Documente Academic
Documente Profesional
Documente Cultură
Author(s): Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis and Fred D. Davis
Reviewed work(s):
Source: MIS Quarterly, Vol. 27, No. 3 (Sep., 2003), pp. 425-478
Published by: Management Information Systems Research Center, University of Minnesota
Stable URL: http://www.jstor.org/stable/30036540 .
Accessed: 09/11/2012 04:51
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact support@jstor.org.
Management Information Systems Research Center, University of Minnesota is collaborating with JSTOR to
digitize, preserve and extend access to MIS Quarterly.
http://www.jstor.org
Venkateshet al./UserAcceptanceof IT
MIS
Quarterly
RESEARCH ARTICLE
assess the likelihoodof success for new techno- The currentworkhas the followingobjectives:
logy introductionsand helps them understandthe
driversof acceptance in orderto proactivelyde- (1) To review the extant user acceptance
sign interventions(includingtraining,marketing, models: The primarypurpose of this review
etc.) targetedat populationsof users thatmay be is to assess the currentstate of knowledge
less inclinedto adopt and use new systems. The with respect to understanding individual
paper also makes several recommendationsfor acceptance of new informationtechnologies.
future research including developing a deeper This reviewidentifieseight prominentmodels
understandingof the dynamicinfluences studied and discusses their similarities and dif-
here, refiningmeasurementof the core constructs ferences. Some authorshave previouslyob-
used in UTAUT,and understandingthe organiza- served some of the similarities across
tionaloutcomes associated withnew technology models.2 However,our review is the firstto
use. assess similaritiesand differences across all
eight models, a necessary first step toward
Keywords: Theory of planned behavior, inno- the ultimategoal of the paper: the develop-
vation characteristics, technology acceptance ment of a unifiedtheory of individualaccep-
model, social cognitive theory, unified model, tance of technology. The reviewis presented
integratedmodel in the followingsection.
-----
f--------'--------'---------------------
Individualreactions to Intentions to use Actual use of
using information information information
technology technology technology
Fiur 1. 0
s0Cncptndrly Sg UserAc cepta nceModel
the p. of
302). 1112).
a a itself,
activity activity
p.
p. 1989,
perform an achieving an process
(evaluative
not 1975, usingjob using only. promotions" 1992,
in activity the
(Davis or al.
her that
that the
or TAM2 perform pay, perform thanet
feelings Ajzen
should in to to
his effort" from
or and of
believes believes instrumental want other
(Davis
320). want
negative p. free be will se"
should Included will distinct
or enhance be to
he (Fishbeinperson
a
person
1989,
a areperformance,
1112).
per
users users
would would thatjobp.
think that reinforcement
that
positive
216). which(Davis
which activity
TRA/TPB. perceived
p. him question"to to is 1992,
the
to in system system from it al.
improved
1975, outcomeset apparent
degree degree perception as perception
individual's no
"an Ajzen important
Definitions particular
behavior"the performance"
particular
"the 320). Adapted The"because
such
valued performing
"for
(DavisThe
of
Norm Ease
Usefulness Norm
Toward Motivation Motivation
Constructs
BehaviorSubjective
Core Attitude Perceived
Perceived Use Subjective Extrinsic Intrinsic
pre-
onTAM in- of a for
most al. the to sup-
in
largely
et techno- of explain
by to
thebehavior.of has motiva-
'1*ividualf.Acceptane1~
behaviorswasTRA usage Vallerand adoption
of TAM (Venkatesh
better motivational
fundamental
information
1999).
of Davis and to predictor
applied
Ind111 onehuman designed explanation
thethe
f
is of an of applied
range was settings Speier
o[ acceptance
explained (TAM) order widely as
extended users. psychology contexts.
TRA review). employed in examinedWithin technology
(TRA) wide a and conceptualization
additional in
ls review(1992)and
theories had acceptance been
and
a for Model TAM2an have
theory specific al. new
hereE final as base.
variance
that
individual has
mandatory et
Action 1988 theconstructof
contexts, (MM)research for
to
predict the it excellent
psychology, IS normTAM of studies DavisVenkatesh
to al.
influential
behaviors. an
et TRA thatstudies to technology
TRA, case motivation understand
technologies
Model
S'[
oelsan and
social Acceptance attitude body to also
theoretical
Reasonedused with
other of
the2000). adapted
Several
1. found theparsimoniously.
Unlike in thisdomain,
(see
of from applied of tailored subjectiveset generalandpresents
been of theory
: Sheppard
and is information Davis use
job.
has significant
Tabe~1.TheoryDrawn It (see(1989)
fundamental logyconsistent
context
TAMdicttheexcludes
Technology intention
intention
cludinganddiverse A ported
behavior.
Motivational theory systems
tenets
(1997) and
tional
428
Venka
IS
theof constraints
149).
p.
context
external
theand
performing
of In 1995b,
188). Todd
internal
p. of
difficulty
or and
1991,
TRA. TRA. ease TRA/TPB.
(Taylor TRA/TPB. TAM.
TRA/TPB.
from from
"perceptionsfrom from
(Ajzen from from
perceived
behavior"
Definitions
Adapted Adapted behavior"
"the research,
on Adapted Adapted
Adapted Adapted
Core Behavior
Attitude Subjective Perceived
Control Behavior
Attitude Perceived
Subjective
Perceived
Control
TPBof tech-
control
of Taylorpre- atti-
control
perceived
intention
predict of contrast
of of In technology hybrid
with
to settings. a
review different
1991;
Decomposed
ndvidalAcceptane of terms
a TPB
behavioral theIn TPB. behavioral TPB
understanding within of
manyis to provide
construct used theof "decomposes"
variety to
(TPB) the determinantto Mathieson
presented
perceived model
(DTPB). structure
wide usage perceived(C-TAM-TPB)
DTPB TAM
a identical predictors
1995a).
1997; is
TPB, (1991)in applied
adding andal. related andbelief TPBthefrom
Behavior
by In additional
successfullyet A BehaviorTAM,
an to Todd
DTPBnorm, and
that
TRA be Ajzenbehavior and
to similar TAM combines
Planned
MdelSad-Teoresof control. acceptance
andsuccessfully Planned underlying
1995b).
(Harrison contexts.
usefulness
of studies of but
intention,
the
subjective model(Taylor
1
extendedbehavior.been Todd its
theorized TPB
Tabe
TheoryTPB intention
is andseveral
behavioral nologies
hasindividual dicting
andTheory intoadoption
to tude, This
Combined model
perceived
429
VAnke
to et
of
[a her to
joy, act" agree
or of culture, is
degree128). individual returning (Thompson
using difficult fee"provision
his p. (Thompson individual's facilitating
of "the displeasure, the
that particular no of
a "the observers
1991, "feelings situations"
subjective
that
future" is example,type
relatively
al. are that whencontext,
utilization"
(1971), disgust,
with
believes as et the use social For IS one
129). in group's anbe
performance factors
p. In system
the toward 127).
individual 126).
agreements facilitated
p.
specific is
p. environment may
individual pay-off depression,
1991, perceived
Shoemaker a
(Thompson an social in item.
an is or reference theaccomplish.
PCs
al. and affectby
1991, the 1991,
in theof influence
to online
enhance
et use"
have
of
al. Triandis,others,
al. can129).
which interpersonal easy
to can andthat 129). et et users p.
return
Rogers pleasure,
innovationp. Triandis, with factors that
from act to for
on an on or associated anpurchased 1991,
extent(Thompson specific
made
1991, hate al.
"the job"Based
Definitions
technology]
which al. Based
understand
"Outcomes elation, Derived
internalization
or(Thompson andhas(Thompson
make
items
Objectivecharged
support
condition
et
Use
Conditions
(honinuIIed)
Constructs Towards Factors
Long-term
Core Job-fit Complexity Affect
Consequences Social Facilitating
is
Acceptanc.Le
al. con- a al.
et IS
human of et thanroots,
these
of perspective
for particularly
use of different
SI'[*Individual it rather examination
the
utilization.
and theory's
theory model anof
effect
of PC
Thompson Thompson
the
makes thesuch
competing behavior
a TPB.
(1977) with
predict
Triandis'
model
acceptance Also,
(MPCU) and to
Theor1i:es usage comparison
examine
the
presents of keeping fair
and
Triandis'
TRArefined
model in will a
technologies.
by and predict intention.
individual
from the
model
Utilization nature to on ensure
Modls research
PC this thepredict
used however,to
information
largely
1. of adapted to of sought
proposed
and
current
that
Model
TabJIle behavior,
Derived
to (1991)However,
texts range
suited (1991)
intention; models.
thedeterminants
important
430
Venka
to as
p.
being being system being
(Moore
as 1991, as the as past
Benbasat
195). system"
Benbasat
p. perceived perceived
is andand is Benbasat
using
social and innovation,
Benbasat
perceived 1991,
perceived perceived the and
is is is needs,
(Moore
and one's others
Moore
innovation
in 195). communicability"
innovation
see using (Moore
an p. from
Benbasat values, of and the
(Moore of of will"
innovationinnovation status can adopters" 203).
innovation
and useor 1991,
an an one an resultsp. usefree
(adapted existing of
the or
which which
precursor" which
(Moore image which thepotential
which 1991,
which
of observability
to its to to Benbasat
to to of to
use" one's with
195). their 195).
than to and
organization p. p.
voluntary,
degree degreedegree degree degree tangibility
degree
Benbasat
the
Definitions
better
"the 195).
"the "The (Moore
enhance
difficult Thein "the 1991,
consistent
experiences
"the
including
and"the 1991,
being
Use
of
Advantage Demon-
Constructs of
in
1999;1991).
be Moore
been alsoal.
et
hasinnovations, (1991) could predictive
presented (see
of
IndvidualAccpace(otiud
Within that the
of
1995) for
acceptance.
Benbasat
organizational
variety 1982). Karahanna
(IDT) a to innovations
(Rogers and constructs
support
Klein of 1998;
characteristics
studytools of
IDT technology
Theoryto andMooreset found1997,
adThois a
1960s innovation
(1996)
individual
odel*s agricultural
sociology, systems,characteristics
refined Prasad
2001).
Diffusion
in the (Tornatzky al.
. from theandstudy theseandet
of
since to Benbasat
Tabe
used
Innovation
Grounded information
Rogers
innovation
ranging used
adapted Plouffe
andvalidity
Agarwal
431
Venkat
and
1995b).
job-
behavior.Specifically,
esteem (e.g., it
(e.g.,
thewith task.
1995b). Higgins or
of when
deal
and job
individual
behavior. behavior
Higgins technology
thethe a
andof reactions
with useparticular
expectations(Compeau
consequences to a particular
a
deal
for emotional
(Compeau ability
or
liking
consequences
performance accomplish
one's
of to
accomplishment use). anxious
expectations
outcomesof
performance-related
personal individual's
Definitions Thepersonal
TheSpecifically,
related senseJudgment
computer) Evoking
Ancomputer p
Expec-
Cotined
Constructs
Core
Outcome
tations- Expectations-
Personal
Performance
Outcome Affect Anxiety
is al. to
it
theet is andthe
to em-
butallow Compeau and
Compeaualsothus
behavior
SCT of predictive
use
andCompeau
Compeau theory predicting
the models.
information
dependent
human 1986). of a of intention
also(1995a) model
of the
ofIndvidalAccetace
of extended as
use
computer of
(see research. spirit
examine
and Higgins
Bandura underlying
performance andoriginal
the
(SCT) theories usagewillcontext
the The
studied
(see and current withwethe
applied study used in comparison
utilization
to the and
Theory
powerful
theory of modelacceptance fair
was keeping
general. a
model
(1995b) it
Compeau model
to (1995b)
in
most goal in
MoelsandTheris computer the acceptance,
theallow
of the(1995b) but
1 thecognitivewhile
Cognitive SCT, of of to
of Higgins Higgins
extended
Tabe
Social
One social 1999);
ployed
andcontext Higgins'
nature
outside andvariable
individual
be technology usage
validity
432
Vanke
of of
in- evi- moreMorriswaswomen a
salient
useful-perceived
original
not was andeffect forstages
(i.e.,
the more women norm interaction).
was
in Empirical while
usefor The
demonstrated early
salient
was of
perceived
men the
N/A
Gender Gender
cludeddence
TAM. for ease
thatness 2000).
salient more
(Venkatesh
subjective N/A
in experience
three-way
the a
not notin and
was norm cases
notand norm less
original
in
in (i.e.,
was was Within
suggestedusebe
the only
settings
important
to only interaction).
experience
in included system
Hartwick TAM.
subjective
Although system
(1994)more
subjective salientthen the
limited
included
Voluntariness
TRA. Barki
tested,
Voluntariness thatwas perceived
when voluntary.
explicitly
original
TAM2,
Voluntariness mandatory
was even
of withthree-way N/A
of
in in
and
of Davis attitude pro- with
became that
lsI3 role by salience
included that have
experience.
(1989)
included
thecontrast,norm al.
theexamined
in In increasing et showing
analysis found others,
nonsignificant
xistinigMode
explicitly with increasing
explicitly
found.
However,change (1999)subjectiveDavis
not empirically not evidence
inE al. with among
No was becomes
wasTRA. et while was
was important TAM. experience,
cross-sectional (1996),use
a (1989). empirical
of
original moreimportant
original
al.
Experience
Experience
theexperience
using Karahanna
et determinants
was lessExperience
theSzajna
experience, vided
ease
increased N/A
RolefMoei[aISJtors
2. of (and
TableModelReasoned
Theory
Action Model
Technology
TAM2)
Acceptance Motivational
Model
433
Venkat
a
atti- was
salient older salient
(i.e.,
that for
Venkateshworkers
control more interaction).
more Subjective
women
andfound perceivedsalientwas
was
younger older
AgeMorris
(2000)
tude behavioral
forwhile more norm N/A
to three-way
workers.
was more
in
(2000)men.
norm exper-
al. for beha- were of
et attitude womenthree-way
that for (i.e.,
control
salient
perceivedstages
subjective
Gender Both
more
Venkatesh
found andvioral ience
salient
early N/A
interactions).
not to
more (Hart-
As
original was system 1994).
was
tested,be
discussion
the to when
norm
in TRA,
not Barki
the perceived
voluntary
DTPB.
in
or was and
less
included
TPB
Voluntariness regarding
noted
Voluntariness although usebe wickN/A
important
subjective
suggested
2.Rol
of
Tabl
ModelPlanned
TheoryBehavior Combined
TAM-TPB
434
Venkat
N/A
Gender N/A N/A
not have
was to on
moderator,
a
shown
effect
as
d
was
direct
N/A
Voluntariness buta intention.
Voluntariness
tested N/A
PC
2.Rol of
Tabl
ModelUtilization
Model Innovation
Diffusion
Theory Social
Cognitive
Theory
435
Tal
TRA and
by and51%, was62% was was45%
intentionand intention intention
57%, intention
in 26%, in TAM was in TAM in TAMwas
by TPB by was60% by IDT
and47%
explained
TPB was
use32%
variance was variance
and variance and
variance
Findings
Theandwas respectively.
TAM 70%
Theexplained DTPB
Theexplained
52%, Theexplained
33%
or thein
at
points
Longitudinal
Cross-
Sectional
Analysis
Cross-
sectional
analysis sectional
Cross-
twotime Cross-
sectional Cross-
sectional
Points mea-
center
students
of student.
weeks all the
14 three-month per
surveyed-
a multiple
Measurement
Number
of Two;
apart One Forperiod, i.e.,sures
visiting
were One
as the
of to the per-
to tech-
a to task with months
famil-
new with partici-
had a students
already 10
technology use
Newness
Studied
Technology
Participants
the
were iarity
Some pant
each
technology Many
nology
choose
form were center
familiar Survey
administered
after
of
(Incl.
Context
Technology)
model
sonandprocessor
Between-subjects
Within-subjects model
sonusesheet
calculator model
sonuseresource
Within-subjects model
sonintentionketelectronic
andcontext
Within-subjects using
ment
Models
Compared
Theories/
TRA, TAM, TAM,
TPB/DTPB TAM,
al.
al.
and(1995b) et
et
Model
Comparison
Studies
Tale3.ReieoPio Davis
(1989) (1991)
Mathieson Taylor
Todd Plouffe
(2001)
436
Venkatesh
et al./UserAcceptanceof IT
* Participants: While there have been some mandatorysettings that are possibly of more
tests of each modelinorganizationalsettings, interest to practicing managers. This re-
the participantsin three of the four model search examines both voluntaryand man-
comparison studies have been students- datoryimplementationcontexts.
only Plouffe et al. (2001) conducted their
research in a nonacademic setting. This
research is conducted using data collected
fromemployees in organizations.
EmpiricalComparisonof the
Timingof measurement: Ingeneral, most of Eight Models
the tests of the eight models were conducted
well after the participants'acceptance or Settings and Participants
rejection decision rather than during the
active adoption decision-making process. Longitudinalfield studies were conducted at four
Because behavior has become routinized, organizationsamong individualsbeing introduced
individualreactionsreportedin those studies to a new technology in the workplace. To help
are retrospective(see Fiske and Taylor1991; ensure our results would be robust across
Venkateshet al. 2000). Withthe exceptionof contexts, we sampled for heterogeneity across
Davis et al. (1989), the model comparisons technologies, organizations,industries,business
examined technologies that were already functions, and nature of use (voluntary vs.
familiarto the individualsat the time of mea- mandatory).Inaddition,we capturedperceptions
surement. Inthis paper,we examine techno- as the users' experience with the technology
logies fromthe timeof theirinitialintroduction increased. At each firm,we were able to time our
to stages of greaterexperience. data collection in conjunction with a training
program associated with the new technology
* Nature of measurement: Even studies that introduction. This approach is consistent with
have examined experience have typically priortrainingand individualacceptance research
employed cross-sectional and/or between- where individualreactions to a new technology
subjects comparisons(e.g., Daviset al. 1989; were studied (e.g., Davis et al. 1989; Olfmanand
Karahannaet al. 1999; Szajna 1996; Taylor Mandviwalla1994; Venkatesh and Davis 2000).
and Todd 1995a; Thompson et al. 1994). A pretested questionnairecontainingitems mea-
This limitationapplies to model comparison suring constructs from all eight models was
studies also. Our work tracks participants administered at three different points in time:
throughvarious stages of experience with a post-training(T1),one monthafterimplementation
new technologyand compares all models on (T2),and three monthsafterimplementation(T3).
all participants. Actualusage behaviorwas measuredoverthe six-
monthpost-trainingperiod. Table 4 summarizes
* Voluntaryvs. mandatorycontexts: Most of key characteristicsof the organizationalsettings.
the model tests and all four model com- Figure2 presents the longitudinaldata collection
parisons were conducted in voluntaryusage schedule.
contexts.3 Therefore,one must use caution
when generalizing those results to the
Measurement
A questionnairewas created withitems validated
3NotableexceptionsareTRA(Hartwick andBarki1994)
and TAM2(Venkateshand Davis 2000) as well as in priorresearch adapted to the technologies and
studiesthathaveincorporated as a direct
voluntariness organizationsstudied. TRAscales were adapted
effect(on intention) in orderto accountfor perceived from Davis et al. (1989); TAM scales were
nonvoluntary adoption(e.g.,Agarwal andPrasad1997;
Karahanna et al. 1999;MooreandBenbasat1991). adapted from Davis (1989), Davis et al. (1989),
Vol.27 No.3/September
MISQuarterly 2003 437
Venkateshet al./UserAcceptance of IT
x 0 X 0 X 0 X 0
Training User System User System User System Usage
Reactions Use Reactions/ Use Reactions/ Use Measurement
Usage Usage
Measurement Measurement
1 week 1 month 3 months 6 months
Figure 2L g d Sche
Functional Sample
Study Industry Area Size System Description
Voluntary Use
Onlinemeeting managerthat could be
Product used to conductWeb-enabled video or
la Entertainment 54
Development audio conferences in lieu of face-to-face
or traditionalphone conferences
Database applicationthat could be used
Telecomm to access industrystandardsfor particular
Services productsin lieu of other resources (e.g.,
technical manuals, Web sites)
Mandatory Use
Business Portfolioanalyzerthat analysts were
2a Banking Account 58 requiredto use in evaluatingexisting and
Management potential accounts
Public Proprietaryaccountingsystems on a PC
2b Administration Accounting 38 platformthat accountantswere required
to use for organizational bookkeeping
7 e tn I0n - 0 - *O m a
0dlC I..
0s0n0ig D
0
PoldAcrssSude ( 65
Pooled.Across Studies (N = 64 5
(CoS n
Sined
q'.s1PoldAcrs ~iI~~T3i~~
i,o,hr
Suie p1j
I IFI I{Oz.evr~
N ri rr
.
45)(otiud
Notes: 1. BI,PBC measured at T1 were used to predictusage betweentime periods 1 and 2 (denoted
Use12);BI, PBC measured at T2 were used to predictusage between time periods 2 and 3
(Use23);BI, PBC measured at T3 were used to predictusage between time periods 3 and 4
(Use3).
2. *p < .05; **p < .01; ***p< .001.
time period: intentionfromT1 was used to predict TRA and TPB/DTPB, perceived usefulness in
usage behaviormeasured betweenT1and T2 and TAM/TAM2 and C-TAM-TPB, extrinsicmotivation
so on (see Table 8). Since intentionwas used to in MM,job-fitin MPCU,relativeadvantage in IDT,
predictactual behavior,concerns associated with and outcome expectations in SCT. Second,
the employmentof subjectivemeasures of usage several other constructswere initiallysignificant,
do not apply here (see Straub et al. 1995). In but then became nonsignificantover time, in-
additionto intentionbeing a predictorof use, per- cludingperceivedbehavioralcontrolinTPB/DTPB
ceived behavioral control became a significant and C-TAM-TPB, perceived ease of use in TAM/
directdeterminantof use overand above intention TAM2,complexityin MPCU,ease of use in IDT,
withincreasingexperience (at T3) indicatingthat and self-efficacyand anxietyin SCT. Finally,the
continued use could be directly hindered or voluntary vs. mandatory context did have an
fostered by resources and opportunities.A nearly influenceon the significanceof constructsrelated
identical patternof results was found when the to social influence:subjective norm (TPB/DTPB,
data were analyzed using facilitatingconditions C-TAM-TPBand TAM2),social factors (MPCU),
(from MPCU) in place of perceived behavioral and image (IDT) were only significant in
control(the specific results are not shown here). mandatoryimplementations.
Performance
Expectancy
Effort
Expectancy
ExpectancyBehavioral Use
Intention , Behavior
Social
Influence
Facilitating
Conditions
Gender Experience
Voluntariness
ou s
Age of Use
oe
- -ue .Rseac
significant role as direct determinants of user performance. The five constructs from the dif-
acceptance and usage behavior: performance ferent models that pertain to performance
expectancy, effort expectancy, social influence, expectancyare perceivedusefulness (TAM/TAM2
and facilitatingconditions. As will be explained and C-TAM-TPB), extrinsicmotivation(MM),job-fit
below, attitude toward using technology, self- (MPCU), relative advantage (IDT),and outcome
efficacy,and anxietyare theorizednotto be direct expectations (SCT). Even as these constructs
determinantsof intention.The labels used forthe evolved in the literature,some authors acknowl-
constructsdescribe the essence of the construct edged theirsimilarities:usefulness and extrinsic
and are meantto be independentof any particular motivation(Davis et al. 1989, 1992), usefulness
theoreticalperspective. In the remainderof this andjob-fit(Thompsonet al. 1991), usefulness and
section, we define each of the determinants, relativeadvantage (Davis et al. 1989; Mooreand
specify the role of key moderators(gender, age, Benbasat 1991; Plouffe et al. 2001), usefulness
voluntariness,and experience), and providethe and outcomeexpectations(Compeauand Higgins
theoretical justification for the hypotheses. 1995b;Daviset al. 1989), andjob-fitand outcome
Figure3 presents the research model. expectations (Compeauand Higgins1995b).
2003
Vol.27 No.3/September
MISQuarterly 447
Venkateshet al./UserAcceptance of IT
3.
Table 9 .PrfraneExecacy *oo Cntrcs , eintosandScae
3.
Table 6.ProraceEpetny:RotC nsrcs , eintosandScae
(Continued)
1998; Compeau and Higgins 1995b; Davis et al. formance expectancies, which focus on task
1992; Taylorand Todd 1995a; Thompson et al. accomplishment,are likelyto be especially salient
1991;Venkateshand Davis2000). However,from to men. Gender schema theory suggests that
a theoretical point of view, there is reason to such differences stem from gender roles and
expect thatthe relationshipbetween performance socialization processes reinforced from birth
expectancy and intentionwill be moderated by ratherthan biologicalgender per se (Bem 1981;
genderand age. Research on gender differences Bem and Allen 1974; Kirchmeyer1997; Lubinski
indicatesthat men tend to be highlytask-oriented et al. 1983; Lynottand McCandless2000; Moto-
(Mintonand Schneider 1980) and, therefore,per- widlo1982). Recent empiricalstudies outside the
450 MISQuarterly
Vol.27 No.3/September
2003
Venkateshet al./UserAcceptance of IT
use is mandated. Venkatesh and Davis (2000) The role of social influence in technology
suggested that such effects could be attributed acceptance decisions is complexand subjectto
to compliance in mandatory contexts that a wide range of contingent influences. Social
causes social influences to have a directeffect influence has an impacton individualbehavior
on intention; in contrast, social influence in throughthree mechanisms: compliance, inter-
voluntarycontexts operates by influencingper- nalization,and identification(see Venkateshand
ceptions about the technology-the mech- Davis 2000; Warshaw 1980). While the latter
anisms at play here are internalizationand two relateto alteringan individual'sbelief struc-
identification. In mandatory settings, social ture and/orcausing an individualto respond to
influence appears to be importantonly in the potential social status gains, the compliance
early stages of individualexperience with the mechanismcauses an individualto simplyalter
technology, with its role eroding over time and his or her intentionin response to the social
eventually becoming nonsignificantwith sus- pressure-i.e., the individualintends to comply
tained usage (T3), a patternconsistent withthe with the social influence. Priorresearch sug-
observations of Venkatesh and Davis (2000). gests that individualsare more likelyto comply
MISQuarterly
Vol.27 No.3/September
2003 453
et al./UserAcceptanceof IT
Venkatesh
I Se
12.
TaS Fai it Sn C tos S Sto r s De io ad l
Vol.27 No.3/September
MISQuarterly 2003 455
Venkateshet al./UserAcceptance of IT
456 MISQuarterly
Vol.27 No.3/September
2003
Venkateshet al./UserAcceptance of IT
Using the post-trainingdata (T1) pooled across An examinationof these highest loading items
studies (N = 215), a measurement model of the suggested that they adequately represented the
seven direct determinantsof intention(using all conceptualunderpinningsof the constructs-this
items that relatedto each of the constructs)was preliminarycontent validitynotwithstanding,we
estimated. All constructs, with the exception of will returnto this issue later in our discussion of
use, were modeled using reflectiveindicators.All the limitationsof this work. Selection based on
internal consistency reliabilities (ICRs) were item loadings or corrected item-totalcorrelations
greaterthan .70. The square roots of the shared are often recommended in the psychometric
variance between the constructs and their mea- literature(e.g., Nunnallyand Bernstein 1994).
sures were higher than the correlationsacross This approach favors building a homogenous
constructs, supporting convergent and discri- instrument with high internal consistency, but
minantvalidity-see Table 14(a). The reverse- could sacrifice content validity by narrowing
coded affect items of Compeau and Higgins domaincoverage." The itemsselected forfurther
(1995b) had loadings lower than .60 and were analysis are indicatedvia an asterisk in Table 15,
and the actual items are shown in Table 16.
dropped and the model was reestimated. With
the exception of eight loadings, all others were
Tables 17(a) and 17(b) show the detailed model
greater than .70, the level that is generally con- test results at each time periodfor intentionand
sideredacceptable (Fornelland Larcker1981;see
also Compeau and Higgins 1995a, 1995b; Com- usage, respectively, including all lower-level
interactionterms. Tables 17(a) and 17(b) also
peau et al. 1999)-see Table 15. Inter-itemcorre- show the model with direct effects only so the
lation matrices (details not shown here due to reader can comparethat to a modelthat includes
space constraints)confirmedthat intra-construct the moderating influences. The variance ex-
item correlationswere very high while inter-con-
plained at various points in time by a direct
struct item correlations were low. Results of
effects-only model and the full model including
similaranalyses fromsubsequent timeperiods(T2 interactionterms are shown in Tables 17(a) and
and T3)also indicatedan identicalpatternand are 17(b) for intentionand usage behavior, respec-
shown in Tables 14(b) and 14(c). tively.12We pooled the data across the different
Tal 0Ie L 0s 0
( =2 a.m e
Items T1 T2 T3 Items TI T2 T3
U1 .82 .81 .80 *SN1 .82 .85 .90
U2 .84 .80 .81 C *SN2 .83 .85 .84
U3 .81 .84 .84 SF1 .71 .69 .76
U4 .80 .80 .84 . *SF2 .84 .80 .90
U5 .81 .78 .84 c SF3 .72 .74 .77
*U6 .88 .88 .90 *SF4 .80 .82 .84
*RA1 .87 .90 .90 11 .69 .72 .72
RA2 .73 .70 .79 0 12 .65 .75 .70
M RA3 .70 .69 .83 13 .71 .72 .69
RA4 .71 .74 .74 PBC1 .72 .66 .62
x *RA5 .86 .88 .94 *PBC2 .84 .81 .80
"' JF1 .70 .71 .69 *PBC3 .81 .81 .82
JF2 .67 .73 .64 V PBC4 .71 .69 .70
M - JF3 .74 .70 .79 o *PBC5 .80 .82 .80
E: JF4 .73 .79 .710 FC1 .74 .73 .69
JF5 .77 .71 .73 FC2 .78 .77 .64
JF6
JF6 81
.81 .78 81
.81
,
.78 *FC3 .80 .80 .82
OE1 .72 .80 .75 Cl .72 .72 .70
OE2 .71 .68 .77 - C2 .71 .74 .74
OE3 .75 .70 .70 .wMr
.
C3 7 .70
OE4 .70 .72 .67
OE5 *SE1 .80 .83 .84
OE5 .72
.72 .72
.72 .70
.70
0E SE2 .78 .80 .80
OE6 .69 .79 .74
OE7 .86 .87 .90
E" SE3 .72 .79 .74
EOUI .90 .89 .83 4.*S8W.
w
Li ? SE4
SE5 .77
.80 .74
.84 .69
.84
EOU2 .90 .89 .88
*SE6 .81 .82 .82
*EOU3 .94 .96 .91
*SE7 .87 .85 .86
EOU4 .81 .84 .88 . .
SSE8 .70 .69 .72
c *EOU5 .91 .90 .90
* .92 .92 .93 *ANX .78 .74 .69
O
4) EU6
E1 4.84
.84
4 .80
. 8_<8*ANX3
"zX
*ANX2 .71
.72
.70
.69
.72
.73
SW EU2 .83 .88 .85 *ANX4 .77
EU3 .74 .72
ti .89 .84 .80
o *EU4 .91 .91 .92 *BI1 .88 .84 .88
w C01 .83 .82 .81 o *B02 .82 .86 .88
CO02 .83 .78 .80 *BI3 .84 88 7
87
CO03 .81 .84 .80
CO04 .75 .73 .78
*Al .80 .83 .85
A2 .67 .64 .65
r- A3 .64 .64 .71
A4 .72 .71 .64
S IM1 .70 .78 .72
IM2 .72 .72 .78
>,
O O IM3 .73 .75 .81
- _
_*AF1 .79 .77 .84
*AF2 .84 .83 .84
AF3 .71 .70 .69
.D
S *Affect1 .82 .85 .82
Affect2 .67 .70 .70
Affect3 .62 .68 .64
Notes: 1. The loadingsat T1, T2, and T3 respectivelyare fromseparate measurementmodeltests and relateto
Tables 14(a), 14(b), and 14(c) respectively.
2. Extrinsicmotivation(EM)was measured using the same scale as perceivedusefulness (U).
3. Items denoted withan asteriskare those thatwere selected for inclusionin the test of UTAUT.
Tale16 te s se n stmaig U AU
Performance expectancy
U6: I wouldfindthe system useful in my job.
RA1: Using the system enables me to accomplishtasks more quickly.
RA5: Using the system increases my productivity.
OE7: IfI use the system, I willincrease my chances of gettinga raise.
Effort expectancy
EOU3: Myinteractionwiththe system would be clear and understandable.
EOU5: Itwould be easy for me to become skillfulat using the system.
EOU6: I wouldfindthe system easy to use.
EU4: Learningto operate the system is easy for me.
Self-efficacy
I could complete a job or task using the system...
SE1: Ifthere was no one aroundto tell me what to do as I go.
SE4: If I could call someone for help if I got stuck.
SE6: If I had a lot of time to complete the job for whichthe softwarewas provided.
SE7: If I had just the built-inhelp facilityfor assistance.
Anxiety
ANX1: I feel apprehensiveabout using the system.
ANX2: Itscares me to thinkthat I could lose a lot of informationusing the system by hitting
the wrongkey.
ANX3: I hesitate to use the system forfear of makingmistakes I cannot correct.
ANX4: The system is somewhat intimidatingto me.
- - A
T 1 l yTso (Cntnud
T1 T2 T3 Pooled
(N = 215) (N = 215) (N = 215) (N = 645)
DONLY D+1 DONLY D+l DONLY D+I DONLY D + I
GDR x AGE x VOL .02 02 01 .00
GDRx AGE x EXP(included Earlier
earlier)
GDR x VOLx EXP .00
AGE x VOLx EXP .01
SI x GDR x AGE x VOL .25** 23** 20* .04
GDRx AGE x VOLx EXP .02
SI x GDRx AGE x VOLx EXP .28**
(b) Dependent Variable: Usage Behavior
R2(PLS) .37 .43 .36 .43 .39 .44 .38 .53
R2(hierarchicalregrn.) .37 .43 .36 .43 .39 .43 .38 .52
AdjustedR2(hierarchicalregrn.) .36 .41 .35 .40 .38 .41 .37 .47
Functional Sample
Study Industry Area Size System Description
Voluntary Use
Mandatory Use
Tabe2. I
Load rmS mhtme
Items T1 T2 T3 Items T1 T2 T3
U6 .91 .92 .91 PBC2 .84 .88 .85
Performance RA1 Facilitating PBC3
.90 .89 .88 .88 .89 .88
Expectancy Conditions
(PE) RA5 .94 .89 .90 (FC) PBC5 .86 .89 .84
OE7 .89 .90 .91 FC3 .87 .78 .81
EOU3 .91 .90 .94 SE1 .90 .84 .88
Effort EOU5 .92 .91 .90 Self-Efficacy SE4 .88 .82 .81
Expectancy
Expectancy)
EOU6 .93 .90 .89 (SE) SE6 .80 .85 .79
EU4 .87 .87 .90 SE7 .81 .77 .75
Attitude Al .84 .80 .86 ANX1 .80 .84 .80
Toward AF1 .82 .83 .77 ANX2 .84 .84 .82
Anxiety
Using
.80 .80 .76 (ANX) ANX3 .83 .80 .83
TechnologyAF2
Technology
(ATUT) Affectl .87 .84 .76 ANX4 .84 .77 .83
SN1 .94 .90 .90 BI1 .92 .90 .91
Social SN2 .90 .93 .88 Intention B12 .90 .90 .91
Influence
(S) SF2 .89 .92 .94 (BI) B13 .90 .92 .92
SF4 .92 .81 .79
Note: The loadings at T1, T2, and T3 respectively are from separate measurement model tests and
relate to Tables 18(a), 18(b), and 18(c) respectively.
-abl- 2-
on.oh g
(a) Dependent Variable: Intention
T1 T2 T3 Pooled
(N = 133) (N = 133) (N = 133) (N = 399)
DONLY D+I DONLY D+I DONLY D+I DONLY D+I
R2(PLS) .42 .52 .41 .52 .42 .51 .36 .77
R2(hierarchicalregrn.) .41 .52 .41 .52 .42 .51 .36 .77
AdjustedR2(hierarchicalregrn.) .37 .48 .36 .47 .36 .46 .30 .70
Tal 21
Es-ala][tI~ eI'1 i. 'n[e ofJLIi FAUI E(C]ont inue[d)
T1 T2 T3 Pooled
(N = 133) (N = 133) (N = 133) (N = 399)
DONLY D + I DONLY D+I DONLY D+I DONLY D+I
GDR x AGE(includedearlier) Earlier Earlier Earlier Earlier
GDR x EXP .02
AGE x EXP .06
EE x GDRx AGE .21** .18" .16" .04
EE x GDRx EXP .00
EE x AGE x EXP .00
GDRx AGE x EXP .01
EE x GDRx AGE x EXP -.25***
SI xGDR -.06.00 .02 -.07
SI x AGE .02 .01 .04 .02
SI xVOL .01 .04 .00 .00
SI x EXP .02IN .
GDR x AGE(includedearlier) Earlier Earlier gk Earlier Earlier
GDRx VOL .04 .02 -.03 .02
GDR x EXP(includedearlier) Earlier
AGE x VOL .00 .01 .00 .07
AGE x EXP(includedearlier) Earlier
VOLx EXP .02
SI x GDRx AGE -.03 .01 -.07 .00
Sl x GDRx VOL .04 -.03 .04 .00
SI x GDRx EXP .00
SI x AGE x VOL .06 .02 .00 .01
SI x AGE x EXP M.07
SI x VOLx EXP .02
GDRx AGE x VOL .01 .06 .01 .04
GDRx AGE x EXP(included Earlier
earlier)
GDR x VOLx EXP ... ....
.. .. .01
AGE x VOL
.VO..L
x..x
EXP
.E
X..P .......................... ......... .0
...........0
SI x GDRx AGE x VOL .27*** .21** .16* .01
GDR x AGE x VOLx EXP .00
SI x GDR x AGE x VOLx EXPa -.299*
(b) Dependent Variable: Usage Behavior
R2(PLS) .37 .44 .36 .41 .36 .44 .38 .52
R2(hierarchicalregrn.) .37 .43 .36 .41 .36 .44 .37 .52
R2
Adjusted (hierarchicalregrn.) .36 .41 .35 .38 .35 .41 .36 .48
period (N = 133 at each time period). The mea- over any of the originaleight models and their
surementmodels are shown in Tables 19 and 20. extensions. Further,UTAUTwas successful in
The patternof results in this validation(Tables integratingkeyelements fromamong the initialset
21(a) and 21(b)) mirrorswhat was found in the of 32 main effects and four moderators as
preliminarytest (Table 17). The last column of determinantsof intentionand behaviorcollectively
Tables 21(a) and 21(b) reportsobservationsfrom posited byeightalternatemodels intoa modelthat
the pooledanalysisas before. AppendixB reports incorporated four main effects and four
the statisticaltests we conducted priorto pooling moderators.
the data for the cross-validationtest, consistent
with the approach taken in the preliminarytest. Thus, UTAUTis a definitivemodel that synthe-
Insofaras the no-relationshiphypotheses were sizes what is knownand providesa foundationto
concerned, the power analysis revealed a high guide future research in this area. By encom-
likelihood(over 95 percent) of detecting medium passing the combined explanatorypower of the
effects. The variance explained was quite com- individualmodels and key moderatinginfluences,
parable to that found in the preliminarytest of UTAUTadvances cumulative theory while re-
UTAUT. taining a parsimoniousstructure. Figure 3 pre-
sents the model proposed and supported.
Table 22 presents a summaryof the findings. It
should be noted that performanceexpectancy
Discussion appears to be a determinantof intentionin most
situations: the strengthof the relationshipvaries
The present research set out to integrate the with gender and age such that it is more signi-
fragmented theory and research on individual ficantfor men and youngerworkers. The effect of
acceptance of informationtechnology into a uni- effortexpectancy on intentionis also moderated
fied theoreticalmodel that captures the essential by gender and age such that it is more significant
elements of eight previouslyestablished models. for women and older workers,and those effects
First, we identified and discussed the eight decrease with experience. The effect of social
specific models of the determinantsof intention influence on intention is contingent on all four
and usage of informationtechnology. Second, moderatorsincludedhere such thatwe founditto
these models were empiricallycompared using be nonsignificantwhen the data were analyzed
within-subjects,longitudinaldatafromfourorgani- withoutthe inclusionof moderators. Finally,the
zations. Third,conceptual and empiricalsimi- effect of facilitatingconditionson usage was only
larities across the eight models were used to significantwhen examinedin conjunctionwiththe
formulatethe UnifiedTheoryof Acceptance and moderatingeffects of age and experience-i.e.,
Use of Technology(UTAUT).Fourth,the UTAUT they only matterfor older workersin laterstages
was empiricallytested using the originaldata from of experience.
the four organizationsand then cross-validated
using new data from an additionaltwo organi- Priorto discussing the implicationsof this work,it
zations. These tests provided strong empirical is necessary to recognize some of its limitations.
support for UTAUT,which posits three direct One limitationconcerns the scales used to mea-
determinants of intention to use (performance sure the core constructs. Forpracticalanalytical
expectancy, effort expectancy, and social influ- reasons, we operationalized each of the core
ence) and two direct determinants of usage constructsin UTAUTby using the highest-loading
behavior (intention and facilitatingconditions). items from each of the respective scales. This
Significantmoderatinginfluences of experience, approach is consistent with recommendationsin
voluntariness,gender, and age were confirmedas the psychometric literature(e.g., Nunnallyand
integralfeatures of UTAUT. UTAUTwas able to Bernstein1994). Such pruningof the instrument
account for 70 percent of the variance (adjusted was the only way to have the degrees of freedom
R2)inusage intention-a substantialimprovement necessary to model the various interactionterms
-abl22.Summayo
at the item level as recommended by Chin et al. for each of the constructs with an emphasis on
(1996). However,one danger of this approachis content validity,and then revalidatingthe model
that facets of each constructcan be eliminated, specified herein(or extendingit accordingly)with
thus threateningcontentvalidity.Specifically,we the new measures. Ourresearch employedstan-
found that choosing the highest-loading items dard measures of intention,but future research
resulted in items from some of the models not should examine alternativemeasures of intention
being represented in some of the core constructs and behavior in revalidatingor extending the
(e.g., items from MPCUwere not represented in research presented here to other contexts.
performanceexpectancy). Therefore,the mea-
sures for UTAUTshould be viewed as preliminary Froma theoreticalperspective, UTAUTprovides
and future research should be targeted at more a refinedviewof howthe determinantsof intention
fullydevelopingand validatingappropriatescales and behaviorevolve over time. It is importantto
emphasize that most of the key relationshipsin the importanceof gender roles and the possibility
the model are moderated. Forexample, age has that "psychologicalgender"is the root cause for
received very little attention in the technology the effects observed. Empiricalevidence has
acceptance research literature,yet our results demonstratedthat gender roles can have a pro-
indicatethat it moderates all of the key relation- foundimpacton individualattitudesand behaviors
ships in the model. Gender, which has received both withinand outside the workplace(e.g., Baril
some recent attention,is also a key moderating et al. 1989; Feldman and Aschenbrenner 1983;
influence;however,consistent withfindingsin the Jagacinski1987;Keys1985; Roberts1997; Sachs
sociology and social psychology literature(e.g., et al. 1992; Wong et al. 1985). Specifically,gen-
Levy1988), itappears to workin concertwithage, der effects observed here could be a manifesta-
a heretoforeunexaminedinteraction. For exam- tion of effects caused by masculinity,femininity,
ple, prior research has suggested that effort and androgyny ratherthan just "biologicalsex"
expectancy is more salient for women (e.g., (e.g., Lubinskiet al. 1983). Futureworkmightbe
Venkatesh and Morris2000). While this may be directedat moreclosely examiningthe importance
true, our findingssuggest this is particularlytrue of gender roles and exploringthe socio-psycho-
forthe oldergenerationof workersand those with logical basis for gender as a means for better
relativelylittleexperience with a system. While understandingits moderatingrole.
existing studies have contributedto our under-
standing of gender and age influences indepen- As is evidentfromthe literature,the role of social
dently,the present research illuminatesthe inter- influence constructs has been controversial.
play of these two key demographicvariablesand Some have arguedfortheirinclusionin models of
adds richness to our currentunderstandingof the adoption and use (e.g., Taylorand Todd 1995b;
phenomenon. We interpretour findingsto sug- Thompson et al. 1991), while others have not
includedthem (e.g., Davis et al. 1989). Previous
gest that as the younger cohort of employees in
the workforcemature,gender differences in how work has found social influenceto be significant
each perceives information technology may only in mandatory settings (see Hartwickand
Barki1994; Venkatesh and Davis 2000). Other
disappear. This is a hopeful sign and suggests work has found social influence to be more
thatoft-mentionedgenderdifferencesinthe use of
informationtechnologymay be transitory,at least significant among women in early stages of
as they relateto a youngergenerationof workers experience (e.g., Venkatesh and Morris2000).
Still other research has found social influenceto
raised and educated in the DigitalAge. be more significantamong older workers (e.g.,
Morrisand Venkatesh 2000). This research is
The complex natureof the interactionsobserved,
among the firstto examinethese moderatinginflu-
particularlyfor gender and age, raises several ences in concert. Ourresults suggest that social
interestingissues to investigateinfutureresearch, influences do matter; however, they are more
especially given the interest in today's societal likely to be salient to older workers, particularly
and workplaceenvironmentsto create equitable women, and even then during early stages of
settings for women and men of all ages. Future experience/adoption.This patternmirrorsthat for
research should focus on identifyingthe potential effortexpectancywiththe addedcaveat thatsocial
"magicnumber"for age where effects begin to influences are more likely to be importantin
appear (say for effort expectancy) or disappear mandatory usage settings. The contingencies
(say for performanceexpectancy). Whilegender identifiedhere providesome insightsintothe way
and age are the variables that reveal an inter- in which social influences change over time and
esting patternof results, futureresearch should may help explain some of the equivocal results
identifythe underlyinginfluentialmechanisms-- reportedin the literature.By helpingto clarifythe
potential candidates here include computer contingentnatureof social influences,this paper
literacyand social or culturalbackground,among sheds light on when social influence is likelyto
others. Finally,althoughgender moderatesthree play an importantrole in driving behavior and
key relationships,it is imperativeto understand when it is less likelyto do so.
2003
Vol.27 No.3/September
MISQuarterly 471
et al./UserAcceptanceof IT
Venkatesh
ErlbaumAssociates, New York,1998, pp. 295- Eichinger, J., Heifetz, L.J., and Ingraham, C.
336. "SituationalShifts in Sex Role Orientation:
Chin,W. W., Marcolin,B. L., and Newsted, P. R. Correlates of Work Satisfaction and Burnout
"A Partial Least Squares Latent Variable Among Women in Special Education,"Sex
ModelingApproachfor MeasuringInteraction Roles (25:7/8), 1991, pp. 425-430.
Effects: Results froma MonteCarloSimulation Feldman, S. S., and Aschenbrenner,B. "Impact
Studyand Voice MailEmotion/Adoption Study," of Parenthoodon VariousAspects of Mascu-
in Proceedings of the InternationalConference linityand Femininity: A Short-TermLongitu-
on InformationSystems, J. I.DeGross,A. Srini- dinalStudy,"DevelopmentalPsychology(19:2),
vasan, and S. Jarvenpaa (eds.), Cleveland, 1983, pp. 278-289.
OH, 1996, pp. 21-41. Fiske, S. T., and Taylor,S. E. Social Cognition,
Chow, G. C. "Testsof EqualityBetween Sets of McGraw-Hill, New York,1991.
Coefficients in Two Linear Regressions," Fishbein,M.,and Ajzen, I. Belief, Attitude,Inten-
Econometrica(28:3), 1960, pp. 591-605. tion and Behavior: An Introductionto Theory
Colquitt,J. A., LePine, J. A., and Noe, R. A. and Research, Addison-Wesley,Reading, MA,
"Towardan IntegrativeTheoryof TrainingMoti- 1975.
vation: A Meta-AnalyticPath Analysis of 20 Fornell,C., and Larcker,D. F. "EvaluatingStruc-
Yearsof TrainingResearch,"JournalofApplied tural Equation Models with Unobservable
Psychology (85:5), 2000, pp. 678-707. Variables and Measurement Error: Algebra
Compeau, D. R., and Higgins,C. A. "Application and Statistics,"Journalof MarketingResearch
of Social CognitiveTheoryto TrainingforCom-
(18:3), 1981, pp. 382-388.
puter Skills,"InformationSystems Research French, J. R. P., and Raven, B. "TheBases of
(6:2), 1995a, pp. 118-143. Social Power,"in Studies in Social Power, D.
Compeau, D. R., and Higgins,C. A. "Computer Cardwright(ed.), Institutefor Social Research,
Self-Efficacy: Developmentof a Measureand AnnArbor,MI,1959, pp. 150-167.
InitialTest," MIS Quarterly(19:2), 1995b, pp.
Goodhue, D. L. "Understanding User Evaluations
189-211. of Information Systems,"ManagementScience
Compeau, D. R., Higgins, C. A., and Huff, S. (41:12), 1995, pp. 1827-1844.
"SocialCognitiveTheoryand IndividualReac-
Goodhue, D. L., and Thompson, R. L. "Task-
tionsto ComputingTechnology:A Longitudinal
Technology Fit and IndividualPerformance,"
Study,"MIS Quarterly(23:2), 1999, pp. 145- MISQuarterly(19:2), 1995, pp. 213-236.
158.
Hall,D., and Mansfield,R. "Relationshipsof Age
Davis, F. D. "PerceivedUsefulness, Perceived and Senioritywith Career Variables of Engi-
Ease of Use, and User Acceptance of Informa-
neers and Scientists," Journal of Applied
tion Technology,"MIS Quarterly(13:3), 1989,
Psychology (60:2), 1995, pp. 201-210.
pp. 319-339.
Harrison, D. A., Mykytyn,P. P., and Riemen-
Davis, F. D., Bagozzi, R. P., and Warshaw,P. R.
"Extrinsicand IntrinsicMotivationto Use Com- schneider, C. K. "ExecutiveDecisions About
Adoptionof InformationTechnology in Small
puters in the Workplace,"Journal of Applied
Business: Theoryand EmpiricalTests," Infor-
Social Psychology (22:14), 1992, pp. 1111-
mation Systems Research (8:2), 1997, pp.
1132.
171-195.
Davis, F. D., Bagozzi, R. P., and Warshaw,P. R.
"UserAcceptance of ComputerTechnology: A Hartwick,J., and Barki,H. "Explaining the Role of
User Participationin InformationSystem Use,"
Comparisonof TwoTheoreticalModels,"Man-
agement Science (35:8), 1989, pp. 982-1002. ManagementScience (40:4), 1994, pp.40-465.
Efron,B., and Gong, G. "ALeisurelyLookat the Helson, R., and Moane, G. "PersonalityChange
Bootstrap,the Jackknife,and Cross-Validation," in Women fromCollege to Midlife,"Journalof
TheAmericanStatistician(37:1), 1983, pp. 36- Personality and Social Psychology (53:1),
48. 1987, pp. 176-186.
Hu, P. J., Chau, P. Y. K., Sheng, O. R. L., and the Theoryof Planned Behavior,"Information
Tam, K.Y. "Examining the TechnologyAccep- Systems Research (2:3), 1991, pp. 173-191.
tance Model Using Physician Acceptance of Miller, J. B. Toward a New Psychology of
TelemedicineTechnology,"JournalofManage- Women,Beacon Press, Boston, 1976.
ment Information Systems(16:2), 1999, pp. 91- Minton,H. L., and Schneider, F. W. Differential
112. Psychology, Waveland Press, Prospect
Jagacinski, C. M. "Androgynyin a Male-Domi- Heights, IL,1980.
nated Field: The Relationshipof Sex-Typed Moore,G. C., and Benbasat, I. "Developmentof
Traitsto Performanceand Satisfactionin Engi- an Instrumentto Measure the Perceptions of
neering, Sex Roles (17:X), 1987, pp. 529-547. Adoptingan InformationTechnology Innova-
Karahanna,E., and Straub, D. W. "ThePsycho- tion," InformationSystems Research (2:3),
logical Origins of Perceived Usefulness and 1991, pp. 192-222.
Ease of Use," Informationand Management Moore,G. C., and Benbasat, I. "IntegratingDiffu-
(35:4), 1999, pp. 237-250. sion of Innovationsand Theory of Reasoned
Karahanna,E., Straub,D. W., and Chervany,N. Action Models to Predict Utilizationof Infor-
L. "Information mationTechnologyby End-Users,"in Diffusion
Technology AdoptionAcross
Time: A Cross-SectionalComparisonof Pre- and Adoption of InformationTechnology, K.
Kautzand J. Pries-Hege (eds.), Chapmanand
Adoption and Post-Adoption Beliefs," MIS
Quarterly(23:2), 1999, pp. 183-213. Hall,London,1996, pp. 132-146.
Keys, D. E. "Gender,Sex Role, and Career Morris, M. G., and Venkatesh, V. "Age Dif-
Decision Makingof CertifiedManagementAc- ferences in Technology Adoption Decisions:
countants,"Sex Roles (13:1/2), 1985, pp. 33- Implicationsfor a ChangingWorkforce,"Per-
46. sonnel Psychology (53:2), 2000, pp. 375-403.
Motowidlo,S. J. "Sex Role Orientationand
Kirchmeyer,C. "Changeand Stabilityin Mana-
Behavior in a Work Setting,"Journal of Per-
ger's Gender Roles," Journal of Applied
sonality and Social Psychology (42:5), 1982,
Psychology (87:5), 2002, pp. 929-939.
pp. 935-945.
Kirchmeyer,C. "GenderRoles in a Traditionally
Female Occupation: A Study of Emergency, Nunnally,J. C., and Bernstein,I.H. Psychometric
Theory(3rded.), McGraw-Hill, New York,1994.
Operating, Intensive Care, and Psychiatric Olfman, L., and Mandviwalla,M. "Conceptual
Nurses, Journalof VocationalBehavior(50:1), Versus Procedural Software Training for
1997, pp. 78-95.
GraphicalUser Interfaces:A LongitudinalField
Leonard-Barton,D., and Deschamps, I. "Mana-
Experiment,"MIS Quarterly(18:4), 1994, pp.
gerial Influencein the Implementationof New 405-426.
Technology," Management Science (34:10), Plouffe, C. R., Hulland,J. S., and Vandenbosch,
1988, pp. 1252-1265. M. "ResearchReport: Richness Versus Parsi-
Levy,J. A. "Intersectionsof Gender and Aging," mony in ModelingTechnologyAdoptionDeci-
The Sociological Quarterly(29:4), 1988, pp.
sions-Understanding MerchantAdoptionof a
479-486. Smart Card-Based Payment System," Infor-
Lubinski,D., Tellegen, A. and Butcher, J. N. mation Systems Research (12:2), 2001, pp.
"Masculinity, Femininity, and Androgyny 208-222.
Viewed and Assessed as DistinctConcepts," Plude, D., and Hoyer,W. "Attentionand Perfor-
Journalof Personalityand Social Psychology mance: Identifyingand LocalizingAge Defi-
(44:2), 1983, pp. 428-439. cits," in Aging and Human Performance, N.
Lynott,P. P., and McCandless,N. J. "TheImpact Charness (ed.), JohnWiley&Sons, NewYork,
of Age vs. LifeExperienceson the GenderRole 1985, pp. 47-99.
Attitudesof Women in DifferentCohorts,"Jour- Porter, L. "JobAttitudesin Management: Per-
nalof WomenandAging(12:2),2000, pp. 5-21. ceived Importanceof Needs as a Functionof
Mathieson,K. "PredictingUser Intentions:Com- Job Level," Journal of Applied Psychology
paringthe TechnologyAcceptance Modelwith (47:2), 1963, pp. 141-148.
474 MISQuarterly
Vol.27 No.3/September
2003
Venkatesh
et al./UserAcceptanceof IT
West, S. G., and Hepworth,J. T., "Statistical Gordon B. Davis, Honeywell Professor of
Issues in the Study of TemporalData: Daily ManagementInformationSystems in the Carlson
Experiences," Journal of Personality (59:2), School of Managementat the Universityof Minne-
1991, pp. 609-662. sota, is one of the founders of the academic
Westland, J. C., and Clark,T. H. K. GlobalElec- disciplineof informationsystems. He has lectured
tronicCommerce: Theoryand Case Studies, in 25 countriesand has written20 books and over
MITPress, Cambridge,MA,2000. 200 articles,monographs,and bookchapters. He
Wong, P. T. P., Kettlewell,G., and Sproule, C. F. participatedin and helped form the majoraca-
"Onthe Importanceof Being Masculine: Sex demic associations related to the field of man-
Role, Attribution, and Women's Career agement informationsystems. He has been
Achievement,"Sex Roles (12:7/8), 1985, pp. honored as an ACM Fellow and an AIS Fellow,
757-769. and is a recipient of the AIS LEO award for
lifetime achievement in the field of information
systems. His research interests include concep-
About the Authors tual foundationsof informationsystems, informa-
tion system design and implementation,and
Viswanath Venkatesh is Tyser Fellow,associate managementof the IS function. He has a Ph.D.
professor, and directorof MBAConsultingat the fromStanfordUniversityand honorarydoctorates
RobertH.SmithSchool of Business at the Univer- fromthe Universityof Lyon,France,the University
sity of Maryland,and has been on the facultythere of Zurich,Switzerlandand the StockholmSchool
since 1997. He earned his Ph.D. at the University of Economics, Sweden.
of Minnesota'sCarlson School of Management.
His research interests are in implementationand Fred D. Davis is DavidD. Glass Endowed Chair
use of technologies in organizationsand homes. Professorin InformationSystems and Chairof the
His research has been publishedin many leading InformationSystems Departmentat the Sam M.
journals including MIS Quarterly, Information Walton College of Business at the Universityof
Systems Research, ManagementScience, Com- Arkansas. Dr. Davis earned his Ph.D. at MIT's
munications of the ACM, Decision Sciences, Sloan School of Management,and has served on
OrganizationalBehavior and Human Decision the business school faculties at University of
Processes, PersonnelPsychology. Heis currently Michigan,Universityof Minnesota,and University
an associate editor at MIS Quarterlyand Infor- of Maryland.He has taughta wide range of infor-
mation Systems Research. He received MIS mation technology (IT) courses at the under-
Quarterly's"Reviewerof the Year"awardin 1999. graduate, MBA,Ph.D., and executive levels. Dr.
Davis has served as associate editor for the
Michael G. Morris is an assistant professor of scholarly journals Management Science, MIS
Commercewithinthe Information Technologyarea Quarterly,and InformationSystems Research. He
at the MclntireSchool of Commerce,Universityof has publishedextensively on the subject of user
Virginia. He received his Ph.D. in Management acceptance of ITand IT-assisteddecision making.
InformationSystems from Indiana Universityin His research has appeared in such journals as
1996. His research interestscan broadlybe clas- MIS Quarterly,InformationSystems Research,
sified as socio-cognitive aspects of human Management Science, Journal of Experimental
response to informationtechnology,includinguser Social Psychology, Decision Sciences, Organiza-
acceptance of informationtechnology, usability tionalBehaviorand HumanDecision Processes,
engineering,and decision-making. His research Communicationsof the AIS, and Journalof MIS.
has been published in MIS Quarterly,Organiza- Currentresearch interests includeITtrainingand
tionalBehaviorand HumanDecision Processes, skillacquisition,managementof emergingIT,and
and Personnel Psychology, among others. the dynamicsof organizationalchange.
MISQuarterly
Vol.27 No.3/September
2003 475
et al./UserAcceptanceof IT
Venkatesh
Appendix A
The most criticalconcern when poolingrepeated measures fromthe same subjects is the possibilityof
correlatederrors. West and Hepworthdescribe this problemas follows:
CorrelatedErrorsTest
We computed the errorterms associated withthe predictionof intentionat T1, T2, and T3 in studies 1
(voluntarysettings) and 2 (mandatorysettings). Further,we also calculatedthe errorterms when pooled
across both settings-i.e., for cross-sectional tests of the unifiedmodel at T1, T2, and T3 respectively.
These computationswere conductedbothforthe preliminary test andthe cross-validation(reportedbelow).
The errortermcorrelationsacross the intentionpredictionsat variouspointsintimeare shown below. Note
that all error correlationsare nonsignificantand, therefore, not significantlydifferentfrom zero in all
situations.
PeriodsSS
Tabe l.CoreatinsBewen r oir Terms of~ ~E
Intention Construct
S*
at VariousTimel
Study I (Voluntary) T1 T2 T3
T1
T2 .04
T3 .11 .09
Study 2 (Mandatory) T1 T2 T3
T1
T2 .07
T3 .08 .13
Study 1 and 2 (Pooled) T1 T2 T3
T1
T2 .06
T3 .09 .10
sured thatthe data includedto examine the interactiontermswithexperience didnot includeany potential
forsystematiccorrelatederrors. Using50 such randomsubsamples, the modelwas tested and the results
derivedsupportedthe patternobserved when the entiredata set was pooled across experience.
Taken together,the analyses reportedabove supportthe poolingof data (see Table 17) across levels of
experience and eliminatethe potentialstatisticalconcerns noted by West and Hepworthin the analysis of
temporaldata.
Appendix B
As withthe test of the preliminarymodel, priorto poolingthe data forthe cross-validationstudies (studies
3 and 4), we conducted statisticaltests to examine the independence of observations (as detailed in
AppendixA). The table below presents the errorterm correlationmatrices for intentionfor studies 3
(voluntary)and 4 (mandatory)as well as pooled across both settings at T1, T2, and T3 respectively.
ToBoIoV
Perod
Study 3 (Voluntary) T1 T2 T3
T1
T2 .01
T3 .07 .11
Study 4 (Mandatory) T1 T2 T3
T1
T2 .04
T3 .02 .08
Study 3 and 4 (Pooled) TI T2 T3
T1
T2 .03
T3 .05 .10