Inhibitors and Enablers as Dual Factor Concepts in Technology Usage

Information systems (IS) research has focused extensively on the factors that foster adoption and usage. A large body of work explores overall beliefs about system usage, antecedents of system satisfaction, and other perceptions that enable system success, create positive attitudes, and encourage usage. However, much less attention has been given to what perceptions uniquely inhibit usage. In large part, this is due to the implicit assumption that the inhibitors of usage are merely the opposite of the enablers. This paper proposes a theory for the existence, nature, and effects of system attribute perceptions that lead solely to discourage use. I posit that usage inhibitors deserve an independent investigation on the basis of three key arguments. One, there exist perceptions that serve solely to discourage usage, and these are qualitatively different from the opposite of the perceptions that encourage usage. Two, these inhibiting and enabling perceptions are independent of one another and can coexist. Three, inhibiting and enabling perceptions have differing antecedent and consequent effects.. As unique beliefs, inhibiting perceptions can add to our understanding of the antecedents of usage or outright rejection. Further, such inhibitors may not only be important to the IS usage decision, they may be more important than enabling beliefs.

[1]  Paul A. Pavlou,et al.  Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..

[2]  M. Scheier,et al.  Pessimism, age, and cancer mortality. , 1996, Psychology and aging.

[3]  Susan A. Brown,et al.  Who's Afraid of the Virtual World? Anxiety and Computer-Mediated Communication , 2004, J. Assoc. Inf. Syst..

[4]  Suzanne Rivard,et al.  An Integrative Contingency Model of Software Project Risk Management , 2001, J. Manag. Inf. Syst..

[5]  M. F. Luce,et al.  Constructive Consumer Choice Processes , 1998 .

[6]  Izak Benbasat,et al.  The Identity Crisis Within the IS Discipline: Defining and Communicating the Discipline's Core Properties , 2003, MIS Q..

[7]  Clifford Nass,et al.  The media equation - how people treat computers, television, and new media like real people and places , 1996 .

[8]  S. Asch Forming impressions of personality. , 1946, Journal of Abnormal Psychology.

[9]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[10]  D. Watson,et al.  Toward a consensual structure of mood. , 1985, Psychological bulletin.

[11]  O. Ybarra Naive causal understanding of valenced behaviors and its implications for social information processing. , 2002, Psychological bulletin.

[12]  A. d’Astous,et al.  Irritating Aspects of the Shopping Environment , 2000 .

[13]  Roderick M. Kramer,et al.  Trust and distrust in organizations: emerging perspectives, enduring questions. , 1999, Annual review of psychology.

[14]  Kenneth J. Calhoun,et al.  Organizational Computing as a Facilitator of Operational and Managerial Decision Making: An Exploratory Study of Managers' Perceptions* , 1996 .

[15]  Clifford Nass,et al.  Source Orientation in Human-Computer Interaction , 2000, Commun. Res..

[16]  Deborah Compeau,et al.  Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study , 1999, MIS Q..

[17]  G. Peeters,et al.  Positive-Negative Asymmetry in Evaluations: The Distinction Between Affective and Informational Negativity Effects , 1990 .

[18]  Timothy D. Wilson,et al.  Mental contamination and mental correction: unwanted influences on judgments and evaluations. , 1994, Psychological bulletin.

[19]  Mary Jo Bitner,et al.  Self-Service Technologies: Understanding Customer Satisfaction with Technology-Based Service Encounters , 2000 .

[20]  Joseph S. Valacich,et al.  The Influence of Task Interruption on Individual Decision Making: An Information Overload Perspective , 1999 .

[21]  T. S. Robertson,et al.  Technology Diffusion: An Empirical Test of Competitive Effects , 1989 .

[22]  Ephraim R. McLean,et al.  Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..

[23]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[24]  Dale T. Miller,et al.  Norm theory: Comparing reality to its alternatives , 1986 .

[25]  David Gefen,et al.  Customer Loyalty in E-Commerce , 2002, J. Assoc. Inf. Syst..

[26]  I. Ajzen The theory of planned behavior , 1991 .

[27]  Andrew B. Whinston,et al.  Research Commentary: Introducing a Third Dimension in Information Systems Design - The Case for Incentive Alignment , 2001, Inf. Syst. Res..

[28]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[29]  Margaret G. Meloy,et al.  Predecisional Distortion of Product Information , 1998 .

[30]  F. Herzberg Work and the nature of man , 1967 .

[31]  R. Oliver Cognitive, affective, and attribute bases of the satisfaction response. , 1993 .

[32]  Ping Zhang,et al.  Satisfiers and dissatisfiers: A two-factor model for website design and evaluation , 2000, J. Am. Soc. Inf. Sci..

[33]  Arun Rai,et al.  Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis , 2002, Inf. Syst. Res..

[34]  Ritu Agarwal,et al.  Are Individual Differences Germane to the Acceptance of New Information Technologies , 1999 .

[35]  Ephraim R. McLean,et al.  The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..

[36]  Peter B. Seddon A Respecification and Extension of the DeLone and McLean Model of IS Success , 1997, Inf. Syst. Res..

[37]  Charles J. Kacmar,et al.  Whoops... did I use the wrong concept to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[38]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[39]  Kalle Lyytinen,et al.  Attention Shaping and Software Risk - A Categorical Analysis of Four Classical Risk Management Approaches , 1998, Inf. Syst. Res..

[40]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[41]  R. Lewicki,et al.  Trust And Distrust: New Relationships and Realities , 1998 .

[42]  Viswanath Venkatesh,et al.  A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..

[43]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[44]  John J. Skowronski,et al.  Social judgment and social memory: The role of cue diagnosticity in negativity, positivity, and extremity biases. , 1987 .

[45]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.

[46]  A. Treisman,et al.  A feature-integration theory of attention , 1980, Cognitive Psychology.

[47]  Sirkka L. Jarvenpaa,et al.  Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[48]  William T. Ross,et al.  The Asymmetric Impact of Negative and Positive Attribute-Level Performance on Overall Satisfaction and Repurchase Intentions , 1998 .

[49]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[50]  Fatemeh Zahedi,et al.  The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach , 2002, Inf. Syst. Res..

[51]  V. Yzerbyt,et al.  Requesting information to form an impression : the influence of valence and confirmatory status , 1991 .

[52]  Vincent Yzerbyt,et al.  Personality traits that distinguish you and me are better memorized , 1997 .

[53]  E. Buchborn [Trust and distrust]. , 1983, MMW, Munchener medizinische Wochenschrift.

[54]  Joseph S. Valacich,et al.  The Effects of Interruptions, Task Complexity, and Information Presentation on Computer-Supported Decision-Making Performance , 2003, Decis. Sci..

[55]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[56]  Suzanne Rivard,et al.  Toward an Assessment of Software Development Risk , 1993, J. Manag. Inf. Syst..

[57]  J. C. Flanagan Psychological Bulletin THE CRITICAL INCIDENT TECHNIQUE , 2022 .

[58]  E. Diener,et al.  The personality structure of affect. , 1995 .

[59]  John P. Robinson,et al.  Measures Of Personality And Social Psychological Attitudes , 1991 .

[60]  Marcy M. Allen,et al.  The Ever-Shifting Internet Population: A New Look At Internet Access and the Digital Divide, Amanda Lenhart (Ed.). The Pew Internet & American Life Project, Washington, DC (2003) , 2005, Gov. Inf. Q..

[61]  Edward B. Royzman,et al.  Negativity Bias, Negativity Dominance, and Contagion , 2001 .

[62]  Roy Payne,et al.  The nature and structure of workers' trust in management , 1997 .

[63]  Mary Jo Bitner,et al.  Critical Service Encounters: The Employee's Viewpoint , 1994 .

[64]  R. Johnston The determinants of service quality: satisfiers and dissatisfiers , 1995 .

[65]  Nanda Izak Kumar,et al.  Para-Social Presence and Communication Capabilities of a Web Site: A Theoretical Perspective , 2002 .

[66]  Gabriel J. Biehal,et al.  Memory-Based Inferences during Consumer Choice , 1990 .

[67]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[68]  Auke Tellegen,et al.  Issues in dimensional structure of affect--Effects of descriptors, measurement error, and response formats: Comment on Russell and Carroll (1999). , 1999 .

[69]  E. Anderson,et al.  The Antecedents and Consequences of Customer Satisfaction for Firms , 1993 .

[70]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.