Unified theory of acceptance and use of technology

Last updated

The unified theory of acceptance and use of technology (UTAUT) is a technology acceptance model formulated by Venkatesh and others in "User acceptance of information technology: Toward a unified view". [1] The UTAUT aims to explain user intentions to use an information system and subsequent usage behavior. The theory holds that there are four key constructs: 1) performance expectancy, 2) effort expectancy, 3) social influence, and 4) facilitating conditions.

Contents

The first three are direct determinants of usage intention and behavior, and the fourth is a direct determinant of user behavior. Gender, age, experience, and voluntariness of use are posited to moderate the impact of the four key constructs on usage intention and behavior. The theory was developed through a review and consolidation of the constructs of eight models that earlier research had employed to explain information systems usage behaviour (theory of reasoned action, technology acceptance model, motivational model, theory of planned behavior, a combined theory of planned behavior/technology acceptance model, model of personal computer use, diffusion of innovations theory, and social cognitive theory). Subsequent validation by Venkatesh et al. (2003) of UTAUT in a longitudinal study found it to account for 70% of the variance in Behavioural Intention to Use (BI) and about 50% in actual use. [1]

Application

Extension of the theory

Criticism

See also

Related Research Articles

Persuasive technology is broadly defined as technology that is designed to change attitudes or behaviors of the users through persuasion and social influence, but not necessarily through coercion. Such technologies are regularly used in sales, diplomacy, politics, religion, military training, public health, and management, and may potentially be used in any area of human-human or human-computer interaction. Most self-identified persuasive technology research focuses on interactive, computational technologies, including desktop computers, Internet services, video games, and mobile devices, but this incorporates and builds on the results, theories, and methods of experimental psychology, rhetoric, and human-computer interaction. The design of persuasive technologies can be seen as a particular case of design with intent.

The technology acceptance model (TAM) is an information systems theory that models how users come to accept and use a technology.

Uses and gratifications theory (UGT) is an approach to understanding why and how people actively seek out specific media to satisfy specific needs. UGT is an audience-centered approach to understanding mass communication. Diverging from other media effect theories that question "what does media do to people?", UGT instead focuses on "what do people do with media?" It postulates that media is a highly available product and the audiences are the consumers of the same product.

<span class="mw-page-title-main">Diffusion of innovations</span> Theory on how and why new ideas spread

Diffusion of innovations is a theory that seeks to explain how, why, and at what rate new ideas and technology spread. The theory was popularized by Everett Rogers in his book Diffusion of Innovations, first published in 1962. Rogers argues that diffusion is the process by which an innovation is communicated over time among the participants in a social system. The origins of the diffusion of innovations theory are varied and span multiple disciplines.

<span class="mw-page-title-main">Theory of planned behavior</span> Theory that links behavior

The Theory of Planned Behavior (TPB) is a psychological theory that links beliefs to behavior. The theory maintains that three core components, namely, attitude, subjective norms, and perceived behavioral control, together shape an individual's behavioral intentions. In turn, a tenet of TPB is that behavioral intention is the most proximal determinant of human social behavior.

The elaboration likelihood model (ELM) of persuasion is a dual process theory describing the change of attitudes. The ELM was developed by Richard E. Petty and John Cacioppo in 1980. The model aims to explain different ways of processing stimuli, why they are used, and their outcomes on attitude change. The ELM proposes two major routes to persuasion: the central route and the peripheral route.

In psychology, self-efficacy is an individual's belief in their capacity to act in the ways necessary to reach specific goals. The concept was originally proposed by the psychologist Albert Bandura.

<span class="mw-page-title-main">Theory of reasoned action</span> Psychological theory

The theory of reasoned action aims to explain the relationship between attitudes and behaviors within human action. It is mainly used to predict how individuals will behave based on their pre-existing attitudes and behavioral intentions. An individual's decision to engage in a particular behavior is based on the outcomes the individual expects will come as a result of performing the behavior. Developed by Martin Fishbein and Icek Ajzen in 1967, the theory derived from previous research in social psychology, persuasion models, and attitude theories. Fishbein's theories suggested a relationship between attitude and behaviors. However, critics estimated that attitude theories were not proving to be good indicators of human behavior. The TRA was later revised and expanded by the two theorists in the following decades to overcome any discrepancies in the A-B relationship with the theory of planned behavior (TPB) and reasoned action approach (RAA). The theory is also used in communication discourse as a theory of understanding.

<span class="mw-page-title-main">Social cognitive theory</span> Theory in psychology

Social cognitive theory (SCT), used in psychology, education, and communication, holds that portions of an individual's knowledge acquisition can be directly related to observing others within the context of social interactions, experiences, and outside media influences. This theory was advanced by Albert Bandura as an extension of his social learning theory. The theory states that when people observe a model performing a behavior and the consequences of that behavior, they remember the sequence of events and use this information to guide subsequent behaviors. Observing a model can also prompt the viewer to engage in behavior they already learned. In other words, people do not learn new behaviors solely by trying them and either succeeding or failing, but rather, the survival of humanity is dependent upon the replication of the actions of others. Depending on whether people are rewarded or punished for their behavior and the outcome of the behavior, the observer may choose to replicate behavior modeled. Media provides models for a vast array of people in many different environmental settings.

Behavioural change theories are attempts to explain why human behaviours change. These theories cite environmental, personal, and behavioural characteristics as the major factors in behavioural determination. In recent years, there has been increased interest in the application of these theories in the areas of health, education, criminology, energy and international development with the hope that understanding behavioural change will improve the services offered in these areas. Some scholars have recently introduced a distinction between models of behavior and theories of change. Whereas models of behavior are more diagnostic and geared towards understanding the psychological factors that explain or predict a specific behavior, theories of change are more process-oriented and generally aimed at changing a given behavior. Thus, from this perspective, understanding and changing behavior are two separate but complementary lines of scientific investigation.

In social dynamics, critical mass is a sufficient number of adopters of a new idea, technology or innovation in a social system so that the rate of adoption becomes self-sustaining and creates further growth. The point at which critical mass is achieved is sometimes referred to as a threshold within the threshold model of statistical modeling.

<span class="mw-page-title-main">Health belief model</span> Psychological model

The health belief model (HBM) is a social psychological health behavior change model developed to explain and predict health-related behaviors, particularly in regard to the uptake of health services. The HBM was developed in the 1950s by social psychologists at the U.S. Public Health Service and remains one of the best known and most widely used theories in health behavior research. The HBM suggests that people's beliefs about health problems, perceived benefits of action and barriers to action, and self-efficacy explain engagement in health-promoting behavior. A stimulus, or cue to action, must also be present in order to trigger the health-promoting behavior.

Fear appeal is a term used in psychology, sociology and marketing. It generally describes a strategy for motivating people to take a particular action, endorse a particular policy, or buy a particular product, by arousing fear. A well-known example in television advertising was a commercial employing the musical jingle: "Never pick up a stranger, pick up Prestone anti-freeze." This was accompanied by images of shadowy strangers (hitchhikers) who would presumably do one harm if picked up. The commercial's main appeal was not to the positive features of Prestone anti-freeze, but to the fear of what a "strange" brand might do.

Social presence theory explores how the "sense of being with another" is influenced by digital interfaces in human-computer interactions. Developed from the foundations of interpersonal communication and symbolic interactionism, social presence theory was first formally introduced by John Short, Ederyn Williams, and Bruce Christie in The Social Psychology of Telecommunications. Research on social presence theory has recently developed to examine the efficacy of telecommunications media, including SNS communications. The theory notes that computer-based communication is lower in social presence than face-to-face communication, but different computer-based communications can affect the levels of social presence between communicators and receivers.

<span class="mw-page-title-main">Active users</span> Performance metric for success of an internet product

Active users is a software performance metric that is commonly used to measure the level of engagement for a particular software product or object, by quantifying the number of active interactions from users or visitors within a relevant range of time . The metric has many uses in software management such as in social networking services, online games, or mobile apps, in web analytics such as in web apps, in commerce such as in internet banking and in academia, such as in user behavior analytics and predictive analytics. Although having extensive uses in digital behavioural learning, prediction and reporting, it also has impacts on the privacy and security, and ethical factors should be considered thoroughly. It measures how many users visit or interact with the product or service over a given interval or period. However, there is no standard definition of this term, so comparison of the reporting between different providers of this metric is problematic. Also, most providers have the interest to show this number as high as possible, therefore defining even the most minimal interaction as "active".. Still the number is a relevant metric to evaluate development of user interaction of a given provider.

<span class="mw-page-title-main">Webreep model</span>

The Webreep model is an information systems theory that explains and predicts website satisfaction, loyalty, and word-of-mouth. The model suggests that four factors directly influence website satisfaction. Website satisfaction, in turn, directly influences website visitor loyalty and likelihood of referral. Each factor is "shaped" by facets. The four dimensions and factors include:

Channel expansion theory (CET) states that individual experience serves as an important role in determining the level of richness perception and development towards certain media tools. It is a theory of communication media perception that incorporates experiential factors to explain and predict user perceptions of a given media channel. The theory suggests that the more knowledge and experience users gain from using a channel, the richer they perceive the medium to be. The more experience, the more stable the knowledge base the person builds, the more knowledge he gains from the given media channel, thus the richer communication he would have using that channel, and ultimately the richer he would perceive the channel. There are four experiential factors that shapes individual's perceived media richness: experience with the channel, experience with the message topic, experience with the organizational context, and experience with a communication partner.

Technological self-efficacy (TSE) is "the belief in one's ability to successfully perform a technologically sophisticated new task". TSE does not highlight specific technological tasks; instead it is purposely vague. This is a specific application of the broader and more general construct of self-efficacy, which is defined as the belief in one's ability to engage in specific actions that result in desired outcomes. Self efficacy does not focus on the skills one has, but rather the judgments of what one can do with his or her skills. Traditionally, a distinguishing feature of self efficacy is its domain-specificity. In other words, judgments are limited to certain types of performances as compared to an overall evaluation of his or her potential. Typically, these constructs refer to specific types of technology; for example, computer self-efficacy, or internet self-efficacy and information technology self-efficacy. In order to organize this literature, technology specific self-efficacies that technology specific self-efficacies can be considered sub-dimensions under the larger construct of technological self-efficacy.

The reasoned action approach (RAA) is an integrative framework for the prediction of human social behavior. The reasoned action approach states that attitudes towards the behavior, perceived norms, and perceived behavioral control determine people's intentions, while people's intentions predict their behaviors.

A Behavioral Change Support System (BCSS) is any information and communications technology (ICT) tool, web platform, or gamified environment which targets behavioral changes in its end-users. BCSS are built upon persuasive systems design techniques.

References

  1. 1 2 Venkatesh, Viswanath; Morris, Michael G.; Davis, Gordon B.; Davis, Fred D. (2003). "User Acceptance of Information Technology: Toward a Unified View". MIS Quarterly. 27 (3): 425–478. doi:10.2307/30036540. JSTOR   30036540. S2CID   14435677.
  2. Koivimäki, T.; Ristola, A.; Kesti, M. (2007). "The perceptions towards mobile services: An empirical analysis of the role of use facilitators". Personal and Ubiquitous Computing. 12 (1): 67–75. doi:10.1007/s00779-006-0128-x. S2CID   6089360.
  3. Eckhardt, A.; Laumer, S.; Weitzel, T. (2009). "Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption". Journal of Information Technology. 24 (1): 11–24. doi:10.1057/jit.2008.31. S2CID   42420244.
  4. Curtis, L.; Edwards, C.; Fraser, K. L.; Gudelsky, S.; Holmquist, J.; Thornton, K.; Sweetser, K. D. (2010). "Adoption of social media for public relations by nonprofit organizations". Public Relations Review. 36 (1): 90–92. doi:10.1016/j.pubrev.2009.10.003. S2CID   154466947.
  5. Verhoeven, J. C.; Heerwegh, D.; De Wit, K. (2010). "Information and communication technologies in the life of university freshmen: An analysis of change". Computers & Education. 55 (1): 53–66. doi:10.1016/j.compedu.2009.12.002.
  6. Welch, Ruel; Alade, Temitope; Nichol, Lynn (2020). "USING THE UNIFIED THEORY OF ACCEPTANCE AND USE OF TECHNOLOGY (UTAUT) MODEL TO DETERMINE FACTORS AFFECTING MOBILE LEARNING ADOPTION IN THE WORKPLACE: A STUDY OF THE SCIENCE MUSEUM GROUP" (PDF). International Journal on Computer Science and Information Systems. 15 (1): 85–98. Retrieved 4 June 2021.
  7. Lin, C.-P.; Anol, B. (2008). "Learning online social support: An investigation of network information technology". CyberPsychology & Behavior. 11 (3): 268–272. doi:10.1089/cpb.2007.0057. PMID   18537495.
  8. Sykes, T. A.; Venkatesh, V.; Gosain, S. (2009). "Model of acceptance with peer support: A social network perspective to understand employees' system use". MIS Quarterly. 33 (2): 371–393. doi:10.2307/20650296. JSTOR   20650296.
  9. Wang, Y.-S.; Wu, M.-C.; Wang, H.-Y. (2009). "Investigating the determinants and age and gender differences in the acceptance of mobile learning". British Journal of Educational Technology. 40 (1): 92–118. doi:10.1111/j.1467-8535.2007.00809.x. S2CID   7092931.
  10. Hewitt, Charlie; Politis, Ioannis; Amanatidis, Theocharis; Sarkar, Advait (2019-03-17). "Assessing public perception of self-driving cars". Proceedings of the 24th International Conference on Intelligent User Interfaces. Marina del Ray California: ACM. pp. 518–527. doi:10.1145/3301275.3302268. ISBN   978-1-4503-6272-6. S2CID   67773581.
  11. Wang, H.-W.; Wang, S.-H. (2010). "User acceptance of mobile Internet based on the Unified Theory of Acceptance and Use of Technology: Investigating the determinants and gender differences". Social Behavior & Personality. 38 (3): 415–426. doi:10.2224/sbp.2010.38.3.415.
  12. Chao, Cheng-Min (2019). "Factors Determining the Behavioral Intention to Use Mobile Learning: An Application and Extension of the UTAUT Model". Frontiers in Psychology. 10: 1652. doi: 10.3389/fpsyg.2019.01652 . ISSN   1664-1078. PMC   6646805 . PMID   31379679.
  13. Cimperman, Miha; Makovec Brenčič, Maja; Trkman, Peter (2016-06-01). "Analyzing older users' home telehealth services acceptance behavior—applying an Extended UTAUT model". International Journal of Medical Informatics. 90: 22–31. doi:10.1016/j.ijmedinf.2016.03.002. ISSN   1386-5056. PMID   27103194.
  14. Bagozzi, R.P. (2007). "The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift". Journal of the Association for Information Systems. 8 (4): 244–254. doi: 10.17705/1jais.00122 .
  15. van Raaij, E. M.; Schepers, J. J. L. (2008). "The acceptance and use of a virtual learning environment in China". Computers & Education. 50 (3): 838–852. doi:10.1016/j.compedu.2006.09.001. S2CID   5676829.
  16. Li, Jerry (2020), "Blockchain technology adoption: Examining the Fundamental Drivers", Proceedings of the 2nd International Conference on Management Science and Industrial Engineering, ACM Publication, April 2020, pp. 253–260. doi : 10.1145/3396743.3396750