The Effect of Self Identity and Social Identity on Technology Acceptance

While the effect of social factors on information technology (IT) acceptance behavior has been recognized as an important issue, only a few studies examined this topic in the context of the technology acceptance model. In this study, we incorporate two social factors, self identity and social identity, in the model and address their impacts on IT acceptance decision. An empirical study investigating the impact these social factors have on the acceptance of a web-based class support system is in progress. Upon completion of this study, we expect to provide further understanding on the role of social influence on individual technology acceptance decisions. Keyword: TAM, identity theory, social influence.

[1]  A. Tenbrunsel,et al.  Organizational Behavior and Human Decision Processes , 2013 .

[2]  Cynthia K. Riemenschneider,et al.  Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests , 1997, Inf. Syst. Res..

[3]  Deborah Compeau,et al.  Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..

[4]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[5]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[6]  P. Sparks,et al.  SELF-IDENTITY AND THE THEORY OF PLANNED BEHAVIOR - ASSESSING THE ROLE OF IDENTIFICATION WITH GREEN CONSUMERISM , 1992 .

[7]  Sören Holmberg,et al.  The Intention-Behavior Relationship Among U.S. and Swedish Voters , 1990 .

[8]  Jane M. Howell,et al.  Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model , 1994, J. Manag. Inf. Syst..

[9]  Ilze Zigurs,et al.  An Exploratory Study of Roles in Computer-Supported Groups , 1994, MIS Q..

[10]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[11]  M. Hogg,et al.  The theory of planned behaviour: self-identity, social identity and group norms. , 1999, The British journal of social psychology.

[12]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[13]  Magid Igbaria,et al.  Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model , 1997, MIS Q..

[14]  Detmar W. Straub,et al.  Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..

[15]  Fred A. Mael,et al.  Identifying Organizational Identification , 1992 .

[16]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[17]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[18]  Detmar W. Straub,et al.  The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..

[19]  Mark Snyder,et al.  Acting on One's Attitudes: The Role of a History of Choosing Situations , 1995 .

[20]  S. Stryker Symbolic Interactionism: A Social Structural Version , 1980 .

[21]  R. Holtz,et al.  The Effects of Social Identity on the Self-Set Goals and Task Performance of High and Low Self-Esteem Individuals , 1997, Organizational behavior and human decision processes.

[22]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[23]  M. Hogg,et al.  Social Identity and Self-Categorization Processes in Organizational Contexts , 2000 .

[24]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[25]  Henri Barki,et al.  Explaining the Role of User Participation in Information System Use , 1994 .

[26]  Dominic Abrams,et al.  The role of categorization and in-group norms in judgments of groups and their members , 1998 .

[27]  Viswanath Venkatesh,et al.  Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..

[28]  V. Venkatesh,et al.  AGE DIFFERENCES IN TECHNOLOGY ADOPTION DECISIONS: IMPLICATIONS FOR A CHANGING WORK FORCE , 2000 .

[29]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[30]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[31]  Richard,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace , 2022 .

[32]  Yannis Theodorakis,et al.  Theodorakis, Y. (1994). Planned behavior, attitude strength, role identity, and the prediction of exercise behavior. The Sport Psychologist, 8, 149-165. Planned behavior, attitude strength, role-identity, and the prediction of exercise behavior , 1994 .

[33]  M. Budden Focus groups: Theory and practice , 1999 .

[34]  Bruce J. Biddle,et al.  Norms, Preferences, Identities and Retention Decisions , 1987 .

[35]  Blair H. Sheppard,et al.  The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .

[36]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[37]  Viswanath Venkatesh,et al.  A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..

[38]  C. Brodsky,et al.  Identities and Interactions. , 1967 .

[39]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[40]  Henry C. Lucas,et al.  Technology Use and Performance: A Field Study of Broker Workstations* , 1999 .

[41]  Blake E. Ashforth,et al.  Socialization and Newcomer Adjustment: The Role of Organizational Context , 1998 .

[42]  P. Callero,et al.  Role identity and reasoned action in the prediction of repeated behavior , 1988 .

[43]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[44]  Lynn J. Frewer,et al.  ASSESSING AND STRUCTURING ATTITUDES TOWARD THE USE OF GENE TECHNOLOGY IN FOOD-PRODUCTION - THE ROLE OF PERCEIVED ETHICAL OBLIGATION , 1995 .

[45]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[46]  Fred D. Davis,et al.  Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1 , 1992 .

[47]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[48]  M. Conner,et al.  Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .

[49]  Magid Igbaria,et al.  A Motivational Model of Microcomputer Usage , 1996, J. Manag. Inf. Syst..

[50]  Paul Sparks,et al.  Self‐Identity and the Theory of Planned Behavior: A Useful Addition or an Unhelpful Artifice?1 , 1998 .

[51]  Ojelanki K. Ngwenyama,et al.  Communication Richness in Electronic Mail: Critical Social Theory and the Contextuality of Meaning , 1997, MIS Q..