00 - 2010 - A Critical Review of Models and Theories in Field of
00 - 2010 - A Critical Review of Models and Theories in Field of
Abstract
Information systems and technology have become essential tools for organizations to
achieve their goals. Therefore, many technology acceptance theories and models have
been developed in the field. Research showed a number of models that introduce the
factors which make information systems successful. Based on the theoretical lens rooted
in the literature, the researchers critically reviewed ten models and theories on individual
acceptance of technology. The review identifies the major models to make explicit
assumptions. The present study tries to provide a summary of strengths and weaknesses
that have been discussed about these models and theories.
1. Introduction
Previous research shows that selecting an appropriate theory or model has always
remained a critical task for IS researchers. To the best of the authors’ knowledge, there
are few papers that review and compare the acceptance theories and models at the
individual level [1]. Hence, this study aims to compare the most important theories and
models in field of individual acceptance.
According to Venkatesh et al. [2] there are eight models and theories in the field of
individual acceptance. Those models and theories are TRA, SCT, TAM, TPB, MPCU,
MM, C-TAM-TPB, and IDT. According to Kim and Crowston [3] there are a good
number of theories and models employed in studying individuals’ ICT adoption and post-
adoption behaviors such as TRA, TAM, TPB, TAM2, IDT, SCT, and UTAUT. According
to Oliveira and Martins [4] the most used theories in field of technology adoption are
TAM, TPB, UTAUT, DOI Theory and TOE. DOI and TOE Framework are at the firm
level. The TAM, TPB and UTAUT are at the individual level. According to Al-Mamary
[5] there are many theories in field of acceptance of the technology such as TAM, IS
success model, computer usage model, personal computing acceptance model. According
to Al-Mamaery et al. [6] the most popular models in the field of information systems
success, and technology adoption such as the technology acceptance model and
information system success model focuses on the technology factors of the successful
implementation of information systems. In addition computer usage model focuses on
people factors and organizational support. In addition, personal computing acceptance
model focuses on the organizational factors.
This paper tried to indicate the strengths and weakness that are discussed in the
literature.
Fishbein and Ajzen [7] defined attitude towards behavior as an individual’s positive or
negative feelings (evaluative effect) about performing the target behavior. Subjective
norm is the person’s perception that most people who are important to him think he
should or should not perform the behavior in question. According to Ramayah and Jantan
[9] the subjective norms reflect the person’s perception of social pressures put on him/her
to perform or not to perform the behavior in question. Subjective norms are a function of
normative beliefs. In other words, a person who believes that most people with whom
he/she is motivated to comply think he/she should perform the behavior will perceive
social pressure to do so.
In summary, there are many researchers applying Theory of Reasoned Action (TRA) in
various academic disciplines. This researcher realized that this theory was not sufficient
and there were several limitations. According to Kurland [10] TRA is limited because it
assumes that actions are totally under volitional control. This assumption fails to
acknowledge that individuals' behaviors may be directed, for example, by systemic
constraints. According to Davis et al. [12] Theory of Reasoned Action (TRA) is very
general. According to Baraghani [13] TRA is a general model that does not specify the
beliefs that are operative for a particular behavior. Researchers using TRA must first
identify the beliefs that are salient for subjects regarding the behavior under investigation.
To address these limitations, Ajzen in 1991 extended the TRA and proposed a new
theory called Theory of Planned Behavior (TPB) by adding the variable perceived
behavioral control. According to Kurland [10] TPB predicts that the stronger the agent's
perceived behavioral control, the more likely the agent will intend to perform the
behavior.
According to Venkatesh et al. [2] Social Cognitive Theory (SCT) is one of the most
powerful theories of human behavior. SCT have five core constructs: outcome
expectations performance, outcome expectations personal, self-efficacy, effect and
anxiety. Compeau and Higgins [16] defined outcome expectations performance as the
performance-related consequences of the behavior. Specifically, performance
expectations deal with job related outcomes. Abbad [17] defines self-efficacy as
interpreted as one’s self-confidence in his or her ability to perform certain tasks using a
system. Venkatesh et al. [2] defines effect as an individual’s liking for a particular
behavior (e.g. computer use). Igbaria and Iivari [18] define computer anxiety as the
Perceived usefulness was defined by Davis [12] as "the degree to which a person
believes that using a particular system would enhance his or her job performance". People
tend to use or not to use an application to the extent they believe that it will help them to
perform their job better.
Meanwhile perceived ease of use explains the user's perception of the amount of effort
required to utilize the system or the extent to which a user believes that using a particular
technology will be effortless [12]. According to Petter et al. [23]; Seddon and Kiew [24];
Delone and Mclean [25]; Hwang et al. [26]; Petter and McLean [27] ease of use is a
measure of the system quality. Hence, some of researchers includes ease of use as a
measure of the system quality.
In 2000, Technology Acceptance Model 2 (TAM2) (as illustrated in Figure 4) was
developed by Venkatesh and Davis [28] on the basis of Technology Acceptance Model
(TAM). Two processes, the social influence processes (Subjective Norm, Voluntariness
and Image) and the cognitive instrumental processes (Job Relevance, Output Quality,
Result Demonstrability and Perceived Usefulness) were integrated into this model. The
two processes were considered to be crucial to the study of user acceptance [29].
According to Wu and Wang [30]. the results of the research by Venkatesh and Davis [28]
indicated that perceived usefulness, perceived ease of use and subjective norm all
indirectly influence actual system use through behavioral intention. In other words,
behavioral intention is jointly determined by perceived usefulness, perceived ease of use
and subjective norm. Subjective norm is the direct and significant determinant of
perceived usefulness while perceived ease of use has a small but significant impact on
perceived usefulness.
model combining the Technology Acceptance Model and the Theory of Planned
Behavior, the Model of PC Utilization, the Innovation Diffusion Theory and the Social
Cognitive Theory Toward a unified view.
UTAUT has four key constructs (i.e., performance expectancy, effort expectancy,
social influence, and facilitating conditions) that influence behavioral intention to use a
technology and/or technology use. According to UTAUT, performance expectancy, effort
expectancy and social influence are theorized to influence behavioral intention to use a
technology, while behavioral intention and facilitating conditions determine technology
use [31].
Venkatesh and Bala [32] combined TAM2 (Venkatesh and Davis, [28]) and the model
of the determinants of perceived ease of use (Venkatesh, [33]) to develop an integrated
model of technology acceptance TAM3, shown in Figure 6. TAM3 presents integrated
model of the determinants of individual level (IT) adoption and use. Technology
Acceptance Model 3 (TAM3) posits three relationships that were not empirically tested in
Venkatesh [33] and Venkatesh and Davis [28]. Venkatesh and Bala [32] suggest that
experience will moderate the relationships between (1) perceived ease of use and
perceived usefulness; (2) computer anxiety and perceived ease of use; and (3) perceived
ease of use and behavioral intention.
TAM3 (Venkatesh and Bala, [32]) is based on a theoretical framework consisting of
four categories the authors say are a synthesis of all previous TAM research. Each of the
four categories: individual differences (Computer Self Efficacy, Computer Anxiety,
Computer Playfulness); system characteristics (Job Relevance, Output Quality, Result
Demonstrability, Perceived Enjoyment, Objective Usability); social influence (Subjective
Norm, Image); and facilitating conditions (Perception of External Control) are made up of
their own variables based on the two main determinants of PU and PEOU [34].
According to Tornatzky and Fleischer [41] the technological context includes the
internal and external technologies that are relevant to the firm. Technologies may include
both equipment as well as processes. The organizational context refers to the
characteristics and resources of the firm including the firm’s size, degree of centralization,
degree of formalization, managerial structure, human resources, amount of slack
resources and linkages among employees. The environmental context includes the size
and structure of the industry, the firm’s competitors, the macroeconomic context and the
regulatory environment.
In summary, TOE framework is focused technology (availability and characteristics),
organization (formal and informal linking structures, communication processes, size and
slack), and environment (industry characteristics and market structure, technology support
infrastructure and government regulation). But these factors are not consistent with the
other researchers. Al-Busaidi and Al-Shihi [42] developed a theoretical framework for
acceptance of learning management systems in Oman. This framework provides a
comprehensive look at the critical factors. These critical factors are related to the
instructor, organization and technology. Technology factors can be related to the system
quality, information quality and service support quality. Organization factors can be
related to motivation, technology alignment, organization support, technical support and
training. Instructor factors can be related to self-efficacy, attitude toward systems,
experience, teaching style and personal innovativeness. User characteristics can be related
to age, education, IS experience, user involvement & participation and training.
Organizational characteristics can be related to top management support, organizational
culture and business process reengineering. According to Yusof et al. [43] human,
organization and technology are the essential components of IS; the impacts of HIS are
assessed in the net benefits. Technology factors can be related to the system quality,
information quality and service support quality. Human factors can be related to system
use and user satisfaction. Organization factors can be related to structure and
environment.
According to Ajzen [44] perceived behavioral control relates to the extent to which the
person believes that he has control over personal or external factors that may facilitate or
constrain the behavioral performance.
In 1995, TAM-TPB Model was developed by Taylor and Todd [48]. In a more
complex approach, Taylor and Todd [48], combined TAM-TPB model the predictors
from TAM and TPB model, such as, attitude toward behavior (adapted from TRA/TPB),
subjective norm (adapted from TRA/TPB), perceived behavioural control (adapted from
TPB), and perceived usefulness (adapted from TAM) in their studies of assessing IT
usage [49]. According to the combined TAM-TPB Model, behavior is influenced by
behavioral intention, which, in turn, is influenced by attitude, subjective norm, perceived
behavioral control, and perceived usefulness. The C-TAM-TPB also predicts that
perceived behavioral control will have a direct effect on behavior in addition to its
indirect effect through intentions. Perceived usefulness and perceived ease of use are
determinants of attitude, whereas perceived ease of use directly affects perceived
usefulness [50].
Taylor and Todd [48] posited that the relationships among the constructs appearing in
combined TAM-TPB Model would be moderated by user experience. Their empirical
study substantiated this assumption since the impact of perceived usefulness, attitude, and
perceived behavioral control on behavioral intentions was stronger in case of users with
relatively more experience. In contrast, the impact of subjective norm was attenuated
under high levels of experience. An apparent implication of Taylor and Todd's study is
that when firms design and implement an IT system, they should take into account the
user's level of experience since less experienced users will tend to rely on different factors
(e.g. perceived usefulness) than experienced ones in order to start using the system [50].
Figure 9 depicts the theory in the form of a structural diagram.
complexity, trial ability and absorbability. Figure 10 shows the variables that determining
the rate of adoption innovations.
(4) DOI more related to educational environments. Diffusion of Innovation (DOI) Theory
users must decide to adopt or reject new technology. But in some cases the users had no
choice because the technology was already adopted. This means this theory is more suited
as an optional choice only.
3. Conclusion
This paper made a review of literature of technology acceptance models at the
individual level. Ten models in field of individual acceptance of technology have been
critically reviewed. These models and theories are: Theory of Reasoned Action (TRA),
Social Cognitive Theory (SCT), Technology Acceptance Model (TAM), Technology
Acceptance Model 2 (TAM2), Unified Theory of Acceptance and Use of Technology
(UTAUT), Technology Acceptance Model 3 (TAM3), Technology, Organization, and
Environment Framework (TOE), Theory of Planned Behavior (TPB), Combined TAM-
TPB, and Diffusion of Innovation (DOI). The study is also potentially useful as it showed
the strengths and the weakness in each model. This can provide a robust opportunity to
future researchers to adopt suitable models to conduct empirical tests in different
technology settings.
References
[1] A. Tarhini, N.A.G. Arachchilage, R. Masa‟deh and M.S. Abbasi, “A Critical Review of Theories and
Models of Technology Adoption and Acceptance in Information System Research”, International
Journal of Technology Diffusion, vol. 6, no. 4, (2015), p. 1-20.
[2] V. Venkatesh, M.G. Morris, G.B. Davis and F.D. Davis, “User acceptance of information technology:
Toward a unified view”, MIS quarterly, (2003), pp. 425–478.
[3] Y. Kim and K. Crowston, “Technology adoption and use theory review for studying scientists‟
continued use of cyber-infrastructure”, Proceedings of the American Society for Information Science
and Technology, vol. 48, no. 1, (2011), pp. 1–10.
[4] T. Oliveira and M.F. Martins, “Literature review of information technology adoption models at firm
level” The Electronic Journal Information Systems Evaluation, vol. 14, no. 1, (2011), pp.110-121.
[5] Y. H. Al-Mamary, A. Shamsuddin and N. A. A. Hamid, “Enhancing Technological Capability of
Telecommunications Sector in Yemen: A Technology Adoption Approach”, Mediterranean Journal of
Social Sciences, vol. 6, no. 4S1, (2015a), pp. 108-112.
[6] Y. H. Al-Mamary, A. Shamsuddin, N. A. Abdul Hamid, Al-Maamari and Hasan Mohammed, “Adoption
of Management Information Systems in Context of Yemeni Organizations: A Structural Equation
Modeling Approach”, Journal of Digital Information Management, vol. 13, no. 9, (2015b), pp. 429-444.
[7] M. Fishbein and I. Ajzen, “Belief, attitude, intention and behavior: An introduction to theory and
research”, Goodhue, (1975).
[8] I. Ajzen and M.Fishbein, “Understanding attitudes and predicting social behavior”, (1980).
[9] T. Ramayah and M. Jantan, “Technology acceptance: An individual perspective current and future
research in malaysia”, Review of Business Research, vol. 2, no. 1, (2004), pp. 103 111.
[10] N. B. Kurland, “Ethical intentions and the theories of reasoned action and planned behavior”, Journal of
applied social psychology, vol. 25, no. 4, (1995), pp. 297–313.
[11] T. J. Madden, P. S Ellen and I. Ajzen, “A comparison of the theory of planned behavior and the theory
of reasoned action”, Personality and social psychology Bulletin, vol. 18, no. 1, (1992), pp. 3–9.
[12] F. D. Davis, R. P. Bagozzi and P.R. Warshaw, “User acceptance of computer technology: a comparison
of two theoretical models”, Management science, vol. 35, no.8, (1989), pp. 982–1003.
[13] N.S. Baraghani, “Factors influencing the adoption of internet banking: masters thesis”, (2008).
[14] A. Bandura, “Social foundations of thought and action: A social cognitive theory”, Prentice-Hall, Inc.
(1986).
[15] R. Wood and A. Bandura, “Social cognitive theory of organizational management”, Academy of
management Review, vol. 14, no. 3, (1989), pp. 361–384.
[16] D.R. Compeau and C.A. Higgins, “Application of social cognitive theory to training for computer
skills”, Information systems research, vol. 6, no. 2, (1995), pp. 118–143.
[17] M. Abbad, “Proposed model of e-learning acceptance. In: Education and e Learning Innovations
(ICEELI), 2012 International Conference on, IEEE, (2012), pp. 1–9.
[18] M. Igbaria and J. Iivari, “The effects of self-efficacy on computer usage”, Omega, vol. 23, no. 6, (1995),
pp. 587–605.
[19] E. Grigg, “Social Cognitive Theory VS. Social Comparison Theory: Examining the Relationship
between Social Influence and Weight Loss”, Master‟s thesis, (2013).
[20] M.S. Abbasi, Culture, demography and individuals‟ technology acceptance behaviour: A PLS based
structural evaluation of an extended model of technology acceptance in South-Asian country context”,
Ph.D. thesis, Brunel University Brunel Business School, (2011).
[21] P. Surendran, “Technology acceptance model: A survey of literature. International”, Journal of Business
and Social Research, vol. 2, no. 4, (2012), pp. 175–178.
[22] S. K. Agrawal, “Knowledge management”, International Journal of Advance Research in Computer
Science and Management Studies, vol. 1, no. 7, (2013), pp. 451–456.
[23] S. Petter, W. DeLone and E. McLean, “Measuring information systems success: models, dimensions,
measures, and interrelationships”, European journal of information systems, vol. 17, no. 3, (2008), pp.
236–263.
[24] P. Seddon and M.Y. Kiew, “A partial test and development of delone and mclean‟s model of is
success”, Australasian Journal of Information Systems, vol. 4, no. 1, (1996), pp. 90–109.
[25] W. H. Delone and E.R. Mclean, “Measuring e-commerce success: Applying the delone & mclean
information systems success model”, International Journal of Electronic Commerce, vol. 9, no. 1,
(2004), pp. 31–47.
[26] H. G., Hwang, I.C. Chang, F.J. Chen and S.Y. Wu, “Investigation of the application of kms for diseases
classifications: A study in a taiwanese hospital”, Expert Systems with Applications, vol. 34, no1, (2008),
pp. 725–733.
[27] S. Petter and E.R. McLean, “A meta-analytic assessment of the delone and mclean is success model: An
examination of is success at the individual level”, Information & Management, vol. 46, no. 3, (2009),
pp. 159–166.
[28] V. Venkatesh and F.D. Davis, “A theoretical extension of the technology acceptance model: Four
longitudinal field studies”, Management science, vol. 46, no. 2, (2000), pp. 186-204.
[29] M. Wu, H. Chou, Y.C. Weng and Y. Huang, “Tam-2 based study of website user behavior-using web
2.0 websites as an example”, WSEAS Transactions on Business and Economics, vol. 4, no. 8, (2011),
pp. 133–151.
[30] J. H. Wu and S.C. Wang, “An empirical study of consumers adopting mobile commerce in taiwan:
analyzed by structural equation modeling”, (2003), pp. 81–94.
[31] V. Venkatesh, J.Y. Thong and X. Xu, “Consumer acceptance and use of information technology:
extending the unified theory of acceptance and use of technology”, MIS quarterly, vol. 36, no. 1, (2012),
pp. 157–178.
[32] V. Venkatesh and H. Bala, “Technology acceptance model 3 and a research agenda on interventions”,
Decision sciences, vol. 39, no. 2, (2008), pp. 273–315.
[33] V. Venkatesh, “Determinants of perceived ease of use: Integrating control, intrinsic motivation, and
emotion into the technology acceptance model”, Information systems research, vol. 11, no. 4, (2000),
pp. 342–365.
[34] N.L. Howard, P. Marshall and P.A. Swatman, “Reconceptualising motivation in adoption and
acceptance research: Back to basics”, In: Proceedings of the 21st Australasian Conference on
Information Systems, Brisbane, (2010).
[35] A. Abugabah, L. Sanzogni and A.E. Poropat, “The impact of information systems on user performance:
A critical review and theoretical model”, In: international conference on information systems (ICIS),
World Academy of Science, Engineering and Technology (WASET), (2009), pp. 809–819.
[36] S.M. Al Haderi, “System characteristic facilitates the acceptance of information technology in middle
east culture”, International Journal of Business and Social Science, vol. 5, no. 6, (2014), pp. 64–69.
[37] R.F Chen and J.L. Hsiao, “An investigation on physicians acceptance of hospital information systems: a
case study”, International journal of medical informatics, vol. 81, no. 12, (2012), pp. 810–820.
[38] B.S. Ragu-Nathan, C.H. Apigian, T. Ragu-Nathan and Q. Tu, “A path analytic study of the effect of top
management support for information systems performance”, Omega, vol. 32, no. 6, (2004), pp. 459–471.
[39] I. Aktag, “Computer self-efficacy, computer anxiety, performance and personal outcomes of Turkish
physical education teachers”, Educational Research and Reviews, vol. 10, no. 3, (2015), pp. 328–337.
[40] Y.A. Hakami, A.R.b.C Hussin and H.M. Dahlan, “Technology acceptance for cbt in secondary schools
of saudi Arabia”, In: Fifth International Conference on Intelligent Systems, Modelling and Simulation,
IEEE, (2014), pp. 804–807.
[41] L.G. Tornatzky and Fleischer, “The Processes of Technological Innovation”, Lexington Books, (1990).
[42] K.A. Al-Busaidi and H. Al-Shihi, “Instructors‟ acceptance of learning management systems: A
theoretical framework”, Communications of the IBIMA 2010, (2010), pp. 1–10.
[43] M.M. Yusof, J. Kuljis, A. Papazafeiropoulou and L.K Stergioulas, “An evaluation framework for health
information systems: human, organization and technology-fit factors (hot-fit)”, International journal of
medical informatics, vol. 77, no. 6, (2008), pp. 386–398.
[44] I. Ajzen, “The theory of planned behavior”, Organizational behavior and human decision processes, vol.
50, no. 2, (1991), pp. 179–211.
[45] J. Morris, M. Marzano, N. Dandy and L. Obrien, “Theories and models of behaviour and behaviour
change”, Forest Research, Tech. Rep, (2012), pp. 1–27.
[46] C. Egmond and R. Bruel, “Nothing is as practical as a good theory: Analysis of theories and a tool for
developing interventions to influence energy behaviour”, Scientific reports produced within the behave
project, evaluation of energy behavioural change programmes intelligent energy–europe (iee) eie,
(2007).
[47] L. A.S. Sommer, “The theory of planned behaviour and the impact of past behavior”, International
Business & Economics Research Journal (IBER), vol. 10, no. 1, (2011), pp. 91–110.
[48] S. Taylor and P. Todd, “Assessing it usage: The role of prior experience, MIS quarterly, (1995), pp.
561– 570.
[49] B.L. Lim, “Factors Influencing Email Usage: Applying The Utaut Model”, Ph.D. thesis, USM, (2005).
[50] N. Panagopoulos, “Sales Technology: Making the Most of Your Investment”, Business Expert Press ,
(2010).
[51] J. MacVaugh and F. Schiavone, “Limits to the diffusion of innovation: A literature review and
integrative model”, European Journal of Innovation Management, vol. 13, no. 2, (2010), pp. 197–221.
[52] E.M. Rogers, Diffusion of innovations 5th Edition. Simon and Schuster, (2003).
[53] E.M. Rogers, Diffusion of innovations. Simon and Schuster, (1995).
[54] R. Ward, “The application of technology acceptance and diffusion of innovation models in healthcare
informatics”, Health Policy and Technology, vol. 2, no. 4, (2013), pp. 222–228.
[55] B.D. Medlin, “The factors that may influence a faculty member‟s decision to adopt electronic
technologies in instruction”, Ph.D. thesis, Virginia Polytechnic Institute and State University, (2001).
[56] K Lyytinen and J. Damsgaard, “What’s wrong with the diffusion of innovation theory?” Springer,
(2001).
Authors
Yaser Hasan Al-Mamary, he is an Assistant Professor of
Management Information Systems, Faculty of Administrative
Sciences, University of Science and Technology, Yemen.