Social Media Use in the Workspace: Applying an Extension of the Technology Acceptance Model Across Multiple Countries

  • Samuel Fosso Wamba
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 747)


Social media technologies and tools are emerging as important source of firm business value creation. In this study, an extended version of the technology acceptance model (TAM) that integrates perceived risk and security is used to assess the acceptance of social media within the workspace across multiple countries and to test for user’s behaviors homogeneity. In addition, the study investigates the moderating effects of user computer experience on the relationship between user’s attitude and intention to use social media. To test the proposed model, the study uses data gathered from the US, Australia, the UK, Canada, and India. In the data analysis process, the study uses the full data and data from each country. The results detect the existence of user’s behaviors heterogeneity across the countries under study; confirm the robustness of the TAM in the context of social media within the workspace. Finally, implications for research and practice are proposed.


Social media Adoption and use Intention TAM Perceived risk Perceived security Computer experience 


  1. 1.
    Stephen, A.T., Toubia, O.: Deriving value from social commerce networks. J. Mark. Res. 47(2), 215–222 (2010)CrossRefGoogle Scholar
  2. 2.
    Culnan, M.J., McHugh, P.J., Zubillaga, J.I.: How large U.S. companies can use twitter and other social media to gain business value. MIS Q. Executive 9(4), 243–259 (2010)Google Scholar
  3. 3.
    Burke, W.Q., Fields, D.A., Kafai, Y.B.: Entering the clubhouse: case studies of young programmers joining the online scratch communities. J. Organ. End User Comput. 22(2), 21 (2010)CrossRefGoogle Scholar
  4. 4.
    IBM: Social Commerce Defined, IBM, Editor. IBM (2009)Google Scholar
  5. 5.
    Herhold, K.: How Businesses Use Social Media: 2017 Survey (2017). Cited 16 Nov 2017
  6. 6.
    STATISTA: Social network advertising revenue from 2014 to 2017 (in billion U.S. dollars) (2017). Cited 15 Nov 2017
  7. 7.
    Fosso Wamba, S., et al.: Role of intrinsic and extrinsic factors in user social media acceptance within workspace: assessing unobserved heterogeneity. Int. J. Inf. Manage. 37(2), 1–13 (2017)CrossRefGoogle Scholar
  8. 8.
    Fosso Wamba, S., Carter, L.: Social media tools adoption and use by SMES: an empirical study. J. Organ. End User Comput. 26(2), 1–17 (2014)CrossRefGoogle Scholar
  9. 9.
    Fosso Wamba, S., Edwards, A.J.: Factors related to social media adoption and use for emergency services operations: the case of the NSW SES. In: 20th Americas Conference on Information Systems, Savannah, Georgia, USA (2014)Google Scholar
  10. 10.
    Meire, M., Ballings, M., Van den Poel, D.: The added value of social media data in B2B customer acquisition systems: A real-life experiment. Decis. Support Syst. 104(Supplement C), 26–37 (2017)Google Scholar
  11. 11.
    Dong, J.Q., Wu, W.: Business value of social media technologies: evidence from online user innovation communities. J. Strateg. Inf. Syst. 24(2), 113–127 (2015)CrossRefGoogle Scholar
  12. 12.
    Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989)CrossRefGoogle Scholar
  13. 13.
    Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46(2), 186–204 (2000)CrossRefGoogle Scholar
  14. 14.
    Venkatesh, V., et al.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003)CrossRefGoogle Scholar
  15. 15.
    Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35(8), 982–1003 (1989)CrossRefGoogle Scholar
  16. 16.
    Trinchera, L.: Unobserved Heterogeneity in Structural Equation Models: a new approach to latent class detection in PLS Path Modeling, p. 338. Universita degli Studi di Napoli Federico II, Napoli (2007)Google Scholar
  17. 17.
    Teuku, N.: The effects of experience, complexity, and computer self efficacy factors towards the use of human resources information system application. J. Res. Bus. Manage. 2(11), 26–33 (2014)Google Scholar
  18. 18.
    Thong, J.Y.L., et al.: Consumer acceptance of personal information and communication technology services. IEEE Trans. Eng. Manage. 58(4), 613–625 (2011)CrossRefGoogle Scholar
  19. 19.
    Ringle, C.M., Wende, S., Becker, J.-M.: SmartPLS 3 (2014).
  20. 20.
    Leung, J., Cheung, W., Chu, S.-C.: Aligning RFID applications with supply chain strategies. Inf. Manage. 51(2), 260–269 (2014)CrossRefGoogle Scholar
  21. 21.
    Fosso Wamba, S., Ngai, E.W.T.: Importance of issues related to RFID-enabled healthcare transformation projects: results from a delphi study. Prod. Plann. Control 26(1), 19–33 (2015)CrossRefGoogle Scholar
  22. 22.
    Guadagnoli, E., Velicer, W.: Relation of sample size to the stability of component patterns. Psychol. Bull. 103, 265–275 (1988)CrossRefGoogle Scholar
  23. 23.
    Chin, W.W.: The partial least squares approach for structural equation modeling (1998)Google Scholar
  24. 24.
    Chin, W.W.: How to write up and report PLS analyses. In: Handbook of Partial Least Squares, pp. 655–690 (2010)Google Scholar
  25. 25.
    Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39–50 (1981)CrossRefGoogle Scholar
  26. 26.
    Becker, J.-M., et al.: Discovering unobserved heterogeneity in structural equation models to avert validity threats. MIS Q. 37(3), 665–694 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Toulouse Business SchoolToulouseFrance

Personalised recommendations