Documente Academic
Documente Profesional
Documente Cultură
Abstract
With the rapid change in all types of working environment, there is a need to implement electronic learning (e-learning)
systems to train people in new technologies, products, and services. However, the large investment in e-learning has made user
acceptance an increasingly critical issue for technology implementation and management. Although user acceptance received
fairly extensive attention in prior research, efforts were needed to examine or validate previous results, especially in different
technologies, user populations, and/or organizational contexts. We therefore proposed a new construct, perceived credibility, to
examine the applicability of the technology acceptance model (TAM) in explaining engineers’ decisions to accept e-learning,
and address a pragmatic technology management issue. Based on a sample of 140 engineers taken from six international
companies, the results strongly support the extended TAM in predicting engineers’ intention to use e-learning.
# 2003 Elsevier B.V. All rights reserved.
0378-7206/$ – see front matter # 2003 Elsevier B.V. All rights reserved.
doi:10.1016/j.im.2003.08.012
796 C.-S. Ong et al. / Information & Management 41 (2004) 795–804
Perceived
Usefulness
H4
H1 H5
H3 H7 H8
Perceived
Credibility
E-learning is reported to be a means of solving learning has a significant effect on behavioral intention to use
and performance problems and has become an increas- e-learning.
ingly critical issue.
Although there have been rapid advances in hard-
ware and software capabilities, the problem of under- 2. Theoretical development
utilized systems still remains [22,28,29,39]. The
technology acceptance model (TAM) [10,11], adapted Similar to prior research on TAM [6,19,24], the
from theory of reasoned action (TRA) [3,13], has been ‘‘attitude’’ construct was removed to simplify the
used as the theoretical basis for many empirical studies model. Fig. 1 depicts the research model for the study,
of user technology acceptance [33,35,37]. Apparently, excluding actual behavior but expanding computer
it is the most promising way to overcome the problem of self-efficacy and perceived credibility. This is based
underutilized systems. However, e-learning is relatively on prior research, which suggested that user accep-
new and electronic learners (e-learners) are a specific tance is determined by two key beliefs: perceived
user group. Thus, existing variables of TAM cannot usefulness and perceived ease of use. In addition,
fully reflect e-learners’ motives, requiring a search for two variables, computer self-efficacy and perceived
additional intrinsic motivation factors. credibility were integrated into TAM to adapt it for the
Privacy and security features have been heavily empirical study of e-learning.
emphasized in the e-commerce context [5,14,32]. Pro-
tecting private information (e.g., education records3) 2.1. Computer self-efficacy
will also affect e-learners’ willingness to accept e-
learning. These issues have not yet been empirically In an IS/IT context, computer self-efficacy is
examined in an e-learning context. This study was defined as ‘‘an individual’s perceptions of his or her
started to respond both to prior studies’ indication of ability to use computers in the accomplishment of a
the need for a broader exploration of factors beyond the task rather than reflecting simple component skills’’
original TAM [20,23] and to a prior study’s suggestion [8]. Significant influences of computer self-efficacy on
for more examination of the role computer self-efficacy perceived usefulness have been empirically validated.
plays in predicting IT usage behavior [7]. The study Additionally, the relationship between computer self-
proposes a new construct, ‘‘perceived credibility,’’ to efficacy and perceived ease of use was based on
enhance understanding of an engineer’s acceptance of theoretical argument [26] and this was empirically
e-learning. Also, it shows that computer self-efficacy examined to see whether there exists a causal link
between computer self-efficacy and perceived ease of
3
Family Educational Rights and Privacy Act (FERPA) defines
use [2,36]. These suggest that computer self-efficacy
educational records as: student’s date and place of birth, parent(s) has a significant positive effect on perceived ease of
and/or guardian addresses, grades, test scores, courses taken, etc. use of e-learning. The relationship between computer
C.-S. Ong et al. / Information & Management 41 (2004) 795–804 797
self-efficacy and perceived credibility has not yet been Extensive research over the past decade has provided
empirically validated, however, Hoffman et al. [18] evidence that perceived ease of use has a significant
analysed data from the 1997 CommerceNet/Nielsen effect on behavioral intention to use, either directly or
Internet Demographic Survey and found that it is indirectly, through its effect on perceived usefulness
apparent that negative perceptions regarding privacy [1,34]. On the other hand, Moon and Kim [27] pointed
and security increase in conjunction with levels of out that ITs that are easier to use will be less threatening
online proficiency (described here as ‘‘computer self- to the individual, implying that perceived ease of use
efficacy’’). The more experience one acquires online, will have a positive effect on users’ perceived credibility
the more important are concerns of control over perso- as interacting with e-learning. Thus, we hypothesized:
nal information, implying that computer self-efficacy
will have a negative effect on perceived credibility in an H5. Perceived ease of use will have a positive effect
e-learning context. Therefore, we hypothesized: on perceived usefulness of e-learning.
H1. Computer self-efficacy will have a positive effect H6. Perceived ease of use will have a positive effect
on perceived usefulness of e-learning. on behavioral intention to use e-learning.
H2. Computer self-efficacy will have a positive effect H7. Perceived ease of use will have a positive effect
on perceived ease of use of e-learning. on perceived credibility of e-learning.
Perceived ease of use is the degree to which a person To ensure content validity of the scales, the items
believes that using a particular system would be free of must represent the concept about which generali-
effort. It is expected to influence perceived usefulness, zations are to be made. Items selected for the con-
behavioral intention to use, and perceived credibility. structs were adapted mainly from previous research.
798 C.-S. Ong et al. / Information & Management 41 (2004) 795–804
Table 2
Analysis of intermeasurement correlation
CSE PU PEOU PC BI
1 2 3 4 1 2 3 4 1 2 3 4 1 2 1 2
CSE1 1.00
CSE2 0.70 1.00
CSE3 0.75 0.77 1.00
CSE4 0.74 0.71 0.75 1.00
PU1 0.39 0.41 0.37 0.51 1.00
PU2 0.37 0.31 0.30 0.46 0.79 1.00
PU3 0.33 0.35 0.28 0.42 0.74 0.83 1.00
PU4 0.39 0.40 0.41 0.44 0.71 0.76 0.76 1.00
PEOU1 0.28 0.31 0.31 0.31 0.55 0.55 0.55 0.56 1.00
PEOU2 0.41 0.35 0.32 0.37 0.47 0.47 0.48 0.48 0.54 1.00
PEOU3 0.46 0.40 0.41 0.45 0.52 0.54 0.53 0.50 0.67 0.80 1.00
PEOU4 0.45 0.44 0.42 0.45 0.54 0.56 0.57 0.58 0.60 0.74 0.79 1.00
PC1 0.16 0.08 0.03 0.08 0.28 0.37 0.34 0.37 0.38 0.47 0.47 0.46 1.00
PC2 0.18 0.02 0.04 0.11 0.29 0.37 0.28 0.33 0.37 0.42 0.42 0.36 0.78 1.00
BI1 0.32 0.34 0.27 0.32 0.43 0.52 0.45 0.48 0.41 0.40 0.48 0.47 0.40 0.43 1.00
BI2 0.37 0.40 0.36 0.34 0.45 0.51 0.46 0.53 0.42 0.44 0.51 0.53 0.40 0.41 0.85 1.00
Perceived
Usefulness
(R 2 =0. 50)
0.34**
0.17*
0.60***
Perceived Behavioral
Computer 0.54*** 0.26*
Ease of Use Intention to Use
Self-Efficacy
(R 2 =0.30) (R 2 =0 .44)
-0.28**
0.20*
0.72***
Perceived
Credibility
(R 2 =0.38)
Table 5
The direct, indirect, and total effect of dominants on behavioral intention to use
CSE 0.17 0.54 0.28 0.32 0.39 0.33 0.49 0.54 0.11 0.33
PU 0.34 0.34
PEOU 0.60 0.72 0.26 0.35 0.60 0.72 0.61
PC 0.20 0.20
C.-S. Ong et al. / Information & Management 41 (2004) 795–804 801
5. Discussion 6. Conclusions
Computer self-efficacy appeared to be a significant Using the extended model as a theoretical frame-
determinant of perceived usefulness, perceived ease work, this study helps practitioners and researchers
of use, and perceived credibility. Users who have better understand why people resist using e-learning,
higher computer self-efficacy are likely to have more predict how users will respond to e-learning, and
positive usefulness and ease of use beliefs. This increase user acceptance by improving the tech-
finding also supports prior research. However, com- niques and processes by which they are implemen-
puter self-efficacy had a negative effect on perceived ted. Also, it can help researchers considerate our
credibility. Possibly an individual with high computer findings for development and evaluation of e-learning
self-efficacy may see the limitations and lack of theories.
privacy and security of a particular e-learning system. Major contributions are:
The higher the computer self-efficacy of an engineer,
1. Our results demonstrate how perceived credibility
the more skepticism she or he may have. Although
influences users’ attitudes toward using e-learning:
computer self-efficacy had a negative effect on per-
they must assure e-learners that they are free of
ceived credibility, its total effect on perceived cred-
privacy and security threats.
ibility and behavioral intention to use was still
2. Perceived usefulness has the most significant
positive.
direct effect on behavioral intention to use
Judged by its direct effect on behavioral intention
e-learning: they must provide useful content to
to use, perceived usefulness was found to be the
attract ‘pragmatic’ users to use.
most significant factor affecting users’ acceptance of
3. Perceived ease of use was found to be an
e-learning. It seems that engineers have specialized
important antecedent of perceived usefulness and
training and practice in a highly autonomous profes-
perceived credibility. User-friendliness is also
sion. Thus, an essential acceptance criterion is whether
important for the success of e-learning and will
or not the e-learning system provides useful content for
increase e-learners’ perceptions of perceived
filling the needs of an individual professional. The
usefulness and perceived credibility.
evaluation criterion or rationale may be, in part, rooted
4. TAM has been extended in an e-learning context.
in engineers’ tendency to view the e-learning system as
5. Computer self-efficacy had a positive effect on
a tool, acceptable only when proven to provide desired
perceived usefulness and perceived ease of use,
utility to them. Pedagogical principles, including prin-
whereas it had a negative effect on perceived
ciples of developing content and packaging content,
credibility.
could be employed in the development and evaluation
of useful content. Four limitations of this study should be noted. First,
Perceived ease of use was found to have the most investigating acceptance of e-learning is relatively
significant effect on behavioral intention to use. This new. The findings and their implications are obtained
suggests that a user’s belief of ease of use is a crucial from a single study of a particular technology in
antecedent to her or his perceptions of usefulness Taiwan. Thus, caution needs to be taken when general-
and credibility of e-learning. As expected, perceived izing our findings. Second, responses were voluntary
credibility was found to be another important factor and thus inevitably subject to self-selection biases.
influencing users’ intention to use e-learning, indicat- Conceivably, users who were interested in, had used,
ing that it is not sufficient to develop an e-learning or were currently using e-learning were more likely to
system with valuable functions and user-friendly inter- respond. Third, the R-square reported by the current
action to attract more users to use. It is of paramount research represents another limitation: there may be a
importance to develop e-learning with a trustworthy need to search for additional variables (e.g., subjective
protection of education records to assure e-learners norm, gender, internet experience, level of education)
that they are free of privacy and security threats. to improve our ability to predict usage intentions more
Education records are of importance and sensitivity accurately. Finally, the study was conducted with a
to e-learners. snapshot research approach. Additional efforts are
802 C.-S. Ong et al. / Information & Management 41 (2004) 795–804
needed to evaluate the validity of the proposed model Perceived usefulness (PU)
and our findings.
There are several implications for e-learning man- PU1 Using the e-learning system improves my
agement based on our findings. job performance.
PU2 Using the e-learning system enhances my
1. It is important for e-learning to be useful by effectiveness in my job.
enhancing the recipient’s job performance or PU3 Using the e-learning system in my job
productivity. improves my productivity.
2. Although perceived usefulness was the most PU4 I find the e-learning system to be useful in
significant direct effect on behavioral intention my job.
to use, perceived ease of use has a stronger total
effect than perceived usefulness. Therefore, being
Perceived ease of use (PEOU)
a user-friendly system is also important for its
success. PEOU1 My intention with the e-learning system
3. This study confirms the significant influence of is clear and understandable.
perceived credibility on behavioral intention to PEOU2 Interacting with the e-learning system
use e-learning. It must assure e-learners that they does not require a lot of my mental
are free of privacy and security threats. In effort.
addition, perceived credibility seems to influence PEOU3 I find the e-learning system to be easy to
users’ attitudes toward using e-learning. use.
4. Perceived usefulness, perceived ease of use, and PEOU4 I found it easy to get the e-learning
perceived credibility are more ‘‘system-specific’’ system to do what I want it to do.
in the sense that they refer to the perceptions of a
particular system, whereas computer self-efficacy Perceived credibility (PC)
as examined here is more general. Managers and
developers can increase users’ usage intention PC1 I don’t worry about the security issue of
through this. In businesses, human resource the e-learning system.
managers can provide training courses to increase PC2 I don’t worry about the e-learning system
employees’ familiarity with computing technolo- divulging my personal information.
gies. Such education need not be formal and may
take any form (e.g., seminars and informal Behavioral intention to use (BI)
discussions).
BI1 Assuming that I had access to the
e-learning system, I intend to use it.
BI2 Given that I had access to the e-learning
Appendix A system, I predict that I would use it.
[5] F. Belanger, J.S. Hiller, W.J. Smith, Trustworthiness in [23] P. Legris, J. Ingham, P. Collerette, Why do people use
electronic commerce: the role of privacy, security, and site information technology? A critical review of the technology
attributes, Journal of Strategic Information Systems 11 (3–4), acceptance model, Information and Management 40 (3),
2002, pp. 245–270. 2003, pp. 191–204.
[6] P.Y.K. Chau, An empirical assessment of a modified [24] H.P. Lu, D.H. Gustafson, An empirical study of perceived
technology acceptance model, Journal of Management usefulness and perceived ease of use on computerized support
Information Systems 13 (2), 1996, pp. 185–204. system use over time, International Journal of Information
[7] P.Y.K. Chau, Influence of computer attitude and self-efficacy Management 14 (5), 1994, pp. 317–329.
on IT usage behavior, Journal of End User Computing 13 (1), [25] C. MacGregor, T. Whittingham, E-learning for industry: the
2001, pp. 26–33. competitive advantage, in: Proceedings of Vocational Educa-
[8] D.R. Compeau, C.A. Higgins, Computer self-efficacy: tion and Training Research Conference, Deakin University,
development of a measure and initial test, MIS Quarterly 19 Geelong, July 2001.
(2), 1995, pp. 189–211. [26] K. Mathieson, Predicting user intentions: comparing the
[9] D.R. Compeau, C.A. Higgins, S. Huff, Social cognitive technology acceptance model with the theory of planned
theory and individual reactions to computing technology: behavior, Information Systems Research 2 (3), 1991, pp. 173–
a longitudinal study, MIS Quarterly 23 (2), 1999, pp. 145– 191.
158. [27] J.W. Moon, Y.G. Kim, Extending the TAM for a World-Wide-
[10] F.D. Davis, Perceived usefulness, perceived ease of use, and Web context, Information and Management 38 (4), 2001,
user acceptance of information technology, MIS Quarterly 13 pp. 217–230.
(3), 1989, pp. 318–339. [28] G.C. Moore, I. Benbasat, Development of instrument to
[11] F.D. Davis, R.P. Bagozzi, P.R. Warshaw, User acceptance measure the perceptions of adopting an information technol-
of computer technology: a comparison of two theoretical ogy innovation, Information Systems Research 2 (3), 1991,
models, Management Science 35 (8), 1989, pp. 982–1003. pp. 192–222.
[12] W.J. Doll, G. Torkzadeh, The measurement of end-user [29] D.A. Norman, Things That Make us Smart: Defending
computing satisfaction, MIS Quarterly 12 (2), 1988, pp. 259– Human Attributes in the Age of the Machine, Addison-
274. Wesley, Reading, MA, 1993.
[13] M. Fishbein, I. Ajzen, Belief, attitude, intention and behavior: [30] J.C. Nunnally, Psychometric Theory, second ed., McGraw-
an introduction to theory and research, Addison-Wesley, Hill, New York, 1978.
Reading, MA, 1975. [31] A. Ravenscroft, M.P. Matheson, Developing and evaluating
[14] B. Friedman, P.H. Kahn Jr., D.C. Howe, Trust online, dialogue games for collaborative e-learning, Journal of
Communications of the ACM 43 (12), 2000, pp. 34–40. Computer Assisted Learning 18 (1), 2002, pp. 93–101.
[15] J. Gordon, E-learning Tagged as Best Corporate IT Invest- [32] V. Shankar, G.L. Urban, F. Sultan, Online trust: a stakeholder
ment, E-learning 4 (1), 2003, pp. 8. perspective, concepts, implications, and future directions,
[16] T. Govindasamy, Successful implementation of e-learning Journal of Strategic Information Systems 11 (3/4), 2002, pp.
pedagogical considerations, Internet and Higher Education 4 325–344.
(3/4), 2002, pp. 287–299. [33] S. Taylor, P.A. Todd, Understanding information technology
[17] M.H. Harun, Integrating e-learning into the workplace, usage: a test of competing models, Information Systems
Internet and Higher Education 4 (3/4), 2002, pp. 301–310. Research 6 (2), 1995, pp. 144–176.
[18] D.L. Hoffman, T.P. Novak, M. Peralta, Building consumer [34] V. Venkatesh, Creation of favorable user perceptions:
trust online, Communications of the ACM 42 (4), 1999, pp. exploring the role of intrinsic motivation, MIS Quarterly 23
80–85. (2), 1999, pp. 239–260.
[19] W. Hong, J.Y.L. Thong, W.M. Wong, K.Y. Tam, Determi- [35] V. Venkatesh, Determinants of perceived ease of use:
nants of user acceptance of digital libraries: an empirical integrating control, intrinsic motivation, and emotion into
examination of individual differences and system character- the technology acceptance model, Information Systems
istics, Journal of Management Information Systems 18 (3), Research 11 (4), 2000, pp. 342–365.
2001, pp. 97–124. [36] V. Venkatesh, F.D. Davis, A model of the antecedents of
[20] P.J. Hu, P.Y.K. Chau, O.R. Liu Sheng, K.Y. Tam, Examining perceived ease of use: development and test, Decision
the technology acceptance model using physician acceptance Sciences 27 (3), 1996, pp. 451–481.
of telemedicine technology, Journal of Management Informa- [37] V. Venkatesh, F.D. Davis, A theoretical extension of the
tion Systems 16 (2), 1999, pp. 91–112. technology acceptance model: four longitudinal field studies,
[21] J. Ismail, The design of an e-learning system beyond the Management Science 46 (2), 2000, pp. 186–204.
hype, Internet and Higher Education 4 (3/4), 2002, pp. 329– [38] V. Venkatesh, M.G. Morris, Why don’t men ever stop to ask
336. for directions? Gender, social influence, and their role in
[22] R. Johansen, R. Swigart, Upsizing the Individual in the technology acceptance and usage behavior, MIS Quarterly 24
Downsizing Organization: Managing in the Wake of Reen- (1), 2000, pp. 115–139.
gineering, Globalization, and Overwhelming Technological [39] L.R. Weiner, Digital Woes: Why We Should Not Depend on
Change, Addison-Wesley, Reading, MA, 1996. Software, Addison-Wesley, Reading, MA, 1993.
804 C.-S. Ong et al. / Information & Management 41 (2004) 795–804