Examining explorative and exploitative uses of smartphones: a user competence perspective

Purpose – The purpose of this paper is to investigate the effects of user competence on two different usage variables related to information systems (IS) infusion: explorative use and exploitative use. Design/methodology/approach – Structural equation modeling is used to construct a predictive model of user competence toward IS infusion. Individuals’ responses to questions about attitude and intention to use smartphone were collected and analyzed. Findings – The results showed that all first-order factors of user competence were significantly linked to the second-order factor. User competence is then significantly related to IS infusion, both explorative use and exploitative use. Research limitations/implications – This study discusses individual usage behavior related to IS infusion usage. The authors conceptualized that exploitative use is different from explorative use. The findings in this study suggest that user competence must be included in IS usage models, especially IS infusion model. Practical i...

[1]  Louis Raymond,et al.  Impact of task uncertainty, end-user involvement, and competence on the success of end-user computing , 1998, Inf. Manag..

[2]  Bong Gyou Lee,et al.  Analyzing User's Intention and Innovation Diffusion of Smartphones , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[3]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[4]  Barry L. Lewis,et al.  Determinants of Auditor Expertise , 1990 .

[5]  Brenda Eschenbrenner,et al.  Towards a model of information systems user competency , 2010 .

[6]  David Gefen,et al.  Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice , 2000 .

[7]  Zi-Lin He,et al.  Exploration vs. Exploitation: An Empirical Test of the Ambidexterity Hypothesis , 2004, Organ. Sci..

[8]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and Voice Mail Emotion/Adoption Study , 1996, ICIS.

[9]  FangXiaowen,et al.  Moderating Effects of Task Type on Wireless Technology Acceptance , 2006 .

[10]  Izak Benbasat,et al.  The Influence of Business Managers' IT Competence on Championing IT , 2003, Inf. Syst. Res..

[11]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[12]  LimayemMoez,et al.  How habit limits the predictive power of intention , 2007 .

[13]  Myeong-Cheol Park,et al.  Mobile internet acceptance in Korea , 2005, Internet Res..

[14]  Jeanne W. Ross,et al.  Learning to Implement Enterprise Systems: An Exploratory Study of the Dialectics of Change , 2002, J. Manag. Inf. Syst..

[15]  Hye-Jin Lee,et al.  Facets of simplicity for the smartphone interface: A structural model , 2012, Int. J. Hum. Comput. Stud..

[16]  Richard Alba,et al.  Rethinking Assimilation Theory for a New Era of Immigration 1 , 1997, The International migration review.

[17]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[18]  Nick Bontis,et al.  The impact of distractions on the usability and intention to use mobile devices for wireless data services , 2012, Comput. Hum. Behav..

[19]  Sumeet Gupta,et al.  A User Empowerment Approach to Information Systems Infusion , 2014, IEEE Transactions on Engineering Management.

[20]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[21]  L HuffSid,et al.  Assessing User Competence , 2000 .

[22]  Dale Goodhue,et al.  Task-Technology Fit and Individual Performance , 1995, MIS Q..

[23]  Yinglei Wang,et al.  Individual Virtual Competence and Its Influence on Work Outcomes , 2011, J. Manag. Inf. Syst..

[24]  D. Campbell,et al.  Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.

[25]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[26]  R. Zmud,et al.  Information technology implementation research: a technological diffusion approach , 1990 .

[27]  Hao Zhou,et al.  Smart phone for mobile commerce , 2009, Comput. Stand. Interfaces.

[28]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[29]  Shao-I Chiu,et al.  A model of the relationship between psychological characteristics, mobile phone addiction and use of mobile phones by Taiwanese university female students , 2012, Comput. Hum. Behav..

[30]  Ritu Agarwal,et al.  Organizational Mechanisms for Enhancing User Innovation in Information Technology , 1999, MIS Q..

[31]  B. Menguc,et al.  Balancing exploration and exploitation: The moderating role of competitive intensity , 2005 .

[32]  Neda Abasi,et al.  Information systems success: the quest for the dependent variable , 2015 .

[33]  Moez Limayem,et al.  How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance , 2007, MIS Q..

[34]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[35]  KimHee-Woong,et al.  Value-based Adoption of Mobile Internet , 2007 .

[36]  BhattacherjeeAnol,et al.  Influence processes for information technology acceptance , 2006 .

[37]  Shuang Xu,et al.  Moderating Effects of Task Type on Wireless Technology Acceptance , 2005, J. Manag. Inf. Syst..

[38]  Malcolm Munro,et al.  Understanding and measuring user competence , 1997, Inf. Manag..

[39]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[40]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[41]  Varun Grover,et al.  Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms , 2003, MIS Q..

[42]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[43]  Robert W. Zmud,et al.  Measuring technology incorporation/infusion , 1992 .

[44]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[45]  Yinglei Wang,et al.  Knowledge transfer in virtual settings: the role of individual virtual competency , 2009, Inf. Syst. J..

[46]  Jengchung V. Chen,et al.  Acceptance and adoption of the innovative use of smartphone , 2007, Ind. Manag. Data Syst..

[47]  Sean Xin Xu,et al.  Extracting Business Value from IT: A Sensemaking Perspective of Post-Adoptive Use , 2011, Manag. Sci..

[48]  Antti Oulasvirta,et al.  Habits make smartphone use more pervasive , 2011, Personal and Ubiquitous Computing.

[49]  Sangmoon Park,et al.  Separating early-adopters from the majority: The case of Broadband Internet access in Korea , 2005 .

[50]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[51]  James T. C. Teng,et al.  Information Systems Use: Construct conceptualization and scale development , 2012, Comput. Hum. Behav..

[52]  R. Schalock Conceptualization and measurement , 1996 .

[53]  Robert W. Zmud,et al.  The Nature and Determinants of IT Acceptance, Routinization, and Infusion , 1993, Diffusion, Transfer and Implementation of Information Technology.

[54]  Chulmo Koo,et al.  E-Smart Health Information Adoption Processes: Central versus Peripheral Route* , 2014 .

[55]  Anol Bhattacherjee,et al.  Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..

[56]  Izak Benbasat,et al.  Business Competence of Information Technology Professionals: Conceptual Development and Influence on IT-Business Partnerships , 2004, MIS Q..

[57]  Magid Igbaria,et al.  Determinants of intranet diffusion and infusion , 2001 .

[58]  Wynne W. Chin,et al.  The future of diffusion research , 2001, DATB.

[59]  William J. Kettinger,et al.  What Determines Actual Use of Mobile Web Browsing Services? A Contextual Study in Korea , 2011, Commun. Assoc. Inf. Syst..

[60]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[61]  Viswanath Venkatesh,et al.  A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..

[62]  James G. Phillips,et al.  Personality and self reported mobile phone use , 2008, Comput. Hum. Behav..

[63]  Daniel A. Levinthal,et al.  Exploration and Exploitation in Organizational Learning , 2007 .

[64]  Bradley Wilson,et al.  Using PLS to Investigate Interaction Effects Between Higher Order Branding Constructs , 2010 .

[65]  Sue Abdinnour-Helm,et al.  Understanding post‐adoption IS usage stages: an empirical assessment of self‐service information systems , 2013, Inf. Syst. J..

[66]  Wei Wang,et al.  AIS Electronic , 2022 .

[67]  Izak Benbasat,et al.  Information Technology Competence of Business Managers: A Definition and Research Model , 2001, J. Manag. Inf. Syst..

[68]  Jason Bennett Thatcher,et al.  The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems , 2011, IEEE Transactions on Engineering Management.

[69]  Dennis F. Galletta,et al.  Research Note - Knowledge Exploration and Exploitation: The Impacts of Psychological Climate and Knowledge Management System Access , 2011, Inf. Syst. Res..

[70]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[71]  Jason Bennett Thatcher,et al.  Moving Beyond Intentions and Toward the Theory of Trying: Effects of Work Environment and Gender on Post-Adoption Information Technology Use , 2005, MIS Q..

[72]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[73]  Jörg Henseler,et al.  Testing Moderating Effects in PLS Path Models. An Illustration of Available Procedures , 2005 .

[74]  Ritu Agarwal Individual Acceptance of Information Technologies , 2000 .

[75]  Saonee Sarker,et al.  Trends in Mobile Computing within the IS Discipline : A Ten-Year Retrospective Trends in Mobile Computing within the IS Discipline : A Ten-Year Retrospective , 2018 .

[76]  Robert W. Zmud,et al.  A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems , 2005, MIS Q..

[77]  Wei Wang,et al.  ScholarWorks @ Georgia State University , 2022 .

[78]  Ephraim R. McLean,et al.  The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..

[79]  Avi Goldfarb,et al.  How Is the Mobile Internet Different? Search Costs and Local Activities , 2013, Inf. Syst. Res..

[80]  J. J. Po-An Hsieh,et al.  Addressing Digital Inequality for the Socioeconomically Disadvantaged Through Government Initiatives: Forms of Capital That Affect ICT Utilization , 2011, Inf. Syst. Res..

[81]  H DeloneWilliam,et al.  The DeLone and McLean Model of Information Systems Success , 2003 .

[82]  Mani Subramani,et al.  How Do Suppliers Benefit from Information Technology Use in Supply Chain Relationships? , 2004, MIS Q..

[83]  Malcolm Munro,et al.  Assessing User Competence: Conceptualization and Measurement , 2000, Inf. Syst. Res..

[84]  Sumeet Gupta,et al.  Value-based Adoption of Mobile Internet: An empirical investigation , 2007, Decis. Support Syst..

[85]  Detmar W. Straub,et al.  Reconceptualizing System Usage: An Approach and Empirical Test , 2006, Inf. Syst. Res..

[86]  A. Bandura,et al.  Self-Efficacy: The Exercise of Control , 1999, Journal of Cognitive Psychotherapy.

[87]  Viswanath Venkatesh,et al.  Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..

[88]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[89]  Ephraim R. McLean,et al.  Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..

[90]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[91]  Deborah Compeau,et al.  Experience effects on the accuracy of self-assessed user competence , 2006, Inf. Manag..