An empirical investigation of anti-spyware software adoption: A multitheoretical perspective

We performed an empirical investigation of factors affecting an individual's decision to adopt anti-spyware software. Our results suggested that an individual's attitude, subjective norm, perceived behavioral control, and denial of responsibility significantly affected anti-spyware adoption intention. Also, relative advantage and compatibility showed a significant effect on attitude, visibility, and image on subjective norm, and trialability, self-efficacy, and computing capacity on perceived behavioral control. Interestingly, moral obligation, ease of use, and perceived cost were not as significant as was originally expected.

[1]  Deborah Compeau,et al.  Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..

[2]  Karen D. Loch,et al.  Ethics and computer use , 1995, CACM.

[3]  Herman Wold,et al.  Soft modelling: The Basic Design and Some Extensions , 1982 .

[4]  Paul Jen-Hwa Hu,et al.  Investigating healthcare professionals' decisions to accept telemedicine technology: an empirical test of competing theories , 2002, Inf. Manag..

[5]  Shalom H. Schwartz,et al.  Normative explanations of helping behavior: A critique, proposal, and empirical test , 1973 .

[6]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[7]  R. Zmud,et al.  Information technology implementation research: a technological diffusion approach , 1990 .

[8]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[9]  Mun Y. Yi,et al.  Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..

[10]  Quey-Jen Yeh,et al.  Threats and countermeasures for information system security: A cross-industry study , 2007, Inf. Manag..

[11]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..

[12]  Younghwa Lee,et al.  Investigating factors affecting the adoption of anti-spyware systems , 2005, CACM.

[13]  Lori N. K. Leonard,et al.  Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..

[14]  Fred D. Davis,et al.  Developing and Validating an Observational Learning Model of Computer Software Training and Skill Acquisition , 2003, Inf. Syst. Res..

[15]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[16]  Jen-Her Wu,et al.  What drives mobile commerce?: An empirical evaluation of the revised technology acceptance model , 2005, Inf. Manag..

[17]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[18]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[19]  E. Rogers,et al.  Diffusion of Innovations , 1964 .

[20]  H. Kelman Compliance, identification, and internalization three processes of attitude change , 1958 .

[21]  Viswanath Venkatesh,et al.  A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..

[22]  Kar Yan Tam,et al.  Factors Affecting the Adoption of Open Systems: An Exploratory Study , 1997, MIS Q..

[23]  A. Manstead,et al.  Evaluating and extending the theory of planned behaviour , 1995 .

[24]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[25]  I. Ajzen,et al.  Predicting dishonest actions using the theory of planned behavior , 1991 .

[26]  J. Hair Multivariate data analysis , 1972 .

[27]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[28]  Thomas F. Stafford,et al.  Spyware: a view from the (online) street , 2005, CACM.

[29]  Peter A. Todd,et al.  Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication , 1992, MIS Q..

[30]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[31]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[32]  Helen Kelley,et al.  Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..

[33]  Sree Nilakanta,et al.  Implementation of Electronic Data Interchange: An Innovation Diffusion Perspective , 1994, J. Manag. Inf. Syst..

[34]  M. Conner,et al.  Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .

[35]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[36]  Ojelanki K. Ngwenyama,et al.  Communication Richness in Electronic Mail: Critical Social Theory and the Contextuality of Meaning , 1997, MIS Q..

[37]  Martin R. Smith Commonsense Computer Security , 1994 .

[38]  Cheng-Kiang Farn,et al.  Acceptance of electronic tax filing: A study of taxpayer intentions , 2006, Inf. Manag..

[39]  Detmar W. Straub,et al.  Validating Instruments in MIS Research , 1989, MIS Q..

[40]  I. Ajzen The theory of planned behavior , 1991 .

[41]  Lei-da Chen,et al.  Enticing online consumers: an extended technology acceptance perspective , 2002, Inf. Manag..

[42]  Richard G. Netemeyer,et al.  Measurement of Consumer Susceptibility to Interpersonal Influence , 1989 .