Documente Academic
Documente Profesional
Documente Cultură
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted
digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about
JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
http://about.jstor.org/terms
Taylor & Francis, Ltd. is collaborating with JSTOR to digitize, preserve and extend access to Journal of
Management Information Systems
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
Does Information Technology Training
Really Matter? A Social Information
Processing Analysis of Coworkers'
Influence on IT Usage in the
Workplace
MICHAEL J. GALLIVAN, VALERIE K. SPITLER, AND
MARIOS KOUFARIS
Journal of Management Information Systems / Summer 2005, Vol. 22, No. 1, pp. 153-192.
2005 M.E. Sharpe, Inc.
0742-1222 / 2005 $9.50 + 0.00.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 54 GALLIVAN, SPITLER, AND KOUFARIS
During the prior quarter century of research on factors that influence system
implementation success and failure [32, 45, 54], it has been axiomatic that user train-
ing is a key ingredient for successful implementation and user acceptance of informa-
tion technology (IT). There have been several problems, however, surrounding the
practice of user training in organizations. One problem is that training is often the
first expense cut when corporations need to tighten their spending, due to economic
downturns or heightened competition [8]. Moreover, when cost and schedule over-
runs occur during implementation, training is often shortchanged in the misguided
attempt to cut corners and deliver a completed system on schedule. An additional
problem is that managers often perceive training to be a panacea that will increase
user acceptance and usage of IT, when there may be other, nontraining barriers to
usage. We believe that managers responsible for overseeing technology implementa-
tion should have a realistic understanding of the benefits and limitations of user train-
ing, so that they do not under- or overinvest in it.
Perhaps one reason for the inconsistent valuation of user training by managers is
that its role in facilitating IT implementation has been exaggerated and oversimpli-
fied. While some of the earliest training studies established the importance of training
end users [13, 15, 55], the relationships between the amount of user training and
performance outcomes are neither simple nor consistent. For example, it is often
assumed, based on some early training studies, that there is a direct link between the
amount of formal training and users' subsequent computer skills, performance, and
system acceptance - that more training is better [37]. Although this may be true un-
der controlled laboratory conditions [71], in actual field studies, training is only one
of many factors that influence users' IT skills and level of usage. Other factors in-
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 1 55
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 56 GALLIVAN, SPITLER, AND KOUFARIS
knowledge [3, 4, 86], has provided new frameworks for reconceptualizing knowledge,
skill, and learning. Our conceptual framework incorporates concepts from social infor-
mation processing (SIP) [19, 20] at the work group level to show how beliefs and
knowledge are shaped by the social environment. Based on SIP theory [68], we de-
velop a framework to explain the determinants of IT usage within organizations and
show how this model provides a more complete picture of employees' IT use than
conventional models of user training. Following our review of relevant literature, we
present our framework and describe the field study we conducted to validate it.
training for the past three decades [15, 37, 45]. The current research and intellectual
discourse on user training have focused on the most effective training modes and
training content for instilling skills and motivation among prospective users [24, 60,
71], rather than dwelling on the basic issue of whether training influences IT accep-
tance and usage. Perhaps this basic question has long been considered resolved and
not worthy of ongoing scrutiny by researchers. Given the complex interaction be-
tween user training and other contextual factors in the environment, we believe that
questions of whether and how training exerts its effect are still unresolved. Perhaps it
is not surprising that few studies have directly sought to identify the relationship
between training and IT usage in field study settings, since researchers increasingly
recognize other forces that exert stronger influences on IT usage.
Surprisingly, few consistent findings have resulted from empirical studies that have
sought to find a direct effect between user training and acceptance or actual use of IT.
Several studies showed that user training does influence users' skills and their accep-
tance of IT [13, 55, 79], but there was no direct relationship between the amount or
quality of user training and actual IT use. Nelson and Cheney [55] explicated a causal
chain from amount of training to user abilities to actual IT use, and finally, to user
satisfaction with the system, but even they found no direct relationship between train-
ing and the level of IT usage.2 Along the same lines, qualitative case studies con-
ducted by Lepore et al. [41] showed that training was one factor that mattered in
shaping users' IT acceptance, but the importance of training was moderated in differ-
ent settings by factors such as users' occupational status (i.e., professional versus
clerical employees) and specifics of the implementation strategy (i.e., top-down ver-
sus bottom-up implementation). Harrison and Rainer [26] found that user training
had an effect on IT usage, but users' prior computer experience and age were more
important determinants of IT acceptance and use. Compeau and Higgins [11] found
that the effect of IT training on subjects' skill level and amount of IT use were mod-
erated by their prior beliefs regarding their IT abilities, which they labeled computer
self-efficacy [12, 47]. Other researchers who studied the multiple, interdependent re-
lationships among subjects' prior computer skills, amount of IT training, acceptance,
system use, and user information satisfaction have found inconsistent support for the
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 157
There has been scant research to assess what fraction of overall learning occu
through formal, classroom-based training versus other informal mechanisms. Th
one study that conducted such an assessment concluded that resident experts in t
work group [9] were more influential than training in shaping users' IT knowled
and skills. While we thus acknowledge the potential value of user training as o
facilitating condition [77, 78] for IT acceptance and use, we conclude that form
training is neither a necessary, nor a sufficient, condition for successful IT adopt
and use. Other approaches for enabling learning may, in fact, be more effective
achieving these ends. Below, we argue that SIP within the work group shapes use
beliefs, skill levels, and motivation to use IT within organizations more effective
than does user training.
One problem with how training practitioners and researchers conceptualize IT tra
ing is that they focus primarily on skill acquisition and transfer at the individual lev
rather than considering the broader sharing of attitudes, values, and norms at t
group level. What actually occurs in training may be more a function of learner
assimilating attitudes and intentions to use IT from other members in the train
setting, rather than acquiring specific skills. In fact, the educational literature strong
argues that most long-term learning and problem-solving learning emerges from
teraction in groups [88]. 4 In the human resource management literature, Gash a
Kossek articulated this point:
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
158 GALLIVAN, SPITLER, AND KOUFARIS
individual aspects of training are studying the wrong questions and overlook-
ing critical organizational and strategic issues of training. [22, p. 230]
It may be that training is relevant to shaping group attitudes and intentions to use
IT, and that the latter factors, in turn, influence how employees use IT in their day-to-
day work. The importance of the social context in which training occurs was demon-
strated by Galletta et al. [21], who found that negative comments made by a stranger
during training sessions exerted a significant effect on other trainees' attitudes to a
software application, reducing their intention to use the software after the training
was over. Their results showed that users who were learning about a new technology
will heed such negative sources of information when forming attitudes toward a new
technology - even from a stranger - while discounting positive sources of informa-
tion as mere hype [25, 85]. While this study showed that social shaping of beliefs and
norms may occur during formal training, we believe that similar forms of SIP occur
more extensively within the day-to-day work environment. It is in the actual work
milieu that the social influence of one's peer group will have a stronger effect on
employees' beliefs, values, and intentions to use IT, relative to a training classroom,
which is distinct from the actual work milieu. For example, in studying IT usage
among Wall Street brokers and their assistants, Lucas and Spitler [46] found a posi-
tive relationship between the level of IT usage and subjects' perceptions of their co-
workers' beliefs about the importance of using the new online system. Other IT
adoption studies of communication technologies (including e-mail and videotelephony
[34, 48]) have underscored the importance of social influence in shaping IT adoption
and use within the workplace.
Researchers have offered critiques of user training similar to that of Gash and Kossek
[22] - namely, that IS managers, training practitioners, and researchers often nar-
rowly regard user training as an individual cognitive activity that is distinct from
users' everyday job duties [23]. In contrast, the new paradigm about how people
actually learn to use technology is that learning is deeply embedded in doing: learn-
ing is inherently part of ongoing work within a specific social context that is shaped
by group- and organizational-level forces [86, 87]. Adopting this practice-based view
of IT use, George et al. criticize traditional beliefs about learning and training:
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 1 59
A more comprehensive and realistic view of user training and skill development
must take into account not just individual, but also work group- and organization
level influences, especially factors related to goals, beliefs, norms, and culture. Nelson
et al. [57] advocated one such training philosophy, derived from general system
theory, which they showed to be effective in a longitudinal study of user training at
the 1RS.
Another research stream rooted in cognitive psychology argues that users learn be
when permitted to learn through hands-on, exploratory learning with other users present
or nearby [6, 30]. Such codiscovery learning may be more appropriate for the type
of graphical user interface systems that are available in most organizations today
Lim et al. offer this insight:
Lim et al. claim that individuals learn better when there is a social component t
learning - when interaction between learners occurs during codiscovery learning. The
believe that enhanced learning outcomes are due to the learners' sharing insights an
challenging each other's mental models during codiscovery learning.5 Research o
apprenticeship learning has yielded similar conclusions - that coworkers influence
each other's attitudes, values, and knowledge. Lave and Wenger [35] argue that learn
ing is most effective when it occurs in the everyday work context, in the presence o
coworkers, and while performing routine job tasks. By crafting a theory emphasizing
the situated nature of learning [75], they argue that traditional perspectives on train
ing and learning, which focus on contrived settings and tasks, are misleading wit
regard to where, when, and how people learn.6 Moreover, Lave and Wenger challen
traditional assumptions about learning, which assume it to be an event that occur
primarily during training, or other situations deliberately conceived and structured a
training events:
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 60 GALLIVAN, SPITLER, AND KOUFARIS
Lave and Wenger believe that learning occurs in a social context where people
share information related to their knowledge, values, and intentions to behave in spe-
cific ways. A central construct in their theory - the notion of community of prac-
tice - has become common parlance not only in the knowledge management literature
[4, 51] but also across the general management landscape [74, 87]. The value of the
community-of-practice construct was first demonstrated through storytelling episodes
of photocopier repair technicians [62], yet, more recently, the ability to acquire, share,
and retain knowledge across communities of practice has been broadly recognized as
a key organizational capability [4, 10].
Over the past decade, there has been growing recognition that employees learn to
perform their jobs and to use IT through the guidance and insights offered by more
experienced coworkers [3]. For instance, one work group may develop a set of norms
to encourage learning and exploration of new technologies on the job, whereas an-
other group may evolve specific norms to avoid using IT, or possibly even to sabotage
the technology. George et al. [23] examined such contrasting scenarios where two
work groups that were each expected to use IT in their jobs appropriated the technol-
ogy in different ways. Their findings suggests that the same technology, when intro-
duced into different social settings, will be appropriated in very different ways, resulting
in distinct patterns of use shaped by job-specific conditions, employee identities, and
group norms [1, 61]. Spitler [73] has employed the community of practice perspec-
tive in her longitudinal study of how new management consultants learned to use IT
in their consulting assignments; however, the specific processes by which coworkers
influence employees' beliefs and behaviors have not been fully elucidated. To fill this
gap, we explore SIP theory as a means by which such beliefs and intentions to act are
shared among group members.
The notion of SIP or social influence has received much attention from IS research-
ers over the past decade. While several researchers working in the technology accep-
tance tradition have examined the importance of social influence or subjective norms
in assessing users' beliefs about an innovation [14, 31, 81, 82], results in this area
have been inconsistent. Some studies have found an effect for social influence or
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 1 6 1
colleagues regarding SIP in the workplace [19, 20, 64, 66], they did not simply ask
subjects what they thought their coworkers and supervisors believed; rather, the re
searchers captured data directly from several coworkers in the same department a
the focal user and then examined the coworkers' actual beliefs and behaviors to evaluate
the degree of convergence. When operationalized in this manner, their results some
times showed very strong SIP effects, whereby employees internalized the beliefs
held by their coworkers and also complied with coworkers' expectations for them t
use the IT innovation in question.
In subsequent studies that cited Fulk's notion of SIP or social influence in the IS
literature, none of these studies collected relevant coworker data in a manner that wa
consistent with the social network method employed by Fulk [19] or Rice and h
colleagues [64, 66]. Instead, IS researchers have simply asked subjects to report whethe
they believed that referent others within the organization thought it was important fo
them to use the IT innovation in question [14, 31, 77, 82]. For example, in a recent
study, Lewis et al. [43] sought to identify the social influence of coworkers' percep
tions of a technology's usefulness and ease of use on the individual subject's own
perceptions, but they found no support for the expected relationship. While citin
Fulk's [19, 69] notion of SIP, these researchers did not appropriately follow the soci
network method of collecting data directly from coworkers [64, 66]; instead, they
relied on subjects' ability to project (or guess) what their coworkers believed about
the technology's usefulness and ease of use. We believe that such inconsistent result
in the IS literature are an artifact of the manner in which coworkers' beliefs or behav-
iors have been captured in these studies through "social projection." Given this prac
tice of operationalizing SIP or social influence through data collection methods tha
are not faithful to the social network method [19, 20, 64, 66], it is not surprising tha
the results examining SIP in the IS literature have been inconsistent. In one study
from the communication literature where Rice and Aydin [63] did operationalize SI
in a manner consistent with the social network method, their results showed that sur
vey respondents were remarkably poor judges of what their coworkers actually be-
lieved. When Rice and Aydin asked hospital employees to characterize the beliefs o
their coworkers and supervisors regarding the usefulness of a new administrative I
system, subjects reported coworkers' beliefs as being similar to their own, yet an
analysis of coworkers' actual beliefs found that subjects' projections were quite inac
curate. Such a revelation has important methodological implications, since it chal-
lenges the methods by which various IS studies have operationalized the notion of
social influence or SIP. Rice and Aydin concluded that
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
162 GALLIVAN, SPITLER, AND KOUFARIS
Research Model
HI: The level of an employee's IT usage will be related to the quantity of user
training received.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 163
Traditional training research has also examined the relationship between emplo
ees' perceptions of the training they received and their level of IT usage [11, 4
again with mixed results. We posit:
H2: The level of an employee 's IT usage will be related to the employee 's belie
about the quality of training received.
IS training studies have also shown that individuals' IT usage is, in part, shaped
their beliefs regarding their ability to use IT, a construct known as computer s
efficacy [11, 12, 47]. Hence,
H3: The level of an employee 's IT usage will be related to the employee 's level
computer self-efficacy.
H4: The level of an employee 's IT usage will be related to his coworkers 'perce
tions of training quality.
Our literature review explained that learning and using IT are not just individu
level phenomena. In contrast, studies have shown that learning within a social conte
enhances users' competence with IT [44, 73, 89, 90]. Since H3 (above) examined
role of individual computer self-efficacy as an antecedent to an individual's IT usa
we offer an analogous hypothesis related to the average level of computer self-ef
cacy of the other work group members. In short, coworkers' computer self-effic
will shape the individual's IT usage by providing a local base of confidence and
know-how for employees to draw upon.
H5: The level of an employee's IT usage will be related to his coworkers' com
puter self-efficacy.
H6: The level of an employee 's IT usage will be related to the level of his cowork-
ers' average IT use.
Next, we examine the internalization and compliance effects [19] as different path-
ways of coworkers' social influence. Compliance implies that individuals change their
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 64 GALLIVAN, SPITLER, AND KOUFARIS
behavior to comply with the group norms, without altering their internal beliefs. Con-
versely, internalization signifies that employees increasingly share the same beliefs
as their coworkers, a phenomenon that is at the heart of SIP theory. Early work by
Salancik and Pfeffer [68] on how employees socially construct their beliefs about job
characteristics and the work environment posits that employees' internal beliefs will
come to resemble each other's over time. Whereas H6 examines one facet of compli-
ance, another dimension of compliance is whether employees use IT because their
coworkers perceive it as useful (regardless of their own beliefs). To assess this facet of
compliance, we posit that:
H7: The level of an employee's IT usage will be related to his coworkers' per-
ceived usefulness of IT.
Finally, we examine the internalization process identified in SIP research [19, 20].
When an individual internalizes the beliefs of other referent individuals, he not only
changes his public behavior, but also his private beliefs. This occurs through the con-
vergence of beliefs through shared interpretations and meanings that are attributed to
situations. Thus, we posit that
Research Methods
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 165
Amount of Coworkers1
User Training Perceived
[Hl] ' / Training
~T : I ' Amount of / rz :
Perceived TTTT Coworkers'
Quality of ^*' TTTT _ UsagC |^^ Computer
User Training / ? _ "C ' Self-Effica
[H2] I / ' ' I [HS]
Computer / ' ' Coworkers' IT
Self-Efficacy / ' ' Usage [H6]
[H3] ' I
.
Individuals' IT
Perceived
Usefulness
[H8]
eastern United States. ServiceCorps offers educational programs, child and adult rec-
reational activities, medical services, and meals to recent immigrants and to other
inner city residents. ServiceCorps employees in all eight locations are engaged in a
range of administrative, professional, and direct service jobs.
ServiceCorps was awarded National Science Foundation (NSF) funding during the
mid-1990s to upgrade its IT infrastructure, allowing them to purchase hundreds of
new workstations, a local area network for each office, a wide area network, and a
variety of application software. In 1996, implementation of the new technology infra-
structure began in all eight locations, and employees were trained to use computers in
traditional, small group training classes. The same independent training contractor
conducted user training for ServiceCorps employees in all eight locations. As one
aspect of a broader study to evaluate the success of the IT initiative, we developed a
written survey to measure various aspects of employees' jobs, their quality of work
life, as well as issues related to the implementation process, user training, technical
support, and their current patterns of IT usage. Five of the eight locations agreed to
participate in our survey. Approximately 8-12 months after implementation of the
new IT infrastructure and applications, we distributed our survey to all ServiceCorps
employees in the five regional locations. Consistent with prior studies of IT usage
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
166 GALLIVAN, SPITLER, AND KOUFARIS
[19, 46, 63, 89], our sample included respondents from multiple job categories, in-
cluding professionals (e.g., nurses, teachers, social workers), administrators, and cleri-
cal employees. Of the 195 surveys we distributed, 96 completed surveys were returned,
yielding a response rate of 49 percent. We eliminated two respondents who indicated
their job role was "technology manager," since our focus was on end users rather than
IT specialists. Table 1 identifies the source for each construct and the Appendix shows
the actual survey items. We used existing, statistically validated instruments to mea-
sure all constructs, including short versions of some scales.8 Most constructs were
measured with multiple-item scales, although, consistent with prior research, we used
single items to measure perceived training quality [55, 79] and prior IT experience
[13, 19, 76, 82, 83]. We used dummy variables to control for respondents' job roles,
consistent with prior research [46], and for the specific office location where they
worked. These dummy variables were included to control for any potential contex-
tual differences among employees.
Scale Validation
Table 1 lists the constructs, their sources, and shows internal reliability re-
sults for all multi-item scales. A Cronbach's alpha of 0.70 or higher was considered
a sign of high internal reliability, consistent with standard practice [58]. We deleted
one item from our computer self-efficacy scale [11, 12], because it loaded poorly
with other items. After deleting this item, all items exhibited acceptable internal reli-
ability. To ensure that each scale was unidimensional and exhibited discriminant
validity, we also conducted a principal components analysis with all items, using
oblique rotation. We evaluated discriminant validity by ensuring that each item loaded
on the appropriate factor (using a threshold of 0.40), and that no items loaded on
other factors. Table 2 shows that each scale was unidimensional. The items corre-
sponding to our dependent variable, level of system usage, yielded a single factor, as
did the items corresponding to amount of IT training. For these constructs, we used a
composite factor score (generated by the principal components analysis) in our sub-
sequent analyses.9
In aggregating individual data to the group level, we defined a work group as those
employees who work in the same office and in the same program. For example, we
considered all employees who worked in the senior citizen center (a specific pro-
gram) of the "downtown" location (a specific office) to be members of a work group.
Our rationale for defining a work group in this manner is consistent with prior studies
by Fulk [19] and Rice and colleagues [64, 66], as well as a recent study of video-
conferencing adoption, where Kraut and his colleagues [34] defined the relevant "ref-
erence group" as individuals in the work group whose influence affects employees'
technology learning and usage.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
167
cu cu cu cu cu
r t r r r S S
II I I | 2 2
li 1j 1j j Li aj 5
I . .E . .e .e Li 5
Q Q. Q. Q. Q. Q.^^
^ C C C C " "
g go 0 cu 9-9-
u cucu cu cu cu - -
C0C7) CO CO COCOCO
o
-I C
<D t
X)g i- t- C3 00 t-^-lO
^ ^
S I W ^Ei
C W UT?-- fl
CC g COC-ftoQO
I li Uli
o coco 3 (D i: o .E
CO o X d 3 ZZhCO i:
C/3
t
<D
5-1
1/3
So g i-
t
co
co ^.E.E
g i=
o >, o
M
o
t
> CU d) (o m. COCO
SS -t-DuEg-Efe o
I g UJCLg-<-g<L CL
U O OS
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
168
. 1 S
s
s
4 !
S & <o
v> : =3 s
^t
I&
E
o
CX)
o
00
g
00
a) odd
3< C
P ( 00 C ^ T- O
X C Tf Tt CO CM O)
P C O O O O O
e co co T- evi O) co o T-
S3 t- O *- CD ifl O ^ 00
(N S O>O>CO00COO>^LO
*g dddddddd
^ CM S CM CO O CM r- r^CJJCM
CO O CM O O ^ O CM If)
OJOJCOI^CDCDinifinLO
S oo
co
'c/5
>>
< s I
C/5
e
^^ O) c" CD ^
70 y ^ >2 d t (D s o> o
I
1
I , ! i i. I HJffl
1
filial-: i if ^|iiii|l?i|t
's
C/5 itlllfib i^SSl H3;JihM!
C/5
CS
u i EEEEEEEEt ?g)g>g)?i)g)?S.|s|5^558.|s
OCCOCUOCDCD^ - ===. C F" ===.
:=.> g g = :=.> g = Cg-D
e2 u> <n <n U) vi co <n o> a. <t P p (= p p -z t- - Cujo
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 169
Thus, if there were four members of a given work group (employees A-D), w
calculated the mean scores for employees B, C, and D on each variable and appen
this result to our data to represent the work group values for employee A. We repea
this process iteratively for all employees (using Excel), and for all group-level c
structs corresponding to H4-H8. We were unable to compute coworker scores for
work group where only one respondent completed the survey (or where missing
occurred for other members). We retained the data from any small work groups
order to analyze individual-level data for H1-H3); however, we ignored any wo
groups with less than three respondents when analyzing H4-H8.
Descriptive Data
Table 3, Panel A, provides descriptive data showing that respondents were predom
nantly female (81 percent), perhaps not surprising, given that our research site was
social service agency where the primary job categories included social workers, teach
ers, educational administrators, nurses, and clerical staff - positions traditionally h
by women. The average educational level was very high, with two-thirds of resp
dents having completed a bachelor's degree. Table 3, Panel A, shows a broad distri
tion of ages, years of work experience, and prior IT experience. Panels B and C
Table 3 provide additional descriptive statistics. We also examined descriptive stat
tics (not shown) for IT usage patterns, based on users' self-reports, finding differ
usage patterns related to specific job roles. For example, individuals occupying t
roles of "house manager" (the administrators responsible for managing each lo
office) and "financial manager" were the heaviest IT users. Employees in anoth
role (teachers) reported much lower use of IT on average, compared to other resp
dents, whereas nurses and social workers reported moderate levels of IT usage.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 70 GALLIVAN, SPITLER, AND KOUFARIS
Panel A
Measurement Mean
Construct
Panel B
Per
Panel C
Per
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
171
1^1 L
a CO
.2 's i O
5
o co g o o
.5 g co <n o
'rt 3
, B* CO CM CM I
13 S 9 9 9 9
$ ig o o o o
^^^.S
.s5
N W )
^ oo t o
ifl W
O) m
SRC3-3 P9CV1T-CVI
s ^ C009999
Ce
L jog Q
"3
H g ood
cr
.2 1 8 i; 5
o3 o dodd
fe coco oor^oOco
g CN9 T-T-pq-r-co
<L>
* *
^ d od
00 t-^o T-^dod-^T^
i
G
>
8. S I a 8s
? ^ i
X O" l CO CD OH
"co
Ufi! l le
I
h- -S S c t o 25 3 1^ ^
s s 2 i &S|1 ob J 1
Tf
|8 8?S
I 8 11 .| ?11
o 08 |^ oo.|ob o$o oo
^ g g o
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 72 GALLIVAN, SPITLER, AND KOUFARIS
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
173
g *
^Sb^H * + * h
p-t^dj O W N O O (O * CM * O
J
T3p-t^dj
g o r ^ T3
q ^(OQUN
q oo scoWOOCOOO... VI
(o o) T- o VI
*2>g o d d d d d n d o> ^
2 n T :
d
VI
o
* 2
^ cg _ s 5
13 g o qpq 5 (p in ifl q q
Sog doo dd^ocvi^
1
I * -S
^ ^ p o ^ ( (D N o co co * w * ^
j) y coco (D w co r- Tti^T-wcvjv,^
Sl o ddod$E^
I Cu .S
1
a
.a
- -a . . . .
^aj'oOO'^tCOr^CJ COCM* ^
8 g> I 55SSS2 J !? 8 S5 | I >
|8?dd<? dci "i
Q a
'S
3 t 1
C/3
I ! fi 1 j
i ! i 1
C/3
C/3
I illll^llllilllll lilS*
2
in
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
174 GALLIVAN, SPITLER, AND KOUFARIS
to the level of an employee's IT usage, but educational level was unrelated - consistent
with prior studies [13, 26]. We also attempted to control for office location - allowing
for the possibility that IT use might vary across office locations (possibly due to the
influence of a strong champion in some locations), but we found no such effect. In
examining the demographic control variables, our findings show that employees who
are younger, male, and occupy specific job roles of "house manager" and "financial
manager" reported higher levels of IT usage. One job type was associated with signifi-
cantly lower levels of IT usage, relative to other jobs: kindergarten and elementary
school teachers (p < 0.05), consistent with our descriptive data above. Taken together,
these demographic control variables explained nearly 40 percent of the variance in
respondents' levels of IT usage (/?2adj = 39.2 percent; p < 0.001). We retained the sig-
nificant control variables in our subsequent analyses, and omitted the other control
variables (educational level and office location).
Next, we included employees' prior IT experience as a control variable and, not
surprisingly, it was a very strong predictor of employees' IT usage. (This was to be
expected, given the high correlation between employees' prior IT experience and
their level of IT use shown in Table 4.) Prior experience contributed an additional
12.0 percent of explained variance to IT usage (ft2adj = 51.3 percent; AR2 = 12.0 per-
cent; p < 0.001), although adding this variable altered the level of statistical signifi-
cance of age and two of the job type dummy variables. These results appear as Model
2 in Table 5.
Since each hypothesis was directional (with all hypotheses predicting a positive rela-
tionship with IT usage), we employed one-tailed tests of significance in interpreting
the regression results. We first added the individual-level variables corresponding to
H1-H3 simultaneously to the regression model and examined the change in propor-
tion of variance explained (AR2) as well as the significance level and the direction of
the beta coefficients. When we entered these three variables as a block, the amount of
variance explained increased slightly (AR2 = 2.8 percent, p < 0.10). These results
appear as Model 3 in Table 5. We review the results of each hypothesis below.
HI was not supported. The amount of user training that employees received was
unrelated to their level of IT usage (b = 0. 139; = 0.091 ; p = 0. 14), although there
was a weak trend in the expected direction. H2 was also not supported, although the
effect was in the predicted direction (b = -0.561; = -0.062; p = 0.24). n Likewise,
H3 was not supported. Employees' computer self-efficacy was not related to their
level of IT usage. This was surprising, given the cumulative body of evidence show-
ing that computer self-efficacy is related to users' IT skills and actual IT use [1 1, 47,
81]. Although disconfirming our hypothesis, this result is consistent with the correla-
tion matrix (Table 4), which also shows a near-zero correlation between individuals'
computer self-efficacy and their level of IT usage (r = -0.075).
None of these three hypotheses corresponding to conventional views of IT training
usage was supported, after controlling for age, gender, job type, and prior computer
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 175
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 76 GALLIVAN, SPITLER, AND KOUFARIS
usefulness of IT. A significant result here would provide support for the internaliza-
tion effect, since this hypothesis considers whether an employee's beliefs converge
with those of his coworkers. In testing H8, we included the same control variables as
above (e.g., age, gender, educational level, prior experience, and job type). This hy-
pothesis was not supported: coworkers' perceived usefulness of IT was unrelated to
the individual employee's perceived usefulness of IT (b = 0. 105; = 0.070; p = 0.50).
While this result discontinus the proposed internalization effect, it is consistent with
our analysis of eta-squared that showed a lack of within-group homogeneity.
In summarizing the group-level hypotheses, two constructs were significant ante-
cedents of individual IT usage: coworkers' perceived training quality (H4), and co-
workers' IT usage (H6). Contrary to our predictions, neither H7 nor H8 was supported:
coworkers' perceived usefulness of IT was unrelated to an individual's level of IT
usage (H7), and was also unrelated to an individual's perceived usefulness of IT (H8).
Discussion
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 177
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
178 GALLIVAN, SPITLER, AND KOUFARIS
influence the individual's IT usage is unclear, since coworkers' beliefs regarding training
quality were not directly correlated with the individual's own beliefs about training
quality. (This correlation was near zero, as shown in Table 4.) This suggests that em-
ployees do not necessarily internalize [19] their coworkers' beliefs regarding training
quality. Similarly, the lack of support for H8 (which examined coworkers' perceived
usefulness of IT and individual's perceived usefulness of IT) also suggests that em-
ployees do not internalize their coworkers' beliefs. Of the two pathways of SIP dis-
cussed by Fulk and her colleagues [17] - internalization and compliance [19] - the
evidence supports the compliance effect (H6), and does not support the internalization
effect (H8). Below, we present the evidence for the compliance effect of SIP.
H5, regarding coworkers' average computer self-efficacy, was not supported (al-
though there was a trend in the expected direction, p < 0.10). Additional analyses
revealed that peers' computer self-efficacy was a statistically significant predictor of
individual IT usage (p < 0.05) when peers' perceived quality of training was omitted
as a simultaneous predictor. Thus, we found some evidence supporting H5, but only
when the peers' perceived training quality (H4) was not concurrently included as a
predictor.13 Figure 2 summarizes the paths that were statistically significant in the full
model (corresponding to the last two columns of Table 5).
We found very strong support for H6: coworkers' average level of IT use was a
strong predictor of the individual's IT usage, even after controlling for employees'
job type (which indirectly controls for employees' task-related requirements to use
IT). This means that knowing whether an individual's coworkers use IT in their jobs
helps to predict the individual's level of use, without regard for the particular job
roles performed by these employees. This is a fascinating result in its own right,
although it is important to also consider the underlying mechanism responsible for it.
The fact that H8 was not supported indicates that individuals do not necessarily inter-
nalize their coworkers' beliefs regarding perceived usefulness of IT The lack of sup-
port for H8 is consistent with Lewis et al.'s [43] recent study, showing that employees
fail to internalize their coworkers' beliefs about perceived usefulness or perceived
ease of use of IT. This means that individual employees are more likely to use IT in
their work if coworkers use it more, but not because coworkers converge, over time,
in terms of their beliefs about the perceived usefulness of IT or other beliefs (such as
ease of use). In the absence of any evidence for such an internalization effect [19],
individuals are simply complying with their coworkers' social influence to use IT on
the job. Such a result may also reflect the well-known critical mass effect [48, 64],
whereby it simply becomes easier and more valuable to use IT (or a specific software
application), as more coworkers or peers begin to use it.
One practical implication of our findings for managers is that traditional training
may be neither a necessary, nor a sufficient, condition for successful IT usage. Recent
training research acknowledges the fact that, for most current software applications
employing a graphical user interface (GUI), cues (icons) are visible to potential users
on the screen for how to use it [62]. As a result, traditional training that instructs
learners in specific sequences of instructions no longer carries the same importance
as for text-based or command-line user interfaces. Instead, learners may be able to
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 179
Coworkers1
Training
Quality [H4]
rerceivea _ TrrTT i
Quality o
User Training / ' Computer
TH21 / ' Self-Efficacy
/ ' Coworkers1 IT
/ N Usage [H6]
i
! - ! | Job ! i Prior ;
L ?l - Type I j Computer j
|
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 80 GALLIVAN, SPITLER, AND KOUFARIS
by-product of the fact that gender was correlated with perceived training quality (with
women reporting lower training quality), and thus, including gender as a control sup-
presses the implicit relationship between individual's perceived training quality and
IT usage (corresponding to H2).
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 1 8 1
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 82 GALLIVAN, SPITLER, AND KOUFARIS
Conclusion
This paper has developed and tested a model of the influence of employees'
coworkers on their IT usage, based on concepts from SIP theory [19, 20, 66], and
grounded in prior qualitative field studies of IT use among clerical employees [86,
87] and knowledge workers [23, 73]. Our results provide support for what we label
the compliance effect, but not the internalization effect of SIP, since our findings
confirmed a relationship between coworkers' level of IT use and their beliefs about
training quality (H6 and H4, respectively), and the indirect effect of coworkers' level
of computer self-efficacy (H5). Taken as a whole, we believe that these findings pro-
vide a conceptually powerful explanation that may explain similarities across work
groups (or other types of reference groups, such as communities of practice [3, 74])
for how employees use IT in their jobs. The research models presented in this paper
may serve as a platform for researchers and practitioners interested in training, learn-
ing, and IT usage. In particular, researchers and practitioners may begin to question
long-held assumptions regarding individual IT adoption and learning behavior within
organizational settings. We expect future research to offer insights into the processes
that shape how technology learning, adoption, and usage occur through reference
groups, such as coworkers. We advocate ongoing longitudinal and ethnographic stud-
ies (e.g., [23, 34, 73]) to provide a more detailed understanding of these processes.
Acknowledgments: The authors thank the managers and employees at ServiceCorps for partici-
pating in this study. Thanks are due also to Professor Jon Turner of New York University Stern
School of Business for initiating this study and for securing funding from the National Institute
for Occupational Safety and Health, a division of the NSF.
Notes
1 . Early studies of IT adoption and usage among nontechnical professionals labeled the
phenomenon as end-user computing. With the widespread dissemination of IT among most
types of workers today, this phrase has fallen into disuse, to be replaced by newer terms such as
desktop computing [41] or simply technology use.
2. Nelson and Cheney [55] observed no relationship between amount of training and IT
usage (r = 0.02), or between perceived quality of user training and amount of IT usage (r -
0.07). They did find that both the amount and the perceived quality of user training were
related to the level of users' computer skills/abilities (r = 0.53 and r = 0.22, respectively), and
IT skills were, in turn, related to their IT use. Thus, it is reasonable to conclude that training has
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 183
value to users, but it does not directly influence IT use, but only as mediated through us
skills/abilities.
3. In Lee et al.'s [37] study, only five of the authors' original ten propositions were su
ported. Their study did not present or analyze any data about IT training, despite the auth
description of their framework as "a causal model of end-user training," and notwithstand
the paper's title, "An Empirical Study of the Relationships Among End-User IS Acceptanc
Training, and Effectiveness" [37].
4. We thank our anonymous Associate Editor for offering this insight.
5. Research by Lim et al. [44] found that when novice computer users were provided t
opportunity to interact with a peer while engaging in exploratory learning (a process th
called codiscovery learning), subjects developed a more sophisticated understanding of ho
the system worked, as demonstrated by their increased ability to generalize and predict syste
behavior on far-transfer tasks [30]. Learning and exploration within such a social cont
(codiscovery learning) appears to prompt learners to develop better mental models that a
their understanding of how technology works [90].
6. Lave and Wenger s [35] framework is called the theory of legitimate peripheral parti
pation. A brief definition of this title is not possible and, unfortunately, a clear definition wo
be lengthy and beyond the scope of this paper. We note that the framework derives from ethn
graphic studies of apprenticeships, and refer interested readers to studies by Lave and Wen
[35], as well as studies by George et al. [23] and Spitler [73].
7. For example, Harrison and Rainer [26] examined IT usage among nearly 800 knowled
workers in a university setting. They found that IT skill levels were positively correlated wit
gender and prior computer experience, but inversely related to age. They also tested for,
found no relationship between educational level and IT skills.
8. Since the overall survey was quite lengthy (over 190 items), we employed shorter v
sions of several common scales. For example, to measure self-efficacy, we used only the f
highest-loading items from Compeau and Higgins' [12] self-efficacy scale, originally c
prised of 10 items. Such reduced scales were necessary for our survey, given the many differ
constructs we captured - some of which are reported elsewhere [70].
9. Our results were robust to the choice of using factor scores to represent "individual
usage" and the individual's "amount of training," or using an alternate method of just aver
ing the existing items.
10. The total size of our data set was 96; however, after eliminating two respondents wh
job roles corresponded to "technical manager," and respondents that had no other work gr
members responding to the survey, the sample size was slightly lower (n = 83), because 1
respondents had no work group peers responding to the survey. Any construct that inclu
data for a respondent's coworkers could only be included if one or more coworkers also
sponded to the survey. There were a total of 25 work groups represented in our data set. Due
nonresponse by some employees, the groups represented in our data ranged from one to
members. In testing H4-H8, we ignored all data for groups smaller than three responden
leaving a total of 16 groups. We repeated the analyses for H4-H8 using two different minimu
thresholds of at least two members per group (20 groups; total n = 83), and with a strict
criterion of at least three members per group (16 groups; total n = 77). The results of
analysis were robust to these different threshold values for group size. The results reported
Tables 4 and 5 are for groups consisting of three or more respondents.
1 1 . The negative sign on the regression coefficient is consistent with our prediction. Since
high score (6) on the perceived training quality scale denotes poor quality, whereas a low sc
(1) represents "outstanding" quality, then the negative coefficient reflects higher-quality bein
associated with greater IT usage. We excluded respondents who reported that they had n
attended user training.
12. We found that perceived training quality was statistically significant in predicting
usage when we omitted gender as a control variable (b = -1.32; = -0.146; p < 0.05). T
means that training quality is related to an individual's IT usage (after controlling for age,
type, and prior experience), but the effect of training quality is suppressed when gende
simultaneously included as a control. Perhaps this is because gender is slightly correlated w
perceived training quality (Table 4 shows Pearson's correlation coefficient of r = 0.098), w
men reporting higher perceived training quality. Gender acts as a suppressor variable wh
simultaneously included with perceived training quality as a predictor of IT usage.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 84 GALLIVAN, SPITLER, AND KOUFARIS
13. Further analysis of this relationship revealed that perceived training quality (H4) serves
as a mediating variable between coworkers' computer self-efficacy (H5) and an individual's IT
usage. The relationship between these variables met the four criteria identified by Baron and
Kenny [2] for a full-mediator relationship. Coworkers' computer self-efficacy (H5) was related
to an individual's IT usage, and it was also related to the mediating variable, coworkers' per-
ceived IT training quality (H4); however, when the mediating variable (coworkers' perceived
training quality) was included as a covariate along with coworkers' computer self-efficacy,
then coworkers' self-efficacy (H5) was no longer a statistically significant antecedent to indi-
viduals' IT usage. These results met all four criteria specified by Baron and Kenny [2] as
necessary to demonstrate a full-mediation effect. We interpret this mediation effect to signify
that coworkers' computer self-efficacy is related to their own perceived training quality, and
that the latter construct, in turn, influences individuals' IT usage.
References
1. Alavi, M.; Marakas, G.M.; andYoo, Y. A comparative study of distributed learning envi-
ronments on learning outcomes. Information Systems Research, 13, 4 (2002), 404-417.
2. Baron, R.M., and Kenny, D.A. The moderator-mediator variable distinction in social
psychological research: Conceptual, strategic, and statistical considerations. Journal of Per-
sonality and Social Psychology, 51, 6 (1986), 1 173-1 182.
3. Brown, J.S., and Duguid, P. Organizational learning and communities of practice: To-
ward a unified view of working, learning, and innovation. Organization Science, 2, 1 (1991),
40-57.
4. Brown, J.S., and Duguid, P. Organizing knowledge. California Management Review, 40,
3 (1998), 90-1 11.
5. Carroll, J.M., and Mack, R.L. Learning to use a word processor: By doing, by thinking
and by knowing. In J. Thomas and M. Schneider (eds.), Human Factors in Computing Systems.
Norwood, NJ: Ablex, 1984, pp. 13-51.
6. Carroll, J.M., and Mack, R.L. Metaphor computing systems, and active learning. Inter-
national Journal of Man-Machine Studies, 22, 1 (1985), 39-57.
7. Castro, S.L. Data analytic methods for the analysis of multilevel questions. Leadership
Quarterly, 13, 1 (2002), 69-93.
8. Chabrow, E.R. The training crisis: Companies are spending millions to retrain tech workers.
InformationWeek (July 10, 1995), 36^6.
9. Cheney, PH.; Mann, R.L; and Amoroso, D.L. Organizational factors affecting the suc-
cess of end user computing. Journal of Management Information Systems, 3, 1 (Summer 1986),
65-80.
10. Cole, R.E. Introduction to special issue on knowledge and the firm. California Manage-
ment Review, 40, 3 (1998), 15-21.
1 1 . Compeau, D.R., and Higgins, C. A. Application of social cognitive theory to training for
computer skills. Information Systems Research, 6, 2 (1995), 118-140.
12. Compeau, D.R., and Higgins, C.A. Computer self-efficacy: Development of a measure
and initial test. MIS Quarterly, 19, 2 (1995), 189-21 1.
13. Davis, D.L., and Davis, D.F. The effect of training techniques and personal characteris-
tics on training end users of information systems. Journal of Management Information Sys-
tems, 7, 2 (Fall 1990), 93-1 10.
14. Davis, F.D.; Bagozzi, R.P.; and Warshaw, PR. User acceptance of computer technology:
A comparison of two theoretical models. Management Science, 35, 8 (1989), 982-1003.
15. Davis, S.A., and Bostrom, R.P. Training end users: An experimental investigation of the
roles of the computer interface and training methods. MIS Quarterly, 17, 1 (1983), 61-85.
16. DeLone, W.H., and McLean, E.R. Information systems success: The quest for the depen-
dent variable. Information Systems Research, 3, 1 (1992), 60-95.
17. Easley, R.F.; Devaraj, S.; and Crant, J.M. Relating collaborative technology use to team-
work quality and performance: An empirical analysis. Journal of Management Information
Systems, 19, 4 (Spring 2003), 249-270.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 1 85
18. Faraj, S., and Sproull, L. Coordinating expertise in software development teams. Man
agement Science, 46, 12 (2000), 1554-1568.
19. Fulk, J. Social construction of communication technology. Academy of Manageme
Journal, 36, 5 (1993), 921-950.
20. Fulk, J.; Schmitz, J.; and Steinfield, C. A social influence model of technology use. In
Fulk and C. Steinfield (eds.), Organizations and Communication Technology. Newbury Park
CA: Sage, 1990, pp. 117-142.
21 . Galletta, D.F.; Ahuja, M.; Hartman, A.; Teo, T.; and Peace, A.G. Social influence and e
user training. Communications of the ACM, 38, 1 (1995), pp. 70-79.
22. Gash, D.C., and Kossek, .E. Understanding end-user training as a lever in organiz
tional strategy and change. In U.E. Gattiker and L. Larwood (eds.), End User Training: Tech
nological Innovation. New York: Walter de Gruvter. 1990. dd. 229-254.
23. George, J.F.; Iacono, S.; and Kling, R. Learning in context: Extensively computerized
work groups as communities of practice. Accounting, Management and IT, 5, 3-4 (1995),
185-202.
24. Gist, M.E.; Schwoerer, C; and Rosen, B. Effects of alternative training methods of self-
efficacy and performance in computer software training. Journal of Applied Psychology, 72, 2
(1987), 307-313.
25. Griffith, T.L., and Northcraft, G.B. Cognitive elements in the implementation of new
technology: Can less information provide more benefits? MIS Quarterly, 20, 1 (1996), 99-1 10.
26. Harrison, A.W., and Rainer, R.K. The influence of individual differences on skill in end-
user computing. Journal of Management Information Systems, 9, 1 (Summer 1992), 93-1 11.
27. James, L.R. Aggregation bias in estimates of perceptual agreement. Journal of Applied
Psychology, 67, 2 (1982), 219-229.
28. Janz, B.D.; Wetherbe, J.C.; Davis, G.D.; and Noe, R.A. Reengineering the system devel-
opment process: The link between autonomous teams and business process outcomes. Journal
of Management Information Systems, 14, 1 (Summer 1998), 41-68.
29. Jasperson, J.; Sambamurthy, V.; and Zmud, R.W. Social influence and individual IT use:
Unraveling the pathways of appropriation moves. In P. De and J.I. DeGross (eds.), Proceed-
ings of the Twentieth International Conference on Information Systems. Atlanta: Association
for Information Systems, 1999, pp. 113-1 18.
30. Johnson, B., and Rice, R. Managing Organizational Innovation. New York: Columbia
University Press, 1987.
3 1 . Karahanna, E.; Strub, D.W.; and Chervany, N.L. Information technology adoption across
time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly,
23,2(1999), 183-213.
32. Keil, M.; Cule, P.E.; Lyytinen, K.; and Schmidt, R.C. A framework for identifying soft-
ware project risks. Communications of the ACM, 41, 1 1 (1998), 76-83.
33. Klein, K.J.; Dansereau, E; and Hall, R.J. Levels issues in theory development, data
collection, and analysis. Academy of Management Review, 19, 2 (1994), 195-229.
34. Kraut, R.; Rice, R.E.; Cool, C; and Fish, R. Varieties of social influence: The role of
utility and norms in the success of a new communication medium. Organization Science, 9, 4
(1998), 437-453.
35. Lave, J., and Wenger, E. Situated Learning: Legitimate Peripheral Participation. Cam-
bridge: Cambridge University Press, 1991.
36. Lee, D.M. Usage pattern and sources of assistance for personal computer users. M/S
Quarterly, 10, 4 (1986), 313-325.
37. Lee, S.M.; Kim, Y.R.; and Lee, J. An empirical study of the relationships among end user
information systems acceptance, training, and effectiveness. Journal of Management Informa-
tion Systems, 12, 2 (Fall 1995), 189-202.
38. Leitheiser, R.L., and Wetherbe, J.C. Service support levels: An organized approach to
end user computing, MIS Quarterly, 10, 2 (1986), 337-349.
39. Leonard Barton, D.A. Experts as negative opinion leaders in the diffusion of a technical
innovation. Journal of Consumer Research, 11, 4 (1985), 914-926.
40. Leonard Barton, D.A., and Deschamps, I. Managerial influence in the implementation of
new technology. Management Science, 34, 10 (1988), 1252-1265.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 86 GALLIVAN, SPITLER, AND KOUFARIS
41. LePore, S.J.; Kling, R.; Iacono, S.; and George, J.F. Desktop computerization and qual-
ity of work life: The role of implementation process and infrastructure. In J.I. DeGross, J.C.
Henderson, and B.R. Konsynski (eds.), Proceedings of the Tenth International Conference on
Information Systems. Atlanta: Association for Information Systems, 1989, pp. 223-235.
42. Levitt, B., and March, J.G. Organizational learning. In W.R. Scott and J. Blake (eds.),
Annual Review of Sociology, 14 (1988), 319-340.
43. Lewis, W.; Agarwal, R.; and Sambamurthy, V. Sources of influence on beliefs about IT
use: An empirical study of knowledge workers. MIS Quarterly, 27, 4 (2003), 657-678.
44. Lim, K.H.; Ward, L.M.; and Benbasat, I. An empirical study of computer system learn-
ing: Comparison of co-discovery and self-discovery methods. Information Systems Research,
8, 3 (1997), 245-272.
45. Lucas, H.C., Jr. Performance and the use of an information system. Management Sci-
ence, 21, 8 (1975), 908-919.
46. Lucas, H.C., Jr., and Spitler, V.K. Technology use and performance: A field study of
broker workstations. Decision Sciences, 30, 2 (1999), 291-31 1.
47. Marakas, G.M.; Yi, M.Y.; and Johnson, R. The multilevel and multifaceted construct of
computer self-efficacy: Toward clarification of the construct and an integrative framework for
research. Information Systems Research, 9, 2 (1998), 126-163.
48. Markus, M.L. Electronic mail as the medium of managerial choice. Organization Sci-
ence, 5, 4 (1994), 502-527.
49. Martocchio, J.J. Effects of conceptions of ability on anxiety, self-efficacy, and learning
in training. Journal of Applied Psychology, 79, 6 (1994), 819-825.
50. Martocchio, J.J., and Judge, T.A. Relationship between conscientiousness and learning
in employee training: Mediating influences of self-deception and self-efficacy. Journal of Ap-
plied Psychology 82, 5 (1997), 764-773.
5 1 . McDermott, R. Why information technology inspired but cannot deliver knowledge man-
agement. California Management Review, 41, 4 (1999), 103-117.
52. McLean, E.R.; Kappelman, L.; and Thompson, J. Converging end-user and corporate
computing. Communications of the ACM, 36, 12 (1993), 79-92.
53. Morgeson, F.P., and Hofmann, D. A. The structure and function of collective constructs:
Implications for multilevel research and theory development. Academy of Management Re-
view, 24, 2 (1999), 249-265.
54. National Research Council. Being Fluent with Information Technology. Committee on
Information Technology Literacy. Washington, DC: National Academy Press, 1999.
55. Nelson, R.R., and Cheney, P.H. Training end users: An exploratory study. MIS Quarterly,
77, 4(1987), 547-559.
56. Nelson, R.R.; Kattan, M.W.; and Cheney, P.H. An empirical re-examination of the rela-
tionship among training, ability and the acceptance of information technology. In T. W. Ferra
(ed.), Proceedings of the ACM Special Interest Group on Computer Personnel Research. New
York: ACM Press, 1991, pp. 177-186.
57. Nelson, R.R.; Whitener, E.M.; and Philcox, H.H. The assessment of end-user training
needs. Communications of the ACM, 38, 1 (1995), 727-738.
58. Nunnally, J.A. Psychometric Theory. New York: Academic Press, 1969.
59. Olfman, L., and Bostrom, R.P. End user software training: An experimental comparison
of methods to enhance motivation. Journal of Information Systems, 7, 3 (1991), 249-266.
60. Olfman, L., and Mandviwalla, M. Conceptual versus procedural software training for
graphical user interfaces: A longitudinal field experiment. MIS Quarterly, 18, 1 (1994), 405-426.
61. Orlikowski, W.J., and Robey, D. Information technology and the structuring of organiza-
tions. Information Systems Research, 2, 2 (1991), 143-169.
62. Orr, J. Talking About Machines: An Ethnography of a Modern Job. Ithaca: Cornell Uni-
versity Press, 1996.
63. Rice, R.E., and Aydin, C. Attitudes toward new organizational technology: Network
proximity as a mechanism for social information processing. Administrative Science Quar-
terly, 36, 2 (1991), 219-244.
64. Rice, R.E., and Shook, D. Voice messaging, coordination and communication. In J.
Galegher, R. Kraut, and C. Egido (eds.), Intellectual Teamwork: Social and Technological
Foundations of Cooperative Work. Hillsdale, NJ: Lawrence Erlbaum, pp. 327-350.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 1 87
65. Rice, R.E.; Collins-Jarvis, L.; and Zydney-Walker, S. Individual and structural influ
ences on information technology helping relationships. Journal of Applied Communication
Research, 27, 4 (1999), 285-309.
66. Rice, R.E.; Grant, A.; Schmitz, J.; and Torobin, J. Individual and network influences o
the adoption and perceived outcomes of electronic messaging. Social Networks, 12, 1 (1990)
27-55.
67. Robey, D., and Zmud, R.W. Research on the organization of end-user computing: Theo-
retical perspectives from organization science. Information Technology & People, 6, 1 (1992),
11-27.
68. Salancik, G.R., and Pfeffer, J. A social information processing approach to job attitudes
and task design. Administrative Science Quarterly, 23, 2 (1978), 224-252.
69. Sein, M.K.; Bostrom, R.P.; and Olfman, L. Training end users to compute: Cognitive,
motivation and social issues. INFOR, 25, 3 (1987), 236-255.
70. Shen, Y., and Gallivan, MJ. An empirical test of the job demand/control model among IT
users. In Proceedings of the 2004 ACM SIG MIS Conference on Computer Personnel Re-
search. New York: ACM Press, 2004, pp. 39-47.
71. Simon, S.J.; Grover, V.; Teng, J.; and Whitcomb, K. The relationship of information
system training methods and cognitive ability to end user satisfaction, comprehension and skill
transfer, a longitudinal field study. Information Systems Research, 7, 4 (1996), 466-490.
72. Simonson, M.; Maurer, M.; Montag-Torardi, M.; and Whitaker, M. Development of a
standardized test of computer literacy and a computer anxiety index. Journal of Educational
Computing Research, 3, 2 (1987), 231-247.
73. Spitler, V. Learning to use IT in the workplace: Mechanisms and masters. Journal of
Organizational and End User Computing, 17, 2 (2005), 1-25.
74. Stamps, D. Communities of practice: Learning is social. Training is irrelevant? Training,
34, 2(1997), 34-42.
75. Suchman, L. Plans and Situated Actions: The Problem of Human-Machine Interaction.
Cambridge: Cambridge University Press, 1987.
76. Taylor, S., and Todd, P.A. Assessing IT usage: The role of prior experience. MIS Quar-
terly, 19, 4 (1995), 561-570.
77. Taylor, S., and Todd, P.A. Understanding IT usage: A test of competing models. Informa-
tion Systems Research, 6, 2 (1995), 144-176.
78. Thompson, R.L.; Higgins, CA.; and Howell, J.M. Personal computing: Toward a con-
ceDtual model of utilization. MIS Ouarterly, 15, 1 (1991), 125-143.
79. Thong, J.Y.L.; Yap, C.-S.; and Raman, K.S. Engagement of external expertise in infor-
mation systems implementation. Journal of Management Information Systems, 11, 2 (Fall 1994),
209-231.
80. Trauth, E.M., and Cole, E. The organizational interface: A method for supporting end
users of packaged software. MIS Quarterly, 16, 1 (1992), 35-53.
81. Venkatesh, V., and Davis, F.D. A theoretical extension of the technology acceptance
model: Four longitudinal field studies. Management Science, 26, 2 (2000), 186-204.
82. Venkatesh, V., and Morris, M.G. Why don't men ever stop to ask for directions? Gender,
social influence, and their role in technology acceptance and usage behavior. MIS Quarterly,
24, 1 (2000), 115-139.
83. Webster, J. Desktop videoconferencing: Experiences of complete users, wary users, and
non-users. MIS Quarterly, 22, 3 (1998), 257-286.
84. Webster, J., and Martocchio, J.J. Turning work into play: Implications for microcom-
puter software training. Journal of Management, 19, 1 (1993), 127-146.
85. Webster, J., and Martocchio, J.J. The differential effects of software training previews on
training outcomes. Journal of Management, 21, 4 (1995), 757-787.
86. Wenger, E.C. Communities of Practice: Learning, Meaning and Identity. Cambridge:
Cambridge University Press, 1998.
87. Wenger, E.C, and Synder, W.M. Communities of practice: The organizational frontier.
Harvard Business Review, 78, 1 (January-February 2000), 139-145.
88. Wilson, A.L. The promise of situated cognition. New Directions for Adult and Continu-
ing Education, 57 (Spring 1993), 71-79.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 88 GALLIVAN, SPITLER, AND KOUFARIS
89. Winter, S.J.; Chudoba, K.M.; and Gutek, B.A. Misplaced resources? Factors associated
with computer literacy among end-users. Information & Management, 32, 1 (1997), 29-42.
90. Winter, S.J.; Chudoba, K.M.; and Gutek, B.A. Attitudes toward computers: When do
they predict computer use? Information & Management, 34, 5 (1998), 275-284.
91 . Yoo, Y., and Alavi, M. Media and group cohesion: Relative influences on social presence,
task participation, and group consensus. MIS Quarterly, 25, 3 (2001), 371-390.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 1 89
During the past week, how often did you make use of the following in your job?
(Circle one number per item.)
1 . A computer.
2. A printer.
3. Electronic mail (e-mail).
4. A text processor application program such as Word or WordPerfect.
5. A spreadsheet application program such as Excel.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
190 GALLIVAN, SPITLER, AND KOUFARIS
Before this year, how would you have rated your computer skills?
Over the past year, how much training have you had in the
subjects?
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
DOES INFORMATION TECHNOLOGY TRAINING REALLY MATTER? 191
Overall, how effective would you rate the training you received i
and applications here?
Often in our jobs we are told about software packages (such as a spreadshee
will make our work easier. Imagine that you were given a new software pack
some aspect of your work. It does not matter specifically what this package
only that it is intended to make your job easier and that you have never used it b
Assume that online help and manuals for it are available. Please indicate the ex
your agreement or disagreement with the following questions about whethe
could use this unfamiliar package under a variety of conditions. (Circle one n
per item.)
1 . I could complete the job using the software if there was no one around to tell
me what to do as I go along.
2. I could complete the job using the software if I had seen someone else using it
before trying it myself.
3. I could complete the job using the software if I could call someone for help if
I got stuck.
4. I could complete the job using the software if I had a lot of time to complete
the job for which it is used.
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms
1 92 GALLIVAN, SPITLER, AND KOUFARIS
Consider your feelings about computers and using them in your work. Please indicate
the extent to which you agree or disagree with these statements (Circle one number
per item.)
This content downloaded from 115.113.11.141 on Sun, 28 May 2017 15:44:53 UTC
All use subject to http://about.jstor.org/terms