Testing the Technology-to-Performance Chain Model

Testing the Technology-to-Performance Chain Model

D. Sandy Staples (Queen’s University, Australia) and Peter B. Seddon (The University of Melbourne, Australia)
Copyright: © 2005 |Pages: 23
DOI: 10.4018/978-1-59140-474-3.ch003
OnDemand PDF Download:


Goodhue and Thompson (1995) proposed the Technology-to-Performance Chain (TPC) model in 1995 to help end-users and organizations understand and make more effective use of information technology. The TPC model combines insights from research on user attitudes as predictors of utilization and insights from research on task-technology fit as a predictor of performance. In this chapter, the TPC model was tested in two settings—voluntary use and mandatory use. In both settings, strong support was found for the impact of task-technology fit on performance as well as on attitudes and beliefs about use. Social norms also had a significant impact on utilization in the mandatory use setting. Beliefs about use only had a significant impact on utilization in the voluntary use setting. Overall, the results found support for the predictive power of the TPC model; however, the results show that the relationships among the constructs in the model will vary, depending on whether or not the users have a choice to use the system.

Complete Chapter List

Search this Book:
Table of Contents
Mo Adam Mahmood
Chapter 1
James P. Downey, Summer E. Bartczak
During the 1980s and into the early 1990s, end user computing (EUC) was reported to be among the key concerns facing managers and organizations. Is... Sample PDF
End User Computing Research Issues and Trends (1990-2000)
Chapter 2
Tanya McGill
End user development of applications forms a significant part of organizational systems development. This study investigates the role that... Sample PDF
The Effect of End User Development on End User Success
Chapter 3
D. Sandy Staples, Peter B. Seddon
Goodhue and Thompson (1995) proposed the Technology-to-Performance Chain (TPC) model in 1995 to help end-users and organizations understand and make... Sample PDF
Testing the Technology-to-Performance Chain Model
Chapter 4
Mun Y. Yi, Kun S. Im
Computer task performance is an essential driver of end user productivity. Recent research indicates that computer self-efficacy (CSE) is an... Sample PDF
The Role of Personal Goal and Self-Efficiency in Predicting Computer Task Performance
Chapter 5
Steven A. Morris, Thomas E. Marshall
The importance of perceptions of control in explaining human behavior and motivation has been identified, investigated, and found to be significant... Sample PDF
Measurement of Perceived Control in Information Systems
Chapter 6
Qingxiong Ma, Liping Liu
The technology acceptance model proposes that perceived ease of use and perceived usefulness predict the acceptance of information technology. Since... Sample PDF
The Technology Acceptance Model: A Meta-Analysis of Empirical Findings
Chapter 7
Nory B. Jones, Thomas R. Kochtanek
Practitioners and academics often assume that investments in technology will lead to productivity improvements. While the literature provides many... Sample PDF
Success Factors in the Implementation of a Collaborative Technology and Resulting Productivity Improvements in a Small Business: An Exploratory Study
Chapter 8
Evan W. Duggan, Cherian S. Thachenkary
Joint Application Development (JAD) was introduced in the late 1970s to solve many of the problems system users experienced with the conventional... Sample PDF
Supporting the JAD Facilitator with the Nominal Group Technique
Chapter 9
Barbara Adams, Eta S. Berner, Joni Rousse Wyatt
User resistance is a common occurrence when new information systems are implemented within health care organizations. Individuals responsible for... Sample PDF
Applying Strategies to Overcome User Resistance in a Group of Clinical Managers to a Business Software Application: A Case Study
Chapter 10
Bernd Carsten Stahl
Decisions regarding information assurance and IT security can affect individuals’ rights and obligations and thereby acquire a moral quality. The... Sample PDF
Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?
Chapter 11
Mary C. Jones, R. Leon Price
This study examines organizational knowledge sharing in enterprise resource planning (ERP) implementation. Knowledge sharing in ERP implementation... Sample PDF
Organizational Knowledge Sharing in ERP Implementation: Lessons from Industry
Chapter 12
Manish Gupta, Raghav Rao, Shambhu Upadhyaya
Information assurance is a key component in e-banking services. This article investigates the information assurance issues and tenets of e-banking... Sample PDF
Electronic Banking and Information Assurance Issues: Survey and Synthesis
Chapter 13
Kregg Aytes, Terry Connolly
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant... Sample PDF
Computer Security and Risky Computing Practices: A Rational Choice Perspective
Chapter 14
Merrill Warkentin, Kimberly Davis, Ernst Bekkering
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and... Sample PDF
A TAM Analysis of an Alternative High-Security User Authentication Procedure
Chapter 15
Kalyani Chatterjea
In-service upgrading has been an accepted avenue for retraining practicing teachers in Singapore to keep abreast of changing curriculum requirements... Sample PDF
A Blended Approach Learning Strategy for Teacher Development
About the Editor
About the Authors