Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 188 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
188
Dung lượng
1,12 MB
Nội dung
INVESTIGATING INFORMATION SYSTEMS INFUSION FROM THE USER EMPOWERMENT PERSPECTIVE NG EE HONG (B.Comp., M.Comp., NUS) A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF INFORMATION SYSTEMS NATIONAL UNIVERSITY OF SINGAPORE 2010 ACKNOWLEDGMENTS I am deeply indebted to many people who have provided invaluable support throughout the course of my study. It has been a truly worthwhile experience, albeit an extremely difficult and exhausting one at times. It thus gives me great pleasure to have the opportunity to acknowledge these wonderful individuals whom have contributed in ways with their good cheer and professional excellence. First and foremost, I wish to express my gratitude to my two supervisors Dr Kim HeeWoong and Dr Kim Seung Hyun for their guidance. I thank Dr Kim Hee-Woong for consistently presenting new challenges in stretching my ability to the fullest. I like to thank Dr Kim Seung Hyun for ensuring that the resources I needed in completing my dissertation are available. I also have the good fortune to have Prof Atreyi Kankanhalli, Prof Chan Hock Chuan and Prof Sung S. Kim as members of my dissertation committee. I thank them for their helpful commentaries that have made every chapter better. On the same note, I would like to first thank the Department of Information Systems for the generous scholarship and grants in overseas conference travels, and to all faculty and staff for providing a supportive environment. I am especially thankful to Prof Pan Shan Ling for his much faith in my potential and imparting his vast qualitative research knowledge and experience. I also need to thank Prof Calvin Xu Yunjie for his useful insights on statistics when I approached him for advice. I thank Prof Alex Siow Yuen Khong for being always supportive and the valuable experience I have gained working alongside him. Thanks also go out to Ms Loo Line Fong for facilitating my every milestone written submission and seminar presentation. Also to my fellow student colleagues, collaborators, and teammates, thank you for the fond time learning and working together, in particular Loo Geok, David, Suparna, Yingqin, Anand, Xiaojia, Elizabeth, Wee Kek and Satish for their careful help in the refinement of my survey instrument. I am also glad to have been associated and mentored some of the best final year students namely, Nipuna, Snow Hnin Hnin Aung, Sandy, i Nabeel, Yang Xian, Elaine and Benedict, and would like to thank them for their patience to listen to my suggestions. This work has benefited tremendously from the many interactions with Globalfoundries Singapore Pte Ltd. (was Chartered Semiconductor Manufacturing Ltd.). For this, I am grateful to Ms Teo Lay Hong, IT Director, for her gracious endorsement of my project. I would also like to thank Ms Karen Yong for her assistance during my data collection. Finally, I want to say a big thank you to the hundreds of survey participants and interviewees for their interests and feedbacks. Special thanks to my friends: Dr Ho Chaw Sing, Director of Operations PHO-Printhead Fabrication at Hewlett-Packard Singapore (Private) Limited, Dr Yeo Yee-Chia from the Department of Electrical and Computer Engineering, NUS, and Dr Ng Hou Tee, Lead at NASA, for their continued faith and support in my pursuit of this degree. Last but not least, I thank my parents, sister, Chit Hwei and brother, Ying Woo for their unconditional love. I would never be able to accomplish this goal without them being with me. To my nieces, Rui Kyi and Rui Shi, and nephews, Shih-Yu, King-Yu and ZenYu, Group Hug! Thank you for bringing me joy and laughter, and being my constant source of creative inspirations. ii TABLE OF CONTENT Page ACKNOWLEDGMENTS . i TABLE OF CONTENT . iii LIST OF TABLES . vi LIST OF FIGURES vii ABSTRACT . CHAPTER INTRODUCTION . 1.1 Research Background . 1.2 Research Motivation . 1.3 Research Objective and Research Questions 1.4 Potential Contributions . 1.5 Thesis Structure 10 CHAPTER LITERATURE REVIEW . 11 2.1 IT Implementation Stage Model . 11 2.1.1 Stages of IT Implementation 11 2.1.2 Stages of Motivation for IT Implementation . 16 2.1.3 Comparison among the Post-Adoption Stages of IT Implementation . 17 2.2 Previous Research on IS Usage 21 2.2.1 Conceptualization of IS Usage . 21 2.2.2 Measurement of IS Usage 39 2.2.2.1 Unidimensional Measure versus Multidimensional Measure . 45 2.2.2.2 Subjective Measure versus Objective Measure 47 2.3 Previous Research on IS Infusion . 48 2.3.1 IS Infusion Research by Jones et al. (2002) . 48 2.3.2 IS Infusion Research by Nah et al. (2004) . 50 2.3.3 IS Infusion Research by Ahuja and Thatcher (2005) . 51 2.3.4 IS Infusion Research by Wang and Hsieh (2006) 52 2.3.5 IS Infusion Research by Hsieh and Wang (2007) 54 2.3.6 IS Infusion Research by Sundaram et al. (2007) . 55 2.3.7 IS Infusion Research by Saeed and Abdinnour-Helm (2008) . 56 2.3.8 IS Infusion Research by Li et al. (2009) 57 2.3.9 Summary of Previous Research on IS Infusion . 58 CHAPTER THEORETICAL BACKGROUND . 61 iii 3.1 Introduction to Theories Explaining IS Usage 61 3.1.1 Discussion on Theories of IS Usage 66 3.1.2 Limitations in Extant Theories for IS Infusion 71 3.2 Empowerment Theory 74 3.2.1 Relational Construct versus Motivational Construct . 75 3.2.2 Psychological Empowerment Theory 76 3.2.2.1 Psychological Empowerment Research by Conger and Kanungo (1988) 79 3.2.2.2 Psychological Empowerment Research by Thomas and Velthouse (1990) . 81 3.2.2.3 Psychological Empowerment Research by Spreitzer (1996) 82 3.2.2.4 Psychological Empowerment Research by Gagne et al. (1997) . 83 3.2.2.5 Psychological Empowerment Research by Kirkman and Rosen (1999) 84 3.2.2.6 Psychological Empowerment Research by Kraimer et al. (1999) 85 3.2.2.7 Psychological Empowerment Research by Liden et al. (2000) 87 3.2.3 User Empowerment . 87 3.2.3.1 Derivation of User Empowerment Concept 89 3.2.3.2 User Empowerment in Relation to Previous IS Usage Literature 90 3.4 Job Characteristics Theory 93 3.4.1 Psychological States . 94 3.4.2 Task Characteristics . 95 3.4.3 IS Characteristics . 97 3.5 Effect of Habit on Attitude-Behavior Relationship 99 3.5.1 Previous Research on Effect of Habit on IS Usage . 100 3.5.2 Moderating Effect of Habit on User Empowerment-IS Infusion Relationship . 102 3.6 Theoretical Framework . 103 CHAPTER INVESTIGATING INFORMATION SYSTEMS INFUSION AND THE MODERATING ROLE OF HABIT: A USER EMPOWERMENT PERSPECTIVE 105 4.1 Overview . 105 4.2 Research Model 105 4.3 Research Hypotheses 106 4.4 Control Variables 109 4.5 Research Methodology . 109 4.5.1 Instrument Development 109 4.5.2 Survey Context . 111 4.5.3 Data Collection 112 4.6 Data Analysis and Results 114 4.6.1 Scale Validation . 114 4.6.2 Common Method Variance Testing . 116 4.6.3 Hypotheses Testing 117 4.7 Discussion and Implications . 119 4.7.1 Discussion of Findings . 119 4.7.1.1 User Empowerment for IS Infusion 119 iv 4.7.1.2 The Moderating Effects of Habit 122 4.7.2 Post Hoc Analysis 123 4.7.3 Implications for Research 124 4.7.4 Implications for Practice 125 4.7.5 Limitations and Future Directions . 126 CHAPTER AN EMPIRICAL INVESTIGATION OF THE ANTECEDENTS OF USER EMPOWERMENT IN INFORMATION SYSTEMS INFUSION . 128 5.1 Overview . 128 5.2 Research Model 129 5.3 Research Hypotheses 129 5.4 Control Variables 135 5.5 Instrument Development . 135 5.6 Data Analysis and Results 137 5.6.1 Scale Validation . 137 5.6.2 Common Method Variance Testing . 140 5.6.3 Hypotheses Testing 140 5.7 Discussion and Implications . 142 5.7.1 Discussion of Findings . 142 5.7.1.1 Explaining IS Characteristics 142 5.7.1.2 Explaining Task Characteristics . 145 5.7.1.3 Explaining User Empowerment and IS Infusion 146 5.7.2 Implications for Research 148 5.7.3 Implications for Practice 149 5.7.4 Limitations and Future Directions . 150 CHAPTER CONCLUSION 152 REFERENCES 155 APPENDIX A CONCEPTUAL VALIDATION 172 APPENDIX B MEASUREMENT INSTRUMENT . 175 APPENDIX C ADDITIONAL MATERIAL 180 v LIST OF TABLES Table 2.1 Stages of IT Post-Adoption . 17 Table 2.2 Review of IS Acceptance Research 23 Table 2.3 Review of IS Continuance Research 30 Table 2.4 Review of IS Infusion Research . 34 Table 2.5 Review of Existing IS Usage Measurements 40 Table 2.6 Summary of Limitations in Previous IS Infusion Research . 59 Table 3.1 Overview of Theories Used to Explain IS Usage . 61 Table 3.2 Overview of IS Usage Research Streams . 66 Table 3.3 Summary of Limitations in Extant Theories . 71 Table 3.4 Previous Research on Psychological Empowerment 77 Table 3.5 Antecedent Conditions of Powerlessness (Conger and Kanungo 1988) 80 Table 3.6 Comparison with Previous IS Post-Adoption Research . 90 Table 3.7 Previous Research on the Effect of Habit on IS Usage 100 Table 4.1 Descriptive Statistics of Respondents . 113 Table 4.2 Respondent Task Type 114 Table 4.3 Results of Convergent Validity Testing 115 Table 4.4 Correlations between Latent Variables . 116 Table 4.5 Moderating Test Results . 119 Table 5.1 Results of Reliability and Convergent Validity Tests 138 Table 5.2 Inter-Construct Correlations . 139 Table A.1 Inter-Judge Agreement Scores 172 Table A.2 Round (Unstructured Sorting): Item Placement Ratio . 172 Table A.3 Round (Structured Sorting): Item Placement Ratio . 172 Table A.4 Inter-Judge Agreement Scores 173 Table A.5 Round (Unstructured Sorting): Item Placement Ratio . 173 Table A.6 Round (Structured Sorting): Item Placement Ratio . 174 Table B.1 Measurement Instrument 175 vi LIST OF FIGURES Figure 2.1 Six-Stage IT Implementation Model (Adapted from Cooper and Zmud 1990, p. 124) . 12 Figure 2.2 Pathways to Acceptance (Reproduced from Saga and Zmud 1994, p. 70) . 13 Figure 2.3 Pathways to Routinization (Reproduced from Saga and Zmud 1994, p. 77) 14 Figure 2.4 Pathways to Infusion (Reproduced from Saga and Zmud 1994, p. 81) 15 Figure 2.5 Intention to Use versus Infusion (Jones et al. 2002) . 49 Figure 2.6 Symbolic Adoption (Nah et al. 2004) 50 Figure 2.7 Trying to Innovate with IT (Ahuja and Thatcher 2005) 51 Figure 2.8 Extended Use and Emergent Use (Wang and Hsieh 2006) . 53 Figure 2.9 Extended Use (Hsieh and Wang 2007) . 54 Figure 2.10 Frequency of Use, Routinization, and Infusion (Sundaram et al. 2007) . 55 Figure 2.11 Extended Usage and Exploratory Usage (Saeed and Abdinnour-Helm 2008) . 56 Figure 2.12 Routine Use and Innovative Use (Li et al. 2009) 58 Figure 3.1 Theory of Reasoned Action (Fishbein and Ajzen 1975) . 62 Figure 3.2 Theory of Planned Behavior (Ajzen 1991) . 63 Figure 3.3 Technology Acceptance Model (original, on top and simplified, below) (Davis 1989) . 63 Figure 3.4 Unified Theory of Acceptance and Use of Technology (Venkatesh et al. 2003) . 64 Figure 3.5 IS Continuance Model (Bhattacherjee 2001b) 64 Figure 3.6 Social Cognitive Theory (Bandura 1986) 65 Figure 3.7 Task-Technology Fit (Goodhue 1995) 65 Figure 3.8 Cognitive Elements of Empowerment (Thomas and Velthouse 1990) . 81 Figure 3.9 Social Structural Characteristics (Spreitzer 1996) 82 Figure 3.10 Job Characteristics (Gagne et al. 1997) . 83 Figure 3.11 Organizational and Job Characteristics of Team Empowerment (Kirkman and Rosen 1999) 84 Figure 3.12 Job Characteristics (Kraimer et al. 1999) 86 Figure 3.13 Job Characteristics and Interpersonal Relationships (Liden et al. 2000) 87 Figure 3.14 Autonomous Work Motivation (Gagne and Deci 2005) . 88 Figure 3.15 Mapping from Psychological Empowerment to User Empowerment . 89 Figure 3.16 Job Characteristics Model (Hackman and Oldham 1976) . 95 Figure 3.17 Proximal Work Environment 97 Figure 3.18 IS Characteristics . 98 Figure 3.19 Habit Moderates User Empowerment on IS Infusion . 102 Figure 3.20 Theoretical Framework . 103 Figure 4.1 Research Model 106 Figure 4.2 Main Testing Results . 118 Figure 5.1 Research Model 129 Figure 5.2 Structural Model 141 Figure C.1 “Knowing, But Not Doing” MIS Asia 1st December 2005 . 180 vii ABSTRACT Organizations have made significant investments in information systems (IS) implementation. However, more than half of these IS implementations have reported failures due to underutilization. Specifically, system underutilization has been identified as the main reason for the high failure rate and information technology (IT) paradox. Although it is known that IS infusion is required for realizing expected returns on investments, most IS research has focused on initial adoption and continuance with only a handful examined infusion. These few IS infusion studies have produced inconclusive results as they have employed models and factors that are used for adoption and continued use which are in-role behaviors in the examination of infusion which is an extra-role behavior. Compare to adoption and continuance, IS infusion requires authentic motivation of users, but there is a lack of understanding in existing literature about such authentic motivation leading to infusion. Thus this thesis examines IS infusion using user empowerment as the authentic motivation based on the psychological empowerment theory which can explain employee user’s behavior beyond management prescription. This research is comprised of two chapters. Chapter focuses on the effect of user empowerment on IS infusion and the moderating role of habit on the user empowerment and IS infusion relationship. Chapter focuses on the proximal work environment antecedents of user empowerment for IS infusion. A field survey was conducted in a large multinational high-tech manufacturing company in Singapore. In total, 206 complete and valid responses were collected and data was analyzed using Partial Least Square (PLS). The results of Chapter show that the four user empowerment dimensions have significant effects on the three IS infusion subtypes. Further, results show that habit attenuates the importance of user competence for extended use and integrative use but reinforces the importance of usage meaning for extended use and user self-determination for integrative use. The results of Chapter show that IS characteristics i.e., technical support, perceived fit, user influence, and IS flexibility and task characteristics i.e., task feedback, task autonomy, and task meaningfulness have significant effects on user empowerment. Except for user self-determination, the other three dimensions: user competence, usage impact, and usage meaning have significant effects on IS infusion. This thesis contributes to theory with first, the proposition of a new concept – user empowerment as an authentic motivation in IS infusion literature. Second, it examines the moderating role of habit at the highest sophistication of use i.e., infusion. Third, it extends job characteristics theory with the identification of IS characteristics in stimulating the authentic motivation of individual user for IS infusion. Lastly, from the practical stance, it offers insights for organizations in achieving optimal IS use. Lyytinen, K., and Hirschheim, R. A. “Information Systems Failures: A Survey and Classification of the Empirical Literature,” in Oxford Surveys in Information Technology, P. I. Zorkoczy (Ed.), Oxford University Press, Oxford, UK, 1987, pp. 257-309. Malhotra, Y., and Galletta, D. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” Journal of Management Information Systems (22:1), 2005, pp. 117-151. Malhotra, Y., Galletta, D. F., and Kirsch, L. J. “How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations,” Journal of Management Information Systems (25:1), 2008, pp. 267-299. Malone, T. W., Lai, K.-Y., and Fry, C. “Experiments with Oval: A Radically Tailorable Tool for Cooperative Work,” in Proceedings of the Conference on Computer Supported Cooperative Work, Toronto, Canada, Oct 31 – Nov 4, 1992, pp. 289-297. March, J. “Exploration and Exploitation in Organizational Learning,” Organization Science (2:2), 1991, pp. 71-87. Marcolin, B. L., Compeau, D. R., Munro, M. C., and Huff, S. L. “Assessing User Competence: Conceptualization and Measurement,” Information Systems Research (11:1), 2000, pp. 37-60. Markus, M. L. “Power, Politics, and MIS Implementation,” Communications of the ACM (26:6), 1983, pp. 430-444. Markus, M. L., and Tanis, C. “The Enterprise System Experience – From Adoption to Success,” in Framing the Domains of IT Management, R. W. Zmud (Ed.), Cincinnati, Ohio, Pinnaflex Educational Resources, 2000, pp. 173-208. Martins, L. L., and Kellermanns, F. W. “User Acceptance of a Web-based Information System in a Non-Voluntary Context,” in Proceedings of the Twenty Second International Conference on Information Systems, New Orleans, Louisiana, USA, December 16-19, 2001, pp. 607-612. Massetti, B., and Zmud, R. W. “Measuring the Extent of EDI Usage in Complex Organizations: Strategies and Illustrative Examples,” MIS Quarterly (20:3), 1996, pp. 331-345. May, D. R., Gilson, R. L., and Harter, L. M. “The Psychological Conditions of Meaningfulness, Safety and Availability and the Engagement of the Human Spirit at Work,” Journal of Occupational and Organizational Psychology (77:1), 2004, pp. 11-37. McElroy, J. C., Hendrickson, A. R., Townsend, A. M., and DeMarie, S. M. “Dispositional Factors in Internet Use: Personality versus Cognitive Style,” MIS Quarterly (31:4), 2007, pp. 809-820. McGregor, D. The Human Side of Enterprise, New York: McGraw-Hill, 1960. Melone, N. P. “A Theoretical Assessment of the User-Satisfaction Construct in Information Systems Research,” Management Science (36:1), 1990, pp. 76-91. Meyer, J. P., and Allen, N. A. “A Three-Component Conceptualization of Organizational Commitment,” Human Resource Management Review (1:1), 1991, pp. 61-89. 165 Morphy, E. (June 6, 2006) “ERP Systems are Underutilized”, CRMBuyer.com, Accessed at: http://www.crmbuyer.com/story/50915.html Moore, G. C., and Benbasat, I. “Development of an Instrument to Measure the Perception of Adoption and Information Technology Innovation,” Information Systems Research (2:3), 1991, pp. 192-233. Munro, M. C., Huff, S. L., Marcolin, B. L., and Compeau, D. R. “Understanding and measuring user competence,” Information & Management (33:1), 1997, pp. 45-57. Nah, F. H., Tan, X., and Teh, S. H. “An Empirical Investigation on End-Users’ Acceptance of Enterprise Systems,” Information Resources Management Journal (17:3), 2004, pp. 32-53. Nambisan, S., Agarwal, R., and Tanniru, M. “Organizational Mechanisms for Enhancing User Innovation in Information Technology,” MIS Quarterly (23:3), 1999, pp. 365-395. O’Brien, J. A. Management Information Systems, 6th Ed. New York: McGraw-Hill, 2004. Organ, D. W. Organizational Citizenship Behavior: The Good Soldier Syndrome, Lexington, MA: Lexington Books, 1988. Ouellette, J. A., and Wood, W. “Habit and Intention in Everyday Life: The Multiple Processes by Which Past Behavior Predicts Future Behavior,” Psychological Bulletin (124:1), 1998, pp. 54-74. Parthasarathy, M., and Bhattacherjee, A. “Understanding Post-Adoption Behavior in the Context of Online Services,” Information Systems Research (9:4), 1998, pp. 362-379. Pflughoeft, K. A., Ramamurthy, K., Soofi, E. S., Yasai-Ardekani, M., and Zahedi, F. “Multiple Conceptualizations of Small Business Web Use and Benefit,” Decision Sciences (34:3), 2003, pp. 467-512. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies,” Journal of Applied Psychology (88:5) 2003, pp. 879-903. Price Waterhouse Change Implementation Team. Better Change: Best Practices for Transforming your Organization, London: Price Waterhouse, Irwin, 1995. Rappaport, J. “Terms of Empowerment/Exemplars of Prevention: Toward a Theory for Community Psychology,” American Journal of Community Psychology (15:2), 1987, pp. 121-148. Rawstorne, P., Jayasuriya, R., and Caputi, P. “Issues in Predicting and Explaining Usage Behaviors with the Technology Acceptance Model and the Theory of Planned Behavior when Usage is Mandatory,” in Proceedings of the Twenty First International Conference on Information Systems, Brisbane, Queensland, Australia, December 10-13, 2000, pp. 3544. Reeve, J. Motivating Others: Nurturing Inner Motivational Resources, Needham Heights, MA: Allyn & Bacon, 1996. Rensel, A. D., Abbas, J. M., and Rao, H. R. “Private Transactions in Public Places: An Exploration of the Impact of the Computer Environment on Public Transactional Web 166 Site Use,” Journal of the Association for Information Systems (7:1), 2006, pp. 19-51. Roca, J. C., Chiu, C. M., and Martinez, F. J. “Understanding E-Learning Continuance Intention: An Extension of the Technology Acceptance Model,” International Journal of Human-Computer Studies (64:8), 2006, pp. 683-696. Rogers, E. M. Diffusion Of Innovations, 5th ed. New York: Free Press, 2003. Ryan, R. M., and Deci, E. L. “Self-Determination Theory and the Facilitation of Intrinsic Motivation, Social Development, and Well-Being,” American Psychologist (55:1), 2000, pp. 68-78. Saeed, K. A., and Abdinnour-Helm, S. “Examining the Effects of Information System Characteristics and Perceived Usefulness on Post Adoption Usage of Information Systems,” Information & Management (45), 2008, pp. 376-386. Saga, V., and Zmud, R. W. “The Nature and Determinants of IT Acceptance, Routinization and Infusion,” in Diffusion, Transfer, and Implementation of Information Technology, L. Levine (Ed.), North Holland, New York, 1994, pp. 67-86. Saha, P. (December 1, 2005) “Knowing, But Not Doing”, MIS Asia, Accessed at: http://www.misweb.com/magarticle.asp?doc_id=25385&rgid=5&listed_months=-16 Salancik, G. R., and Pfeffer, J. “A Social Information Processing Approach to Job Attitudes and Task Design,” Administrative Science Quarterly (23:2), 1978, pp. 224-243. Schrage, M. (April 15, 2006) “Realizing the True Value of Your Software Applications”, CIO Magazine, Accessed at: http://www.cio.com/article/20130/Realizing_the_True _Value_of_Your_Software_Applications Schwarz, A., and Chin, W. “Looking Forward: Toward an Understanding of the Nature and Definition of IT Acceptance,” Journal of the Association for Information Systems (8:4), 2007, pp. 230-243. Scott, S. G., and Bruce, R. A. “Determinants of Innovative Behavior: A Path Model of Individual Innovation in the Workplace,” Academy of Management Journal (37:3), 1994, pp. 580-607. Seddon, P. “A Respecification and Extension of the DeLone and McLean Model of IS Success,” Information Systems Research (8:3), 1997, pp. 240-253. Son, J. Y., Narasimhan, S., and Riggins, F. J. “Effects of Relational Factors and Channel Climate on EDI Usage in the Customer-Supplier Relationship,” Journal of Management Information Systems (22:1), 2005, pp. 321-353. Spector, P. E. “Perceived Control by Employees: A Meta-Analysis of Studies Concerning Autonomy and Participation at Work,” Human Relations (39:11), 1986, pp. 1005-1016. Spreitzer, G. M. “Psychological Empowerment in the Workplace: Dimensions, Measurement, and Validation,” Academy of Management Journal (38:5), 1995, pp. 14421465. Spreitzer, G. M. “Social Structural Characteristics of Psychological Empowerment,” Academy of Management Journal (39:2), 1996, pp. 483-504. Straub, D. W. “Validating Instruments in MIS Research,” MIS Quarterly (13:2), 1989, pp. 167 147-170. Straub, D., Limayem, M., and Karahanna-Evaristo, E. “Measuring System Usage: Implications for IS Theory Testing,” Management Science (41:8), 1995, pp. 1328-1342. Strong, D. M., Dishaw, M. T., and Bandy, D. B. “Extending Task Technology Fit with Computer Self-Efficacy,” The DATA BASE for Advances in Information Systems (37:2&3), 2006, pp. 96-107. Sundaram, S., Schwarz, A., Jones, E., and Chin, W. W. “Technology Use on the Front Line: How Information Technology Enhances Individual Performance,” Journal of the Academy of Marketing Science (35:1), 2007, pp. 101-112. Sykes, T. A., Venkatesh, V., and Gosain, S. “Model of Acceptance with Peer Support: A Social Network Perspective to Understand Employees’ System Use,” MIS Quarterly (33:2), 2009, pp. 371-393. Szajna, B. “Determining Information System Usage: Some Issues and Examples,” Information & Management (25:3), 1993, pp. 147-154. Szajna, B. “Empirical Evaluation of the Revised Technology Acceptance Model,” Management Science (42:1), 1996, pp. 85-92. Taylor, S., and Todd, P. “Understanding Information Technology Usage: A Test of Competing Models,” Information Systems Research (16:2), 1995, pp. 144-176. Teo, T. S. H., and Choo, W. Y. “Assessing the Impact of Using the Internet for Competitive Intelligence,” Information & Management (39:1), 2001, pp.67-83. Teo, T. S. H., Srivastava, S. C., and Jiang, L. “Trust and Electronic Government Success: An Empirical Study,” Journal of Management Information Systems (25:3), 2008-9, pp. 99131. Thomas, K. W., and Velthouse, B. A. “Cognitive Elements of Empowerment: An “Interpretive” Model of Intrinsic Task Motivation,” Academy of Management Review (15:4), 1990, pp. 666-681. Thompson, R. L., Higgins, C. A., and Howell, J. M. “Personal Computing: Toward a Conceptual Model of Utilization,” MIS Quarterly (15:1), 1991, pp. 125-143. Thompson, R. L., Higgins, C. A., and Howell, J. M. “Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model,” Journal of Management Information Systems (11:1), 1994, pp. 167-187. Thong J. Y. L., Hong, S. J., and Tan, K. Y. “The Effects of Post-Adoption Beliefs on the Expectation-Confirmation Model for Information Technology Continuance,” International Journal of Human-Computer Studies (64:9), 2006, pp. 799-810. Tiwana, A., and Bush, A. A. “Continuance in Expertise-Sharing Networks: A Social Perspective,” IEEE Transactions on Engineering Management (52:1), 2005, pp. 85-101. Triandis, H. C. “Values, Attitudes, and Interpersonal Behavior,” in Nebraska Symposium on Motivation, 1979: Beliefs, Attitudes, and Values, University of Nebraska Press, Lincoln, NE, 1980, pp. 195-259. Tsai, H.-T., and Huang, H.-C. “Determinants of E-Repurchase Intentions: An Integrative 168 Model of Quadruple Retention Drivers,” Information & Management (44:3), 2007, pp. 231-239. Turel, O., Yuan, Y., and Connelly, C. E. “In Justice We Trust: Predicting User Acceptance of E-Customer Services,” Journal of Management Information Systems (24:4), 2008, pp. 123-151. Vallerand, R. J. “Toward a Hierarchical Model of Intrinsic and Extrinsic Motivation,” Advances in Experimental Social Psychology (29), 1997, pp. 271-360. Van der Heijden, H. “Factors Influencing the Usage of Websites: The Case of a Generic Portal in The Netherlands,” Information & Management (40:6), 2003, pp. 541-549. Van Dyne, L., Cummings, L. L., and McLean-Parks, J. “Extra-role Behaviors: In Pursuit of Construct and Definitional Clarity,” in Research in Organizational Behavior (17), L. L. Cummings, and B. M. Staw (Eds.), Greenwich, CT: JAI Press, 1995, pp. 215-285. Vatanasombut, B., Igbaria, M., Stylianou, A. C., and Rodgers, W. “Information Systems Continuance Intention of Web-Based Applications Customers: The Case of Online Banking,” Information & Management (45:7), 2008, pp. 419-428. Vecchio, R. P. Organizational Behavior. The Dryden Press, Chicago, 1988. Venkatesh, V., Brown, S. A., Maruping, L. M., and Bala, H. “Predicting Different Conceptualizations of System Use: The Competing Roles of Behavioral Intention, Facilitating Conditions, and Behavioral Expectation,” MIS Quarterly (32:3), 2008, pp. 483-502. Venkatesh, V., and Davis, F. D. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science (46:2), 2000, pp. 186204. Venkatesh, V., and Morris, M. G. “Why Don’t Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior,” MIS Quarterly (24:1), 2000, pp. 115-139. Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly (27:3), 2003, pp. 425478. Venkatraman, N. “The Concept of Fit in Strategy Research: Toward Verbal and Statistical Correspondence,” Academy of Management Review (14:3), 1989, pp. 423-444. Ventana Research “ERP Innovation,” 2006a. Ventana Research (May 30, 2006b) “Companies Underutilize ERP Systems”. Accessed at: http://www.ventanaresearch.com/resources/resources.aspx?id=1675 Verplanken, B. “Beyond Frequency: Habit as Mental Construct,” British Journal of Social Psychology (45:3), 2006, pp. 639-656. Verplanken, B., and Aarts, H. “Habit, Attitude, and Planned Behaviour: Is Habit an Empty Construct or an Interesting Case of Goal-Directed Automaticity?” Chapter in European Review of Social Psychology, Volume 10, W. Stroebe and M. Hewstone (eds.), John Wiley & Sons, London, 1999, pp. 101-134. 169 Vessey, I., Ramesh, V., and Robert, L. G. “Research in Information Systems: An Empirical Study of Diversity in the Discipline and its Journals,” Journal of Management Information Systems (19:2), 2002, pp. 129-174. Vroom, V. H. Work and Motivation, New York: Wiley, 1964. Wang, W., and Hsieh, J. J. Po-An “Beyond Routine: Symbolic Adoption, Extended Use, and Emergent Use of Complex Information Systems in the Mandatory Organizational Context,” in Proceedings of the Twenty Seventh International Conference on Information Systems, Milwaukee, WI, December 10-13, 2006, pp. 733-750. Webster, J., and Martocchio, J. J. “Microcomputer Playfulness: Development of a Measure with Workplace Implications,” MIS Quarterly (16:2), 1992, pp. 201-226. Widaman, K. F. “Hierarchically Nested Covariance Structure Models for MultitraitMultimethod Data,” Applied Psychological Measurement (9:11), 1985, pp. 1-26. Williams, L., Cote, J., and Buckley, M. “Lack of Method Variance in Self-Reported Affect and Perceptions of Work: Reality or Artifact?,” Journal of Applied Psychology (74:3), 1989, pp. 462-468. Wixom, B. H., and Todd, P. A. “A Theoretical Integration of User Satisfaction and Technology Acceptance,” Information Systems Research (16:1), 2005, pp. 85-102. Wu, C.-G., Gerlach, J. H., and Young, C. E. “An Empirical Analysis of Open Source Software Developers’ Motivations and Continuance Intentions,” Information & Management (44:3), 2007, pp. 253-262. Wu, M.-C., and Kuo, F.-Y. “An Empirical Investigation of Habitual Usage and Past Usage on Technology Acceptance Evaluations and Continuance Intention,” The DATA BASE for Advances in Information Systems (39:4), 2008, pp. 48-73. Wu, J., and Lederer, A. “A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance,” MIS Quarterly (33:2), 2009, pp. 419-432. Xia, W., and King, W. R. “Interdependency of the Determinants of User Interaction and Usage: An Empirical Test,” in Proceedings of the Seventeenth International Conference on Information Systems, Cleveland, Ohio, December 16-18, 1996, pp. 1-21. Yin, R. K. Changing Urban Bureaucracies, Lexington, MA: Lexington Books, 1979. Yu, S., Mishra, A. N., Gopal, A., and Mukhopadhyay, T. “IT Infusion and its Performance Impacts: An Empirical Analysis of E-Procurement in the Service Industry,” in Proceedings of the Thirtieth International Conference on Information Systems, Phoenix, Arizona, December 15-18, 2009, pp. 1-20. Zmud, R. W., and Apple, E. “Measuring Technology Incorporation/Infusion,” Journal of Product Innovation Management (19:2), 1992, pp. 148-155. Zain, M., Rose, R. C., Abdullah, I., and Masrom, M. “The Relationship between Information Technology Acceptance and Organizational Agility in Malaysia,” Information & Management (42:6), 2005, pp. 829-839. Zhang, P., and Li, N. “Love at First Sight or Sustained Effect? The Role of Perceived Affective Quality on Users’ Cognitive Reactions to Information Technology,” in 170 Proceedings of the Twenty Fifth International Conference on Information Systems, Washington, D.C., December 12-15, 2004, pp. 283-296. Zhang, X., Prybutok, V. R., and Koh, C. E. “The Role of Impulsiveness in a TAM-Based online Purchasing Behavior Model,” Information Resources Management Journal (19:2), 2006, pp. 54-68. Zhu, K., and Kraemer, K. L. “Post-Adoption Variations in Usage and Value of E-Business by Organizations: Cross-Country Evidence from the Retail Industry,” Information Systems Research (16:1), 2005, pp. 61-84. Zimmerman, M. A. “Psychological Empowerment: Issues and Illustrations,” American Journal of Community Psychology (23:5), 1995, pp. 581-599. 171 APPENDIX A CONCEPTUAL VALIDATION Table A.1 Inter-Judge Agreement Scores Round Raw Agreement Judges and 0.84 Judges and 0.88 Judges and 0.75 Average 0.82 Round Cohen’s Kappa 0.82 0.86 0.72 0.80 Round Raw Agreement 0.97 0.81 0.81 0.86 Round Cohen’s Kappa 0.96 0.79 0.79 0.85 Table A.2 Round (Unstructured Sorting): Item Placement Ratio Actual Category Target EXU ITU EMU UIP UMG UCP USD HBT N/A TOT Category EXU 12 12 ITU 11 12 EMU 12 12 UIP 11 12 UMG 12 UCP 12 12 USD 12 12 HBT 10 12 Total Item Placements: 96 Hits: 88 Overall Hit Ratio: 91.7% Table A.3 Round (Structured Sorting): Item Placement Ratio Actual Category 172 TGT % 100 91.7 100 91.7 66.7 100 100 83.3 Target EXU ITU EMU UIP UMG UCP USD HBT N/A TOT Category EXU 11 12 ITU 12 12 EMU 12 12 UIP 12 12 UMG 12 12 UCP 12 12 USD 12 12 HBT 12 Total Item Placements: 96 Hits: 92 Overall Hit Ratio: 95.8% TGT % 91.7 100 100 100 100 100 100 75 Table A.4 Inter-Judge Agreement Scores Round Raw Agreement Judges and 0.80 Judges and 0.96 Judges and 0.77 Average 0.84 Round Cohen’s Kappa 0.78 0.95 0.76 0.83 Round Raw Agreement 1.00 0.82 0.82 0.88 Round Cohen’s Kappa 1.00 0.80 0.80 0.87 Table A.5 Round (Unstructured Sorting): Item Placement Ratio Target Category IFU UIP UMG Actual Category IFU UIP UMG UCP USD TST ISF PFT UIF TFB TAY TMG N/A TOT TGT % 12 75 11 12 91.2 12 66.7 173 UCP USD TST ISF PFT UIF TFB TAY TMG 12 12 12 12 12 9 Total Item Placements:132 Overall Hit Ratio: 93.9% Hits:124 12 12 12 12 12 9 100 100 100 100 100 100 100 100 100 Table A.6 Round (Structured Sorting): Item Placement Ratio Actual Category Target IFU UIP UMG UCP USD TST ISF PFT UIF TFB TAY TMG N/A TOT TGT Category % IFU 12 58.3 UIP 12 12 100 UMG 12 12 100 UCP 12 12 100 USD 12 12 100 TST 12 12 100 ISF 9 100 PFT 12 12 100 UIF 12 12 100 TFB 9 100 TAY 9 100 TMG 9 100 Total Item Placements: 132 Hits: 127 Overall Hit Ratio: 96.2% 174 APPENDIX B MEASUREMENT INSTRUMENT Table B.1 Measurement Instrument Construct Technical support Perceived fit User influence IS flexibility Item TST1 Wording Technical guidance is available to me in the use of the ERP system TST2 Specialized instruction concerning the ERP system use is available to me TST3 A specific person or group is available for assistance with ERP system difficulties TST4 When I have difficulties in using the ERP system, technical assistance is available to me Self-developed PFT1 The ERP system fits well with the needs of my tasks Nah et al. (2004) PFT2 The ERP system is suitable for performing my tasks Self-developed PFT3 The ERP system is compatible Lin and Huang (2008) with my tasks PFT4 The ERP system is appropriate for my tasks Self-developed UIF1 Most users think that the ERP system is good UIF2 Most users are supportive of the ERP system Selfdeveloped/Thompson et al. (1991) UIF3 Most users are in favor of the ERP system UIF4 Most users hold positive views of the ERP system ISF1 The ERP system can be flexibly adjusted to my new demands or conditions ISF2 The ERP system is versatile in addressing my needs as they arise ISF3 The ERP system can be 175 Reference Thompson et al. (1991) Wixom and Todd (2005) adapted to meet a variety of my needs Task feedback Task meaningfulness Task autonomy Extended use Hackman and Oldham (1980) TFB1 Doing my job itself provides me with information about my work performance TFB2 Just doing the work required by my job provides many chances for me to figure out how well I am doing TFB3 After I finish my job, I know whether I performed well Idaszak and Drasgow (1987) TMG1 The work results in my job significantly affect other people Hackman and Oldham (1980) TMG2 My job is one where a lot of other people can be affected by how well the work gets done TMG3 My job itself is very significant and important in the broader scheme of things Idaszak and Drasgow (1987) TAY1 My job gives me a chance to use my personal initiative and judgment in carrying out the work Idaszak and Drasgow (1987) TAY2 I have much autonomy in my job Hackman and Oldham (1980) TAY3 My job gives me considerable opportunity for independence and freedom in how I the work EXU1 I fully use the available ERP system features to complete my tasks Self-developed EXU2 I use most of the available ERP system features in performing my tasks Hsieh and Wang (2007) EXU3 I make use of the available ERP system features thoroughly to accommodate my tasks Self-developed EXU4 I use all available ERP system Jones et al. (2002) 176 features to help me in my tasks Integrative use Emergent use IS infusion User competence ITU1 I use the ERP system for better connections among tasks ITU2 I use the ERP system to organize various tasks in an integrative manner ITU3 I use the ERP system to coordinate multiple tasks ITU4 I use the ERP system to handle related-tasks EMU1 I explore new uses of the ERP system to support my tasks Saeed and AbdinnourHelm (2008) EMU2 I often experiment with new ways of using the ERP system to accomplish my tasks Agarwal and Karahanna (2000) EMU3 I often find new uses of the ERP system in performing my tasks Ahuja and Thatcher (2005) EMU4 I use the ERP system in novel ways to complete my tasks IFU1 I make the best use of the ERP Self-developed system to support my tasks IFU2 I use the ERP system to its fullest potential in performing my tasks IFU3 I use all capabilities of the ERP system in best fashion to complete my tasks IFU4 I doubt that there are any better ways for me to use the ERP system in performing my tasks UCP1 I have complete knowledge in using the ERP system Marcolin et al. (2000), Munro et al. (1997) UCP2 I have mastered the skills necessary for using the ERP system Spreitzer (1995) UCP3 I am self-assured about my capabilities to use the ERP 177 Self-developed Jones et al. (2002) system Usage impact Usage meaning UCP4 I am confident about my ability to use the ERP system UIP1 My ERP system usage highly affects task outcomes Self-developed UIP2 The impact of my ERP system usage on task outcomes is large Spreitzer (1995) UIP3 My ERP system usage has significant influence over task outcomes UIP4 My ERP system usage has a great deal of control over task outcomes UMG1 Using the ERP system is very important to me Spreitzer (1995) UMG2 Using the ERP system is meaningful to me User selfdetermination Habit UMG3 I feel that using the ERP system is valuable May et al. (2004) UMG4 ERP system usage activities are personally meaningful to me Spreitzer (1995) USD1 I have significant autonomy in determining how I use the ERP system Spreitzer (1995) USD2 I can decide on my own how to go about using the ERP system USD3 I have a lot of freedom to decide how I use the ERP system Ahuja and Thatcher (2005) USD4 I have considerable opportunity for independence in how I use the ERP system Spreitzer (1995) HBT1 The use of ERP system has become a habit for me Limayem and Hirt (2003) HBT2 Using the ERP system has become automatic to me Limayem et al. (2007) HBT3 When faced with a particular task, using the ERP system is 178 an obvious choice for me HBT4 Work group climate for achievement Using the ERP system is natural to me WGC1 Most members of my work group attempt to their best in work Self-developed WGC2 Most members of my work group attempt to excel Joyce and Slocum (1984) WGC3 Most members of my work group attempt to address difficult problems WGC4 Most members of my work group attempt to advance themselves 179 APPENDIX C ADDITIONAL MATERIAL Figure C.1 “Knowing, But Not Doing” MIS Asia 1st December 2005 180 [...]... between user empowerment and IS infusion? 4 What factors affect user empowerment? 1.4 Potential Contributions The contributions of this research are manifold First, it proposes a new concept – user empowerment in IS infusion literature based on the theory of psychological empowerment Second it develops a theoretical model which examines user s authentic 9 motivation from the user empowerment perspective. .. value from their IT investments Two possible reasons could be inferred: One is that the installed system is ineffective therefore users are unlikely to use it, and infusion may not be relevant (as per Kim and Pan 2006) Another is the installed system is effective but is lowly utilized by the users, which is the common reason for the low level of IS infusion that has led to low value sensed If the installed... quite limited in both its perspective and its progress A principle reason for this slow progress is the lack of a directing and organizing theory Thus from the theoretical perspective, user empowerment as a motivational state 8 reflective of an individual’s orientation towards engaging in IS infusion in performing tasks, provides the motivational explanation for user in fully use the system to enhance... could evoke authentic motivation i.e., user empowerment for IS infusion are identified based on the job characteristics theory (Hackman and Oldham 1976) and O’Brien’s (2004) taxonomic framework of IS components Specifically, we seek answers to four research questions: 1 How is user empowerment conceptualized and measured? 2 Does user empowerment influence IS infusion? 3 Does habit moderate the relationship... important is that the findings from this wealth of studies can only inform about users’ initial adoption of the IS and their intention to continue with current usage, regardless if the usage is only superficial In other words, consideration of whether system has been used to its full potential has not been given 1.2 Research Motivation What is missing is thus users’1 infusion of the IS; the levels of sophistication... performed for the IS adoption/acceptance, IS continuance, and IS infusion studies, limited to major IS journals (Vessey et al 2002) and conference proceedings, namely MIS Quarterly (MISQ), Information Systems Research (ISR), Journal of the Association for Information Systems (JAIS), Journal of Management Information Systems (JMIS), Management Science (MS), The DATA BASE for Advances in Information Systems. .. underutilized their enterprise systems (CRMBuyer.com, Morphy 2006) In its other similar study, it was found that ERP has become so commonplace in organizations that they often overlook opportunities to use these systems more effectively to further improve their companies’ performances (Ventana Research 2006a) To add, in a survey (Saha 2005) conducted across Southeast Asia for the current state of Information. .. new technology and continuance from several theoretical perspectives including the Diffusion of Innovations (DOI, e.g., Moore and Benbasat 1991; Rogers 2003), the Technology Acceptance Model (TAM, e.g., Davis et al., 1989), the Theory of Reasoned Action (TRA, e.g., Karahanna et al 1999), the Theory of Planned Behavior (TPB, e.g., Taylor and Todd 1995), the Social Cognitive Theory (SCT, e.g., Compeau and... user empowerment perspective leading to infusion of installed IS Third, it demonstrates the moderating effect of habit at the infusion stage Fourth, it identifies the IS characteristics by extending job characteristics theory using O’Brien’s (2004) taxonomic framework of IS components which can stimulate user empowerment Lastly, in addition to the contribution from theoretical stance, it offers practical... deployed TAM in the examination of technology adoption The users’ beliefs are relatively significant in having direct influence on acceptance without the mediation of attitude Furthermore, user participation and manager intervention influence users’ intentions to use These are strategies where organizations employ to encourage employees in using the new IT applications in their work The next stage routinization . on User Empowerment- IS Infusion Relationship 102 3.6 Theoretical Framework 103 CHAPTER 4 INVESTIGATING INFORMATION SYSTEMS INFUSION AND THE MODERATING ROLE OF HABIT: A USER EMPOWERMENT PERSPECTIVE. INVESTIGATING INFORMATION SYSTEMS INFUSION FROM THE USER EMPOWERMENT PERSPECTIVE NG EE HONG (B.Comp., M.Comp., NUS) A THESIS SUBMITTED FOR THE DEGREE OF. about such authentic motivation leading to infusion. Thus this thesis examines IS infusion using user empowerment as the authentic motivation based on the psychological empowerment theory which