Advertisement

Journal of Information Technology

, Volume 32, Issue 2, pp 147–162 | Cite as

Voluntary use of information technology: an analysis and synthesis of the literature

  • HsingYi Tsai
  • Deborah Compeau
  • Darren Meister
Research Article

Abstract

Voluntariness is recognized as an important influence on individual and collective technology acceptance. We conducted a comprehensive review of this literature and identified a rich set of voluntariness concepts and methods of operationalization. However, while considerable empirical evidence is reported in the literature, our review also revealed inconsistent results concerning the relationship between voluntariness and other concepts. Against that backdrop, we synthesized the literature into three types of voluntariness – perceived, intended and realizable voluntariness (RVOL), and showed how prior literature had not adequately accounted for RVOL. Moreover, we examined the multiple mechanisms that influence voluntariness and created a model to describe how to advance new knowledge about the important relationships among the three types of voluntariness and between voluntariness and user behavior. We argue that these concepts and relationships may help advance our knowledge of how a new technology is used individually and collectively in organizations.

Keywords

voluntariness technology acceptance technology use choice freedom psychological reactance 

Notes

Supplementary material

41265_2016_13_MOESM1_ESM.doc (236 kb)
Appendix

References

  1. * References marked with an asterisk are the 61 studies in our final literature review pool.Google Scholar
  2. Aarts, J., Ash, J.S. and Berg, M. (2007). Extending the Understanding of Computerized Physician Order Entry: Implications for professional collaboration, workflow and quality of care, International Journal of Medical Informatics 76(Supplement 1): S4–S13.CrossRefGoogle Scholar
  3. Abbasi, M.S., Chandio, F.H., Soomro, A.F. and Shah, F. (2011). Social Influence, Voluntariness, Experience and the Internet Acceptance: An extension of technology acceptance model within a South-Asian country context, Journal of Enterprise Information Management 24(1): 30–52*.CrossRefGoogle Scholar
  4. Adams, D.A., Nelson, R.R. and Todd, P.A. (1992). Perceived Usefulness, Ease of Use, and Usage of Information Technology: A replication, MIS Quarterly 16(2): 227–247*.CrossRefGoogle Scholar
  5. Agarwal, R. and Karahanna, E. (2000). Time Flies When You’re Having Fun: Cognitive absorption and beliefs about information technology usage, MIS Quarterly 24(4): 665–694.CrossRefGoogle Scholar
  6. Agarwal, R. and Prasad, J. (1997). The Role of Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technologies, Decision Sciences 28(3): 557–582*.CrossRefGoogle Scholar
  7. Agarwal, R., Prasad, J. and Zanino, M.C. (1996). Training Experiences and Usage Intentions: A field study of a graphical user interface, International Journal of Human-Computer Studies 45(2): 215–241*.CrossRefGoogle Scholar
  8. Aguirre-Urreta, M. and Marakas, G. (2012). Exploring Choice as an Antecedent to Behavior: Incorporating alternatives into the technology acceptance process, Journal of Organizational & End User Computing 24(1): 82–107*.CrossRefGoogle Scholar
  9. Ahuja, M.K. and Thatcher, J.B. (2005). Moving Beyond Intentions and toward the Theory of Trying: Effects of work environment and gender on post-adoption information technology use, MIS Quarterly 29(3): 427–459.Google Scholar
  10. Ajzen, I. (1985). From Intentions to Action: A theory of planned behavior, in J. Kuhl and J. Beckmann (eds.) Action Control: From Cognition to Behavior, New York: Springer-Verlag.Google Scholar
  11. Ajzen, I. (2005). Attitudes, Personality and Behavior, 2nd edn, Milton-Keynes, UK: Open University Press/McGraw-Hill.Google Scholar
  12. Alter, S. (2014). Theory of Workarounds, Communication of the Association for Information Systems 34(55): 1041–1066.Google Scholar
  13. Amoako-Gyampah, K. and Salam, A.F. (2004). An Extension of the Technology Acceptance Model in an ERP Implementation Environment, Information & Management 41(6): 731–745*.CrossRefGoogle Scholar
  14. Anderson, J.E., Schwager, P.H. and Kerns, R.L. (2006). The Drivers for Acceptance of Tablet PCs by Faculty in a College of Business, Journal of Information Systems Education 17(4): 429–440*.Google Scholar
  15. Azad, B. and King, N. (2008). Enacting Computer Workaround Practices Within a Medication Dispensing System, European Journal of Information Systems 17(3): 264–278*.CrossRefGoogle Scholar
  16. Bagozzi, R.P. (1984). A Prospectus for Theory Construction in Marketing, The Journal of Marketing 48(1): 11–29.CrossRefGoogle Scholar
  17. Benham, H.C. and Raymond, B.C. (1996). Information Technology Adoption: Evidence from a voice mail introduction, Computer Personnel 17(1): 3–25*.CrossRefGoogle Scholar
  18. Bhattacherjee, A. and Hikmet, N. (2007). Physicians’ Resistance Toward Healthcare Information Technology: A theoretical model and empirical test, European Journal of Information Systems 16(6): 725–737.CrossRefGoogle Scholar
  19. Boudreau, M.-C. and Robey, D. (2005). Enacting Integrated Information Technology: A human agency perspective, Organization Science 16(1): 3–18*.CrossRefGoogle Scholar
  20. Brehm, S.S. and Brehm, J.W. (1981). Psychological Reactance: A theory of freedom and control, New York: Academic Press.Google Scholar
  21. Brown, S.A., Massey, A.P., Montoya-Weiss, M.M. and Burkman, J.R. (2002). Do I Really Have to? User Acceptance of Mandated Technology, European Journal of Information Systems 11(4): 283–295*.CrossRefGoogle Scholar
  22. Burton-Jones, A. and Grange, C. (2012). From Use to Effective Use: A representation theory perspective, Information Systems Research 24(3): 632–658.CrossRefGoogle Scholar
  23. Chae, B. and Poole, M.S. (2005). Mandates and Technology Acceptance: A tale of two enterprise technologies, The Journal of Strategic Information Systems 14(2): 147–166*.CrossRefGoogle Scholar
  24. Chan, F.K.Y., Thong, J.Y.L., Venkatesh, V., Brown, S.A., Hu, P.J.H. and Tam, K.Y. (2010). Modeling Citizen Satisfaction with Mandatory Adoption of An e-Government Technology, Journal of the Association for Information 11(10): 519–549*.Google Scholar
  25. Chen, C., Lai, H. and Ho, C. (2015). Why Do Teachers Continue to Use Teaching Blogs? The Roles of Perceived Voluntariness and Habit, Computers & Education 82(1): 236–249*.CrossRefGoogle Scholar
  26. Chengalur-Smith, I. and Duchessi, P. (1999). The Initiation and Adoption of Client – Server Technology in Organizations, Information & Management 35(2): 77–88.CrossRefGoogle Scholar
  27. Classen, D., Bates, D.W. and Denham, C.R. (2010). Meaningful Use of Computerized Prescriber Order Entry, Journal of Patient Safety 6(1): 15–23.CrossRefGoogle Scholar
  28. Clay, P.F., Dennis, A.R. and Ko, D. (2005). Factors Affecting the Loyal Use of Knowledge Management Systems, in R.H. Sprague Jr (ed.) The 38th Hawaii International Conference on System Sciences, Big Island, Hawaii: IEEE, p. 251*.Google Scholar
  29. Compeau, D.R., Meister, D.B. and Higgins, C.A. (2007). From Prediction to Explanation: Reconceptualizing and extending the perceived characteristics of innovating, Journal of the Association for Information Systems 8(8): 409–439*.Google Scholar
  30. Croteau, A.-M. and Vieru, D. (2002). Telemedicine Adoption by Different Groups of Physicians, in The 35th Hawaii International Conference on System Sciences, Big Island, Hawaii: IEEE, pp. 1–9*.Google Scholar
  31. Debono, D.S., Greenfield, D., Travaglia, J.F., Long, J.C. and Black, D. (2013). Nurses’ Workarounds in Acute Healthcare Settings: A scoping review, BMC Health Services Research 13(55): 175.CrossRefGoogle Scholar
  32. DeLone, W.H. and McLean, E.R. (2003). The DeLone and McLean Model of Information Systems Success: A ten-year update, Journal of Management Information Systems 19(4): 9–30.CrossRefGoogle Scholar
  33. Elie-Dit-Cosaque, C., Pallud, J. and Kalika, M. (2011). The Influence of Individual, Contextual, and Social Factors on Perceived Behavioral Control of Information Technology: A field theory approach, Journal of Management Information Systems 28(3): 201–234.CrossRefGoogle Scholar
  34. Ferneley, E.H. and Sobreperez, P. (2006). Resist, Comply or Workaround? An Examination of Different Facets of User Engagement with Information Systems, European Journal of Information Systems 15(4): 345–356*.CrossRefGoogle Scholar
  35. Fishbein, M. and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An introduction to theory and research, Reading, MA: Addison-Wesley Publications.Google Scholar
  36. Geiger, G. and Derman, Y.D. (2003). Methodology for Evaluating Physician Order Entry (POE) Implementations, Journal of Evaluation in Clinical Practice 9(4): 401–408.CrossRefGoogle Scholar
  37. Green, G.C., Collins, R.W. and Hevner, A.R. (2004). Perceived Control and the Diffusion of Software Process Innovations, Journal of High Technology Management Research 15(1): 123–144*.CrossRefGoogle Scholar
  38. Grudin, J. and Palen, L. (1995). Why Groupware Succeeds: Discretion or mandate?, in H. Marmolin, Y. Sundblad and K. Schmidt (eds.) The 4th European Conference on Computer-Supported Cooperative Work, Stockholm, Sweden, pp. 263–278.Google Scholar
  39. Hardgrave, B.C., Davis, F.D. and Riemenschneider, C.K. (2003). Investigating Determinants of Software Developers’ Intentions to Follow Methodologies, Journal of Management Information Systems 20(1): 123–151*.CrossRefGoogle Scholar
  40. Hartwick, J. and Barki, H. (1994). Explaining in the Role of User Participation in Information System Use, Management Science 40(4): 440–465*.CrossRefGoogle Scholar
  41. Hebert, M. and Benbasat, I. (1994). Adopting Information Technology in Hospitals: The relationship between attitudes/expectations and behavior, Hospital & Health Services Administration 39(3): 369–383*.Google Scholar
  42. Hester, A.J. (2010). A Comparative Analysis of the Usage and Infusion of Wiki and Non-Wiki-based Knowledge Management Systems, Information Technology and Management 12(4): 335–355*.CrossRefGoogle Scholar
  43. Hsieh, J.J.P., Rai, A., Petter, S. and Zhang, T. (2012). Impact of User Satisfaction with Mandated CRM Use on Employee Service Quality, MIS Quarterly 36(4): 1065–1080.Google Scholar
  44. Hsieh, J.J.P. and Wang, W. (2007). Explaining Employees’ Extended Use of Complex Information Systems, European Journal of Information Systems 16(3): 216–227*.CrossRefGoogle Scholar
  45. Hsu, C., Lu, H. and Hsu, H. (2007). Adoption of the Mobile Internet: An empirical study of multimedia message service (MMS), Omega 35(6): 715–726*.CrossRefGoogle Scholar
  46. Igbaria, M., Zinatelli, N., Cragg, P. and Cavaye, A.L.M. (1997). Personal Computing Acceptance Factors in Small Firms: A structural equation, MIS Quarterly 21(3): 279–305*.CrossRefGoogle Scholar
  47. Ignatiadis, I. and Nandhakumar, J. (2009). The Effect of ERP System Workarounds on Organizational Control: An interpretivist case study, Scandinavian Journal of Information Systems 21(3): 59–90.Google Scholar
  48. Iivari, J. (1996). Why are CASE Tools not Used?, Communications of the ACM 39(10): 94–103*.CrossRefGoogle Scholar
  49. Jasperson, J.S., Carter, P.E. and Zmud, R.W. (2005). A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems, MIS Quarterly 29(3): 525–557.Google Scholar
  50. Kane, G.C. and Labianca, G.J. (2011). IS avoidance in Healthcare Groups: A multilevel investigation, Information Systems Research 22(3): 504–522.CrossRefGoogle Scholar
  51. Karahanna, E., Straub, D.W. and Chervany, N.L. (1999). Information Technology Adoption Across Time: A cross-sectional comparison of pre-adoption and post-adoption beliefs, MIS Quarterly 23(2): 183–213*.CrossRefGoogle Scholar
  52. Kelman, H. (1958). Compliance, Identification, and Internalization: Three processes of attitude change, The Journal of Conflict Resolution 2(1): 51–60.CrossRefGoogle Scholar
  53. Kijsanayotin, B., Pannarunothai, S. and Speedie, S.M. (2009). Factors Influencing Health Information Technology Adoption in Thailand’s Community Health Centers: Applying the UTAUT model, International Journal of Medical Informatics 78(6): 404–416*.CrossRefGoogle Scholar
  54. Klein, K.J. and Kozlowski, S.W.J. (eds.) (2000). A Multilevel Approach to Theory and Research in Organizations’ Contextual, Temporal, and Emergent Processes, in Multilevel Theory Research, and Methods in Organizations: Foundations, Extensions, and New Directions, San Francisco, CA: Jossey-Bass, pp. 3–90.Google Scholar
  55. Klein, K.J. and Sorra, J.S. (1996). The Challenge of Innovation Implementation, The Academy of Management Review 21(4): 1055–1080.Google Scholar
  56. Kuan, K.K.Y., Zhong, Y. and Chau, P.Y.K. (2014). Informational and Normative Social Influence in Group-Buying: Evidence from self-reported and EEG data, Journal of Management Information Systems 30(4): 151–178.CrossRefGoogle Scholar
  57. Lapointe, L. and Beaudry, A. (2014). Identifying IT User Mindsets: Acceptance, resistance and ambivalence, in R.H. Sprague Jr (ed.) The 47th Hawaii International Conference on System Sciences, Waikoloa, Hawaii: IEEE, pp. 4619–4628.Google Scholar
  58. Lapointe, L. and Rivard, S. (2005). A multilevel Model of Resistance to Information Technology Implementation, MIS Quarterly 29(3): 461–491.Google Scholar
  59. Lapointe, L. and Rivard, S. (2007). A Triple Take on Information System Implementation, Organization Science 18(1): 89–107.CrossRefGoogle Scholar
  60. Lee, Y., Lee, J. and Lee, Z. (2006). Social Influence on Technology Acceptance Behavior: Self-identity theory perspective, Database for Advances in Information Systems 37(2–3): 60–75*.CrossRefGoogle Scholar
  61. Leonardi, P.M. (2009). Why Do People Reject New Technologies and Stymie Organizational Changes of Which They are in Favor? Exploring Misalignments Between Social Interactions and Materiality, Human Communication Research 35(3): 407–441.CrossRefGoogle Scholar
  62. Leonardi, P.M. (2011). When Flexible Routines Meet Flexible Technolologies: Affordances, constraint, and the imbrication of human and material agencies, MIS Quarterly 35(1): 147–167.Google Scholar
  63. Liang, H., Xue, Y., Ke, W. and Wei, K.K. (2010). Understanding the Influence of Team Climate on IT Use, Journal of the Association for Information 11(8): 414–432*.Google Scholar
  64. Lowry, G. (2002). Modelling User Acceptance of Building Management Systems, Automation in Construction 11(6): 695–705*.CrossRefGoogle Scholar
  65. Lucas, H.C. and Spitler, V.K. (1999). Technology Use and Performance: A field study of broker workstations, Decision Sciences 30(2): 291–311*.CrossRefGoogle Scholar
  66. Malhotra, Y., Galletta, D.F. and Kirsch, L.J. (2008). How Endogenous Motivations Influence User Intentions: Beyond the dichotomy of extrinsic and intrinsic user motivations, Journal of Management Information Systems 25(1): 267–300.CrossRefGoogle Scholar
  67. Marakas, G.M. and Hornik, S. (1996). Passive Resistance Misuse: Overt support and covert recalcitrance in IS implementation, European Journal of Information Systems 5(3): 208–219.CrossRefGoogle Scholar
  68. Moore, G.C. (1989). An Examination of the Implementation of Information Technology for End Users: A diffusion of innovations perspective, in Unpublished Doctoral Dissertation, Vancouver: University of British Columbia*.Google Scholar
  69. Moore, G.C. and Benbasat, I. (1991). Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research 2(3): 192–222*.CrossRefGoogle Scholar
  70. Nah, F. F.-H., Tan, X. and Teh, S.H. (2004). An Empirical Investigation on End-Users’ Acceptance of Enterprise Systems, Information Resources Management Journal 17(3): 32–53*.CrossRefGoogle Scholar
  71. Plouffe, C.R., Hulland, J.S. and Vandenbosch, M. (2001). Richness Versus Parsimony in Modeling Technology Adoption Decisions: Understanding merchant adoption of a smart card-based payment system, Information Systems Research 12(2): 208–222*.CrossRefGoogle Scholar
  72. Rai, A., Lang, S.S. and Welker, R.B. (2002). Assessing the Validity of IS Success Models: An empirical test and theoretical analysis, Information Systems Research 13(1): 50–69*.CrossRefGoogle Scholar
  73. Ramayah, T. (2010). The Role of Voluntariness in Distance Education Students’ Usage of a Course Website, The Turkish Online Journal of Educational Technology 9(3): 96–105*.Google Scholar
  74. Rivard, S. and Lapointe, L. (2012). Information Technology Implementers’ Responses to User Resistance: Nature and effect, MIS Quarterly 36(3): 897–920.Google Scholar
  75. Salancik, G.R. and Pfeffer, J. (1978). A Social Information Processing Approach to Job Attitudes and Task Design, Administrative Science Quarterly 23(2): 224–253.CrossRefGoogle Scholar
  76. Scheepers, R., Scheepers, H. and Ngwenyama, O.K. (2006). Contextual Influences on User Satisfaction with Mobile Computing: Findings from two healthcare organizations, European Journal of Information Systems 15(3): 261–268*.CrossRefGoogle Scholar
  77. Sørebø, Ø. and Eikebrokk, T.R. (2008). Explaining IS Continuance in Environments Where Usage is Mandatory, Computers in Human Behavior 24(5): 2357–2371*.CrossRefGoogle Scholar
  78. Speier, C. and Venkatesh, V. (2002). The Hidden Minefileds in the Adoption of Sales Force Automation Technologies, The Journal of Marketing 66(3): 98–111*.CrossRefGoogle Scholar
  79. Staples, D.S. and Seddon, P. (2004). Testing the Technology-to-Performance Chain Model, Journal of Organizational and End User Computing 16(4): 17–36*.CrossRefGoogle Scholar
  80. Stein, M.-K., Newell, S., Wagner, E.L. and Galliers, R.D. (2015). Coping with Information Technology: Mixed emotions, vacillation, and nonconforming use patterns, MIS Quarterly 39(2): 367–392.Google Scholar
  81. Templeton, G.F. and Byrd, T.A. (2003). Determinants of the Relative Advantage of a Structured SDM During the Adoption Stage of Implementation, Journal Information Technology and Management 4(4): 409–428*.CrossRefGoogle Scholar
  82. van Harreveld, F., van der Pligt, J. and de Liver, Y.N. (2009). The Agony of Ambivalence and Ways to Resolve It: Introducing the MAID model, Personality and Social Psychology Review 13(1): 45–61.CrossRefGoogle Scholar
  83. van Slyke, C., Dick, G., Case, T. and Ilie, V. (2010). The Importance of Compatibility and Pressure on Intentions to Engage in Distance Learning, Communications of the Association for Information Systems 27(1): 395–414*.Google Scholar
  84. van Slyke, C., Lou, H. and Day, J. (2002). The Impact of Perceived Innovation Characteristics on Intention to Use Groupware, Information Resources Management Journal 15(1): 5–12*.CrossRefGoogle Scholar
  85. Vehring, N., Riemer, K. and Klein, S. (2011). ‘Don’t Pressure Me!’ Exploring the Anatomy of Voluntariness in the Organizational Adoption of Network Technologies, in C. Beath, M. Myers and K.-K. Wei (eds.) The Thirty Second International Conference on Information Systems, Shanghai, China, pp. 1–18*.Google Scholar
  86. Venkatesh, V. and Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda on Interventions, Decision Sciences 39(2): 273–315*.CrossRefGoogle Scholar
  87. Venkatesh, V. and Davis, F.D. (2000). The Theoretical Extension of the Technology Acceptance Model: Four longitudinal field studies, Information Systems Research 46(2): 186–204*.Google Scholar
  88. Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003). User Acceptance of Information Technology: Toward a unified view, MIS Quarterly 27(3): 425–478*.Google Scholar
  89. Wang, W. and Butler, J.E. (2007). Effects of Adoption Determinants in Voluntary Contexts on IS Mandated Usage, Journal of Information Science and Technology 3(3): 5–24.Google Scholar
  90. Webster, J. and Watson, R.T. (2002). Analyzing the Past to Prepare for the Future: Writing a literature review, MIS Quarterly 26(2): xiii–xxiii.Google Scholar
  91. Worchel, S. and Brehm, J.W. (1971). Direct and Implied Social Restoration of Freedom, Journal of Personality and Social Psychology 18(3): 294–304.CrossRefGoogle Scholar
  92. Wu, J. and Du, H. (2012). Toward a Better Understanding of Behavioral Intention and System Usage Constructs, European Journal of Information Systems 21(6): 680–698.CrossRefGoogle Scholar
  93. Wu, J. and Lederer, A. (2009). A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance, MIS Quarterly 33(2): 419–432*.Google Scholar

Copyright information

© Association for Information Technology Trust 2016

Authors and Affiliations

  • HsingYi Tsai
    • 1
  • Deborah Compeau
    • 2
  • Darren Meister
    • 3
  1. 1.Information Technology Management, Cedarville UniversityCedarvilleUSA
  2. 2.Department of Management, Information Systems, and Entrepreneurship, Washington State UniversityPullmanUSA
  3. 3.Information Systems, Richard Ivey School of Business, University of Western OntarioLondonCanada

Personalised recommendations