Why Do Users Accept Innovative Technologies? A Critical Review of Models and Theories of Technology Acceptance in The Information System Literature

View/ Open
alkhwaldi_kamala_2017.pdf (1005.Kb)
Download
Publication date
2017-08Keyword
Technology acceptance behaviourAcceptance models
Acceptance theories
Information systems
UTAUT2
Rights
© 2017 JMEST. Full-text reproduced with publisher permission.Peer-Reviewed
Yes
Metadata
Show full item recordAbstract
Earlier literature illustrates that the selection of the appropriate theoretical model has always prescribed as a crucial task for the research community in the information systems (IS) field. According to the authors' knowledge, there are few articles aims to review IT acceptance theories and models at the individuals' level. Thus, this paper aims to bridge this gap by presenting a critical review of ten of the most influential models/theories that have been employed in predicting and explaining the human acceptance behavior of different technologies at the individuals' level. This paper also provides a summary of their evolution, pointed out the main constructs, strengths, related fields, and criticisms based on a selected published literature appeared in IS research. This review offers a holistic view for future scholars to select appropriate constructs/models owing to their strengths and criticisms as well explanatory or predictive power. This paper concluded that the well-established and comprehensive theoretical model should consider the parsimony in the term of simplifying the model with the least constructs and the highest predictive power, also the ability to integrate the relevant context's factors (e.g., UTAUT2).Version
Accepted manuscriptCitation
Alkhwaldi AFA and Kamala MA (2017) Why Do Users Accept Innovative Technologies? A Critical Review of Models and Theories of Technology Acceptance in The Information System Literature. 4(8): 7962-7971.Link to published version
http://www.jmest.org/wp-content/uploads/JMESTN42352358.pdfType
ArticleCollections
Related items
Showing items related by title, author, creator and subject.
-
Electronic Customer Knowledge Management Systems: a multimodal interaction approach : an empirical investigation into the role of the multimodal interaction metaphors to improve usability of Electronic Customer Knowledge Management Systems (ECKMS) and increase the user's trust, knowledge and acceptance.Rigas, Dimitrios I.; Alotaibi, Mutlaq B.G. (University of BradfordInformatics Research Institute, 2010-05-14)There has been an increasing demand for commercial organisations to foster real-time interaction with customers, because harnessing customer competencies has been shown to be a major contributor towards various benefits, such as growth, innovation and competition. This may drive organisations to embrace the development of multimodal interaction and complement Electronic Customer Knowledge Management Systems (E-CKMS) with metaphors of audio-visual nature. Although the implementation of E-CKMS encounters several challenges, such as lack of trust and information overload, few empirical studies were devoted to assess the role of audio-visual metaphors, and investigate whether these technologies can be put into practice. Therefore, this thesis describes a comparative evaluation study carried out to examine the implication of incorporating multimodal metaphors into E-CKMS interfaces on not only usability of E-CKMS, but also the user¿s trust, knowledge and acceptance. An experimental E-CKMS platform was implemented with three different modes of interaction: Visual-only E-CKMS (VCKMS) with text and graphics, Multimodal E-CKMS (MCKMS) with speech, earcons and auditory icons and Avatar-enhanced multimodal E-CKMS (ACKMS). The three platforms were evaluated by three independent groups of twenty participants each (total=60) who carried out eight common tasks of increasing complexity and design based on three different styles. Another dependent group of forty-eight participants (n=48) was instructed to interact with the systems under similar usability conditions by performing six common tasks of two styles, and fill a questionnaire devised to measure the aspects of user acceptance. The results therein revealed that ACKMS was more usable and acceptable than both MCKMS and VCKMS, whereas MCKMS was more usable than VCKMS, but less acceptable. Inferential Statistics indicated that these results were statistically significant.
-
The effects of individual, organizational and environmental factors on the adoptions of e-commerce by SMEs in the Netherlands. An examination of factors influencing managerial beliefs, attitudes and the use of an e-commerce system using the technology acceptance model.Not named; Castricum, Marc C. (University of BradfordSchool of Management, 2015-06-04)Since the 1990s the use of the Internet and electronic commerce (e-commerce) has exploded, yet few SMEs seem to benefit from its potential. The lack of personal involvement and low level of use are an indication that managers still have not committed themselves to e-commerce. Consequently they are not reaping the full benefits first hand. The objectives of the study are to identify key factors and relationships likely to influence e-commerce use by SME managers in the Netherlands and to investigate whether relevant and significant factors can be combined in a new model to predict how SME managers will use new technology. To achieve these objectives, a well-established model of IT usage behaviour, the Technology Acceptance Model (TAM), was used. Building upon TAM, a theoretical research model was developed to investigate a large number of external variables that are possible antecedents of managerial beliefs, attitudes, and the use of IT. E-commerce systems were chosen as the IT tool under review. A cross-sectional field survey was conducted to investigate the theoretical research model. The results are based on the analysis of questionnaire data from 114 managers from Dutch SMEs. Using Structural Equation Modelling (SEM) the results show significant support for external variables, mostly of an individual nature, in the categories of demographics, managerial and IT knowledge, individual characteristics, and company characteristics. Contrary to expectations, two categories - social factors and environmental characteristics - had few or no variables with a significant relationship. This study further presents empirical evidence to suggest a limited number of antecedents under managerial control influencing beliefs, attitudes, and use. A better understanding of the various factors that may impede or increase effective utilization of IT can facilitate the design of organizational or managerial interventions that address these issues. Building on the core TAM model a new model, the e-Tam Model, has been developed based on the results of the theoretical research model. In this model, it is hypothesized that IT usage is directly and indirectly influenced by seven external variables divided into three categories: demographics, personality, and company characteristics. Using the e-Tam Model, effective and increased use of managerial IT tools can be promoted. This will enable managers to have a better use of e-commerce systems leading in turn to better margins and opportunities.
-
Jordanian Citizen-Centric Cloud Services Acceptance Model in an e-Government Context: Security Antecedents for Using Cloud ServicesKamala, Mumtaz A.; Qahwaji, Rami S.R.; Alkhwaldi, Abeer F.A.H. (University of BradfordSchool of Electrical Engineering and Computer Science, 2019)Cloud computing (CC) has become a strategic trend for online government services around the world, and Jordan is no exception. However, the acceptance and use of this novel technology face a number of barriers and challenges, including technological, human-aspects, social, and financial issues which need to be considered carefully by governments contemplating the implementation of cloud-based services. Drawing on the literature review on the acceptance and use of cloud-based e government services, it is evident that there is still a lack of explanatory power due to the following reasons: 1) focusing on the adoption and implementation of cloud-based e-government systems from the supply-side perspective, and therefore there are no enough studies on the integration between the supply-side and the demand-side as a single phenomenon. 2) while most of the e-government literature discussed the acceptance and adoption of traditional e-government services, there has been relatively little research on the distinguishing characteristics of cloud technology (e.g. security and trust). In addition, although Jordan made significant efforts in implementing cloud-based e-government systems since 2014, Jordan still has an unsatisfied rank with respect to the E-Government Development Index (EGDI) and E Participation Index (EPI). Many researchers state that security is one of the main determinates to the successful implementation of e-government services, without investigating this issue in depth. This thesis aims to bridge these gaps in an empirical manner through introducing a comprehensive investigation to provide a thorough understanding of cloud services adoption stemming from multiple perspectives, using an amended theoretical model based on the second version of the Unified Theory of Acceptance and Use of Technology (UTAUT2). To achieve this research aim, a mixed-methods approach for data collection was used. The first stage employed an online questionnaire (220 valid responses and 27 questions) to identify that some e-government challenges still affect the acceptance of cloud-based public services (e.g. lack of awareness and security). Also, to determine some of the security concerns relevant to the research context. In the second stage, a grounded theory approach (18 semi-structured interviews and five questions as an interview guide) was adopted to explore factors affecting users’ (i.e. citizens’) perceptions regarding the security of cloud-based e-government services. The results show five factors influencing perceived security: intangible and tangible characteristics (ITCS), information security awareness (ISA), interface design quality (IDQ), law and regulations, and security culture (SC). The third stage applied an online questionnaire to validate the proposed theoretical framework which integrated the findings of the second stage with the UTAUT2 constructs, trust and perceived security. In this stage, the theoretical model was evaluated through an online survey (57 Likert five-point scale questions), and a total of 669 validated responses were analysed with the Structural Equation Modelling (SEM) technique using Analysis of Moment Structures (AMOS) version 25.0. The results indicated that performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC) and trust (ToEG) of e-government were found to significantly and positively influence the individuals’ behavioural intention to use cloud-based e-government services. Moreover, perceived security (PS) significantly influenced trust (ToEG) of e-government. In addition, intangible and tangible characteristics (ITCS), information security awareness (ISA), interface design quality (IDQ), law and regulations, and security culture (SC) had a positive effect on the perceived security of cloud-based public services. The outcome of this research presents a theoretical framework for studying the acceptance of cloud services in the Jordanian public sector. Additionally, eighteen action guidelines corresponding to the eleven factors of this study have been suggested and five of which have been already implemented or are planned to be implemented by the Jordanian government. The results of this study will provide empirical findings for the e-government professionals around the world, especially in developing countries with a similar context to the Hashemite Kingdom of Jordan, facing similar obstacles for the acceptance and adoption of cloud-based e-government services, and aspiring to enhance such services in their countries. The practical implications, implementation guidelines, theoretical contributions, and limitations of this work are discussed in the context of providing key directions for future research.