Impacts of IT Acceptance and Resistance Behaviors: A Novel Framework

Despite the progress that has been made in understanding acceptance and resistance, there remains a need to further clarify into what behaviors they translate and what their impacts are. On the basis of our review, acceptance and resistance are associated with a range of behaviors, which in turn are related to various individual and organizational impacts. We suggest that taking these behaviors at face value is misleading and that a better understanding of their impacts lies in taking organizational intent into account. We develop propositions to provide a theoretical explanation of the impacts of IT-related behaviors associated with acceptance and resistance in light of their conformity with IT terms of use. Generally, acceptance and conformity with terms of use result in positive impacts but may occasionally have adverse consequences. Similarly, resistance and non-conformity typically have negative consequences but may sometimes benefit the organization.

[1]  Elaine H. Ferneley,et al.  Resist, comply or workaround? An examination of different facets of user engagement with information systems , 2006, Eur. J. Inf. Syst..

[2]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[3]  David M. Gann,et al.  "In Case of Fire, Please Use the Elevator": Simulation Technology and Organization in Fire Engineering , 2007, Organ. Sci..

[4]  Suzanne Rivard,et al.  Information Technology Implementers' Responses to User Resistance: Nature and Effects , 2012, MIS Q..

[5]  Ryad Titah,et al.  Information System Use - Related Activity: An Expanded Behavioral Conceptualization of Individual-Level Information System Use , 2007, Inf. Syst. Res..

[6]  Marjolein van Offenbeek,et al.  Towards integrating acceptance and resistance research: evidence from a telecare case study , 2013, Eur. J. Inf. Syst..

[7]  Mark Griffiths,et al.  Sex on the internet: Observations and implications for internet sex addiction , 2001 .

[8]  W. Powell,et al.  The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .

[9]  Ephraim R. McLean,et al.  Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..

[10]  Wanda J. Orlikowski,et al.  Evolving the notes: organizational change around groupware technology , 1997 .

[11]  Wei Wang,et al.  System deep usage in post-acceptance stage: a literature review and a new research framework , 2006, Int. J. Bus. Inf. Syst..

[12]  W. Richard Scott,et al.  Formal Organizations: A Comparative Approach. , 1962 .

[13]  Eric T. G. Wang,et al.  Understanding misalignment and cascading change of ERP implementation: a stage view of process analysis , 2005, Eur. J. Inf. Syst..

[14]  W. Chismar,et al.  The interaction of institutionally triggered and technology-triggered social structure change: an investigation of computerized physician order entry , 2007 .

[15]  Anthony DiRomualdo,et al.  Strategic Intent for IT Outsourcing , 1998 .

[16]  M. Markus,et al.  The Enterprise System Experience— From Adoption to Success , 2000 .

[17]  Lorne Olfman,et al.  Rethinking end-user training strategy: applying a hierarchical knowledge-level model , 1999 .

[18]  Monideepa Tarafdar,et al.  The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation , 2008, Inf. Syst. Res..

[19]  Hock-Hai Teo,et al.  An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..

[20]  Kailash Joshi,et al.  A Model of Users' Perspective on Change: The Case of Information Systems Technology Implementation , 1991, MIS Q..

[21]  Alexander Serenko,et al.  Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users , 2011, MIS Q..

[22]  Radhika Santhanam,et al.  A Longitudinal Field Study of Training Practices in a Collaborative Application Environment , 2003, J. Manag. Inf. Syst..

[23]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[24]  Brian L. Dos Santos,et al.  Improving the return on IT investment: the productivity paradox , 2000, Int. J. Inf. Manag..

[25]  W. Orlikowski Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000 .

[26]  Monideepa Tarafdar,et al.  The Impact of Technostress on Role Stress and Productivity , 2007, J. Manag. Inf. Syst..

[27]  Jörn-Axel Meyer,et al.  The acceptance of visual information in management , 1997, Inf. Manag..

[28]  Marie-Claude Boudreau,et al.  Enacting Integrated Information Technology: A Human Agency Perspective , 2005, Organ. Sci..

[29]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[30]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[31]  Anne Beaudry,et al.  The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use , 2010, MIS Q..

[32]  Debra L. Nelson,et al.  Individual Adjustment to Information-Driven Technologies: A Critical Review , 1990, MIS Q..

[33]  Brian T. Pentland,et al.  USE AND PRODUCTIVITY IN PERSONAL COMPUTING: AN EMPIRICAL TEST , 1989 .

[34]  W. Orlikowski,et al.  Windows of Opportunity: Temporal Patterns of Technological Adaptation in Organizations , 2011 .

[35]  Gerald C. Kane,et al.  IS Avoidance in Health-Care Groups: A Multilevel Investigation , 2011, Inf. Syst. Res..

[36]  Anne Beaudry,et al.  Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..

[37]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.

[38]  Brian S. Butler,et al.  Power and Information Technology Research: A Metatriangulation Review , 2002, MIS Q..

[39]  Robert W. Zmud,et al.  A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems , 2005, MIS Q..

[40]  S. Newell,et al.  Repairing ERP , 2006 .

[41]  Robert W. Zmud,et al.  The Nature and Determinants of IT Acceptance, Routinization, and Infusion , 1993, Diffusion, Transfer and Implementation of Information Technology.

[42]  Steven Hornik,et al.  Passive resistance misuse: overt support and covert recalcitrance in IS implementation , 1996 .

[43]  Shan Ling Pan,et al.  Managing user acceptance towards enterprise resource planning (ERP) systems – understanding the dissonance between user expectations and managerial policies , 2005, Eur. J. Inf. Syst..

[44]  Daniel Robey,et al.  A Social Process Model of User-Analyst Relationships , 1992, MIS Q..

[45]  Nick Bontis,et al.  Blackberry Addiction: Symptoms and Outcomes , 2008, AMCIS.

[46]  D. C. Gash,et al.  Waiting for innovation in the human resources department: Godot implements a human resource information system , 1994 .

[47]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[48]  Wallace E. Carroll,et al.  The Diffusion and Assimilation of Information Technology Innovations , 2001 .

[49]  Paul M. Leonardi,et al.  Activating the Informational Capabilities of Information Technology for Organizational Change , 2007, Organ. Sci..

[50]  Mohammad Muzahid Akbar,et al.  ORGANIZATIONAL CITIZENSHIP BEHAVIOR: ITS NATURE AND ANTECEDENTS , 2004 .

[51]  Rudy Hirschheim,et al.  Information Systems and User Resistance: Theory and Practice , 1988, Comput. J..

[52]  Chien Chou,et al.  A Review of the Research on Internet Addiction , 2005 .

[53]  Kuheli Roy Sarkar Assessing insider threats to information security using technical, behavioural and organisational measures , 2010, Inf. Secur. Tech. Rep..

[54]  Kenneth L. Kraemer,et al.  Executives’ Perceptions of the Business Value of Information Technology: A Process-Oriented Approach , 2000, J. Manag. Inf. Syst..

[55]  Liette Lapointe,et al.  Is Smartphone Usage Truly Smart? A Qualitative Investigation of IT Addictive Behaviors , 2013, 2013 46th Hawaii International Conference on System Sciences.

[56]  Ronald E. Rice,et al.  Technology adaption: the case of a computer-supported inter-organizational virtual team 1 , 2000 .

[57]  Claudio U. Ciborra,et al.  Groupware and teamwork: invisible aid or technical hindrance? , 1997 .

[58]  Ronald E. Rice,et al.  Technology Adaptation: The Case of a Computer-Supported Inter-Organizational Virtual Team , 2000, MIS Q..

[59]  Rajiv Kishore,et al.  A Comparative Analysis of E-Commerce Governance Mechanisms , 2000 .

[60]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[61]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[62]  Nelson E. King,et al.  Enacting computer workaround practices within a medication dispensing system , 2008, Eur. J. Inf. Syst..

[63]  P. Prasad,et al.  Stretching the Iron Cage: The Constitution and Implications of Routine Workplace Resistance , 2000 .

[64]  Gerardine DeSanctis,et al.  Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory , 1994 .

[65]  C. Barnard The Functions of the Executive , 1939 .

[66]  Suzanne Rivard,et al.  An Organizational Culture-Based Theory of Clinical Information Systems Implementation in Hospitals , 2011, J. Assoc. Inf. Syst..

[67]  Mike Chiasson,et al.  Contextual influences on technology use mediation: a comparative analysis of electronic medical record systems , 2005, Eur. J. Inf. Syst..

[68]  Petter Gottschalk,et al.  Maturity model for IT outsourcing relationships , 2006, Ind. Manag. Data Syst..

[69]  Lisen Selander,et al.  Cynicism as user resistance in IT implementation , 2012, Inf. Syst. J..

[70]  Ephraim R. McLean,et al.  The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..

[71]  Peter B. Seddon A Respecification and Extension of the DeLone and McLean Model of IS Success , 1997, Inf. Syst. Res..

[72]  Brian S. Butler,et al.  Reliability, Mindfulness, and Information Systems , 2006, MIS Q..

[73]  Yajiong Xue,et al.  Punishment, Justice, and Compliance in Mandatory IT Settings , 2011, Inf. Syst. Res..

[74]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[75]  M. Lynne Markus,et al.  Power, politics, and MIS implementation , 1987, CACM.

[76]  Neil Pollock,et al.  Generification Work in the Production of Organizational Software Packages , 2022 .

[77]  A. Gouldner Patterns Of Industrial Bureaucracy , 1954 .

[78]  Nick Bontis,et al.  Family and work-related consequences of addiction to organizational pervasive technologies , 2011, Inf. Manag..

[79]  M. Lynne Markus,et al.  If we build it, they will come: Designing information systems that people want to use , 1994 .

[80]  Catherine E. Connelly,et al.  In Justice We Trust: Predicting User Acceptance of E-Customer Services , 2008, J. Manag. Inf. Syst..

[81]  Barbara H Wixom,et al.  A Theoretical Integration of User Satisfaction and Technology Acceptance , 2005, Inf. Syst. Res..

[82]  E. B. Swanson,et al.  Information System Implementation: Bridging the Gap Between Design and Utilization , 1988 .

[83]  Marianne Bradford,et al.  The value impact of strategic intent on firms engaged in information systems outsourcing , 2009, Int. J. Account. Inf. Syst..

[84]  Viswanath Venkatesh,et al.  Model of Acceptance with Peer Support: A Social Network Perspective to Understand Employees' System Use , 2009, MIS Q..

[85]  M. Lynne Markus,et al.  A Foundation for the Study of IT Effects: A New Look at DeSanctis and Poole's Concepts of Structural Features and Spirit , 2008, J. Assoc. Inf. Syst..

[86]  M. Griffiths Internet addiction: Fact or fiction? , 1999 .

[87]  Robin L. Wakefield,et al.  Mobile computing: a user study on hedonic/utilitarian mobile device usage , 2006, Eur. J. Inf. Syst..

[88]  Melissa Mazmanian,et al.  UBIQUITOUS EMAIL: INDIVIDUAL EXPERIENCES AND ORGANIZATIONAL CONSEQUENCES OF BLACKBERRY USE. , 2006 .

[89]  Suzanne Rivard,et al.  A Triple Take on Information System Implementation , 2007, Organ. Sci..

[90]  Neil F. Doherty,et al.  Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy , 2011, Int. J. Inf. Manag..

[91]  Varun Grover,et al.  Contributing to Rigorous and Forward Thinking Explanatory Theory , 2008, J. Assoc. Inf. Syst..

[92]  P. Leonardi,et al.  What’s Under Construction Here? Social Action, Materiality, and Power in Constructivist Studies of Technology and Organizing , 2010 .

[93]  Suzanne Rivard,et al.  A Multilevel Model of Resistance to Information Technology Implementation , 2005, MIS Q..

[94]  Shoshana Zuboff,et al.  In the Age of the Smart Machine: The Future of Work and Power , 1989 .

[95]  Cynthia Mathis Beath,et al.  The Information Technology Interaction Model: A Foundation for the MBA Core Course , 1995, MIS Q..

[96]  Wendy L. Cukier,et al.  Is mobile email functional or dysfunctional? Two perspectives on mobile email usage , 2006, Eur. J. Inf. Syst..

[97]  Marc Berg,et al.  Viewpoint Paper: Some Unintended Consequences of Information Technology in Health Care: The Nature of Patient Care Information System-related Errors , 2003, J. Am. Medical Informatics Assoc..

[98]  Deborah Compeau,et al.  Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..

[99]  Paul M. Leonardi,et al.  When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies , 2011, MIS Q..

[100]  S. Barley Technology as an occasion for structuring: evidence from observations of CT scanners and the social order of radiology departments. , 1986, Administrative science quarterly.

[101]  H. Simon,et al.  Administrative Behavior: A Study of Decision-Making Processes in Administrative Organization. , 1959 .

[102]  Detmar W. Straub,et al.  Reconceptualizing System Usage: An Approach and Empirical Test , 2006, Inf. Syst. Res..

[103]  Atreyi Kankanhalli,et al.  Investigating user resistance to information systems implementation: a status quo bias perspective , 2009 .

[104]  M. Griffiths Internet abuse in the workplace: Issues and concerns for employers and employment counselors , 2003 .

[105]  Sebastián Bruque Cámara,et al.  Individual Adaptation to IT-Induced Change: The Role of Social Networks , 2008, J. Manag. Inf. Syst..

[106]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[107]  Susan A. Brown,et al.  Do I really have to? User acceptance of mandated technology , 2002, Eur. J. Inf. Syst..

[108]  Jeanne W. Ross,et al.  Learning to Implement Enterprise Systems: An Exploratory Study of the Dialectics of Change , 2002, J. Manag. Inf. Syst..

[109]  John W. Meyer,et al.  Institutionalized Organizations: Formal Structure as Myth and Ceremony , 1977, American Journal of Sociology.

[110]  Robert W. Zmud,et al.  An attributional explanation of individual resistance to the introduction of information technologies in the workplace , 1996, Behav. Inf. Technol..

[111]  Anol Bhattacherjee,et al.  Physicians' resistance toward healthcare information technology: a theoretical model and empirical test , 2007, Eur. J. Inf. Syst..

[112]  Ann Majchrzak,et al.  A Longitudinal Study of Adjustment to Technological Change: From Mass To Computer-Automated Batch Production , 1988 .

[113]  W. Orlikowski,et al.  Genres of Organizational Communication: A Structurational Approach to Studying Communication and Media , 1992 .

[114]  R. S. Davidson,et al.  Computer Fear and Addiction , 1985 .

[115]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[116]  P. Leonardi WHEN DOES TECHNOLOGY ENABLE ORGANIZATIONAL CHANGE? CONVERGENT FEATURE USE AND COLLECTIVE AFFORDANCES , 2011 .

[117]  Nelson E. King,et al.  Institutionalized computer workaround practices in a Mediterranean country: an examination of two organizations , 2012, Eur. J. Inf. Syst..

[118]  R. Zmud,et al.  Information technology implementation research: a technological diffusion approach , 1990 .