. (1998). "Self-identity and the Theory of Planned Behavior: A Useful Addition or an Unhelpful Artifice?" Journal of Applied Social Psychology, Vol.28, pp. 398--1410.
[30]
Sparks, P. and Shepherd, R. (1992). "Self-identity and the Theory of Planned Behavior: Assessing the Role of Identification with Green Consumerism," Social Psychology Quarterly, Vol.55, No.4, pp. 388--399.
[31]
Sparks, P., Shepherd, R., and Frewer, L. J. (1995). "Assessing and Structuring Attitudes toward the Use of Gene Technology in Food Production: the Role of Perceived Ethical Obligation," Basic and Applied Social Psychology, Vol.16, pp. 267--285.
[32]
Straub, D. W. (1989). "Validating Instruments in MIS Research," MIS Quarterly, Vol.13, No.2, pp. 147--169.
[33]
Stryker, S. and Burke, P.J. (2000). "The Past, Present, and Future of an Identity Theory," Social Psychology Quarterly, Vol.63, pp. 284--297.
[34]
Taylor, S.P. and Todd, P.A. (1995a). "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research, Vol.6, pp. 144--176.
[35]
Taylor, S.P. and Todd, P.A. (1995b). "Assessing IT Usage: the Role of Prior Experience," MIS Quarterly, Vol.19, No.4, pp. 561--570.
[36]
Terry, D. J., and Hogg, M. A. (2000). Attitudes, Behavior and Social Context: the Role of Norms and Group Membership, Mahwah, NJ: Laurence Erlbaum Associates.
[37]
Terry, D.J., Hogg, M.A., and White, K.M. (1999). "The Theory of Planned Behavior: Self-identity, Social Identity, and Group Norms," British Journal of Social Psychology, Vol.38, pp. 225--244.
[38]
Thoits, P.A. and Virshup, L. (1997). "Me's and We's: Forms and Functions of Social Identities," in Ashmore, R.D., and Jussim, L. (Eds.), Self and Identity: Fundamental Issues, Oxford: Oxford University Press, pp. 106--133.
[39]
Thompson, R.L., Higgins, C.A., and Howell, J.M. (1994). "Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model," Journal of Management Information Systems, Vol.11, No.1, pp. 167--187.
[40]
Venkatesh, V. (2000). "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research, Vol.11, No.4, pp. 342--365.
[41]
Venkatesh, V. and Brown, S. (2001). "A Longitudinal Investigation of Personal Computers in Home: Adoption Determinants and Emerging Challenges," MIS Quarterly, Vol.25, No.1, pp. 71--102.
[42]
Venkatesh, V. and Davis, F.D. (2000). "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science, Vol.46, No.2, pp.186--204.
[43]
Venkatesh, V. and Morris, M.G. (2000). "Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and User Behavior," MIS Quarterly, Vol.24, pp. 115 --139.
[44]
Venkatesh, V., Morris M. G., Davis G. B., and Davis, F. D. (2003). "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, Vol.7, No.3, pp. 425--478.
[45]
Venkatesh, V. and Speier, C. (2000). "Creating an Effective Training Environment for Enhancing Telework," International Journal of Human Computer Studies, Vol.52, No.6, pp. 991--1005.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGMIS Database: the DATABASE for Advances in Information Systems
ACM SIGMIS Database: the DATABASE for Advances in Information Systems  Volume 37, Issue 2-3
Spring-Summer 2006
178 pages
ISSN:0095-0033
EISSN:1532-0936
DOI:10.1145/1161345
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 September 2006
Published in SIGMIS Volume 37, Issue 2-3

Check for updates

Author Tags

  1. self-identity
  2. social influence
  3. subjective norm
  4. technology acceptance model

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)427
  • Downloads (Last 6 weeks)39
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media