Intentions to Use Information Technologies: An Integrative Model

Intentions to Use Information Technologies: An Integrative Model

Ron Thompson (Wake Forest University, USA), Deborah Compeau (University of Western Ontario, Canada), Chris Higgins (University of Western Ontario, Canada) and Nathan Lupton (University of Western Ontario, Canada)
DOI: 10.4018/978-1-59904-295-4.ch006
OnDemand PDF Download:


An integrative model explaining intentions to use an information technology is proposed. The primary objective is to obtain a clearer picture of how intentions are formed, and draws on previous research such as the technology acceptance model (Davis, Bagozzi, & Warshaw, 1989) and the decomposed theory of planned behavior (Taylor & Todd, 1995a). The conceptual model was tested using questionnaire responses from 189 subjects, measured at two time periods approximately two months apart. The results generally supported the hypothesized relationships, and revealed strong influences of both personal innovativeness and computer self-efficacy.

Complete Chapter List

Search this Book:
Table of Contents
Steve Clarke
Steve Clarke
Chapter 1
Timothy Paul Cronan, David E. Douglas
This chapter advances IT ethics research by surveying the literature regarding IT ethical behavior models and proposes an IT ethical behavioral... Sample PDF
A Proposed IT Ethical Behavioral Model
Chapter 2
Judy Drennan, Gillian Sullivan Mort, Josephine Previte
This chapter reports research concerning privacy, risk perceptions, and online behavior intentions on a sample of expert household end users.... Sample PDF
Understanding the Impact of Household End Users' Privacy and Risk Perceptions on Online Behavior
Chapter 3
Bassam Hasan
Identifying factors affecting effectiveness of computer training remains a key issue in information systems (IS) research and practice. To this end... Sample PDF
The Impact of Multilevel Computer Self-Efficacy on Effectiveness of Computer Training
Chapter 4
David F. Rico
This chapter illustrates how to optimize the return on investment (ROI) of enterprise architecture. Enterprise architecture is a blueprint for... Sample PDF
Optimizing the ROI of Enterprise Architecture Using Real Options
Chapter 5
Tabitha James, Taner Pirim, Katherine Boswell, Brian Reithel, Reza Barkhi
Protection of physical assets and digital information is of growing importance to society. The need for development and use of security technologies... Sample PDF
An Extension of the Technology Acceptance Model to Determine the Intention to Use Biometric Devices
Chapter 6
Ron Thompson, Deborah Compeau, Chris Higgins, Nathan Lupton
An integrative model explaining intentions to use an information technology is proposed. The primary objective is to obtain a clearer picture of how... Sample PDF
Intentions to Use Information Technologies: An Integrative Model
Chapter 7
Hege-Rene Hansen Asand, Anders I. Morch
The chapter presents a case study following the activities of super users and local developers during the adoption of a new business application by... Sample PDF
The Organization of End User Development in an Accounting Company
Chapter 8
Tanya McGill, Chris Klisc
The development of applications by end users has become an integral part of organizational information provision. It has been established that there... Sample PDF
End User Perceptions of the Benefits and Risks of End User Web Development
Chapter 9
Maria Francesca Costabile, Daniela Fogli, Rosa Lanzilotti, Piero Mussio, Loredana Parasiliti Provenza, Antonio Piccinno
End-user development means the active participation of end users in the software development process. In this perspective, tasks that are... Sample PDF
Advancing End User Development Through Metadesign
Chapter 10
Jens H. Weber-Jahnke, Yury Bychkov, David Dahlem, Luay Kawasme
Many recently emerging component-based Web portal application platforms allow end users to compose dynamic Web dialogues on the fly. Experts predict... Sample PDF
Semantic Composition of Web Portal Components
Chapter 11
Irene Pollach
Grounded in uncertainty reduction theory, the present study analyzes the content of 50 privacy policies from well-known commercial Web sites with a... Sample PDF
Privacy Statements as a Means of Uncertainity Reduction in WWW Interactions
Chapter 12
Robin L. Wakefield, Dwayne Whitten
Despite the fact that over half of U.S. residents are now online, Internet users hesitate to enter into transactions with e-retailers in the absence... Sample PDF
Examining User Perception of Third-Party Organization Credibility and Trust in an E-Retailer
Chapter 13
Youngjin Kim
The leadership role facilitates group process by structuring group interaction. How leadership affects group performance in GSS settings remains one... Sample PDF
Supporting Distributed Groups with Group Support Systems: A Study of the Effect of Group Leaders and Communication Modes on Group Performance
Chapter 14
Chieh-Peng Lin, Cherng G. Ding
This study examines the moderating role of gender during the formation of relationship quality and loyalty in the context of IT service. In the... Sample PDF
Evaluating Group Differences in Gender During the Formation of Relationship Quality and Loyalty in ISP Service
Chapter 15
Donna Weaver McCloskey
This research examines electronic commerce participation and attitudes by older Americans. Questionnaires were distributed at a large retirement... Sample PDF
The Importance of Ease of Use, Usefulness, and Trust to Online Consumers: An Examination of the Technology Acceptance Model with Older Consumers
Chapter 16
Carol Clark
Until recent years, the end user computing ergonomic focus has primarily been on stationary computer use. A new trend for the end user is mobile... Sample PDF
End User Computing Ergonomics: Facts of Fads?
About the Contributors