NASCENT CONNECTIONS 2013

103
NASCENT CONNECTIONS 2013 Proceedings of Swansea University Business School Postgraduate Research Conference 15 May 2013 Edited by Y.K. Dwivedi, N. Koenig-Lewis, A. Pullen, E. Robbins, A. Simintiras

Transcript of NASCENT CONNECTIONS 2013

Page 1: NASCENT CONNECTIONS 2013

NASCENT CONNECTIONS 2013

Proceedings of Swansea University Business School

Postgraduate Research Conference

15 May 2013

Edited by Y.K. Dwivedi, N. Koenig-Lewis, A. Pullen,

E. Robbins, A. Simintiras

Page 2: NASCENT CONNECTIONS 2013
Page 3: NASCENT CONNECTIONS 2013

i

Nascent Connections 2013

Proceedings of Business School Postgraduate Research Conference

Swansea University

15 May 2013

Edited by Y. Dwivedi, N. Koenig-Lewis, A. Pullen, E. Robbins and A. Simintiras

Page 4: NASCENT CONNECTIONS 2013

ii

First paperback edition printed 2013 in the United Kingdom

ISBN 978-0-9576423-0-0

Published by Business School, Swansea University

Although every precaution has been taken in the preparation of this publication, the publisher

and author assume no responsibility for errors or omissions.

Page 5: NASCENT CONNECTIONS 2013

iii

Foreword

Dr Deborah Fitzsimmonds

Dean of Academic Board (Research)

Swansea University

Our postgraduate research community at Swansea University is vital to creating the next

generation of researchers and we are proud of the success and achievement of our students.

Your contribution is central to the University’s aspirations as a research intensive institution

delivering world-leading research. To help foster success, the Academic Board (Research) is

committed to supporting departments in delivering high quality supervision, training and

research environments for our research students. I am delighted to have the opportunity to

hear the exciting and ground breaking postgraduate research being undertaken within the

Business School. I look forward to sharing this day with you.

Page 6: NASCENT CONNECTIONS 2013

iv

Acknowledgements

We would like to thank Prof Antonis Simintiras and the Business School for

financially supporting the first Postgraduate Research Conference, Nascent

Connections 2013.

The conference chairs are especially grateful to Liz Robbins, Postgraduate Research

Administrator for the College of Business, Economics and Law. Without her

tremendous effort, hard work and attention to detail, this first Business School

Postgraduate Research Conference 2013 would have not been possible.

All of the papers included in these proceedings have been through a double-blind

peer-review process, and we would like to thank the students who submitted their

work and the academics of the Swansea University Business School who kindly acted

as reviewers.

Our thanks also go to Mango Bikes and the Chartered Institute of Marketing for

sponsoring our prizes.

Dr Yogesh Dwivedi, Dr Nicole Koenig-Lewis, Prof Alison Pullen, Prof Antonis

Simintiras (Conference Chairs)

May 2013

Page 7: NASCENT CONNECTIONS 2013

v

Nascent Connections 2013 – Introduction

Y. Dwivedi, N. Koenig Lewis, A. Pullen, E. Robbins and A. Simintiras

It gives us great pleasure to introduce the proceedings of Nascent Connections 2013,

the inaugural conference hosted by Swansea University Business School for

Postgraduate Research Students. As the name suggests, students participating in the

conference will be showcasing new research which they hope will stimulate dialogue

and networking with other members of their academic community. We hope the event

will set down roots in this founding year and act as a precedent for many more

successful events in the future.

This introductory article briefly outlines the importance and relevance of events such

as these to the doctoral researcher before going on to exploring the opportunities and

obstacles that students might discover as they make their way through their research.

The concluding section of the introduction provides a summary of the submissions

presented in the proceedings and an overview of their key messages.

Facilitating successful research for the doctoral student

One of the chief aims of a doctoral student is to find their place within their research

community and to understand the academic, social and political dimensions of a

world in which they will need to compete in order to further their careers. Whilst

studying for a research degree can be an isolating experience at times, it should also

represent the beginning of an exchange of knowledge, ideas and aspirations which

have the potential to contribute to world leading research.

Conference attendance and, specifically, presentation of research, introduces the

student to the community of learning of which they have chosen to be a part. It

provides a dynamic and specialist forum in which they can share their own research

whilst also absorbing the ideas and thoughts of others, making connections and

contrasts which lead to new or revised lines of thought. It is these nascent

connections, just emerging and beginning to develop which can enhance the

originality of the research and lead it in directions not initially anticipated.

Presenting at an academic conference not only gives students valuable experience of

speaking to an audience of experts in their field of research, it also allows them to

acquire a new level of self-confidence. Presenting with conviction and responding

thoughtfully to questioning requires a true commitment to the research, a true passion

for the direction it is taking and it is at these events that students come to realise their

dedication to their subject. This in turn encourages them to explore the thoughts of

others, to allow their research to be questioned by the community and to refine their

thinking without being afraid of the possible effect this might have on the outcome.

Conference attendance has another vital dimension for students. As well as exhibiting

their own individual research, they are also given the opportunity to develop as active

and thoughtful participants of an academic audience. Engaging with the work of

others, asking questions and delving into detail helps to facilitate the emergence of a

Page 8: NASCENT CONNECTIONS 2013

vi

dialogue which in itself is the essence of learning and discovery (Cryer 2006). It is

through this vocalisation and response that new ideas can be advanced and allowed to

flourish.

Whether the conference is international, national, regional or local, the results and

benefits are the same. Connections, established between people, groups, institutions

and, essentially, ideas, are the lifeblood of research with the potential to produce

world changing results.

Such results are not easily obtained. The path to obtaining a research degree is

notoriously beset with unexpected obstacles and tempting crossroads which offer both

useful and misleading directions to students. Reaching the end of this path, complete

with a degree requires tenacity, self-belief and above all the determination to make a

contribution to the chosen topic. The three years of study should develop the student’s

thinking, provide a rewarding experience and offer a starting point for the next stage

in their career. In order to reach this point, a sense of perspective must be retained; the

PhD is not self-defining, neither is it the means to an end, rather it is an opportunity to

discover an abundance of new beginnings.

Studying for a PhD tests both the intellectual and psychological strength of the

individual (Phillips and Pugh 2010). The nature of research coupled with the relative

inexperience of the postgraduate student can mean that feelings of isolation and a lack

of motivation can overcome the essence of the study itself. A vicious cycle can then

come into play, leading the student further into self-doubt and away from the true

purpose of the research – to explore, ask questions, make corrections and be inspired.

Students often assert great pressure on themselves, expecting too much and allowing

the PhD to take control of them. A pragmatic and practical approach to undertaking a

research degree can avoid this and allow the student to be in control, not of something

solid and unmoving, but of a fluid, ever-changing process leading to original and

exciting discoveries.

One of the most important pitfalls to overcome as a research student is the loss of

motivation. More than ever, students will find themselves working independently,

making choices and decisions about their research and not always having someone

else to help maintain their focus. Inevitably, the three years which initially seem like

an eternity, can slip away, prey to drifting thoughts and lack of any concrete goals

aside from the mammoth deadline looming at the end. Essential to avoiding this is the

production of a realistic time plan, developed at the start and kept to as much as

possible until the end. This plan must include long and short term goals which can be

agreed with supervisors and can also relate to University stipulated progression points

(Phillips and Pugh 2010). These will provide positive pressure which will help

students maintain an on-going focus even when motivation begins to wane.

Such goals are also important in order to maintain a grasp of reality during the PhD. It

is easy for students to allow the research project to grow too big and to start exploring

all of the inevitable offshoots that the results reveal. It is essential for students to

remember that whilst research in general does not necessarily have a definitive end,

this particular project has a time limit, an overall deadline which needs to be met.

Page 9: NASCENT CONNECTIONS 2013

vii

Although it is very tempting to be distracted by new directions, having a time plan

established from the start will allow the student to understand what is achievable in

the time available. The unexplored waters will still be there, ready to be chartered,

once the project is finished. Indeed the student will then be far better equipped with

knowledge and skills to do so.

Students can experience feelings of immense self-doubt whilst studying for their

research degrees and much of this comes from the isolation they can feel as they try to

make their way through a seemingly boundless topic (Phillips and Pugh 2010). Whilst

it is essential to have the time and space alone to delve into the detail of this topic, as

human beings students also need the opportunity to vocalise their thoughts, concerns

and questions to others. Whilst working as an individual, social and academic

stimulation from others is vital and students should aim to build and maintain their

own support network of friends and colleagues. Peer support is very powerful in its

mutuality and it is these connections which can help students get through the most

challenging times of their research degrees. Working alone can be tempting as the

removal of ‘distractions’ can make it seem as if there is more time to focus on the task

at hand. However, working in a busy research environment is far more conducive to

productive thinking. Sharing moments of despair and euphoria can help with

motivation and keep the size of the project in perspective. Although the PhD

‘belongs’ to one individual, it is always a part of something much bigger in the same

way that the individual is a part of their own research community.

As well as connecting with peers, the doctoral student must also develop a beneficial

relationship with their supervisor. There is a delicate balance between dependence

and independence and the student should naturally migrate from one to the other over

the three years (Delamont and Atkinson 2004). Students should make use of their

supervisor at the beginning of the period of research when the topic seems huge and

direction is difficult to glean. The supervisor should facilitate the immersion of the

student in the subject, assisting them with the development of a realistic work plan

and then allowing them to gain a steady control of the subject so that the dependence

will naturally diminish. A supervisor’s role as an expert in the field should be to

impart experience to the student but also to equip them with the tools of enquiry they

need to become successful as researchers in their own right.

Completing a PhD does not mean that a line of investigation is closed between the

covers of the thesis. It represents a genesis which allows the student, now a fully-

fledged researcher, to use the skills and knowledge acquired to take their ideas

forwards, or sideways or see them metamorphose into something altogether new and

unexplored. There is not one single outcome of a research degree; instead there is a

synthesis of results which have limitless possibilities for further enquiry. Moreover, a

researcher has been equipped with the analytic and inquiring mind needed for these

possibilities to be explored.

Overview of research

The conference proceedings include submissions from 17 PhD and MPhil students

within the Business School. They are made up of 8 conceptual papers and 4 full

Page 10: NASCENT CONNECTIONS 2013

viii

papers. 7 abstracts are also included which will be presented as posters during the

conference. Submissions reflect some of the research active areas within the School,

including Technology and Innovation Management, Marketing and People,

Organisations and Work. A synthesis of these submissions is presented here.

The proceedings are opened with a group of papers which explore the use of a range

of models to address consumer and public sector adoption of information technology

(IT). In the first paper Slade seeks to determine the most appropriate model to be

employed to undertake novel research into mobile payment adoption in the UK.

Babdullah builds on previous research to explore the application of UTAUT2

(Unified Theory of Acceptance and Use of Technology) to identify factors

contributing to IT consumer acceptance in Saudi Arabia. Factors that influence Indian

citizens’ adoption of an online PAN card registration system are explored by Rana

with a focus on trust, risk and self-efficacy. Using a review of the literature as a basis,

Kapoor focuses on the attributes of four recent innovations in order to develop a

research model which explores factors affecting consumer adoption of such

innovations. Miller analyses the divide between business and IT communities and

present a theoretical basis for interrogation of the presence of social capital as a

potential means of aligning these communities. The paper introduces a qualitative

study which lays the ground for further empirical research. Alkhowaiter presents an

extensive literature review on the subject of HRIS (Human Resources Information

Systems) before introducing a study which combines the UTAUT and D&M IS

(DeLone and McLean IS Success) models in order to explore the adoption and

success of HRIS in Saudi Arabia. UTAUT2 is then explored further by Alawan in a

paper which looks at the adoption of self-service technology in Jordan and how

various factors affect this. The study proposes the use of quantitative field survey in

order to focus specifically on the Jordanian banking context. A collection of three

abstracts complete this group of submissions. The first two explore the acceptance

and adoption of e-government in different contexts. Aralyat attempts to gather

empirical data in order to investigate factors affecting e-government adoption in the

Jordanian context while Alhamzi focuses on the challenges that culture presents to the

adoption of e-government in Saudi Arabia. On a similar theme, Alatawi examines the

importance and influence of environmental factors on the adoption of knowledge

management systems (KMS) in the Saudi Arabian public sector.

The following two papers present studies of various effects of marketing on consumer

behaviour. Based on a review of the literature on experiential marketing, Sibbald

introduces research into the experiential values of purchasing through online and

offline distribution channels. Using a form of qualitative webnography, Warr

examines the impact of social networking on music consumption and identity and

how they are inextricably linked. An abstract by Yang completes this section with a

focus on developing a new theoretical model which analyses how gamification can

act as a powerful influence on brand perceptions.

The penultimate section begins with an investigation into workforce development,

Wintersberger interrogates the sustainability of work within low fares airlines in India

and Brazil. The paper explores the attempt to achieve both cost and quality

Page 11: NASCENT CONNECTIONS 2013

ix

effectiveness and, therefore, the treatment of workers as both dependable and

disposable. Two abstracts follow this by exploring various factors affecting the

employment of female workers. Al-Suwaileh looks at the work-life balance for

Kuwaiti mothers and how gender affects both their family and working lives,

specifically those employed in management roles. Alkothami analyses the various

social and cultural factors that affect the nursing turnover in Saudi Arabia.

The proceedings are closed with a discussion of some of the characteristics of

different types of failure data. Tudor applies both a Weibull distribution and an

empirical distribution to the data considered in the paper.

Conclusion

This range of research showcased by doctoral students represents a part of the

dynamic and inquisitive community which has developed within the Business School.

The level of innovation, both in terms of subject area and approach, reflects the

development of analytic, investigative minds and the desire to create and share

something relevant, new and inspirational. We hope that this flagship event offers a

rich experience to its participants and audience alike and encourages future students

to contribute their own research to a similar forum.

References

Cryer, P. (2006) The Research Student’s Guide to Success. Buckingham: Open

University Press.

Delamont, S., Atkinson, P. and Parry, O. (2004) Supervising the Doctorate. A Guide

to Success (2nd Edition). Berkshire: McGraw Hill.

Phillips, E.M and Pugh, D.S (2010) How To Get A PhD: A Handbook for Students

and their Supervisors (5th Edition). Berkshire: McGraw Hill.

Page 12: NASCENT CONNECTIONS 2013

x

Contents

Developing a theoretically grounded model to explore adoption of mobile

payments

Emma Slade

1

Evaluating the Unified Theory of Acceptance and Use of Technology

(UTAUT2) in the Saudi Arabian context

Abdullah Baabdullah

8

Examining Adoption of Online PAN Card Registration System: A Context

of Indian EGov System

Nripendra Rana

17

Innovation-attributes roles in the contemporary innovation adoption

research: An Investigation

Kawaljeet Kapoor

25

Searching for the engine of Business-IT alignment in social capital

Sian Miller

32

Examining the factors influencing the Adoption and Success of Human

Resource Information Systems in Saudi Public Sector Organization

Wassan Alkhowaiter

39

Adoption of Self-Service Technology by Jordanian Customers

Ali Alawan

47

Citizen Adoption of Electronic Government in Jordanian Context

Mohammad Alryalat

55

Evaluating the Cultural Impact on E-government Adoption: A Citizen

Centric View of Saudi Arabia

Khalid Alhamzi

57

Adoption of Knowledge Management Systems in Saudi Arabian Public

Sector Organisations: Role of Institutional Factors

Fatmah Alatawi

59

Will mobile payments prevail in the UK?

Emma Slade

61

Page 13: NASCENT CONNECTIONS 2013

xi

Developing a framework to compare the effect of distribution channels on

consumer behaviour

Francesca Sibbald

62

The Impact of Online Social Networking on Music Consumption and

Identity

Richard Warr

69

The Impact of Gamification on Brand Perception Enhancement

Yang Yang

71

HRM at Low Fares Airlines in BRICs: Commitment and Insecurity

Daniel Wintersberger

72

Barriers of culture, gender and family facing Kuwaiti mothers employed in

high and middle management in the education sector

Mai Al-Suwaileh

79

The Influence of Social and Cultural Factors on the Turnover Intentions of

Saudi Female Nurses

Matrah Alkothami

81

The analysis of failure data and warranty claims data: A comparison and

some lessons for automotive manufacturers

Patrick Tudor

83

Page 14: NASCENT CONNECTIONS 2013

1

Developing a theoretically grounded model to explore adoption of

mobile payments

Emma L Slade, Michael D Williams, Yogesh K Dwivedi

Abstract

So far mobile payment systems have not been widely adopted in Europe and North

America. Analysis of the existing literature revealed that no empirical mobile

payment adoption research has been conducted in the context of the UK to date;

therefore, the researchers seek to fill this current void. In order to achieve this, this

study sought to develop a theoretically grounded adoption model in order to examine

mobile payment adoption in the UK. Based on the current research findings a

theoretically grounded model has been developed by extending UTAUT2 with self-

efficacy, innovativeness, trialability, perceived risk and trust.

Keywords: Mobile payment (m-payment), Adoption, UK, UTAUT2, Extension

Introduction

Mobile payments (m-payments) combine payment systems with mobile devices and

services to provide users with the ability to initiate, authorize, and complete a

financial transaction in which money or funds are transferred over mobile network or

wireless communication technologies to the receiver through the use of a mobile

device (Chandra et al., 2010; Lu et al., 2011). The advantages of m-payment systems

are that they are not restricted to certain transaction situations, they have the benefit of

mobility, and are not restricted to the availability of ATMs (Gerpott & Kornmeier,

2009; Mallat, 2007). Forecasts by Gartner (2012) suggest that m-payment systems

will have 448 million users and $617 billion in transaction value worldwide by 2016.

Nevertheless, with the exception of a handful of countries, the application of various

m-payment solutions has not been as successful in Europe and North America in

comparison with Asian and developing countries, and despite their availability m-

payment systems are yet to reach critical mass in the UK. Therefore, consumer

adoption behaviour in relation to m-payments in the UK is a key issue in order to

provide important managerial information for the development and marketing of m-

payment systems according to consumers’ needs (Mallat, 2007; Schierz et al., 2010).

Despite this importance, no empirical mobile payment adoption research has been

conducted in the context of the UK to date, leaving an important void that needs to be

filled.

The remainder of this paper will be as follows. Firstly, from reviewing the existing

adoption research relating to mobile commerce (m-commerce), mobile banking (m-

banking), and m-payment, we will be able to highlight the most commonly used IS

adoption theories employed in this context to date. We will then explore which IS

adoption model would be appropriate to extend in order to examine UK consumer m-

payment adoption. From analysis of the relationships examined by the existing studies

Page 15: NASCENT CONNECTIONS 2013

2

we will then propose the extensions to the selected theory. Finally the paper will be

concluded and potential avenues for future research discussed.

Literature review

A review of the extant literature via Google Scholar® and ISI Web of Knowledge®

revealed that 20 quantitative studies had been conducted relating to m-payment

adoption. Therefore as m-payments and m-banking are both a part of m-commerce, it

was decided to examine quantitative adoption research relating to all three

innovations for the development of the conceptual model. Combined, 56 studies were

found to be appropriate for inclusion. Analysis of the 56 quantitative studies revealed

that the models used by at least four or more of the m-commerce, m-banking, and m-

payment studies were the Diffusion of Innovation theory (DOI), the Technology

Acceptance Model (TAM), and the Unified Theory of Acceptance and Use of

Technology (UTAUT).

Four of the 56 quantitative studies examining acceptance of m-commerce, m-banking,

and m-payments have applied DOI. Kapoor et al. (2013) employed DOI in order to

examine adoption of the Indian Railway Catering and Tourism Corporation’s mobile

ticketing service, extending it with constructs focussed on cost and risk. Although the

model explained 58.4 per cent of variance in behavioural intention, it was less

successful in predicting actual use, explaining just 26.4 per cent.

TAM is the most widely used theory in adoption research within the m-commerce, m-

banking, and m-payment context, with 28 of the 56 quantitative studies utilising the

model. Chandra et al. (2010) extended TAM with trust to explore adoption of m-

payments in Singapore and found that trust was the most significant predictor of

behavioural intention. Shin (2010) explored adoption of m-payments in the US with

an extended model of TAM; again, trust was found to be the most significant

predictor of behavioural intention, although attitude and perceived risk were also

highly significant.

Six of the quantitative m-commerce, m-banking, and m-payment adoption studies

have employed UTAUT. Hongxia et al. (2011) extended UTAUT with perceived risk

and cost to examine adoption of m-payments in China. Wang & Yi (2012) also

applied an extended UTAUT to examine adoption of m-payments in China. Of the six

studies, only Yu (2012) has included examination of the moderating variables,

although even this study only examined the effect of two of UTAUT’s four

moderators, and only examined the effect of each of these singularly rather than

comparing their moderating effects alone and in tandem.

Selection of theoretical model

UTAUT has been the second most used model to examine m-commerce, m-banking,

and m-payment adoption. In a similar vein to other IS adoption models such as TAM,

UTAUT was originally developed to explain employee technology acceptance within

an organizational context. Based on a further review of the extant literature,

Venkatesh et al. (2012) have recently proposed the extension of UTAUT, to what they

Page 16: NASCENT CONNECTIONS 2013

3

termed UTAUT2, in order to tailor it to the consumer technology acceptance context.

In addition to UTAUT’s four original constructs, performance expectancy, effort

expectancy, social influence, and facilitating conditions, UTAUT2 incorporates

hedonic motivation, price value, and habit (Table 1). Moreover, voluntariness of use

has been removed as a moderating variable assuming that consumer behaviours are

completely voluntary, thus leaving the three original moderators, gender, age and

experience. Used to examine mobile internet, a technology used by some m-payment

systems, UTAUT2, compared with UTAUT, produced a substantial improvement in

the explained variance of behavioural intention, from 56 per cent to 74 per cent, and

also a significant improvement in the explained variance of usage, from 40 per cent to

52 per cent. Given the constraints of this paper, please refer to Venkatesh et al. (2012)

for further explanation of UTAUT2’s relationships.

Whilst some models within the IS context have reached a relative level of maturity,

the same cannot be said of UTAUT2 for which replication and generalizability

studies, as well as those examining the model’s predictive validity, are still much

more limited in number. Venkatesh et al. (2012) suggested that future research should

apply UTAUT2 in different countries, across different age groups, and on different

technologies. Based on these recommendations, and as UTAUT has already been

applied by existing m-payment adoption research, then the selection of UTAUT2 to

examine adoption of m-payments in the UK would provide a valuable contribution to

both theoretical and practical knowledge.

Table 1. Overview of UTAUT2’s hypotheses

Hypothesis Explanation

H1a Age, gender, and experience will moderate the effect of habit on behavioural

intention, such that the effect will be stronger for older men with high levels of

experience.

H1b Age, gender, and experience will moderate the effect of habit on technology

use, such that the effect will be stronger for older men with high levels of

experience.

H2a Age and gender will moderate the effect of facilitating conditions on

behavioural intention, such that the effect will be stronger for older women.

H2b Age and experience will moderate the effect of facilitating conditions on

technology use, such that the effect will be stronger for older consumers with

increasing experience.

H3 Age, gender, and experience will moderate the effect of hedonic motivation

on behavioural intention, such that the effect will be stronger among younger

men with limited experience.

H4 Age and gender will moderate the effect of performance expectancy on

behavioural intention, such that the effect will be stronger for younger men.

H5 Age, gender, and experience will moderate the effect of effort expectancy on

behavioural intention, such that the effect will be stronger for older women

with limited experience.

Page 17: NASCENT CONNECTIONS 2013

4

H6 Age, gender and experience will moderate the effect of social influence on

behavioural intention, such that the effect will be stronger for older women

with limited experience.

H7 Age and gender will moderate the effect of price value on behavioural

intention, such that the effect will be stronger for older women.

H8 Experience will moderate the effect of behavioural intention on technology

use, such that the effect will be stronger for consumers with limited

experience.

Proposed extension of UTAUT2

Almost all of the adoption studies found in the context of m-commerce, m-banking,

and m-payment have extended a core model such as DOI, TAM, and UTAUT with

relationships from other models or studies. When Aldás-Manzano et al. (2009)

compared TAM with their extended model the variance explained was shown to

increase as a result of the extension. Moreover, as a further recommendation,

Venkatesh et al. (2012) suggested that future research should attempt to identify other

key constructs salient to different research contexts in order to extend UTAUT2. For

these reasons, the extension of UTAUT2 to examine UK consumer adoption of m-

payments is justified.

A thorough review of the existing relationships tested between dependent and

independent variables of the 56 quantitative m-commerce, m-banking, and m-

payment studies was conducted. It was revealed that a total of 269 relationships had

been examined by the 56 studies, of which 63 relationships had been observed by two

or more different studies. Of these 63 relationships several constructs are not

represented in UTAUT2. Based on the suitability for the context of m-payments, self-

efficacy, innovativeness, trialability, perceived risk, and trust were selected from

these relationships and proposed as extensions to UTAUT2.

In the arena of IS, self-efficacy is the belief in one’s ability to use a technology to

accomplish a task (Compeau & Higgins, 1995). Four m-commerce, m-banking, and

m-payment adoption studies have found self-efficacy to significantly predict

behavioural intention. Although Venkatesh et al. (2003) did not find self-efficacy to

have a role in UTAUT, as a result of its effect being captured by effort expectancy,

Khalifa & Shen (2008) found that when self-efficacy was included as a direct

antecedent of intention and perceived ease of use, the direct effect of perceived ease

of use on intention was no longer significant. This suggests that in the context of m-

commerce, m-banking, and m-payment, self-efficacy may not be captured by effort

expectancy and should therefore be included as an extension of UTAUT2. Therefore,

it is proposed that:

H9: Self-efficacy positively affects behavioural intention to use m-payments

Innovativeness reflects the willingness of an individual to try a concept, product or

service that is new in the context of their experience (Rogers, 1995). Venkatesh et al.

(2012) did not incorporate innovativeness as a construct in its own right as it was

Page 18: NASCENT CONNECTIONS 2013

5

suggested that innovativeness is accounted for by the effect of hedonic motivation on

behavioural intention moderated by age, gender and experience. Although

innovativeness is related with hedonic motivation, it is different in that hedonic

motivation looks at the perceived enjoyment of the technology in question whereas

innovativeness looks at the individual’s predisposition to adopt technology in general

relative to others. In the context of m-commerce, m-banking, and m-payment,

innovativeness has been found to significantly predict behavioural intention (Aldás-

Manzano et al., 2009; Yang et al., 2012). Moreover, Aldás-Manzano et al. (2009)

found innovativeness to be the most significant predictor of behavioural intention.

Therefore, it is proposed that:

H10: Innovativeness positively affects behavioural intention to use m-payments

Trialability is derived from DOI. It is argued that perceptions of trialability facilitate

innovation adoption because it makes potential adopters more comfortable with the

technology if they think they can experiment with it for a limited time first (Rogers,

1995). In the m-commerce, m-banking, and m-payment context, three studies that

have examined the effect of trialability on behavioural intention have found it to have

a significant effect. Moreover, Kapoor et al. (2013) found that trialability had a

greater influence on behavioural intention than relative advantage, complexity and

compatibility, which had previously been identified by Tornatzky & Klein (1982) as

the three consistently significant constructs. Therefore, it is proposed that:

H11: Trialability positively affects behavioural intention to use m-payments

A consumers’ perception of risk is derived from feelings of uncertainty or anxiety

about the behaviour and the seriousness of the possible outcomes of the behaviour

(Shin, 2010). The effect of anxiety was found to be insignificant by Venkatesh et al.

(2003) when developing the original UTAUT. However, anxiety is different from

perceived risk as it focuses on emotional, rather than technological, concerns.

Moreover, UTAUT was tested in the organizational, rather than consumer, context.

Given the infancy of m-payment systems and the uncertainty of the environment then

it is likely that adoption of m-payments will be negatively affected by perceptions of

risk. Perceived risk has been treated as both a unitary and multidimensional concept.

The effect of perceived risk, as a singular construct, on behavioural intention has been

proven to be significant by 12 studies in the context of m-commerce, m-banking, and

m-payment. Given that the inclusion of perceived risk as a singular, rather than

multidimensional, construct has proven successful by a large number of studies then,

for the purpose of parsimony, we propose the extension of UTAUT2 with one

construct to measure perceived risk. Therefore, it is proposed that:

H12: Perceived risk negatively affects behavioural intention to use m-payments

Trust is a subjective belief that a party will fulfil their obligations and it plays an

important role in uncertain financial transactions where users of the system are

vulnerable to financial loss (Gefen et al., 2003; Lu et al., 2011). Similarly to perceived

risk, trust has also been treated as both a unitary and multidimensional concept. The

Page 19: NASCENT CONNECTIONS 2013

6

effect of trust, as a unitary construct, on behavioural intention has been found to be

significant by a total of fourteen studies in the m-commerce, m-banking, and m-

payment context. In light of this, we propose the extension of UTAUT2 with one

construct to measure trust. Therefore, it is proposed that:

H13a: Trust positively affects behavioural intention to use m-payments

Trust can also help to reduce high perceptions of risk as trust helps users to overcome

uncertainty or anxiety of the behaviour and its possible outcomes (McKnight et al.,

2002). Gefen et al. (2003) suggested that more research should examine the

relationship between trust and perceived risk. The effect of trust, as a unitary

construct, on perceived risk has been found to be significant by four studies in the m-

commerce, m-banking, and m-payment context. Therefore, it is proposed that:

H13b: Trust negatively affects perceived risk of m-payments

Conclusion

Despite the existence of m-payment adoption research in a variety of different

contexts, examination of m-payment adoption in the UK has not currently been

undertaken. This study sought to develop a theoretically grounded adoption model in

order to examine m-payment adoption in the UK. Based on the existing research in

this context, UTAUT2 has been utilised and extended with self-efficacy,

innovativeness, trialability, perceived risk, and trust. Future research should conduct

empirical research in this context using this theoretically grounded model in order to

make a contribution to knowledge. In line with UTAUT2 it may also be useful to

examine the effects of the moderating variables on the proposed extensions.

References

Aldás-Manzano, J., Ruiz-Mafé, C. & Sanz-Blas, S. (2009). Exploring individual

personality factors as drivers of m-shopping acceptance. Industrial Management &

Data Systems, 109(6), 739-757.

Chandra, S., Srivastava, S. & Theng, Y-L. (2010). Evaluating the role of trust in

consumer adoption of mobile payment systems: An empirical analysis.

Communications of the Association for Information Systems, 27(29), 561-588.

Compeau, D. & Higgins, C. (1995). Computer self-efficacy: Development of a

measure and initial test. MIS Quarterly, 19(2), 189-211.

Gartner (2012). Gartner says worldwide mobile payment transaction value to surpass

$171.5 billion. Gartner: Newsroom, 29th

May 2012. Accessed online 19th

August

2012 from: http://www.gartner.com/newsroom/id/2028315

Gefen, D., Karahanna, E. & Straub, D. (2003). Trust & TAM in online shopping: An

integrated model. MIS Quarterly, 27(1), 51-90.

Gerpott, T. & Kornmeier, K. (2009). Determinants of customer acceptance of mobile

payment systems. International Journal of Electronic Finance, 3(1), 1-30.

Hongxia, P., Xianhao, X. & Weidan, L. (2011). Drivers and barriers in the acceptance

of mobile payment in China. International Conference on E-Business & E-

Government, 6-8th

May, Shanghai, 1-4.

Page 20: NASCENT CONNECTIONS 2013

7

Kapoor, K., Dwivedi, Y. & Williams, M. (2013). Role of innovative attributes in

explaining intention and adoption: A case of the IRCTC mobile ticketing

application in the Indian context. Proceedings of the UK Academy for Information

Systems Conference, 19-20th

March, Oxford.

Khalifa, M. & Shen, K. (2008). Explaining the adoption of transactional B2C mobile

commerce. Journal of Enterprise Information Management, 21(2), 110-124.

Lu, Y., Yang, S., Chau, P. & Cao, Y. (2011). Dynamics between the trust transfer

process and intention to use mobile payment services: A cross-environment

perspective. Information & Management, 48(8), 393-403.

Mallat, N. (2007). Exploring consumer adoption of mobile payments - A qualitative

study. The Journal of Strategic Information Systems, 16(4), 413-432.

McKnight, D., Choudhury, V. & Kacmar, C. (2002). Developing and validating trust

measures for e-commerce: An integrative typology. Information Systems Research,

13(3), 334-359.

Rogers, E. (1995). Diffusion of Innovations (4th

ed.), New York: Free Press.

Schierz, O., Schilke, O. & Wirtz, B. (2010). Understanding consumer acceptance of

mobile payment services: An empirical analysis. Electronic Commerce Research

& Applications, 9(3), 209-216.

Shin, D-H. (2010). Modelling the interaction of users and mobile payment system:

Conceptual framework. International Journal of Human-Computer Interaction,

26(10), 917-940.

Tornatzky, L. & Klein, K. (1982). Innovation characteristics and innovation adoption-

implementation: A meta-analysis of findings. IEEE Transactions on Engineering

Management, 29(1), 28-45.

Venkatesh, V., Thong, J. & Xu, X. (2012). Consumer acceptance and use of

information technology: extending the unified theory of acceptance and use of

technology. MIS Quarterly, 36(1), 157-178.

Venkatesh, V., Morris, M., Davis, G. & Davis, F. (2003). User acceptance of

information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.

Wang, L. & Yi, Y. (2012). The impact of use context on mobile payment acceptance:

An empirical study in China. In Xie, A. & Huang, X. (Eds.), Advances in

Computer Science & Education, pp.293-300. Berlin: Springer.

Yang, S., Lu, Y., Gupta, S., Cao, Y. & Zhang, R. (2012). Mobile payment services

adoption across time: An empirical study of the effects of behavioural beliefs,

social influences, and personal traits. Computers in Human Behaviour, 28(1), 129-

142.

Yu, C-S. (2012). Factors affecting individuals to adopt mobile banking: Empirical

evidence from the UTAUT model. Journal of Electronic Commerce Research,

13(2), 104-121.

Zhou, T. (2013). An empirical examination of continuance intention of mobile

payment services. Decision Support Systems, 54(2), 1085-1091.

Page 21: NASCENT CONNECTIONS 2013

8

Evaluating the Unified Theory of Acceptance and Use of Technology

(UTAUT2) in the Saudi Arabian context

Abdullah M Baabdullah, Yogesh K Dwivedi Michael D Williams

Abstract

Through the analysis of several previous studies, the purpose of this research is to

present an overview of the acceptance and use of technology in the Saudi Arabian

context. An extensive literature review has been outlined, grouped and represented by

Internet, M-Commerce, M-Banking, E-Government and M-Government Adoption,

Acceptance, Usage and Diffusion in order to investigate topical and theoretical gaps

that may require further research in the field (example references given at the end of

the paper). This study evaluates the acceptance and use of technology in the Saudi

Arabian context with the spotlight on various theories applied and extended.

Keywords: Acceptance and Use of Technology, Unified Theory of Acceptance and

Use of Technology, Internet, E-government, M-government, Saudi Arabia

1. Introduction

It is true to say that Western countries have contributed significantly towards the

development of emerging technologies and still continue to do so. The acceptance of

emerging technologies outside of the western countries, especially in the Middle

Eastern (ME) countries is not only challenging but also a risk to business and country

due to the strong influence of cultural, social and religious boundaries. Therefore,

end-users' behaviour, limitations, their intentions and related influencing factors

towards the adoption and use of technology are crucial and require extra analysis for

mature understanding, integration and sustainability. The decision makers,

management, developers and designers from governmental service to private

institutional services and from small to large scale enterprises demand a strong

acceptance validation model before business cost for technological deployment. In

this paper, several previous studies have been reviewed and represented by Internet,

M-Commerce, M-Banking, E-Government and M-Government Adoption, Acceptance,

Usage and Diffusion in the Saudi Arabian context in order to investigate topical and

theoretical gaps that can be researched in the future. It is due to the fact that the

adoption of emerging IT has a strong impact on business as well as social

development in the context of developing countries. Over the years, investigation

towards the adoption and use of IT has been conducted using different models such as

the Technology Acceptance Model (TAM), the Theory of Planned Behaviour (TPB),

the Theory of Reasoned Action (TRA) and the Unified Theory of Acceptance and Use

of Technology (UTAUT). Based on the extensive literature review outlined in the

coming sections, it is observed that the majority of these studies with extension,

Page 22: NASCENT CONNECTIONS 2013

9

medication and testing have been found with significant limitation and future research

recommendations. Therefore, conducting research on new IT/Information System (IS)

will contribute to better understanding of the concept of acceptance and use of

technology not only for Saudi Arabia but also for the international context in order to

identify, modify or determine constructs, relationships or problems related to the

applicability of theories applied or extended to IT/IS like UTAUT2 that was just

generated in 2012. Venkatesh, Thong and Xu (2012) have recommended that future

research can be built on UTAUT2 and applied in different countries, age groups and

technologies by identifying other relevant factors that may develop the usability of

UTAUT. Goodhue (2007) claimed that UTAUT is a powerful model, especially when

it is extended with relevant constructs as it contributes to the understanding of

important phenomena of consumer use of technologies (Bagozzi, 2007). A future

research model can be redefined to conform with the acceptance and use of

technology in the ME and Saudi Arabian context.

2. Methodology

By using various online databases and professional MIS research sources such as Web

of Knowledge, Emerald, EEE Xplore, Business Source Complete (EBSCO), ProQuest

Business Collection, ScienceDirect (Elsevier), SCOPUS (Elsevier), SpringerLink ant

etc., reviewing the acceptance and use of technology in the Saudi Arabian context

will be presented in thematic tables to have a wide look at several previous studies in

order to find future research based on the previous research papers' limitations and

future recommendations. The gap that will be filled with this research lies in the

identification of the factors that affect consumer acceptance and use of IT in the Saudi

Arabian context, as well as the correlation that exists between them. Despite the fact

that past studies have indicated the correlations that exist between consumer

acceptance and use, and factors that include mobility, security, cost, experience of use

etc., a more comprehensive understanding of how these factors actually correlate with

consumer acceptance and use will help to effectively eliminate the gap that exists in

the IT consumer acceptance and use context. This will be done by advising new IT/IS

that can be adopted, and identifying additional constructs, factors, mediators and

relationships related to theories that can be applied or extended on IT/IS as a new

model.

3. Literature Review Analysis

The acceptance and use of technology in the Saudi Arabian context will be presented

in thematic tables and summarised texts; this directs future studies in conducting

further research investigating topical and theoretical gaps based on the previous

studies' limitations and future research recommendations.

Page 23: NASCENT CONNECTIONS 2013

10

Theme: Internet Usage/ Citation: (Adaileh, 2012); (Al Nashmi, Cleary, Molleda &

McAdams, 2010); (Al-Asmari, 2005); (Al-Ghaith, Sanzogni & Sandhu, 2010); (Al-

Hawari, Al–Yamani & Izwawa, 2008); (Al-Jetaily, Al-Megbel & Al-Mojaly, 2003);

(Al-Kahtani, Ryan & Jefferson, 2006); (Al-Zoman & Al-Zoman, 2002); (Al-Shohaib,

2005); (Alshankity & Alshawi, 2008); (Foster, Wynn, Rouhana, Polis & Trussell,

2005); (Hattingh, Matthee & Lotriet, 2011); (Hattingh, Matthee & Lotriet, 2012);

(Oshan, 2007); (Simsim, 2011); (Wyne & Hashim Nainar, 2002); (AlGhamdi &

Almohedib, 2011); (Almahroos, 2012); (Breslow & Allagui, 2011); (Ghashghai &

Lewis, 2003); (Sait, Al-Tawil, Ali, S. & Ali, H., 2003); (Sait & Al-Tawil, 2007); (Sait,

Al-Tawil, Khan & Faheemuddin, 2009); (Sait, Al-Tawil & Sanaullah, 2003)

Theme: Internet Adoption/ Citation: (Al-Ghaith, Sanzogni & Sandhu, 2010); (Al-

Shohaib, Al-Kandari & Abdulrahim, 2009); (Alrashid, 2012); (Shalhoub, 2006); (Al-

Shohaib, 2005); (Al-Shohaib, Frederick, Al-Kandari & Dorsher, 2010); (Alsalloum,

2005); (Almobarraz, 2007); (Al-Wehaibi, Al-Wabil, Alshawi & Alshankity, 2008)

Theme: Internet Diffusion / Citation: (Arnum & Conti, 1998); (Loch, Straub &

Kamel, 2003); (Al-Shohaib, 2005); (Beilock & Dimitrova, 2003); (Mathrani &

Alipour, 2010); (Fulih, 2002)

Theme: Internet Ownership/ Citation: (Oghia & Indelicato 2011)

Theme: Internet Effects / Citation: (Albirini, 2008); (Sait, Al-Tawil, Ali, S. & Ali,

H. 2003); (Sait, Al-Tawil, Khan & Faheemuddin, 2009); (Chaurasia, Asma & Ahmed,

2011)

Theme: Internet Pricing/ Citation: (Al-Heizan, 2002)

Theme: Broadband Adoption & Diffusion/ Citation: (Dwivedi, 2008); (Gerami,

2010); (Weerakkody, 2008); (Dwivedi & Weerakkody, 2007); (Dwivedi &

Weerakkody, 2006); (Yates, Gulati & Weiss, 2011); (Gulati & Yates, 2012); (Gulati,

& Yates, 2010); (Williams et al., 2007)

Theme : Other Groups/ Citation: (Al Lily, 2011); (Al-Saggaf & Begg, 2004);

(Hermida, 2002); (Elgohary, 2008); (Alterman, 2000); (Alqudsi-ghabra, Al-Bannai &

Al-Bahrani, 2011); (Anderson, 2007); (Zittrain & Edelman, 2002); (Ostrum, 2011)

Table1: Internet Adoption, Acceptance, Usage and Diffusion in the Saudi Arabia

Context

Through adopting quantitative research and model-based research; using Grounded

Theory Methodology (GTM); conducting interviews and web-based surveys;

designing self-administered questionnaires; following TRI scale; using Diffusion Of

Innovations (DOI) theory, Social Construct Theory and Negotiating adjustment to

KSA: Internet a lifeline to the Real World theory, Internet Technology in the Saudi

Arabian Context has been researched from several aspects as grouped above in

Table1. Internet usage has been widely covered compared to internet acceptance.

However, further research should compare SMEs and large-scale businesses to

determine where the difference in adoption and usage of the internet lies. There is a

need for more detailed discussion of challenges that small businesses face; revealing

some internet functions such as communication, information source and socialisation

will lead to better understanding of the internet usage. It is also important to

encourage stakeholders to develop cultural and practical approaches to enable the

public to take advantage of the benefits brought by technology. The adoption and

usage of the internet is influenced by factors such as education, age, occupation, the

Page 24: NASCENT CONNECTIONS 2013

11

changing of people’s perception, trust, security, the characteristics of the adoption of

new technology and privacy of information. Research that only included the online

population could not reflect the views of all people who were not online. Noticeably,

private organisations encourage adopting the current technological innovations to

improve the efficiency and innovation. The per capita income, the level of people’s

openness and liberty determine the diffusion and use of the internet. Developed

countries are adopting new technologies at a faster rate and continue in their states.

The access of websites is also restricted in areas related to religion, social networking,

politics, news channels and entertainment. While some of the sources are grouped

under ‘Internet Effect, Ownership, pricing and other groups’, they provide an

understanding on the various aspects of internet technology. Broadband is a new

technology that improves the speed and quality of internet; the broadband diffusion

significantly relates to the developed countries that have invested heavily in ICT,

implemented good governance, developed highly educated citizens and encouraged

urbanisation. Factors that hindered fast adoption of broadband are the regulation

placed on it, service quality, usage, age, connection type, accommodation type and

usefulness. It clearly seems that Mobile Internet technology has never been

researched in the Saudi Arabian context.

Theme: E-government Acceptance/ Citation: (Alshehri et al, 2012-a); (Alshehri et

al, 2012-c); (Alzahrani, 2011); (Alzahrani, Stahl & Prior, 2012); (Baakeel, 2012);

(Basri, 2012); (Alzahrani & Goodwin, 2012)

Theme: E-government Usage/ Citation: (Abanumy & Mayhew, 2005); (Basri,

2012); (Imran & Gregor, 2007)

Theme: E-government Adoption/ Citation: (Alshehri et al, 2012-a); (Alshehri et al,

2012-b); (Alshehri et al, 2012-c); (Al-Shehry, Fairweather, Prior & Rogerson, 2006);

(Al-Sobhi, 2011); (Al-Sobhi, Kamal & Weerakkody, 2009); (Al-Sobhi, Weerakkody &

Al-Busaidy, 2010); (Al-Sobhi, Weerakkody & El-Haddadeh, 2011); (Al-Sobhi,

Weerakkody & El-Haddadeh, 2012); (Al-Sobhi, Weerakkody & Kamal, 2010);

(Alanezi, Mahmood & Basri, 2011); (Alateyah, Crowder & Wills, 2012); (Alateyah,

Crowder & Wills, 2012); (Aldhabaan, 2012); (Alghamdi, Goodwin & Rampersad,

2011); (Al-Shehry, 2009); (Alshehri & Drew, 2010); (Alshehri, Drew & Alfarraj,

2012); (Alsowoyegh, 2012); (Altameem, 2007); (Rana, Dwivedi & Williams, 2012);

(Al-Shehry, Rogerson, Fairweather & Prior, 2009); (Sharief, & Yahya, 2012)

Theme: E-government Diffusion/ Citation: (Al-Sobhi & Weerakkody, 2010); (Al-

Sobhi, Kamal & Weerakkody, 2009); (Al-Sobhi, Weerakkody & Al-Busaidy, 2010);

(Rorissa, Potnis & Demissie, 2010); (AlGhamdi, Drew & Alkhalaf, 2011)

Theme: E-government Development/ Citation: (Al-Mushayt, Perwej & Haq,

2012); (Hamner, & Al-Qahtani, 2009); (Saghafi, Zarei, Abadi & Shahkooh, 2011)

Theme: E-government Security/ Citation: (Alfawaz, May & Mohannak, 2008);

(Alsaghier, Ford, Nguyen & Hexel, 2009)

Theme: E-government Challenges/ Citation: (Sahraoui, Gharaibeh & Al-Jboori,

2006)

Theme: E-government Implementation/ Citation: (Alharbi, 2006); (Drew, 2011);

(Gulati & Yates, 2011)

Theme: E-government Assimilation/ Citation: (Pudjianto & Hangjung, 2009)

Page 25: NASCENT CONNECTIONS 2013

12

Theme: Biotechnology Adoption & Acceptance in E-government/ Citation:

(Alhussain & Drew, 2009); (Alhussain & Drew, 2010)

Theme: Other Groups/ Citation: (Al-Fakhri, Cropf, Kelly & Higgs, 2008);

(Abanumy, Al-Badi & Mayhew, 2005); (Abdallah & Khalil, 2009); (Alanezi,

Mahmood & Basri, 2012); (Alfarraj, Drew & AlGhamdi, 2011); (Almalki, Duan &

Frommholz, 2012); (Alryalat, Dwivedi, Williams, Rana & Lal, 2012); (Alsaffar, Sun

& Kabeil, 2009); (Alshawi & Alalwany, 2009); (Bawazir, 2006); (Chanchary &

Islam, 2011); (Sahraoui, 2005); (Halpern, Rozaidi & Ki, 2012); (Katchanovski & La

Porte, 2009); (Pankowska, 2008); (Al-Khouri & Bal, 2006)

Table2: E-government Adoption, Acceptance, Usage and Diffusion in the Saudi

Arabia Context

Through conducting questionnaires, utilising Q-Methodology, performing a meta-

analysis and quantitative case study, carrying out telephone interviews and interviews

as a qualitative survey methodology, semi-structured interviews, observations, using

SPSS and Partial Least Square, AMOS tools and implementation of Structural

Equation Model, employing TAM, UTAUT, DOI, TPB and web trust models,

Technological-Organisation-Environment framework, generating new models, E-

Government in the Saudi Arabia Context has been researched from several aspects as

grouped above in Table2. Key limitations and findings of e-government acceptance

can be outlined as follows: the impact of website quality and the key factors

responsible for the adoption of e-government among citizens have been investigated;

society, trust and gender also influence the acceptance of e-government. In e-

government usage, few studies here develop a powerful instrument for measuring the

acceptance of e-public services to help stakeholders studying different strategies.

Finding factors that inhibit the adoption and use of ICT include political unrest, lack

of or poor ICT infrastructure, access to ICT infrastructure by users and leadership

unwillingness to accept technological change. It is assumed that lack of training,

resistance to change, trust, privacy, culture and language barriers influence users to

accept technologies. There has not been enough research in e-government diffusion

and few papers identify factors that influence the adoption and usage of e-commerce.

The support received from government has become the most influential factor;

studying the similarities among e-government websites in the ME and North Africa

has found that similarities existed in the stages of development of the services offered

by e-government websites. The Saudi government is motivated to incorporate e-

government in its operations to improve its economy, to attract more investors

including the best technicians all over the world and to deliver timely information and

services, to improve their cultural and religious practices by empowering women to

participate in public affairs, to encourage young people to adopt internet technology

and to improve its politics. Though adoption of e-government is influenced by digital

divide, trust and accessibility, the intermediaries are playing a major role. E-

government infrastructure, culture, ICT literacy, the usability and accessibility of

websites, gender and technical problems all affect the adoption of e-government.

Some sources also discuss other aspects such as the security issues in e-government,

Page 26: NASCENT CONNECTIONS 2013

13

implementation, challenges, assimilation, acceptance and adoption of biometric

technology in e-government, and development of secure and user friendly e-

government systems.

Theme: M-government Security/ Citation: (Alhussain & Drew, 2010)

Theme: M-government Development/ Citation: (Al-Khalifa, 2011)

Theme: M-government Challenges and Success Factors/ Citation: (Almutairi,

2011)

Theme: M-government Implementation/ Citation: (Abanumy & Mayhew, 2005);

(Alsenaidy & Ahmad, 2012)

Theme: Biometrics in M-government/ Citation: (Alhussain & Drew, 2012);

(Alhussain, Drew & Von Hellens, 2010)

Theme: Other Groups/ Citation: (Al-Solbi & Mayhew, 2005)

Table3: M-Government Adoption, Acceptance, Usage, and Diffusion in the Saudi

Arabia Context

Indicating to Table3, Abanumy and Mayhew (2005) conducted interviews on IT

professionals working in government institutions. They found that very few m-

government applications have been implemented thus far, being limited mostly to

SMS alerts. Al-Solbi and Mayhew (2005) used a quantitative approach based on

interviews to investigate the level of e-readiness. They found that the country is by no

means ready for the development of a complete ICT infrastructure. Alhussain and

Drew (2010) found that users do not fully trust the current authentication techniques

employed by m-government. They suggest that an advanced authentication technique

like biometric technology should be implemented. Drew & Von Hellens (2010) used

GTM (questionnaires and semi-structured interviews) to find that successful

implementation of biometric technology in m-government is influenced by user

acceptance. Alhussain & Drew (2012) and Alsenaidy & Ahmad (2012) focus on m-

government security, and m-government implementation, respectively. The first

builds on grounded theory to conclude that PINs do not provide high security; the

study goes on to propose the use of a biometric authentication method to provide high

security. The second found that m-government is used to provide G2G, G2C and G2B

services. Also, such m-government applications are underdeveloped, and

improvements are in order. For the m-government websites, a designed approach has

been applied based on their desired functionalities (Al-Khalifa, 2011). Almutairi

(2011) reviewed challenges m-government face, and key success factors e-

government follow to strengthen their services. Clearly, m-government in Saudi

Arabia requires further research.

Conducting additional research will reach reliable information on the factors affecting

the evolution of m-commerce. Al Hosni, Ali & Ashrafi (2010) found that the success

of m-commerce is conditioned by mobility of mobile technology devices, security of

information, location based services, time of information delivery, costs of devices,

customised technology and culture. However, it still is a review of past studies, and

Page 27: NASCENT CONNECTIONS 2013

14

this implies a limitation. The study’s results are limited because they do not focus

exclusively on Saudi Arabia, but on the ME as a whole. The second study conducted

by Alotaibi (2010) builds on the premise that a quantitative research methodology

may be used to build the foundations of a TAM that will allow for the existing

(literature) gap between engagement and empowerment of customers in using mobile

devices. Finally, Al-Muhtib (2011) focused on the identification of factors responsible

to stimulus m-commerce acceptance and adoption. TAM was extended by integrating

bandwidth, quality, social influences, security and privacy factors with reference to

usefulness and perceived ease of use. A web survey was analysed using a structure

model and the measurement model using StatPlus. This area requires a more in-depth

analysis by adopting more variables in to consideration. Future work may consider the

influence of m-commerce adoption on e-commerce.

It becomes clear that m-banking in Saudi Arabia requires further investigation. The

first of the four studies reviewed was founded on data gathering and on the DOI

theory as a baseline for investigating the factors that influence the adoption of m-

banking. Al-Jabri & Sohail (2012) found that the observability of the systems by

users, the compatibility of the systems with other technologies and the advantages that

the systems offer significantly influence their adoption by users; there was no

significant correlation found between system complexity and trialability, and user

adoption. Alber (2011) investigated the effects bank expansions had on profit

efficiency; the surveys demonstrated that profit efficiency is affected by mobile

banking availability, ATM availability and number of bank branches. This study was

significantly limited by the lengthy time it took to complete as technology changes

very fast. Abdullah (2009) modified TAM to suit bank customers and found that

though improving SMS services, banks can reduce costs and improve efficiency. The

results contribute to SMS banking as they enable the development of m-banking

systems that are easy to use, credible and compatible. Al-Ashban and Burney (2001)

found that the experience of using tele-banking is correlated with user adoption.

Significant (positive) correlations were also found between education and income

level, and user adoption.

4. Discussion

The exploration of technologies tested before, theories, methodologies, findings,

obstacles, challenges, success factors, limitations and recommendations provides a

basis for valuable future research in the acceptance and use of technology. Based on

the extensive literature, only a limited number of papers researched e-government

acceptance and usage in Saudi Arabia as the government has recently established e-

services; therefore, they may require further research to find whether citizens are

aware of these services. Although there is no research which specifically concentrates

on internet acceptance, internet and e-government subjects have been widely covered.

With the increase in the number of mobile internet users in the ME, especially in

Saudi Arabia as subscriptions to mobile broadband reached 11.5 million at the end of

Page 28: NASCENT CONNECTIONS 2013

15

2011 representing 40.5% of the population (Ethos Interactive, 2012), conducting

further research in Mobile Technologies will lead to better understanding of these

technologies as they have not yet been well investigated. It also seems that m-internet

technology has never been studied. According to the previous studies, UTAUT2 has

not yet been tested in The ME or extended in the field. Therefore, the implementation

of UTAUT2 on the acceptance and use of technology in the Saudi Arabian context

will be a new experience not only for the Saudi studies but also for the worldwide

context. The future research model can be redefined to conform with the acceptance

and use of technology in the ME and Saudi Arabian context.

5. Conclusion

This paper reviewed several previous studies conducted in the acceptance and use of

technology in the Saudi Arabian context. It will strongly contribute to the field and aid

future research by finding what has been topically and theoretically studied before

investigating new technologies and conducting further research based on previous

limitations and recommendations. In addition, this study will help in eliminating gaps

that exist in the IT consumer acceptance and use context by recommending new IT/IS

that can be adopted, and identifying additional constructs, factors, mediators and

relationships related to theories that can be applied or extended on IT/IS as a new

model.

References

Abanumy, A., & Mayhew, P. (2005). M-gov implications for e-gov in developing

countries: The case of Saudi Arabia. EURO mGOV 2005, 1-6.‏

Abdullah, A. S. (2009). SMS Banking in Saudi Arabia (Doctoral dissertation),

Universiti Utara Malaysia.‏

Al Hosni, N., Ali, S., & Ashrafi, R. (2010). The key success factors to mobile

commerce for Arab countries in Middle East. In Proceedings of the 12th

International Conference on Information Integration and Web-based Applications

& Services (pp. 787-790). ACM.‏

Al-Ashban, A. A., & Burney, M. A. (2001). Customer adoption of tele-banking

technology: the case of Saudi Arabia. International Journal of Bank

Marketing,19(5), 191-201.‏

Al-Jabri, I. M., & Sohail, M. S. (2012). Mobile Banking adoption: Application of

Diffusion of Innovation Theory. Journal of Electronic Commerce Research, 13(4).‏

Al-Khalifa, H. S. (2011). Development of mobile government websites: a functional

design approach. In Proceedings of the 13th International Conference on

Information Integration and Web-based Applications and Services (pp. 455-458).

ACM.‏

Al-Muhtib, M. I. (2011). M-Commerce in Saudi Arabia, Adoption and Acceptance.

MSc Thesis in Business Information Technology, School of Mathematical and

Computer Science, Heriot Watt University, UK.

Page 29: NASCENT CONNECTIONS 2013

16

Al-Solbi, A., & Mayhew, P. J. (2005). Measuring e-readiness assessment in saudi

organisations preliminary results from a survey study. From e-government to m-

government, 467-475.‏

Alber, N. (2011). The Effect Of Banking Expansion On Profit Efficiency Of Saudi

Arabia Commercial Banks. Journal of Global Business and Economics, 3(1), 11-

‏.23

Alhussain, T. O. M., & Drew, S. (2010). Towards Secure M-Government

Applications: A survey study in the Kingdom of Saudi Arabia. In International

Conference on Intelligent Network and Computing (ICINC 2010). IEEE.‏

Alhussain, T. O. M., Drew, S., & Von Hellens, L. A. (2010). Qualitative Study on

Implementing Biometric Technology in M-Government Security: a Grounded

Theory Approach. In 5th International Conference on Qualitative Research in IT &

IT in Qualitative Research (QualIT2010). QUT, Griffith University and ANU.‏

Alhussain, T., & Drew, S. (2012). Developing a Theoretical Framework for the

Adoption of Biometrics in M-Government Applications Using Grounded

Theory.SECURITY ENHANCED APPLICATIONS FOR INFORMATION

SYSTEMS, 183.‏

Almutairi, M. (2011). M-government: Challenges and key success factors – Saudi

Arabia case study. In Mubarak Almutairi, and Lawan A. Mohammed (Ed.), Cases

on ICT Utilization, Practice and Solutions: Tools for Managing Day-to-Day Issues,

IGI Global, Hershey, PA, USA, pp. 78-96.

Alotaibi, I. (2010). Beyond Mobile Advertising: An exploratory study of customer

engagement and empowerment behavior via mobile devices in relation to

marketing communication campaigns in Saudi Arabia. Technology Quantitative

Approaches. Hull University, UK.

Alsenaidy, A. & Ahmad, T. (2012). A review of current state m-government in Saudi

Arabia, Department of Biochemistry, King Saudi University.

Bagozzi, R. P. (2007). The Legacy of the TAM and a Proposal for a Paradigm Shift.

Journal of the Association for Information Systems, 8(4), 3.

Ethos Interactive, (2012). INTERNET AND MOBILE USERS IN SAUDI ARABIA

KSA. [online] Available at: [Accessed 28 November 2012].

Goodhue, D. L. (2007). Comment on Benbasat and Barki’s “Quo Vadis TAM”

Article. Journal of the Association for IS, 8(4), 219-222.

Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and use of

information technology: extending the unified theory of acceptance and use of

technology. MIs Quarterly, 36(1), 157-178.

Page 30: NASCENT CONNECTIONS 2013

17

Examining Adoption of Online PAN Card Registration System: A

Context of Indian EGov System

Nripendra P. Rana, Yogesh K Dwivedi, Michael D Williams

Abstract

The study aimed to develop and test the effect of trust, risk, and self-efficacy on an

individual’s attitude, and the effect of trust and attitude on intention to adopt online

PAN card registration system (OPCRS). To empirically test the model, survey

questionnaire was used to collect usable data from 377 potential adopters of the

OPCRS system in India. The results were analysed using structural equation

modelling (SEM) and indicated that all six hypotheses were found significant.

Moreover, all model-fit indices exceeded their respective common acceptance levels,

thus demonstrating that structural model exhibited a fairly good-fit with the collected

data.

Keywords: Online PAN Card Registration System, OPCRS, Trust, Risk, Adoption,

India

Introduction

Electronic government (eGov) is understood as the use of information technology (IT)

to enable and advance the effectiveness by which government services are rendered to

citizens, professionals, businesses, and agencies (Carter & Belanger, 2005; McClure,

2001). It allows users to explore and acquire intended information at their own

convenience beyond geographical and time restrictions. The interactive nature of e-

government provides benefits for both citizens and bureaucrats alike (West, 2008).

The key to a successful e-government is the implementation of systems that are

utilized and meet users’ needs (Economist, 2008) and expectations. One such e-

government system from India that is currently receiving growing attention is the

OPCRS system.

OPCRS is an e-government system for obtaining PAN cards. PAN (Permanent

Account Number) is essentially a ten-digit alphanumeric number, issued in the form

of a laminated card by an investigating officer of the income tax department in India.

It is mandatory to quote PAN on the return of income in all correspondence with the

income tax authority and on any payments to the income tax department. Every

taxpayer who is required to furnish a return of income, even on behalf of others, must

obtain a PAN. Although possessing PAN is mandatory for all individuals who file

income tax return, OPCRS is a voluntary e-government system for obtaining a PAN

card. This system has been implemented with a goal of easing the individual’s burden

of going through the cumbersome processes of obtaining a PAN card through the

offline process. As per the recent statistics, more than 35 million people in India pay

direct tax on their incomes and many more are to be added in the future. In such a

scenario, introducing an online process of obtaining PAN card is an initiative

Page 31: NASCENT CONNECTIONS 2013

18

welcomed by the government of India. However, the benefits for such e-government

application are limited due to low adoption rate. Therefore, the research is needed to

examine the role of certain factors that might be critical for measuring adoption of

such a system in the Indian context.

Hence, this study aims to explore factors that influence Indian citizens’ intention to

adopt the OPCRS system. Based on previous technology acceptance and e-

government research, we develop a model aimed at understanding Indian citizens’

intention to use an OPCRS system.

Theoretical Basis and Research Model

The majority of studies (e.g., Lin et al., 2011; Wang and Shih, 2009; Yeow and Loo,

2009) on eGov adoption have only used the IS/IT adoption models to explore the

intention and use of such systems. However, relatively fewer studies (e.g., Belanger &

Carter, 2008; Hung et al., 2009; Schaupp et al., 2010) have analysed trust and risk

based models in this research. The literature (e.g., Colesca, 2009; Hung et al., 2006;

Karavasilis et al., 2010; Schaupp & Carter, 2010) also identified trust and risk as

important predictors of intention and use for an eGov system. It is believed that eGov

can only be adopted when the citizens find it trustworthy (Belanger and Carter, 2008)

and less risk averse (Schaupp & Carter, 2010). In light of the importance of trust and

risk and relatively less knowledge available in this area of research, this study

proposes a parsimonious yet explanatory model of trust and risk for e-government

adoption.

The proposed model combines adoption factors (i.e., self-efficacy and attitude),

perceived trust, and perceived risk to explain citizens’ intention to adopt OPCRS

system in India. Our research model postulates that an individual’s IS/IT acceptance

(i.e., intention) can be explained by attitude which in turn is influenced by trust, risk,

and self-efficacy. Table 1 presents the associated hypotheses for the proposed model

significantly supported by the corresponding studies of e-government adoption.

Table 1: Constructs’ relationships with existing sources and proposed relationships

IC DC Example studies with significant

effects

Proposed hypotheses for this

research

PT AT Gefen et al. (2003), Ha and Stoel

(2008), Hung et al. (2006)

H1: Perceived trust will have a

significant influence on

attitude.

SE AT Fotland (2012), Gangadharbatla

(2008)

H2: Self-efficacy will have a

significant influence on

behavioral intention to adopt

OPCRS system.

PR AT Chiu et al. (2012), Hung et al. (2009)

H3: Perceived risk will have a

significant influence on

behavioural intention to adopt

OPCRS system.

Page 32: NASCENT CONNECTIONS 2013

19

SE PT Kim and Kim (2005), Parent et al.

(2005)

H4: Self-efficacy will have a

significant influence on

perceived trust.

PT BI

Lean et al. (2009), Lee and Lei

(2007), Schaupp and Carter (2010),

Teo et al. (2008)

H5: Perceived trust will have a

significant influence on

behavioral intention to adopt

OPCRS system.

AT BI Karavasilis et al. (2010), Li et al.

(2008), Lin et al. (2011)

H6: Attitude will have a

significant influence on

behavioral intention to adopt

OPCRS system.

[Legend: DC: Dependent Construct, IC: Independent Construct, AT: Attitude, BI:

Behavioral Intention, PR: Perceived Risk, PT: Perceived Trust, SE: Self-Efficacy]

Research Methodology

There are various ways to capture the data, however, a self-administered

questionnaire was found suitable as a primary survey instrument of data collection in

this research. Collecting data from the majority of respondents within a short and

specific period of time was critical to this research. Given the nature of constructs and

the unit of analysis used, getting responses through closed-ended and multiple choice

questions would be deemed appropriate. The final questionnaire consisted of total 30

questions including 10 questions from respondent’s demographic characteristics and

20 questions on the five different constructs of the proposed research model. All these

questions were multiple-type, closed-ended and seven-point Likert scale type

questions. Likert scales (1-7) with anchors ranging from “strongly disagree” to

“strongly agree” were used for all constructs’ measures.

The sample of this research consists of a wide array of respondents from different

cities of India including New Delhi, Pune, Mumbai, Bangalore, Patna, Siliguri, and

Gangtok. Out of 1000 questionnaires distributed, a total of 474 survey questionnaires

were returned. After discarding the incomplete responses, a usable sample of 377 was

used for further empirical analysis. The overall response rate was found to be 47.4%

with 37.7% valid questionnaires.

Data Analysis

The data were analysed using SEM of AMOS (version 21.0) software package. This

technique is particularly appropriate for examining a series of relationships or an

entire theory. This study is appropriate for confirmatory testing of the fit of the

proposed research model to empirical data using SEM.

Respondents’ Profile of OPCRS System

The results indicated that users were predominantly male (66.3%). Respondents’ age

fell primarily between 20 and 39 (≈75%) and their minimal educational levels were

largely bachelor’s degree or higher (88%). A majority of respondents (≈97%) had the

computer and Internet experience of a year or more. Also, the mainstream (≈98%) of

respondents had access to a computer and the Internet.

Page 33: NASCENT CONNECTIONS 2013

20

Reliability Analysis, Descriptive Statistics, and Factor Loading

The findings indicated that the Cronbach’s alpha (α) value of all items exceeded the

recommended minimum acceptable level of 0.70 (Nunnally, 1978). The high scores

of the means (>5.2) for most of variables except perceived risk indicates that users

responded favourably to the system adoption measures. Standardized factor loadings

are indicative of level of association between scale items and a single latent variable

(Belanger & Carter, 2008). Standardized factor loadings for all items greater than 0.50

are indicative of the strong degree of association between scale items and single latent

variable (Belanger & Carter, 2008).

Structural Model Results

The first step in model estimation involved examining the model fit results of the

hypothesized model. The analysis indicates that all the model fit indices (e.g., Chi-

square(χ2)/degree of freedom (DF) (≤3.000) =2.590, comparative fit index (≥0.900)

=0.947, goodness of fit index (≥0.900) =0.868, adjusted goodness of fit index

(≥0.800) =0.870, normative fit index (≥0.900)=0.917, and root mean square error of

approximation (≤0.08)=0.065) exceeded their respective acceptance levels (presented

above in the parentheses) suggested by prior research (Bagozzi & Yi, 1988; Hair et

al., 1998) and hence demonstrates that the structural model exhibits a fairly good fit

with the data provided.

The second step in model estimation was to examine the significance of each

hypothesized path in the research model and the variance explained by each path.

Figure 1 illustrates all structural relationships among the studied constructs. The

results indicated that the model explained overall 74% variance on behavioural

intention. This shows the importance of explained factors (i.e., trust, risk, self-

efficacy, and attitude) in predicting individual’s intention toward accepting the

projected eGov system. Properties of causal paths, including standardized path

coefficients, p-values, and variance explained are discussed below.

As per hypotheses, all path coefficients including perceived trust (γ=0.37, p<0.001),

perceived risk (γ=-0.14, p=0.002), and self-efficacy (γ=0.40, p<0.001) on attitude,

self-efficacy on perceived trust (γ=0.66, p<0.001), and perceived trust (γ=0.21,

p<0.001) and attitude (γ=0.71, p<0.001) on behavioural intention were found

significant at the 0.001 and 0.01 levels. Therefore, all hypotheses H1, H2, H3, H4,

H5, and H6 were found significant.

Page 34: NASCENT CONNECTIONS 2013

21

Figure 1: Results of the model for OPCRS system

It is evident from the above analysis that perceived trust and self-efficacy have a

strong positive relationship with user’s attitude whereas perceived risk shows a

negative significant relationship with attitude. Moreover, these three constructs also

exert a strong, significant, and indirect relationship on behavioral intention through

attitude. Moreover, perceived trust was found to be a direct determinant of behavioral

intention.

Discussion

The research empirically examined the influence of factors such as perceived trust,

perceived risk, and self-efficacy on attitude and intention to use OPCRS system by

citizens of India. The findings demonstrated that both increased trust and reduced risk

significantly influenced citizens’ attitude that in turn impacted intention of using the

e-government system. Such relationships have been supported by some prior studies

(e.g., Hung et al., 2006; Susanto and Goodwin, 2011) on e-government adoption. One

possible explanation for this support is that the users are relatively new to the system

and need high trust and low risk in order to develop a positive attitude and intention to

use the system. The findings of higher self-efficacy leads to higher trust (Kim and

Kim, 2005; Parent et al., 2005) and enhanced positive attitude (Fotland, 2012;

Gangadharbatla, 2008) toward the concerned eGov system is supported by prior

research. The probable reasons for this is an individual’s higher beliefs on his

capability (i.e., self-efficacy) (Bandura, 1986) can lead him to higher perceived trust

and a positive attitude toward using an eGov system whereas low self-efficacy might

limit his perceived trust and affirmative attitude toward the system.

Page 35: NASCENT CONNECTIONS 2013

22

Implications for Theory and Practice

This research proposed a parsimonious collection of constructs that may explain the

eGov adoption. The theoretical model presented here will enrich the existing literature

of eGov adoption and will help researchers in acknowledging the importance of trust,

risk, and self-efficacy in eGov research. It is evident from the empirical justification

that the government needs to play a significant role in enhancing citizens’ trust to

maximize eGov systems adoption. The findings of the research suggest that

government should take initiatives to make its citizens more competent to interact

with such systems, as competent users will more likely to use the eGov system even if

a reasonable amount of risk is involved with it. The designers of the system are

recommended to add sufficient security and privacy measures in the application to

ensure the minimal risk that could lead to higher user’s attitude and intention to use

the system.

Conclusion

The purpose of this research is to explore the influence of eGov oriented factors

including trust, risk, and self-efficacy toward individual’s attitude to adopt OPCRS

and also examining how an individual’s attitude leads to intention to adopt the

system. It was revealed that users responded quite positively towards the adoption of

the OPCRS system despite it being a relatively new system. The model suggested that

users showed a positive sign toward acceptance of the system due to their trust and

self-efficacy on the government systems. Perceived risk was found as a factor which

deters an individual’s likings to use the system.

References

Bagozzi, R. P. & Yi, Y. (1988). On the evaluation of structure equation models.

Journal of the Academy of Marketing Science, 16(1), 74-94.

Bandura, A. (1986). Social foundations of thought and action: A social cognitive

theory. Prentice-Hall, Englewood Cliffs, NJ.

Belanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. The

Journal of Strategic Information Systems, 17(2), 165-176.

Carter, L. & Belanger, F. (2005). The utilization of e-government services: citizen

trust, innovation and acceptance factors. Information Systems Journal, 15(1), 5-25.

Chiu, Y. T. H., Lee, W. I., Liu, C. C. & Liu, L. Y. (2012). Internet Lottery

Commerce: An Integrated View of Online Sport Lottery Adoption. Journal of

Internet Commerce, 11(1), 68-80.

Colesca, S. E. (2009). Increasing E-Trust: A Solution to Minimize Risk in E-

Government Adoption. Journal of Applied Quantitative Methods, 4(1), 31-44.

Cornford, T. & Smithson, S. (1996). Project Research in Information Systems: A

Student’s Guide. London: Macmillan Press Ltd.

Economist (2008). The Good the Bad and the Inevitable. The Economist.

Fotland, A. I. (2012). Intention to use RFID-enabled services: Theoretical review and

case study. Master’s thesis, NHH, Bergen.

Page 36: NASCENT CONNECTIONS 2013

23

Gangadharbatla, H. (2008). Facebook me: Collective self-esteem, need to belong, and

internet self-efficacy as predictors of the iGeneration's attitudes toward social

networking sites. Journal of Interactive Advertising, 8(2), 5-15.

Gefen, D., Karahanna, E. & Straub, D. W. (2003). Trust and TAM in online shopping:

An integrated model. MIS Quarterly, 27(1), 51-90.

Ha, S. & Stoel, L. (2009). Consumer e-shopping acceptance: Antecedents in a

technology acceptance model. Journal of Business Research, 62(5), 565-571.

Hair Jr., F., Anderson, R. E., Tatham, R. L. & Black, W. C. (1998). Multivariate data

analysis. 5th Edition, Prentice Hall, Upper Saddle River.

Hung, S-Y., Chang, C-M. & Yu, T-J. (2006). Determinants of user acceptance of the

Government services: The case of online tax filing and payment system.

Government Information Quarterly, 23(1), 97-122.

Hung, S-Y., Tang, K-Z., Chang, C-M. & Ke, C-D. (2009). User acceptance of inter-

governmental services: An example of electronic document management system.

Government Information Quarterly, 26(2), 387-397.

Karavasilis, I., Zafiropoulos, K. & Vrana, V. (2010). Extending TAM to Understand

E-Governance Adoption by Teachers in Greece. In M.D. Lytras et al. (Eds.):

WSKS 2010, Part II, CCIS 112, 57-68.

Kim, Y. H. & Kim, D. J. (2005). A study of online transaction self-efficacy, consumer

trust, and uncertainty reduction in electronic commerce transaction. Proceedings of

the 38th Annual Hawaii International Conference on System Sciences, 1-11.

Lean, O. K., Zailani, S., Ramayah, T. & Fernando, Y. (2009). Factors influencing

intention to use-government services among citizens in Malaysia. International

Journal of Information Management, 29(6), 458-475.

Lee, C. B. P. & Lei, U. L. E. (2007). Adoption of E-Government Services in Macao.

ICEGOV.

Li, X., Hess, T. J. & Valacich, J. S. (2008). Why do we trust new technology? A study

of initial trust formation with organizational information systems. Journal of

Strategic Information Systems, 17(1), 39-71.

Lin, F., Fofanah, S. S. & Liang, D. (2011). Assessing citizen adoption of e-

Government initiatives in Gambia: A validation of the technology acceptance

model in information systems success. Government Information Quarterly, 28(2),

271-279.

McClure, D. (2001). Electronic government: challenges must be addressed with

effective leadership and management. WWW document: General Accounting

Office.

Nunnally, J. (1978). Psychometric Theory. McGraw-Hill, New York, NY.

Parent, M., Vandebeek, C. A. & Gemino, A. C. (2005). Building citizen trust through

e-government. Government Information Quarterly, 22(4), 720-736.

Schaupp, L. C. & Carter, L. (2010). The impact of trust, risk and optimism bias on e-

file adoption. Information Systems Frontiers, 12(3), 299-309.

Schaupp, L. C., Carter, L. & McBride, M. E. (2010). E-file adoption: A study of U.S.

taxpayers’ intentions. Computers in Human Behavior, 26(4), 636-644.

Page 37: NASCENT CONNECTIONS 2013

24

Susanto, T. D. & Goodwin, R. (2011). User Acceptance of SMS-Based eGovernment

Services. In M. Janssen, H.J. Scholl, M.A. Wimmer, and Y-H. Tan (Eds.): EGOV

2011, LNCS, 75-87.

Teo, T. S. H., Srivastava, S. C. & Jiang, L. (2008). Trust and Electronic Government

Success: An Empirical Study. Journal of Management Information Systems, 9(3),

99-131.

Wang, Y-S., and Shih, Y-W. (2009). Why do people use information kiosks: A

validation of the Unified Theory of Acceptance and Use of Technology.

Government Information Quarterly, 26(1), 158-165.

West, D. M. (2008). Improving technology utilization in electronic government

around the world. Washington, D.C.: The Brookings Institution.

Yeow, P.H.P., and Loo, W.H. (2009). Acceptability of ATM and Transit Applications

Embedded in Multipurpose Smart Identity Card: An Exploratory Study in

Malaysia. International Journal of Electronic Government Research, 5(2), 37-56.

Page 38: NASCENT CONNECTIONS 2013

25

Innovation-attributes roles in the contemporary innovation adoption

research: An Investigation

Kawaljeet Kapoor, Yogesh K Dwivedi, Michael D Williams

Abstract

Consumers possess different degrees of willingness of adoption towards different

innovations. A good understanding of the attributes that influence this varying

willingness of the consumers is thus critical. This study aims to develop a research

model for exploring the contributory roles of different innovation-attributes in

influencing an innovation-diffusion and its final adoption. This research focuses on

four innovations recently launched in the Indian market. The study begins with a

systematic review of the literature, followed by meta-analysis of the shortlisted

innovation-attributes. A quantitative approach is adopted for gathering empirical data,

which is then statistically analysed using the SPSS AMOS technique.

Keywords: Adoption, AMOS, Attributes, Diffusion, Innovation, Meta-analysis

Introduction

The concept of innovation is gaining increased visibility with the increasing intensity

of competition in the world today. According to Ridderstrale and Nordstrom (2002),

most of what one business offers can be bought from other similar type of businesses,

but to attract a buyer towards a business, the offered products and services need to be

something that the world has not witnessed/experienced before. The only solution in

such a scenario is – to innovate, to make businesses unique by their products and

services, and consequently uniquely competitive. Innovations have become vital to

the success of any business today.

Innovation is a continuous process. The success of an innovation can be evaluated by

measuring the positives and negatives of that innovation. In doing so, gaining an

understanding of the behaviour of different factors/attributes that influence the use

intention and adoption of an innovation becomes essential. The field of innovations is

rich with models that are used for evaluating the adoption/diffusion of different

innovations. To name a few – theory of reasoned action, theory of planned behaviour,

unified theory of acceptance and use of technology, technology acceptance model and

many others exist. Broadly, the types of attributes used in these above listed models

were found to be more or less of the same kind. Another model, which is well

established and very frequently used theory in this field, is the Diffusion of

Innovations (DOI) theory introduced by Everett M. Rogers in 1962. Rogers’ listed

relative advantage, compatibility, complexity, trialability and observability as the five

innovation attributes. It is to be noted here that there are other attributes, apart from

Rogers’ five attributes that have been identified as the significant influencers of an

innovation-adoption. These other attributes thus need to be studied in detail to account

for their impacts on an innovation’s diffusion and adoption. Rogers regularly

reviewed innovation-attributes every ten years, until his last publication in 2003. After

Page 39: NASCENT CONNECTIONS 2013

26

Rogers’ last book, the literature on innovations did not receive any such systematic

review of innovation-attributes. No studies aimed at identifying new innovation-

attributes either, which indicates, research in the field of innovations lacks recent

evaluation.

This research thus aims at evaluating the roles of different innovation attributes in

measuring the adoption of different innovations. In accomplishing the proposed aim,

the objectives that were identified are– to carry out a systematic review of relevant

literature for gaining an insight into the recent theoretical advances in the DOI theory;

undertake a meta-analysis of innovation attributes to evaluate the performance of

these attributes across different studies/innovations; identifying the innovation

attributes for pursuing an empirical investigation; and lastly, analyzing the empirical

data using the IBM SPSS AMOS tool for arriving at the statistical deductions to be

interpreted for the key research conclusions. The remaining paper will flow as follows

– the next section will familiarize readers with the existing literature on innovation-

diffusion, which will be followed by a briefing into the proposed research design; the

immediate next section explains data collection and data analysis procedures, leading

into - an identification of the four different innovations, discussion of the proposed

conceptual model and hypotheses, and finally extending the contributions from this

study.

Literature Review

Rogers (2003) defined diffusion as a process in which an innovation is communicated

through different channels over time among the members of a social system. His

book, Diffusion of Innovations (1962) dealt with both organization and individual-

oriented innovations. Rogers had five editions of this book published (1962, 1971,

1983, 1995 and 2003). Being almost a decade apart, these books contributed greatly

to the field of innovations. Another significant contribution in this field was a meta-

analysis by Tornatzky and Klein (1982) which reviewed all of the then published

innovation studies for attributes that impacted the adoption and implementation of

innovations. Using statistical techniques, they analysed the consistency of empirical

findings from different studies and extended seven features of an ideal innovation-

study. In doing so, they listed 30 innovation attributes, five of them being Rogers’

attributes. Yet another noteworthy contribution was a study by Moore and Benbasat

(1991) which focussed more on designing an instrument to measure the roles of

innovation attributes for evaluating the users’ perceptions towards the adoption of an

IT innovation. They reviewed eight innovation attributes, five of which were again

Rogers’ attributes. Overall, these three aforementioned studies extended meaningful

conclusions towards the literature on the diffusion of different innovations.

Combining attributes from these three studies, a total of 33 innovation-attributes were

shortlisted to be systematically reviewed and statistically analysed under this study.

[Five from Rogers (2003), 25 from Torantzky and Klein (1982), and three from

Moore and Benbasat, (1991)].

Page 40: NASCENT CONNECTIONS 2013

27

In reviewing the literature on innovations diffusion, it was found that most of the

publications focussed on reviewing the literature specific to a particular

technology/innovation. For instance – Lee et al. (2003) reviewed the usage of

Technology Acceptance Model over a span of 18 years; Greenhalgh et al. (2004)

systematically reviewed the diffusion of service innovations in the health service

industry; Dahlberg (2007) reviewed literature on the mobile payment services; Reed

(2007) reviewed literature on extending agroforestry. Legare et al. (2008)

systematically reviewed literature on clinical practice, and so on. All these instances

show that none after Rogers’ book in 2003 attempted to undertake an overall review

of studies on innovation-attributes across different technology/innovation types.

Research Design

Figure 1 is illustrative of the research design for this work. Rogers’s DOI theory

(2003) is the basis of this research. The systematic review began with extracting all

studies citing this theory. One critical observation made was that most recent studies

preferred citing Rogers’ fourth edition (1995), even after the release of the fifth, and

more often, both editions were simultaneously cited. Therefore, using ISI Web of

Knowledge and Google Scholar, all studies from 1996 until mid-2011 (this study

began in mid-2011) were extracted. The search engines retrieved 2073 publications.

These publications were screened to confirm if the 33 attributes were studied as

innovation attributes, or were merely mentioned in the 2073 extracted papers.

Eventually, only 241 publications were declared relevant and only 15 of these 33

attributes were found to be in active use as the innovation-attributes.

Research Method

A multi-method approach is employed, which starts with a meta-analysis of the 15

shortlisted innovation-attributes (relative advantage, complexity, compatibility,

observability, trialability, cost, riskiness, image, result demonstrability,

communicability, visibility, behavioural intention, voluntariness, social approval,

ease of operation). Meta-analysis is a statistical procedure permitting integration of

results from various independent studies that are deemed combinable (Egger, 1997).

In conducting the meta-analysis, we adopted the method followed by Tornatzky and

Klein (1982), wherein, the ten most used attributes were chosen for meta-analysis, the

findings from which were then compared with the findings from Tornatzky and

Klein’s meta-analysis. The comparison was undertaken to identify any deviations in

the behaviour of these attributes over time. The binomial probabilities of the 10

shortlisted attributes were calculated to measure the significance of the collated

findings, which revealed that six of these attributes exerted a significant impact

(p<0.05) on an innovation-adoption decisions.

For undertaking an empirical investigation, the quantitative data will be collected

using the survey method. A questionnaire based approach will be followed for

acquiring the relevant data. This research aims at targeting four different innovations

of the voluntary kind. Since the study involves examining the diffusion of innovations

in the Indian context, the data was collected from four different cities across India -

Page 41: NASCENT CONNECTIONS 2013

28

Delhi city (north), Kolkata city (east), Mumbai city (west) and Bangalore city (south).

The target was set at 80 respondents, per city, per innovation. Questionnaires were

distributed as physical copies and online to gather the intended data to develop an

understanding of the consumers’ perceptions of the positives and negatives of

adopting the innovations under consideration. The analysis of this data is expected to

yield insights into the adoption rate, adoption barriers, potential users, and the non-

adopters of these four innovations. A total of 1300+ valid responses have been

received. The four innovations have been summarized in the following paragraph.

Innovation 1: Household Solar - solar energy, an environment-friendly sustainable

form of energy is being made available mostly as solar lighting, solar water heaters,

and the solar cooking systems for everyday use. (Solar, 2012). Innovation 2: Sky TV

- a direct to home television service has been launched for Indian households, which

redefines everyday entertainment with enhanced picture quality, sound, and new age

interactive services that can be tailored to suit the needs of individual users (Sky,

2012). Innovation 3: Interbank Mobile Payment Service – is a recent mobile wallet

initiative by the National Payments Corporation of India. It is an electronic fund

transfer service available 24/7, enabling customers to access their bank accounts with

their mobile phones to make person-to-person or person-to-merchant type payments

(NPCI, 2012). Innovation 4: IRCTC Mobile Ticketing Application – is a secure

mobile ticketing solution recently introduced by the Indian Railway Catering and

Tourism Corporation, available 24/7, allowing users to make railway bookings on a

mobile phone application (IRCTC, 2012).

Page 42: NASCENT CONNECTIONS 2013

29

Figure 1: The Research Design

Page 43: NASCENT CONNECTIONS 2013

30

Data Analysis

The conceptual model for this empirical investigation initially proposes studying the

influences of these 15 innovation-attributes on both, behavioural intention and

adoption. Depending upon the support from literature, the segregation of the attributes

to be studied against intention, and of those to be studied against adoption will be

made. Based on the segregation, hypotheses for all of these 15 attributes will be then

proposed. The empirical data will be subjected to structural equation modelling

(SEM) using the IBM SPSS AMOS technique to test and validate all of the proposed

hypotheses and the conceptual model. According to (Gefen et al., 2000), these SEM

techniques allow researchers to address the interrelated questions in one methodical,

complete analysis by simultaneous modeling the relationships amongst the predictor

and dependent variables. This research, alongside exploring the impact of innovation-

attributes on both behavioural intention and adoption, will also explore the

relationship amongst the different shortlisted innovation attributes. Thus, SEM is

chosen over regression analysis for this research.

Conclusion and Implications for Theory and Practice

Potentially, the findings from this research should succeed in extending a predictive

estimate of the behavioural pattern of different innovation attributes – their behaviour

in the past, their present effect on an innovation-adoption, and their probable

behaviour in the near future. Aggregating the studies analysing these innovation-

attributes over a span of 15 years (1996-2011) will help in establishing definite

patterns of the influence these shortlisted attributes on an innovation-adoption

decision. In comparing the our meta-analysis results with the meta-analysis results by

Tornatzky and Klein (1982), a longitudinal view of the behaviour of ten most used

innovation-attributes over a span of almost 30 years will be achieved. In addition, the

empirical examination of the recent innovations should allow for evaluating the

consistency of the results deduced from the meta-analysis undertaken by this research.

The literature review revealed that the studies explored and proposed innovation-

attributes in a very generic manner. More particularly, none of the studies attempted

to list innovation-attributes more or most suitable for studying a particular type of

technology/innovation, for instance, innovation attributes most appropriate for

studying the IS innovations, or mobile related innovations, or e-government

innovations, and so on. With this research, such explained type of classification and

taxonomy of different innovation-attributes, for different innovation-types will be

arrived at. Two of the four empirically examined innovations, the IRCTC mobile

ticketing application and the Interbank mobile payment service have no evidenc

es of studies available until date, on their adoption/diffusion in the Indian context. The

results from our research will thus be significant in providing the researchers and the

managers of these applications with the first insights into the effect of different factors

that impede and accelerate the adoption/diffusion of these innovations. With our

research, the existing literature on attributes from DOI theory, Moore and Benbasat’s

perceived characteristics of innovating theory and Tornatzky and Klein’s meta-

Page 44: NASCENT CONNECTIONS 2013

31

analysis will be extended in four new different contexts of mobile ticketing, mobile

wallet, direct to home entertainment service, and household solar, all in an Indian

context.

References

Egger. M. (1997). Meta analysis: Principles and Procedures. British Medical Journal,

315(7121), 1533.

Dahlberg, T., Mallat, N., Ondrus, J. and Zmijewska, A. (2007). Past, present and

future of mobile payments research: A literature review. Electronic Commerce

Research and Applications, 7(2), 165-181.

Gefen, D., Straub, D. W., and Boudreau, M. (2000). Structural Equation Modeling

And Regression: Guidelines For Research Practice, Communications of AIS, 4(7),

1-79.

Greenhalgh, T., Robert, G., MacFarlane, F., Bate, P. and Kyriakidou, O. (2004).

Diffusion of Innovations in Service Organizations: Systematic Review and

Recommendations, The Milbank Quarterly, 82(4), 581-629.

IRCTC (2012). Available at: < https://www.irctc.co.in/> [Accessed: 22 May 2012]

Lee, Y., Kozar, K. A., and Larsen, K.R.T. (2003). The Technology Acceptance

Model: Past, Present, and Future, Communications of the Association for

Information Systems, 12(50). 752-780.

Legare, F., Ratte´,S., Gravel, K. and Graham, I. D. (2008). Barriers and facilitators to

implementing shared decision-making in clinical practice: Update of a systematic

review of health professionals’ perceptions, Patient Education and Counseling,

73, 526–535.

Moore, G.C., and Benbasat, I. (1991). Development of an Instrument to Measure the

Perceptions of Adopting an Information Technology Innovation. Information

Systems Research, 2(3), 192-222.

NPCI (2012). Available at: < http://www.npci.org.in/aboutimps.aspx> [Accessed: 18

May 2012]

Reed, M.S. (2007). Participatory technology development for agroforestry extension:

an innovation-decision approach. African Journal of Agricultural Research, 2(8),

334-341.

Ridderstrale, J. and Nordstrom, K. (2002). Funky Business: Talent makes capital

dance. England: Pearson Education. 2nd

Edition.

Rogers, E.M. (2003). Diffusion Of Innovations. New York: The Free Press. 5th

edition.

Rogers, E.M. (1995). Diffusion Of Innovations. New York: The Free Press. 4th

edition.

Sky (2012). Available at: < http://www.tatasky.com/ > [Accessed from: 22 May

2012]

Solar (2012). Available at: <http://www.solarpanelsindia.com/> [Accessed: 20 May

2012]

Tornatzky, L.G. and Klein, K.J. (1982). Innovation Characteristics and Innovation

Adoption-Implementation: A Meta-Analysis of Findings. IEEE Transactions on

Engineering Management, 29(1), 28-43.

Page 45: NASCENT CONNECTIONS 2013

32

Searching for the engine of Business-Information Technology

alignment in social capital

Siân Miller, Yogesh K Dwivedi

Abstract

This paper examines the role that social capital plays in organisations in order to

create alignment between the Information Technology (IT) and business

communities. These communities often experience difficulties sharing objectives,

deliverables and even communicating with each other. Beginning with the premise

that the absence of social capital is destroyer of alignment, the paper suggests that

where social capital bridges the boundaries between the business and IT

organisations, this leads to superior performance. A multi-dimensional framework

explores the attributes of social capital and points to the direction for an empirical

study.

Keywords: business-IT alignment, social capital, trust, obligations.

Introduction

Creating alignment between the business and Information Technology (IT)

departments has been of academic interest for over 25 years (MacFarlan, 1984) but

the role of social capital in creating that alignment has not received a great deal of

focus. The lack of a common ground has been noted and the business and IT

communities often seem to share little and experience difficulties sharing objectives,

deliverables and even communicating with each other (Khandelwal, 2001; van den

Hoof and de Winter; 2011 and Willcoxson and Chatham, 2004). By 2003, Gartner

noted that alignment had become the top concern for Chief Information Officers

(CIOs) and it remains problematical with Luftman and Zadeh’s broad study (2011)

finding that it was still in the top five issues for CIOs.

This paper forms the conceptual basis for empirical research to discover if firms

which overcome the natural barriers between the two groups create alignment and are

consequently better able to withstand environmental turbulence.

The outcome of an extensive review of the business-IT alignment literature and the

use of social capital theory will be explored in this paper. It will also describe the next

steps to be taken in an in-depth empirical study.

The problem of alignment

Business and IT organisations frequently see themselves divided, “the IT department

is often seen by the Business as having a focus on technology rather than the interests

of the organisation as a whole, IT professionals often regard Business employees as

technologically inept and insufficiently aware of the importance and complexity of

IT.” (van den Hooff and de Winter, 2011, p.255). Shared domain knowledge and

understanding (Reich and Benbasat, 2000) coupled with frequent communication

(Johnson and Lederer, 2005) tends to engender a shared view and the converse is

often observed. The absence of a business perspective by IT managers or a mismatch

Page 46: NASCENT CONNECTIONS 2013

33

in perception creates business dissatisfaction (Khandelwal, 2001 and Willcoxson and

Chatham, 2004).

While the existence of alignment continues to be problematical, most writers agree

that significant performance benefits accrue when alignment is observed (Croteau and

Raymond, 2004). Looking at poor performance, low performing firms exhibit a

misalignment between business and IT compared with their more successful

competitors (Bergeron, et al., 2004 and Tallon, 2007).

Theoretical choice

There is no clear, commonly-held view of the nature of alignment. The debate on

strategic alignment is predicated on the existence of a boundary between the business

and IT organisations (van den Hooff and de Winter, 2011). Writers have sought

indicators, signs and symbols, that can be traced across firms, sectors and geographies

identifying relationships and communications (Johnson and Lederer, 2005;

Khandewal, 2001 and Reich and Benbasat, 2000), configuration and boundaries

(Cumps, et al., 2009 and Valorinta, 2011) and process (Willcoxson and Chatham,

2004) This paper seeks to understand the fundamentals of alignment through a

holistic framework bringing together these disparate components.

Social capital

Social capital is “embedded in social networks accessed and used by actors for

actions” (Lin, 2001, p 25). A consensus exists in the literature that social capital

comprises five dimensions:

• networks: lateral associations (Coleman, 1988);

• social norms: the tacit and informal values governing behaviour (Coleman,

1988) ;

• trust: willingness to take initiatives or risk (Coleman 1988;) ;

• reciprocity-expectation: a mutual exchange of benefit and services (Bourdieu,

1986; Burt, 1992 and Lin, 2001) ;

• personal and collective efficacy: the participation to create active engagement

and commitment in a group (Collier, 1998).

To access the “competencies and resources at the nodes of the network” opportunity,

motivation and ability need to be present (Adler and Kwon, 2002, p.26). Dense,

closed networks provide ready access to people within a group whereas sparse

networks bridge boundaries and are characterised by “structural holes” (Burt, 1992).

These ties are necessarily the product of daily, structural interaction and may be

flexed less frequently but, nonetheless, they generate trust and the expectation of

mutual obligations. Social capital resides in constantly reinvigorated relationships

(Bourdieu, 1986) characterised by trust and co-operation (Tyler and Kramer, 1996).

Conceptual Framework

Three tiers of social capital are proposed. Tier 1 contains the building blocks of

network and social norms. With these components in place, trust and mutual

expectations of delivery can develop. The growth of trust and fulfilment of

expectations will enable the organisation to achieve at a collective level: the third tier.

Page 47: NASCENT CONNECTIONS 2013

34

This three tier representation has been chosen to reflect the need to see social capital

as a whole and, for the benefit of social capital to be realised, all three tiers need to be

present. It is not suggested that there is no evidence of social capital if only the

elements of the lowest tier existed but rather, the presence of network associations

and the sharing of some social norms will tend to enable trust and the expectation of

mutual benefit even if this is only transitory.

Moreover, collective efficacy may not always be the natural outcome of trust and

mutual obligations but, with the establishment of the pre-conditions for its creation. it

may be present some of the time.The building blocks of social capital can all be seen

in terms of alignment. Table 1 maps the dimensions and attributes of social capital to

those of alignment.

Social capital

dimension Strategic alignment attribute

Networks

(Burt, 1992;

Coleman, 1988)

Network connections (Banker et al. 2011)

Regular formal and informal communication (Johnson and

Lederer, 2005)

Access to decision-makers and decision-making process

(Banker et al. 2011)

Boundary spanning (Valorinta, 2011)

Social norms

(Coleman, 1988)

Shared perspective, language, experience (Preston and

Karahanna, 2009)

Shared domain knowledge (Reich and Benbasat, 2000)

Common processes (Johnson and Lederer, 2005)

Figure 1- Three Tiers of Social Capital

Page 48: NASCENT CONNECTIONS 2013

35

Social capital

dimension Strategic alignment attribute

Reciprocity-

expectation

(Bourdieu, 1986;

Burt, 1992, Lin,

2001)

Business- IT mutual understanding of each party's value to the

organisation (Kearns and Sabherwal, 2006)

Convergent interests (Cumps, et al., 2009)

Shared participation in business-IT planning (Banker et al. 2011)

Trust

(Coleman,

1988;Tyler and

Kramer, 1996)

Belief in the other party's value and integrity (Khandelwal,

2001)

Engagement of the other party in planning processes (Cumps, et

al, 2009)

Personal and

collective efficacy

(Adler and Kwon,

2002; Collier, 1998;

Lin, 2001)

Integrated processes (Cumps, et al, 2009)

Business-IT partnering for major investment decisions

(Willcoxson and Chatham, 2004)

Functionally and geographically mirrored network associations

Common understanding of both cost and value of IT (Cumps, et

al, 2009)

Access to governance and financial decision-making (Banker et

al. 2011)

Superior performance (Bergeron et al., 2004; Tallon, 2007)

Table 1 – Dimensions of Social Capital and Strategic Alignment

Discussion

Examining alignment between the business and IT, collective efficacy is the very goal

sought from alignment allowing the two communities to engage in both operational

problem-solving and large, long-term strategic initiatives with mutual trust, accepting

shared processes and valuing the skills and norms of the other. If the IT department

perceives itself as separate with different professional norms, methods and processes,

it may not share behaviours and beliefs with its business. Norms which are valuable

in-group may reinforce the otherness of those outside the group even driving them

apart. External delivery organisations may have norms which are not convergent with

the host organisation leading to failures of trust across the boundaries (Valorinta,

2011). The IT department may be disadvantaged in its conversations with the business

where it ranks lower in the organisation’s social hierarchy.

Where social capital is built between the IT department and the business, it is

proposed that this will translate into alignment between the two departments. This

needs to be seen through the input tier as structural and boundary spanning network

relations and sufficient shared norms demonstrated through processes, beliefs and

narratives. The transformational tier builds trust and shared expectation of mutual

benefit. Finally, the output tier will be evidenced by the ability to work together

achieving the aims of the organisation.

Expanding on the three tiers of social capital shown in Figure 1 and Table 1, it is now

possible to show this in terms of alignment:

Page 49: NASCENT CONNECTIONS 2013

36

Figure 2 - Social capital as a transformational engine

Continuing with an empirical study

Studies of alignment (Bergeron, et al., 2004; Croteau and Raymond, 2004 and Tallon,

2007) have tended to use wholly quantitative methods with only a small number

selecting a mixed method, for example, van den Hooff and de Winter (2011)

combined survey material and interviews. The selection framework suggested by

Cresswell (2003) has been used to determine that this approach is suitable. A mixed-

method approach will be taken with a quantitative study of the relationships expressed

in the model and with in-depth, qualitative focus on the transformational tier to

attempt to understand the richness of that layer.

The study will examine a small number of cases in the asset management segment of

the financial services sector. Four firms have been selected since they are all subject

to common operating and regulatory environments but may have chosen very

different ways to deliver services, for example, outsourcing versus a shared services

model.

The study will seek participants in those firms who can be partnered, that is, the IT

respondent will have a corresponding partner in the business to enable the same

problem to be seen from both sides. Thus far, trial interviews indicate that this is a

suitable format since it gives the participants the opportunity to be open and

expansive in their views which would be unlikely to be captured in surveys and

questionnaires. Participants were interested and engaged in the topic and prepared to

give time to a subject which they considered a relevant problem for their businesses.

Conclusion

"[T]he existence of connections … is the product of an endless effort at institution"

(Bourdieu, 1986, p. 249).

It is proposed that social capital is achieved through this endless effort, building trust

and creating and fulfilling mutual obligations. Trust is earned and given, reliability

delivers and generate the expectation that mutual obligations will be met whether in

Page 50: NASCENT CONNECTIONS 2013

37

the short or long term.. Alignment between a business and IT department only creates

value when it is an enabler of superior performance, otherwise it is simply a way of

generating organisational comfort. Alignment and social capital may be seen as

proxies for each other. The enablers of input tier need to go through a transformation

to deliver effectiveness as the output.

Contribution to research and practice

This paper contributes to the theory of business-IT alignment proposing the presence

of social capital as a critical underpinning for the creation of alignment and, hence,

superior performance. It further suggests that trust and mutual obligations are built

enabling alignment by creating feedback into networks and norms and that superior

performance is unlikely to be created without this transformational engine of

alignment.

This paper also contributes to the understanding of alignment for in-organisation

practitioners and consultants providing a brief summary of the current literature with

insights into the impact of social capital. Additionally, it will give scholars insights

into studies for which further in-depth reading may be beneficial.

Limitations

This paper proposes a theoretical framework only and is not yet supported by

empirical research. Therefore, this provides an insight into directions for field-work

using the framework to inform and guide that research.

References

Adler, P. & Kwon, S.W. (2002). Social Capital: Prospects for a new concept.

Academy of Management Review, 27(1), 17-40.

Banker, R. D., Hu, N., Luftman, J. & Pavlou, P.A. (2011). CIO reporting structure,

strategic positioning and firm performance. MIS Quarterly, 35 (2), 487-504.

Bergeron, F., Raymond, L. & Rivard, S. (2004). Ideal patterns of strategic alignment

and business performance. Information and Management, 41 (8), 1003-1020.

Bourdieu, P. (1986). The Forms of Capital. in: J.G Richardson, J.G.(Ed.), Handbook

of theory and research for the sociology of education (pp. 241-258). New York :

Greenwood.

Burt, R.S. (1992). Structural holes: the social structure of competition, Cambridge,

MA : Harvard University Press.

Coleman, J.S. (1988). Social Capital in the Creation of Human Capital. American

Journal of Sociology, 94 (Supplement), S95-S120.

Creswell, J. W. (2003). Research design: Qualitative, quantitative, and mixed method

approaches (3rd ed.). Thousand Oaks, CA: Sage.

Croteau, A.M. & Raymond, L. (2004). Performance outcomes of strategic and IT

competencies alignment. Journal of Information Technology, 19 (3), 178-190.

Cumps, B., Martens, D. & De Backer, M. (2009). Inferring comprehensible

business/ICT alignment rules. Information and Management, 46(2), 116-124.

Gartner Group Executive Research Program Survey, Gartner Inc, (2003).

http://www.gartner.com/press_releases/pr17mar2003b.html Stamford, CT.

Page 51: NASCENT CONNECTIONS 2013

38

Johnson, A. M. & Lederer, A.L. (2005). The effect of communication frequency and

channel richness on the convergence between chief executive and chief

information officers. Journal of Management Information Systems, 22(2), 227-

252.

Kearns, G. S. & Sabherwal, R. (2006). Strategic alignment between business and

information technology: A knowledge-based view of behaviors, outcome, and

consequences. Journal of Management Information Systems, 23 (3), 129-162.

Khandelwal, V. K. (2001). An empirical study of misalignment between Australian

CEOs and IT managers. Journal of Strategic Information Systems, 10(1), 15-28.

Lin, N. (2001). Building a Network Theory of Social Capital. in: N. Lin, K. Cook &

R.S. Burt, (Eds.), Social Capital: Theory and Research (pp. 3 – 29). New York:

Aldine de Gruyter.

Luftman, J. & Zadeh, H. S. (2011). Key information technology and management

issues 2010-11: an international study. Journal of Information Technology, 26(3),

193-204.

McFarlan, W. (1984). Technology changes the way you compete. Harvard Business

Review, 68 (3), 98-104.

Preston, D. S. & Karahanna, E. (2009). How to develop a shared vision : the key to IS

strategic alignment. MIS Quarterly Executive, 8(1), 1-8.

Reich, B. H. & Benbasat I. (2000). Factors that influence the social dimension of

alignment between business and information technology objectives. MIS

Quarterly, 24(1), 81-113.

Tallon, P. P. (2007). A process-oriented perspective on the alignment of information

technology and business strategy. Journal of Management Information Systems,

24(3), 227-268.

Tyler, T. R., & Kramer, R. M. (1996). Whither trust? in: R.M. Kramer & T.R. Tyler,

(Eds.), Trust in organizations: Frontiers of theory and research (pp.1-15).

Thousand Oaks, CA: Sage.

Valorinta, M. (2011). IT alignment and the boundaries of the IT function. Journal of

Information Technology, 26(1), 46-59.

Van den Hooff, B. & de Winter, M. (2011). Us and them: a social capital perspective

on the relationship between the business and IT departments. European Journal of

Information Systems, 20(3), 255-266.

Willcoxson, L. & Chatham, R. (2004). Progress in the IT/business relationship: a

longitudinal assessment. Journal of Information Technology, 19(1), 71-80.

Page 52: NASCENT CONNECTIONS 2013

39

Examining the factors influencing the Adoption and Success of Human

Resource Information Systems in Saudi Public Sector Organization

Wassan Alkhowaiter, Yogesh K Dwivedi, Michael D Williams

Abstract

This study aims to present an investigation of the factors affecting the adoption and

success of Human Resource Information system (HRIS) in public organizations. A

model developed for this aim, which is based on the unified theory of acceptance and

use of technology (UTAUT) and DeLone and McLean IS success model. Users of the

system in the public organizations are target to attain the suitable data to empirically

test the proposed model for this study. As far, no study conducted in Saudi Arabia,

this study attempt to full this gap empirically.

Key words: Human Resource Information system HRIS, Adoption, Success, Public

organization.

1.0 Introduction

In today’s knowledge economy, the value of the organization depends on its

employees’ knowledge and this presents a challenge to the HR departments in many

companies. Management of HR is important so that expertise and ideas are greatly

valued, and an innovative workforce is essential to meet the challenges of this

economy. Thus, having a highly skilled human capital it is necessary for

organizations to obtain a competitive edge.

With large amounts of information to process accurately and many functions to

track, HR managers have turned to information technology (IT) to assist them in

meeting their organization’s information needs. This has led to the development

of HRIS in organizations. In fact, using HRIS provides value to the organization and

improve HR professionals’ positions in the organization. Still, there is a wide

agreement that HRIS adoption and success research is still in need (Hendrickson

2003; Blount and Castleman, 2009).

Thus, it is timely to understand the factors that contribute to the adoption and success

of HRIS (Hussain et al., 2007) and so the objective of this study is to examine these

factors in public organizations in Saudi Arabia. This will be achieved by developing a

model and testing it empirically.

This paper is structured as follows: the next section reviews the extant literature

related to HRIS and its adoption and success. The third section then identifies the

research gap. This is then followed by a presentation of the research’s conceptual

model and the research methodology. Finally, the paper highlights key conclusions.

2.0 Literature Review

2.1 Concept, Benefits and Challenges of HRIS

In understanding more about human resource information systems (HRIS), it is

essential to define the term and identify its attributes in the context of organizational

services. A HRIS is defined as one of the modern systems used for obtaining,

analysing, manipulating, storing and distributing a firm’s human resource data; in

Page 53: NASCENT CONNECTIONS 2013

40

other words, it acts as an information services provider to the organization

(Tannenbaum, 1990). Such a system provides many benefits for the organization,

Beckers and Bsat (2002) have summarized four reasons that justify why organizations

should use HRIS. First, it helps to shift the role of HRM from transactions to strategic

human resource management. Second, it helps to increase competitiveness by

developing and enhancing human resource activities and procedures. Third, to re-

engineer the whole HRM department and finally, it helps to create a greater range of

HRM reports.

Notwithstanding the benefits that organizations can obtain through the adoption of

HRIS, they may also face difficulties in implementing any such new technological

systems. Kovach and Cathcart (1999) argue that barriers to HRIS are not limited to

cost, but extend to shortage of skills, maintaining capital, shortage of support and

commitment from higher management, the difficulty in finding system designers with

knowledge of human resource activities and a lack of cooperation with other

departments.

2.2 HRIS Adoption

Modern organizations are attempting to benefit from the positive attributes of HRIS

by applying it in their human resource departments. Still, the adoption of this

technology is considered a challenging issue, as it can be costly and can take a long

time. Furthermore, the advantages identified before its adoption may not be realised

until much later, when HRIS has been assimilated (Ashbaugh and Miranda, 2002).

HRIS adoption by public bodies seems to be more challenging than it is in the private

sector. This is because public sector organizations have various objectives which do

not apply to the private sector. They are involved with multiple intangibles such as

education and health, while private sector firms are mainly profit-oriented and driven

by economic factors (Kamal, 2006). Unlike private firms, which take a proactive

approach to innovation, the public sector innovates reactively; that is, evidence is

required of likely success before the decision is taken to adopt a certain system.

In ensuring its adoption, scholars focus on investigating the influential factors that are

expected to assist its implementation such as human resource capabilities,

management commitment and regulatory issues in the public sector (Troshani, et al.,

2010). Yang, et al. (2007) also added management style, organizational resource,

impact of type of technology used, quick response and data accessibility. Other

variables identified include employees sharing acceptance regarding the system’s

implementation, firm’s commitment and climate (support, warmth and rewarding);

i.e. job satisfaction, work environment, freedom of implementation, higher

management involvement and consistency, and supervisory support (Mat-Zin, 2009).

Teo et al (2007) also have examined the adoption of HRIS and found that top

management support, organization size and perceived benefits can reflect positively

on the adoption process.

2.3 HRIS Success

In terms of HRIS success, a few research studies have aimed to examine the success

of HRIS. Al-Shaliby (2011) defined the success of the system as an achievement of

Page 54: NASCENT CONNECTIONS 2013

41

both the firm’s objectives and achievement of the end-user’s related objectives from

using the HRIS. DeLone and McLean (2003) and Ngai and Wat (2006) state that few

companies have attempted to closely investigate the success of such systems or to

measure their effectiveness. Therefore, there is pressure on HR managers to

understand the variables that might contribute to their success (Hussain et al., 2007;

Ngai and Wat, 2006). The success has become essential to firms that are attempting to

plan their investments or to recover the expenses of these investments (Hagood and

Friedman, 2002).

User satisfaction and system use are considered the two common measures of system

success (Haines et al., 1997); including these two measures together give a complete

picture of system (e.g. HRIS) success. In ensuring HRIS success, scholars focus on

investigating the influential factors that are expected to assist its success. Alshaliby

(2011) conducted a study that looked on the assessment of HRIS success. The study

found that information quality, system quality and usefulness are the most important

factors that led to HRIS success. Ramezan (2010) and Bal et al. (2012) support his

finding and they add ease of use as a factor that effects on the system success.

Rai et al. (2002) describe these systems as satisfactory in terms of information

quality; i.e., they are capable of helping their users with decision-making, data

accuracy and correctness, as well as meeting the standard of information which users

need. The results of the study highlight the usefulness of such a system in contributing

to improved performance and ease of work.

3.0 Gap Identification and Research Direction

Although the literature on HRIS has been growing, little attention has been paid to its

adoption and success. As a matter of fact, there is wide agreement that HRIS adoption

and success remains under researched (Blount and Castleman, 2009).

Whilst there are some studies (Alshaliby, 2011; Bal et al., 2012; Ramezan, 2010) that

have examined the success of the HRIS in Middle Eastern countries, still, there is no

study that has studied the success of the systems in the context of Saudi Arabia.

Before the success of these systems is examined, their adoption should be explored

first. The literature review revealed that no study has attempted to empirically

examine the users’ perspective of HRIS adoption in general and Saudi public

organizations in particular. Also, the context of Saudi Arabia is different to that of

other countries. Whilst The Kingdom of Saudi Arabia (KSA) has the largest economy

in the Gulf Cooperation Council (GCC), it has experienced strong demographic

changes which have affected not only its political stability but also its economy. In

GCC countries including Saudi Arabia, the flow of foreign labour is seen to have a

negative impact on the region’s economy. Thus, developments are required in the

Saudi human resource (HR) capability so that HR departments can perform their

functions rapidly and with great accuracy, which could be achieved by adopting HRIS

in the Kingdom’s local organizations. Therefore, factors examined in existing studies

may or may not be relevant to the Saudi context.

Based on the above discussion, it could be said that there is a lack of specific

empirical research to measure the user adoption and success of HRIS. Therefore, this

study will attempt to fill the specified gap by undertaking research in this direction.

Page 55: NASCENT CONNECTIONS 2013

42

4.0 Theoretical Background and Conceptual Model

A number of alternative theories and models (for example, Technology Acceptance

Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT),

Theory of Planned Behaviour (TPB), Theory of Reasoned Action (TRA), the DeLone

and McLean IS Success Model, etc) have been utilised to examine the individual

adoption and success of IS/IT (including HRIS) in various contexts (Hisao and Yang,

2011). Given the mandatory use of HRIS in Saudi public organizations, where users

are required to use these systems in order to perform their essential work duties, most

of these theories have limited application to mandatory-use contexts (Rawstrone et al.,

2000).

UTAUT is a unified framework based on the mapping of eight theories, including

TAM, TRA and TPB, which fulfils the requirement of all the theoretical constructs

that are useful and suitable for the present research purpose and that, takes into

account the mandatory nature of systems like HRIS. Whereas, the D&M IS Success

Model is considered to be one of the most established and frequently utilized theories

that facilitates the examination of success and user satisfaction.

4.1 Overview of the Research Conceptual Model

For the purpose of the present study, which aims to measure the adoption and success

of HRIS, UTAUT and D&M IS success models have been integrated in order to

identify the factors that influence these outcomes. Combining these two models

produces a more comprehensive means of doing so. The proposed conceptual model

is therefore based on constructs derived from combining both models.

The UTAUT model (Venkatesh et al., 2003) has four core constructs describing

adoption beliefs: performance expectancy, effort expectancy, social influence and

facilitating condition, which are moderated by age, gender and experience. The IS

success (DeLone and McLean, 2003) model has six elements which are directly

connected to each other to measure the success of IS. These dimensions are:

information quality, system quality, service quality, system use, user satisfaction and

net benefit. Owing to the mandatory use of the system in question, other relation was

found to be appropriate for representation within the model. In the context of

mandatory technology adoption, performance expectancy and effort expectancy have

significant effects on user satisfaction. Also, users of a mandatory system cannot

avoid paying attention to their managers’ and peers’ opinions about using the system.

Therefore, use of the system now takes on an additional social meaning, namely,

earning the user credibility in the eyes of the referents. This will lead the users to

perceive the system as more useful. Under the proposed research model, 17

hypotheses have been formulated. Table 1 presented a list of constructs and a

summary of hypotheses.

Page 56: NASCENT CONNECTIONS 2013

43

Hn Independent variable Dependent Variable

H1 Performance expectancy Intention to use

H2 Performance expectancy User satisfaction

H3 Effort expectancy Intention to use

H4 Effort expectancy User satisfaction

H5 Social influence Intention to use

H6 Social influence Performance expectancy

H7 Facilitating condition use

H8 Information quality Intention to use/use

H9 Information quality User satisfaction

H10 System quality Intention to use/use

H11 System quality User satisfaction

H12 Service quality Intention to use/use

H13 Service quality User satisfaction

H14 User satisfaction Intention to use

H15 User satisfaction HRIS success

H16 Use User satisfaction

H17 Intention to use /use HRIS success

Table 1 Summary of research hypotheses

5.0 Research Method

Since this research involves formulating and testing hypotheses, a survey is the most

appropriate research approach that can be employed to conduct such research (i.e. that

which requires testing hypotheses and validation of the conceptual model) (Galliers,

1992). Furthermore, by reviewing the previous studies in HRIS comprehensively, the

survey was found to be the most appropriate tool to obtain the data for this research.

Thus, this research considered the survey method to be the most suitable research

method.

This study’s population involves employees of the human resource departments at the

Ministry of Education in Saudi Arabia, which implemented HRIS in March 2011 at a

cost of 120 million Saudi riyals. The aim of this system is to facilitate the tracking of

the data of the Kingdom’s 550,000 employees.

The Ministry of Education has 1400 employees in its administration departments. The

staff are considered to be the most appropriate sample to test the hypotheses that are

associated with this research regarding the adoption and success of HRIS. Having

determined the research sample, the next step will be to distribute an online survey to

the entire HR employee department who will use the system in mid July 2013. This

study is aiming to collect around (700) completed questionnaires.

After collecting the data the next step is to analyse the collected data in order to test

the proposed hypotheses. This research will adopt the structural equation modelling

(SEM) framework and use AMOS 19 for data analysis. The use of SEM is appropriate

because it allows the examination of more than one regression relationship at a time

(Ullman & Benter, 2003).

Page 57: NASCENT CONNECTIONS 2013

44

6.0 Conclusion and Contribution to Theory and Practice

HRIS has become the backbone of the modern organization. It helps organizations

generally in terms of managing all HR information. It also helps in recoding and

analyzing employees and organizational information; however implementing such a

system has many challenges and one of the major drawbacks is the cost of the system.

Organizations still adopt such a system to obtain their advantages. Although different

studies have looked at its adoption and success, there is still a need for more studies to

look at the facts influencing the HRIS’s adoption and success. This study aimed to do

this through developing a conceptual model by combining the UTAUT model with

the D&M IS success model. Such a theoretical integration provides new material. In

order to validate the proposed model, an online survey will be distributed to the users

of the system in the Ministry of Education in Saudi Arabia.

As this study is one of the first studies to explore the adoption and success of HRIS in

Saudi Arabia it will contribute to emerging literature on HRIS adoption and success in

Saudi Arabia in particular, and more generally to the field of HR management and

information systems. Also, the completion of this study is expected to contribute to

the Kingdom’s initiatives in improving the Kingdom’s human resource capability and

expertise in the newly developed information technology systems such as HRIS.

References

Al-Shibly, H. (2011) Human Resources Information Systems success Assessment: An

integrative model. Australian Journal of Basic and Applied Sciences, 5(5),

p.157–169.

Ashbaugh, S. and Miranda, R. (2002). Technology for human resources management:

seven questions and answers, Public Personnel Management, 31(1), 7-20

Bal, Y., Bozkurt, S. and Ertemsir, E. (2012) The importance of using human

resources information systems (HRIS) and a research on determining the success

of HRIS. In Management, Knowledge and Learning International Conference.

Blount, Y. and Castleman, T. (2009). The curious case of the missing employee in

information systems research. In Proceedings of the 20th Australasian

Conference on Information Systems, Monash University, Melbourne, Australia,

300-10.

Beckers, A.M., & Bsat, M.Z. (2002). A DSS classification model for research in

human resource information systems. Information Systems Management, 19, 41-

50.

DeLone, W.H. and McLean, E.R. (2003). The DeLone and McLean Model of

information systems success: A ten year update. Journal of Management

Information Systems, 19(4), 9–30.

Galliers, R. D. (1992) Choosing information systems research approaches. In R. D.

Galliers (ed.), Information Systems Research: Issues, Methods and Practical

Guidelines (p. 144). Oxford: Blackwell Scientific.

Haines, V.Y. and Petit, A. (1997). Conditions for successful human resource

information systems. Human Resource Management, 36 (2), 261-275.

Page 58: NASCENT CONNECTIONS 2013

45

Hagood, W. and L. Friedman.(2002). Using the balanced scorecard to measure the

performance of your HR information system. Public Personnel Management,

(31), 543-57.

Hendrickson, A. (2003). Human Resource Information Systems: Backbone

Technology of Contemporary Human Resources, Journal of Labor Research,

5(3).

Hsiao, C. H., & Yang, C. (2011). The intellectual development of the technology

acceptance model: A co-citation analysis. International Journal of Information

Management, 31(2), 128–136.

Hussain, Z., Wallace, J. and Cornelius, E. (2007). The use and impact of human

resource information systems on human resource management professionals,

Information and Management, 44 (1), 74-89.

Kamal, M. (2006). IT innovation adoption in the government sector: identifying the

critical success factors, Journal of Enterprise Information Management,19(2),

192-222.

Kovach, A. and Cathcart, E. (1999). Human resource information systems (HRIS):

Providing business with rapid data access, information exchange and strategic

advantage. Public Personnel Management, 28 (2), 275-282.

Mat-Zin, R. (2009). The reactions of employees towards the implementation of

human resource information systems (HRIS) as a planned change program: a case

study, In: 2nd

IEEE International Conference, 8-11 August 2009, Computer

Science and Information Technology, 433-437.

Mohanty, M., & Tripathy, S. K. (2007). Effectiveness of Human Resource

Information System: A Study in National Aluminium Company Limited

(NALCO). Management and Labour Studies, 32(4), 422-450.

Ngai, E. and Wat, F. (2006). Human resource information systems: A review and

empirical analyses. Personnel Review, 35: 297-314.

Ramezan, M. (2010). Measuring the effectiveness of human resource information

systems in national Iranian oil company an empirical assessment. Iranian Journal

Management Studies. 2 ,129-145.

Rawstorne, P., Jayasuriya, R., and Caputi, P. (2000). Issues in predicting and

explaining usage behaviours with the technology acceptance model and the

theory of planned behaviour when usage is mandatory, In Proceedings of the

Twenty-First International Conference on Information Systems, Brisbane,

Queensland, Australia, December 2000, 35-44.

Rai, A., Lang, S., Welker, R. (2002). Assessing the validity of IS success models: an

empirical test and theoretical analysis. Information Systems Research, 13, 50-69.

Tannenbaum, I. (1990). Human resource information systems: user group

implications, Journal of Systems Management, 41 (1), 27-32.

Teo, T.S., Soon, L.G. and Fedric, S.A. (2007). The adoption and diffusion of human

resource information systems in Singapore. Asia Pacific Journal of Human

Resources, 45 (1), 44-62.

Page 59: NASCENT CONNECTIONS 2013

46

Troshani, I., Jerram, C. and Gerrard, M. (2010). Exploring the organizational adoption

of human resource information systems (HRIS) in the Australian public sector.

21st Australian conference on information system, 1-3 December 2010, Brisbane.

Ullman, J. B. and Bentler, P. M. (2003). Structural equation modeling. Handbook of

Psychology. 607–634.

Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003) User acceptance of

information technology: Toward a unified view. MIS Quarterly, 27(3), p.425–

478.

Yang, H., Lee, M. and Lee, G. (2007). Adoption of information and communication

technology: impact of technology types, organization resources and management

style, Industrial Management and Data Systems, 107 (9), 1257-1275.

Page 60: NASCENT CONNECTIONS 2013

47

Adoption of Self-Service Technology by Jordanian Customers

Ali Al Alawan,, Yogesh K Dwivedi, Michael D Williams

Abstract

This study aims to examine the factors affecting consumer adoption of self-service

technology (Internet banking, mobile banking and telebanking) in the context of

Jordanian banking. The conceptual model is proposed by extending the Unified

Theory of Acceptance and Use of Technology (UTAUT2) and includes other external

factors: trust, perceived risk, and self-efficacy. A quantitative field survey study will

be conducted to obtain the data from a convenience sample of Jordanian banking

customers via a self-administrated questionnaire. The findings of this study will be

useful for learning how the Jordanian customers’ adoption of SST can be improved.

Keywords: SSTs, Banking, Jordan, customer, UTAUT2, Adoption.

1. Introduction

Self-service technology (SST) has received considerable attention from both scholars

and service providers (Meuter et al., 2005). As an alternative to human interaction,

SST represents a ground breaking system that provides customers with a wide range

of high-quality services, at a time and place suitable to them, without any assistance

from the service provider (Meuter et al., 2005; Dabholkar et al., 2003). Noticeably,

SST applications are observed at different contexts from banking context, such as

Internet banking (Curran et al., 2003), grocery stores’ setting, for example, self-

scanning checkouts (Dabholkar et al., 2003) to airlines context such as check-in

kiosks (Gelderman et al., 2011).

In the context of Jordanian banking, where there are 26 banks, implementing SST

will play a crucial role in not only saving on labour costs and enhancing profitability

and competitive advantages, but also in increasing customer satisfaction and loyalty

(Azzam and Alramahi, 2010; Curran et al., 2003). Therefore, approximately the

amount of $182 million is projected to update the Internet banking services

(Association Banks in Jordan, 2010). However, implementing SST will not be

feasible unless customers accept this technology (Meuter et al., 2005). Along the

same lines, the adoption of SST by Jordanian customers is low; less than 3.5% of

Jordanian bank customers adopted internet banking services in 2010 (Department of

Statistics, 2010). In spite of this, quite a few studies have examined the adoption of

SST in Jordan. In addition to this, there are other critical factors that have not been

examined by these studies, such as habit, cost, perceived enjoyment, etc. Accordingly,

this study aims to identify and examine the factors influencing consumer adoption of

SSTs in the context of Jordanian banking. It is important to note that the body of SST

literature is large, and numerous factors have been examined and many theories

developed (Meuter et al., 2005). Therefore, there is a necessity for a systematic

review of the relevant literature so as to identify the most important and frequently

found factors influencing the adoption of SST, as well as choosing the appropriate

theory to propose conceptual which can provide a full picture about the adoption of

SST from the perspective of Jordanian customers.

Page 61: NASCENT CONNECTIONS 2013

48

The next sections of the paper will present the relevant literature and a selection of the

appropriate theories. This is followed by an overview of the proposed conceptual

model and the research methodology. The last section will outline the research

conclusions, its contribution, and limitations.

2. Literature Review

By closely reviewing the relevant literature of SST, SST literature can be categorized

in three main themes as follows:

2.1 Implementing SST and its Benefits from Organisation Perspectives

Increasingly, SST has been viewed critically in the service context, due to its

considerable impact on organisations’ strategies and activities (Curran et al., 2003).

Indeed, service organisations worldwide have engaged SST applications in an attempt

to meet growing customer demand, as well as to confront intense competition

(Dabholkar et al., 2003; Curran et al., 2003). The considerable role of SST in

enhancing a firm’s performance in areas such as profitability, productivity, and

cutting labour costs, has been broadly highlighted in prior studies (Bitner, 2002).

SSTs have been used as an efficient mechanism for maintaining and enlarging market

share and marketing relationship management (Azzam and Alramahi, 2010).

Essentially, this is due to higher service quality and convenience, which the SST is

better at, relative to human encounter. This significantly contributes to customer

satisfaction and loyalty (Al-Hawari et al., 2009). Thus, the important role of SST for

organisations can be seen. As customer adoption of SST represents the most

important challenge to successfully implementing SST (Meuter et al., 2005), there is a

need to learn more about the factors influencing the adoption of SST by customers.

Hence, the next section will discuss the adoption of SST from the customers’

perspective.

2.2 Adoption of SST from the Customer Perspective

Several studies have examined the adoption of SST from customers’ perspectives.

Factors that predict the adoption of SST are more likely to vary, so the literature here

has been categorised as follows: (1) Factors related to SST characteristics; for

instance, relative advantages, complexity, customisation, design, usefulness, and

convenience (e.g. Gerrad and Cunningham, 2003). (2) Factors associated with

individual’s characteristics, such as customer readiness, demographic variables, habit,

perceived enjoyment and perceived risk (e.g. Meuter et al., 2005). (3) Situational

factors such as waiting time, context, and perceived crowdedness (e.g. Gelderman et

al., 2011). (4) Factors concerned with organisational characteristics, for example,

price value, role of human encounter and facilitating conditions (e.g. Dabholkar et al.

2003). (5) Aspects related to trust, privacy and security, and credibility (Rexha et al.,

2003, etc.). (6) Factors related to the social environment, such as subjective norms,

reference groups, and word of mouth (e.g. Dabholkar et al., 2003). In summary, there

are a large number of factors influencing the adoption of SST and these factors vary

with context and cultural differences. Therefore, this study realises the need to

identify the most significant factors that explain the adoption of SST in Jordan. The

next section reviews studies conducted in the Jordanian context.

Page 62: NASCENT CONNECTIONS 2013

49

2.3 Adoption of SST by the Jordanian Customers

Although there are numerous studies that have examined the adoption of SST

worldwide, quite a few studies have examined the adoption of SST in Jordan. Abu-

Shanab et al. (2010) in their study to examine the adoption of Internet banking, found

that performance expectancy, effort expectancy, and social influences respectively

determine the behavioural intention to adopt internet banking. They even confirmed

the considerable role of perceived trust, self-efficacy, and locus of control on the

customer’s tendency to adopt Internet banking. However, they did not confirm the

influencing role of facilitating conditions, anxiety, perceived risk, and innovativeness

on the behavioural intention. In the same context, Al-Majali, (2011) highlighted that

perceived risk, awareness of Internet banking, and trust all have a significant impact

on the customer’s attitudes and beliefs, which in turn significantly predict the

customer’s willingness to adopt internet banking. Regarding mobile banking, Khraim

et al. (2011) acknowledged that the adoption of mobile banking by Jordanian

customers is considerably predicted by self-efficacy, compatibility, relative

advantage, complexity and perceived risk.

On the whole, although these studies enhance understanding regarding important

factors affecting the adoption of SST in Jordan, there are other pivotal factors, such as

habit, perceived enjoyment, readiness, need for interaction, and price value that are

excluded by these studies. Furthermore, these studies have proposed their models

based on UTAUT (Abu-Shanab et al., 2010) and the theory of reasoned action (Al-

Majali, 2011). They also examine only Internet banking while Khraim et al. (2011)

randomly selected factors in their conceptual model to test the adoption of mobile

banking. Thus, this study aims to identify a suitable theoretical foundation that will

illuminate the most important factors, as well as being able to explain Jordanian

customers’ adoption of three kinds of SST (Internet banking, mobile banking, and

telebanking). Due to the considerable differences between these channels in terms of

their novelty, facilities required, how to use them, related costs, barriers, and

characteristics, comparative analyses will be conducted. This is in order to learn if

there are differences between the factors influencing the adoption of SSTs from one

type to another. Another rationale behind studying three kinds of SSTs concurrently is

in discovering if there are differences between the adopters of each type of SST in

order to manage the factors contributing to the adoption rate of each type,

commensurate with the nature and characteristics of their users.

3. Selection of Appropriate Theory to Propose Conceptual Model

In order to successfully explain the adoption of SST from the Jordanian customer

perspective, the conceptual model should provide a clear picture of the aspects of

SST, including individuals’ characteristics, environmental factors, and safety and trust

aspects. From analysis of the common models and theories in the field of technology

acceptance, the model proposed by Venkatesh et al. (2012) UTAUT2, is deemed to be

the appropriate theory for forming the conceptual model. This is because UTAUT2 is

particularly proposed for explaining technology acceptance from customers’

perspectives (Venkatesh et al., 2012). Furthermore, UTAUT2 was proposed based on

Page 63: NASCENT CONNECTIONS 2013

50

UTAUT, which has been attributed as the most parsimonious, inclusive, and

predictive model (Venkatesh et al., 2003, 2012). Furthermore, upon a closer reading

of the relevant research into SST, it was recognised that the main constructs in

UTAUT and UTAUT2, such as performance expectance, and social influences (Abu-

Shanab et al., 2010, etc.) or related constructs such as usefulness, relative advantages,

perceived enjoyment, cost (Gerrad and Cunningham, 2003, Curran et al., 2003, etc.)

are identified as significant determinants of customer intention and adoption of SST.

Meanwhile, Venkatesh et al. (2012) suggested that the applicability of UTAUT2

could be increased through investigating UTAUT2 by including new constructs, over

new cultures, for diverse customer segments, and various types of systems. Therefore,

UTAUT2 has been selected as the theoretical foundation of the conceptual framework

in order to explain banking customers’ reaction to new technologies (SST: internet

banking, mobile banking, and telebanking) in a new cultural context (Jordan). As well

as, in the line with Venkatesh’s et al. (2012) recommendations, other external factors

(trust, self-efficacy, and perceived risk), which are identified as the most important

and frequently used factors in the SST literature, will be considered along with

UTAUT2 constructs in the same conceptual model.

4. Overview of Proposed Conceptual Model

Based on UTAUT2 and other factors extracted from prior SST studies, the current

study proposes a conceptual model. Accordingly, UTAUT2 constructs of performance

expectancy, effort expectancy, price value, hedonic motivation, social influences,

habit and facilitating conditions are all proposed as having a direct influence on

behavioural intention. In addition, three factors from UTAUT2 habit, facilitating

conditions, and behavioural intention are formulated as direct determinants of

adoption behaviour. This study also postulates that trust, self-efficacy and perceived

risk, as external factors, have a direct relationship with behavioural intention.

Notably, either the UTAUT2 constructs or the extracted factors from SST literature

have been recognised as significant determinants of customer intention and adoption

of SST (e.g. Abu-Shanab et al., 2010). In line with Venkatesh et al. (2003; 2012), this

study supposes that the relationship between UTAUT2 constructs with behavioural

intention and adoption could significantly be moderated by age, gender, income, and

experience.

Page 64: NASCENT CONNECTIONS 2013

51

Table 1: Constructs definition and research hypotheses

Independent

construct

Definition Dependent

construct 1

H#

Dependent

construct 2

H#

Performance

expectancy

“The degree to which, an

individual believes that

applying the technology will

help him or her to gain in

job performance”

(Venkatesh et al., 2003, p.

447).

Behavioural

intention

H1

Effort

expectancy

“Extent of ease connected

with the use of system”

Venkatesh et al., (2003, p.

450).

Behavioural

intention

H2

Social

influences

“The extent to which, an

individual perceives that

important others believe he

or she should apply the new

system” (Venkatesh et al.,

2003, p. 450).

Behavioural

intention

H3

Facilitating

conditions

“The degree to which, an

individual believes that an

organisation and technical

infrastructure exists to

support the system”

(Venkatesh et al., 2003, p.

453).

Behavioural

intention

H4a Adoption H4b

Hedonic

motivation

The feeling of cheerfulness,

joy, and enjoyment, which

is stimulated by applying

technology (Venkatesh et

al., 2012).

Behavioural

intention

H5

Price value “Consumer’s cognitive

trade-off between the

perceived benefits of the

application and the

monetary cost for using it”

(Venkatesh et al., 2012,

p.161).

Behavioural

intention

H6

Habit “The extent to which,

people tend to perform

behaviours automatically

because of learning”

Behavioural

intention

H7a Adoption H7b

Page 65: NASCENT CONNECTIONS 2013

52

5. Research Methodology

Given the nature of this study, a positivist paradigm (quantitative approach) is the

appropriate philosophical foundation for helping to explain the adoption of SSTs by

Jordanian customers. This is due to the fact that technology acceptance is a mature

research area, with well-established knowledge and many theories, which can be used

to understand the interested problem (Bhattacherjee, 2012). In addition to this, the

study aims objectively to examine the causal relationships between the independent

and dependent constructs based on the UTAUT2 model (Bhattacherjee, 2012).

Therefore, a field survey questionnaire, a cost-effective and objective method, will be

conducted to obtain data from a convenience sample of 400 Jordanian banking

customers for each type of SSTs (Bhattacherjee, 2012). In order to validate the good

fit of the conceptual model and test the underlying hypotheses, the structural equation

model (SEM) would appear to be the suitable statistical technique (Kline, 2004).

6. Conclusion

This study aims to identify important factors influencing the adoption of SSTs by

Jordanian customers. UTAUT2 has been identified as the appropriate theoretical

foundation for proposing a conceptual model. Other important and frequently used

factors (trust, self-efficacy and perceived risk) are formulated along with UTAUT2

constructs in the same model. The conceptual model considers the moderating impact

of age, gender, income, and experience on the relationships among the conceptual

model. In order to achieve the study aims, a quantitative field survey study will be

(Venkatesh et al., 2012,

p.161).

Trust “Individual willingness to

depend based on the beliefs

in ability, benevolence, and

integrity” (Gefen et al.,

2003, p.161).

Behavioural

intention

H8

Perceived

risk

“The consumer’s subjective

expectation of suffering a

loss in pursuit of a desired

outcome” (Pavlou, 2001, p.

109).

Behavioural

intention

H9

Self-efficacy People’s judgments of their

capabilities to organise and

execute courses of action

required to attain designated

types of performances

(Venkatesh et al., 2003).

Behavioural

intention

H10

Behavioural

intention

The extent to which, an

individual intents to adopt

the technology in the future

(Venkatesh et al., 2003).

Adoption H11

Page 66: NASCENT CONNECTIONS 2013

53

conducted to obtain data from a convenience sample of Jordanian banking customers;

the data will be collected from a self-administered questionnaire. The gathered data

will be analysed by SEM.

6.1 Research Contribution

The current study makes an important contribution by proposing UTAUT2 for

examining the adoption of three kinds of SSTs (Internet banking, mobile banking, and

telebanking). The study also extends the applicability of UTAUT2 by focusing on

Jordanian banking. By including other external factors from the SST literature, this

study is able to expand the theoretical horizon of UTAUT2. Another contribution is

associated with examining the adoption of mobile banking, which is considered a

novel, modern technology in Jordan.

6.2 Limitations and Future Research Directions

The current study is restricted by number of limitations. Firstly, the current study

only theoretically identifies the main factors that could influence the adoption of SST,

but it has not yet empirically examined these factors. Therefore, an empirical study

should be conducted to validate the proposed model. Secondly, other factors, such as

technology readiness, the need for interaction and technology anxiety are excluded

from the current study. These are worthy directions for future studies to take. Thirdly,

the postulated hypotheses are not fully discussed and justified. This calls for further

explanation and justification of these hypotheses.

References

Abu-Shanab, E. and Pearson, M. (2010). Internet banking and customers’ acceptance

in Jordan: The unified model’s perspective. Communications of the Association

for Information Systems, 26 (1), 493-524.

Al-hawari, M. Ward, T. and Newby, L. (2009).The relationship between service

quality and retention within the automated and traditional contexts of retail

banking. Journal of service management, 20 (4), 455-472.

AL-Majali, M. (2011). The use of theory reasoned of action to study Information

technology in Jordan. Journal of Internet Banking and Commerce, 16(1), 1-13.

Association banks in Jordan. (2010). Annual Report of Association Bank:

Development of the Jordanian Banking Sector (2000 - 2010). Available from:

http://abj.org.jo/public/English.aspx?Lang=1&Page_Id=2129&Menu_ID=182.

[Accessed 11 April 2012].

Azzam, Z.A. and Alramahi, N.M. (2010).Effect of electronic Interactive technologies

usage on services marketing activities empirical study on banking sector in

Jordan. International Arab Journal of e-Technology, 1 (4), 154-163.

Bhattacherjee, A. (2012). Social Science Research: Principles, Methods, and

Practices. 2nd

edition. Florida, USA: AnolBhattacherjee.

Bitner, M. J. Ostrom, A. L. and Meuter, M. L. (2002).Implementing successful self-

service technologies. Academy of Management Executive, 16, 96-108.

Page 67: NASCENT CONNECTIONS 2013

54

Curran, J.M. Meuter, M.L. and Surprenant, C.F. (2003). Intentions to use self-service

technologies: A confluence of multiple attitudes. Journal of Service Research, 5

(3), 209-224.

Dabholkar, P.A. Bobbit, M.L. and Lee, E.J. (2003). Understanding consumer

motivation and behavior related to self-scanning in retailing. Implications for

strategy and research on technology based self-service. International Journal of

Service Industry Management, 14 (1), 59–95.

Department of statistics in Jordan. (2010). Survey use of information technology in

the Jordan. Amman. Available from:

http://www.dos.gov.jo/dos_home_a/main/Analasis_Reports/it_tech/tech_2009.pd

f [Accessed 11 April 2012].

Gefen, D. Karahanna, E. and Straub, D.W. (2003). Trust and TAM in online

shopping: an integrated model. MIS Quarterly, 27 (1), 51-90.

Gelderman, C.J. Ghijsen, P.W. and Diemen, R. (2011).Choosing self- service

technologies or interpersonal services: The impact of situational factors and

technology-related attitudes. Journal of Retailing and Consumer Services, 18 (5),

414–421.

Gerrard, P. and Cunningham, J.B. (2003).Diffusion of internet banking among

Singapore consumer. International of Bank Marketing, 21(1), 16-29.

Khraim, H.S, Shoubaki, Y.E, Khraim, A.S. (2011). Factors affecting Jordanian

consumers’ adoption of mobile banking services. International Journal of

Business and Social Science, 2 (20), 96-105.

Kline, R. B. (2004). Principles and Practice of Structural Equation Modelling. 2nd

ed.

New York: The Guilford Press.

Meuter, M.L. Bitner, M.J. and Ostrom, A.L. and Brown, S.W. (2005).Choosing

among alternative service delivery modes: An investigation of customer trial of

self-service technologies. Journal of Marketing, 69 (2), 61-83.

Pavlou, P.A. (2001). Integrating trust in electronic commerce with the technology

acceptance model: model development and validation. In: AMCIS. Proceedings

of the Seventh Americas Conference on Information Systems, 2001, Boston.

Rexha, N. John, R.P. and Shang, A.S. (2003).The impact of the relational plan on

adoption of electric banking. Journal of Services Marketing, 17 (1), 53-67.

Venkatesh, V. Thong, J. Y. L. and Xu, X. (2012). Consumer acceptance and use of

information technology: Extending the Unified Theory of Acceptance and Use of

Technology. MIS Quarterly, 36 (1), 157-178.

Venkatesh, V., Morris, M., Davis, G. & Davis, F. (2003) User Acceptance of

Information Technology: Toward A Unified View. MIS Quarterly, 27 (3), 425-

478.

Page 68: NASCENT CONNECTIONS 2013

55

Citizen Adoption of Electronic Government in Jordanian Context

Mohammad Alryalat, Yogesh K Dwivedi, Michael D Williams

The application of the Internet for enabling the operation of the government and for

the delivery of public services to citizens and businesses has been termed as electronic

government (eGov). Although eGov offers several benefits (such as offering always

on (24/7) services, reducing corruption and bureaucracy), citizens of many countries

are slow in adopting eGov systems. In order to understand reasons for such sluggish

adoption, a number of studies have attempted to explore factors influencing citizens’

adoption of eGov in a number of different countries both from developed and

developing world. The Jordanian government has also recently implemented a

number of citizen centric eGov services but the adoption rate has been slow here too.

Therefore, undertaking such research would be useful for accelerating the adoption

rate. However, no research, except for a few theoretical studies (Abu-Shanab et al.,

2010; Al Nagi and Hamdan, 2009), has been conducted in the Jordanian context. This

research is aimed at examining factors influencing citizens’ intention to adopt

available e-government services in the Jordanian context.

This research has employed the UTAUT (Venkatesh et al., 2003) as a guiding theory

to explain the citizens’ intention to adopt eGov services. The theory comprises four

independent constructs (i.e. performance expectancy (PE), effort expectancy (EE),

social influence (SI) and facilitating conditions (FC)) that affect behavioural

intentions and use of technology. This research has also adopted some additional

constructs such as perceived trust (PT), perceived risk (PR), and perceived security

(PS) along with the UTAUT to best explain the model. A field survey was considered

as a suitable research approach and a paper-based questionnaire was considered as the

preferred data collection method. Respondents were chosen from four different

locations (i.e., Salt, Irbid, Zarqa, and Aqaba) of a Jordanian university. Out of 1,200

questionnaires distributed during June-July 2012, a total of 538 valid responses were

received. The study selected a structural equation modelling technique using AMOS

for estimating the model. The fit indices provided evidence of a reasonably good

model fit (Chi-Square (χ2)/degree of freedom (DF) = 921.964/359 = 2.568, GFI =

0.893, AGFI = 0.871, NFI = 0.839, CFI = 0.894, RMSEA = 0.054). The analysis of

the model indicates that PE (γ=0.72, p<0.001) and EE (γ=0.28, p<0.001) were found

significant whereas SI (γ=0.07, p=0.135), FC (γ=0.08, p=0.097) and PT (γ=0.06,

p=0.205) were found non-significant on behavioural intention to use the eGov system.

Moreover, PS (γ=0.66, p<0.001) was found positively significant and PR (γ=-0.37,

p<0.001) negatively significant on PT. This research contributes to an overall

theoretical understanding of factors influencing eGov adoption.

References

Abu-Shanab, E., Al-Rub, S. A. & Nor, K. M. (2010). Obstacles Facing the Adoption

of E-Government Services in Jordan. Journal of E-Governance, 33(1), 35-47.

Page 69: NASCENT CONNECTIONS 2013

56

Al Nagi, E. A. & Hamdan, M. (2009). Computerization and e-Government

implementation in Jordan: Challenges, obstacles and successes. Government

Information Quarterly, 26(4), 577-583.

Venkatesh, V., Morris, M. G., Davis, G. B. & Davis, F. D. (2003). User acceptance of

information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.

Page 70: NASCENT CONNECTIONS 2013

57

Evaluating the Cultural Impact on E-government Adoption: A

Citizen Centric View of Saudi Arabia

Khalid Alhamzi, Michael D Williams, Yogesh K Dwivedi

Abstract

Many governments across the world are developing and utilizing ICT technologies as

a medium to propagate information and services to their citizens. Even in Saudi

Arabia (KSA) e-government projects have been identified as one of the key

government priority areas. However, the adoption of e-government by Saudi Arabian

citizens has seen many challenges and barriers (Alshehri et al., 2009), significant

among which are the social issues which need to be considered and treated carefully

by the Saudi government in order to utilize the full potential that e-government carries

(Alshehri & Drew, 2010).

One of the critical components of the social barrier is culture, which plays a vital role

in the lives of Saudi Arabian citizens and their intention to use any new technology

such as that of e-government (Alshehri & Drew, 2010). Overcoming this important

and complex cultural inertia has become the main challenge for both the

implementation and adoption of e-government in Saudi Arabia (Ndou, 2004).

There have been researchers in the past (Al-Kinani & Al-Besher, 2008 and

(Aldraehim et al., 2012) who have studied the impact of culture on e-services

available in Saudi Arabia and e-readiness of Saudi Arabian citizens at large. But there

haven’t been many articles which have specifically looked at evaluating the impact

that Saudi Arabian culture has on its citizens in adopting e-government in particular.

Since culture plays such a vital role in influencing the adoption and use of e-

government (Aldraehim et al., 2012), it becomes imperative to empirically evaluate

and understand the factual impact that culture has on the adoption of e-government

from the perspective of Saudi Arabian citizens.

Research Aim: The main aim of this research is to understand and empirically

evaluate the impact that culture has on Saudi Arabian Citizens in adoption of e-

government.

Research Objectives:

Undertake an extensive review of literature to analyse the current level of research

corresponding to the impact of culture on the adoption of e-government by Saudi

Arabian citizens in specific.

Structure a conceptual model and undertake a substantive quantitative survey in

order to identify the current level of impact of Saudi culture on the adoption and

use of e-government in Saudi Arabia.

Empirically validate and refine the proposed conceptual model by firstly testing

the reliability of the constructs adopted and then identifying the conversions and

diversions of the research result.

Page 71: NASCENT CONNECTIONS 2013

58

Provide detailed inferences on the implications for policies and practices that could

be rendered imperative, which may negate or minimize the impact of culture on the

adoption of e-government by Saudi Citizens.

A sheer lack in the scale of past research dealing with this particular topic and context

to date, and the impact of cultural influence, emphasize the scope and significance of

this research (Aldraehim et al., 2012).

References

Aldraehim, M.; Edwards, S., L. & Watson, J. (2012). Cultural impact on e-service use

in Saudi Arabia: Results from Focus Groups. Ninth International Conference on

Information Technology- New Generations, pp: 744-750.

Al-Kinani, A., N. & Al-Besher, B., M., N. (2008). “Analysis Study of Culture’s

Impact on E-Readiness Assessments in developing countries”. Communications of

the IBIMA, Vol. 6, No. 24, pp: 154-164.

Alshehri, M. & Drew, S. (2010). Challenges of e-Government Services Adoption in

Saudi Arabia from an e-ready citizen Perspective. World Academy of Science,

Engineering and Technology, Vol. 66, pp: 1053-1059.

Alshehri, M.; Drew, S. & Alfarraj, O. (2009). A Comprehensive Analysis of E-

government services adoption in Saudi Arabia: Obstacles and Challenges.

International Journal of Advanced Computer Science and Applications, Vol. 3,

No.2, pp:1-6.

Ndou, V. (2004). E-government for developing countries: opportunities and

challenges. The Electronic Journal on Information Systems in Developing

Countries, Vol. 18, No. 1, pp: 1-24.

Page 72: NASCENT CONNECTIONS 2013

59

Adoption of Knowledge Management Systems in Saudi Arabian

Public Sector Organisations: Role of Institutional Factors

Fatmah M. H. Alatawi, Yogesh K Dwivedi, Michael D Williams

Abstract

This research aimed to examine the importance and influence of environmental

factors on adoption of knowledge management systems (KMS) in the context of the

Saudi Arabian public sector. In order to analyse the external environmental pressures

felt by organisations, the Institutional Theory was deemed relevant as a guiding

theory and source of factors tested in this research. The conceptual model proposed to

guide this research postulates that coercive pressure along with normative pressure

and external IS support determines the mimetic pressure element. Mimetic along with

coercive pressure influences the intention and behaviour to adopt KMS. Thus, in the

proposed model, coercive pressure will exert both direct and indirect (via mimetic

pressure) effect on intention and behaviour. Data collected from a survey of 352

employees from organisations within the Saudi Arabian public sector organisations

was utilised to perform a number of analyses. Findings obtained from regression

analysis suggest that the coercive pressure not only affects behavioural intention

directly but also exerts an indirect effect on it via mimetic pressure construct.

Coercive pressure along with normative pressure and external IS support determined

the strength of mimetic pressure. Findings also indicate that mimetic pressure along

with coercive pressure significantly influenced behavioural intention to adopt KMS in

Saudi Arabian public sector organisations.

The research contributes to the existing knowledge on the topic investigated by this

submission as this is one of the first initiatives to investigate the role and importance

of environmental/institutional factors for determining KMS adoption in Saudi Arabian

context. Thus, findings of this research would contribute to the institutional theory on

IS/IT management in particular and technology-organisation-environment (TOE)

framework in general as it provides tested elements for integration in the

‘Environment’ category of the framework. This research clearly indicates that

coercive and mimetic pressure can be utilised to promote widespread adoption of

KMS in public sector organisations in Saudi Arabia. Also, normative pressure and

external IS support can be utilised to strengthen the mimetic pressure which appeared

to act as a major factor that determines intention to adopt the KMS system. Also,

managers of the Saudi public sector organisations should carefully analyse and exert

an appropriate level of pressure on their subordinates in such a way that may lead to

the stronger intentions of employees to adopt KMS systems. The research reported in

this submission was focused on examining the role and importance of environmental

factors in determining KMS adoption in Saudi Arabian context. So the main

limitation of this submission is that it excluded other types of factors (i.e.,

organisational and technological factors) which would have provided further

understanding of KMS adoption in the Saudi Arabian context. Remaining analysis

from this research would focus on undertaking analysis on organisational and

Page 73: NASCENT CONNECTIONS 2013

60

technological factors (by employing the TOE framework) when approaching such

problems.

Keywords: Knowledge Management System, Coercive Pressure, Mimetic Pressure,

Normative Pressure, External IS Support

Page 74: NASCENT CONNECTIONS 2013

61

Will mobile payments prevail in the UK?

Emma L Slade, Michael D Williams, Yogesh K Dwivedi

Extended abstract

Mobile payments (m-payments) represent a culmination of innovations, combining

payment systems with mobile devices and services, to enable users to initiate,

authorise, and complete a financial transaction over a mobile network or wireless

communication technology. They offer users the first ubiquitous payment solution

and thus a distinctive value over other payment systems. However, there is a general

reluctance to adopt new payment systems as a result of consumers’ entrenched

behaviour and stakeholders’ vested interest in existing payment systems. Although m-

payment initiatives such as mPesa have experienced success in developing countries

where banking infrastructure is more limited, m-payment systems have gained little

ground in the UK to date. However, there are now a variety of different proximity and

remote m-payment systems available in the UK, such as Barclays’ Pingit and

Orange’s QuickTap, and m-payments have become a specifically denoted project of

the UK Payments Council.

A review of the extant literature via Google Scholar® and ISI Web of Knowledge®

revealed that 35 studies have been conducted relating to m-payment adoption.

However, 15 of these studies have not been quantitatively validated. 70 per cent of the

remaining 20 quantitative studies have been published since 2010; therefore, m-

payment adoption research is still in its infancy. Quantitative m-payment adoption

research has been conducted in a variety of countries, including China, Germany,

Finland, India, Ireland, Korea, Malaysia, Singapore and the US. To date China has

been the most researched context, accounting for 7 of the 20 empirical studies relating

to m-payment adoption. However, currently no m-payment adoption research has

been conducted in the UK context.

The lack of m-payment adoption research in the context of the UK leaves an

important void that needs to be filled for several reasons. Firstly, as the survival and

growth of mobile commerce by both consumers and merchants is largely dependent

on a secure and reliable payment system, then examination of m-payment adoption is

important to those stakeholders with an interest in the success of mobile commerce

both in the UK and internationally. Secondly, as the success of m-payments will pose

a threat to existing payment systems, then adoption research is imperative for

stakeholders who have a vested interest in existing UK payment systems. Finally,

adoption research conducted in different contexts is not wholly generalizable due to

different payment cultures; therefore, adoption research in the UK context will be of

use to stakeholders with a specific interest in the UK m-payment environment.

Therefore, examining the adoption of m-payments in the UK will generate knowledge

that is useful both theoretically and practically.

Page 75: NASCENT CONNECTIONS 2013

62

Developing a framework to compare the effect of distribution

channels on consumer behaviour

Francesca Sibbald, Adrian Palmer, Nicole Koenig-Lewis

Abstract: My research focuses on the comparison of the experiential values of

purchasing through an online distribution channel with an offline distribution channel.

Two models will be created with the distribution channel being the variable to

compare differential effects of the customer experience on behavioural intention.

Research will consist of both qualitative and quantitative methods.

Keywords: consumer behaviour, distribution channels, customer experience

Introduction

Service dominant logic is the crossover between goods and services and states that

intangible resources, the co-creation of value, and relationships are more important

than the good itself (Vargo and Lusch 2004). In contrast, value in use is associated

with the experiential elements of consumption. Previous research on value in use has

focused heavily on the utilitarian and hedonic benefits, which arise after the purchase

experience. However, experiential benefits can take place before a purchase (the

build-up to purchasing a product), during the transaction and subsequently during

consumption. Research into the experiential values arising from the transaction

process itself is very limited. Thus, this research tries to close this gap by establishing

the experiential benefits and values associated with the acquisition and transaction

process of obtaining a good. The focus will be on the comparison of the experiential

values of purchasing through an online channel and via a traditional store with face to

face contact. This is important to research as the industry changes so do the needs of

consumers, competition is increased and the price offers of a product is not enough

anymore. By comparing the two purchasing channels, the industry is able to move

further forward to meet and deliver the needs of customer, providing very useful

research.

Customer experience has been defined as “an interaction between an organisation and

a customer. It is a blend of an organisation’s physical performance, the senses

stimulated and emotions evoked, each intuitively measured against customer

experience across all moments of contact” (Shaw and Ives 2002, p.6). Thus

experiences are sensations, cognitions, behavioural responses and feelings provoked

by brand related stimuli. Holbrook and Hirschman (1982) identified fantasies,

feelings and fun as the experiential aspects of consumption.

Page 76: NASCENT CONNECTIONS 2013

63

However, since the introduction of the Internet, brands have had to examine the way

in which they provide an experience. Brands try to create an experience for the

consumer from the minute they enter the store by creating emotional cues such as

lighting and smell. But online this is more of a challenge for brands who are trying to

achieve a luxurious webmosphere (Okonkwo 2009). Ismail et al (2011, p.5) state that

“enabling the customer to live outstanding moments of the relationships with the

company is more valuable for the customer rather than selling a memorable

experience”. Brand and their branding should be continued throughout their websites.

Research has focused mainly on web site design and have tend to ignore website

aesthetics, empirical studies have found consumers perceptions of a website quality

are affected by aesthetics (Heijden 2003). Originally aesthetics were considered

important to attract the attention of potential users and to provide an enjoyable

experience (Hallnas et al 2002) however findings by Cai and Xu (2011) found

consumer shopping value to have a direct link with website aesthetics. Jennings

(2006) stated an e-business will not thrive unless it provides an “experience”.

However, emphasis has been based too much on the performance issues of a web site

and not on the emotional aspects, it is considered essential for a website to be fun,

pleasurable, and exciting which are all influenced by the aesthetics (Hassanein and

Head 2005, Tractinsky 2004). Extensive research has been carried out into the effect

of atmospherics on customer behaviour in an online store environment (Eroglu 2001,

2003). Atmospherics has been defined as the effect of the immediate physical

environment on the consumer and “the conscious designing of space to create certain

effects in buyers that enhance their purchase probabilities” (Kotler 1973 p 50).

Expressive aesthetics can affect the shopping process value for two reasons. The halo

effect means that the first impression of the shopping environment could have an

influence on the evaluation of other attributes within the environment (Tractinsky

2007). Secondly, by inducing an effective response, expressive aesthetics affect

process perceptions which in turn influence cognitive evaluations (Vilnai-Yavetz et al

2006). Aesthetic websites are likely to lead a flow experience, resulting in increased

learning, perceived shorter shopping time, positive subjective experience and

increased shopping productivity (Hoffman and Novak 1996). Rintamaki et al (2006)

argues the importance of social shopping value and its recognition by conceptualising

shopping value into three dimensions, social value, utilitarian value and hedonic

value. By including social value Rintamaki et al (2006) is connecting the value of

fulfilment to consumer shopping motivations. In this conceptualisation, social value is

gained from enhanced self-esteem and status, utilitarian value stems from saving

money and convenience and hedonic value stems from entertainment and exploration.

Online consumers’ perceptions may be affected by aesthetics by inducing affective

response (Tractinsky and Lowengart 2007) “Affect is pre-attentively ‘extracted’ and

influences subsequent perception” (Fazio et al 1994 p 212). The attractiveness of a

Page 77: NASCENT CONNECTIONS 2013

64

website can be judged very quickly as it is the first attribute of an object (Lingaard et

al 2006). Kim et al (2004) found that it is possible to induce a target emotion by

manipulating design factors of an interface. Vilnai-Yavetz and Rafaeli (2006) found

aesthetics of a virtual landscape to be positively associated with satisfaction and

attitude. Consumer value perception is a key element of traditional consumer

behaviour. Obtaining value is considered a fundamental purchase goal for consumers

and is essential to all successful transactions (Holbrook 1999). Shopping value has

been decomposed into ‘shopping process value’ and ‘shopping enjoyment’, with

shopping process value representing the utilitarian aspect of consumer shopping value

and shopping enjoyment captures the hedonic aspect of consumer shopping value

“with a focus on affective consumer behaviour elicited by emotive and multisensory

elements” (Cai and Xu 2011 p 164). This explains the reasoning behind value

dimensions being critical antecedents of consumer satisfaction, commitments, loyalty

and trust (Sirdeshmukh et al 2002). Therefore, this will be included as an influence

on customer experience in this research. Trust can be influenced by website

aesthetics.

Website aesthetics provide an enjoyable experience and can improve the consumer’s

perception of the usability of a site. Sautter et al (2004) found that e-atmospherics are

important cues for consumers to evaluate the quality of a web site. This is supported

by Van Der Haijden (2003) who suggested perceived attractiveness of a website is

influenced by the perceived ease of use, perceived usefulness and perceived

enjoyment. These are considered motivations for consumption. Research has found

there are two different types of benefits, hedonic benefits and utilitarian benefits. It is

found that utilitarian motives can be dominated by emotional desires, “the intensity of

emotive arousal largely depends on the capacity and desire for spending emotional

resources on the part of the buyer, and this capacity and desire carry within one

consumer over time” (Sarkar 2011 p59). Forsythe et al (2006) carried out research

into the perceived benefits and risks associated with online shopping. Their study

found that individuals with higher utilitarian shopping motives and likely to gain

greater benefits through online shopping than those with lower utilitarian shopping

motives. This is because of the convenience of shopping online, the wide product

range, the how it is easier and quicker through the use of longer opening hours (24/7)

and customer reviews resulting in a more positive customer experience. However it

was also found that due to the financial risk, product risk and convenience risk

associated with shopping online, those with higher utilitarian shopping motives are

also more likely to perceived and overall greater risk in online shopping than those

with lower utilitarian motives. To relieve the worry of failing in an online

environment and to overcome the lack of face-to-face contact, e-tailers have adapted

by creating features such as real-time chats, search engines, bulletin boards. This

increased interaction with the consumer can provide benefits such as customised

information, entertainment and image manipulation (Fiore et al 2005). “the purpose of

Page 78: NASCENT CONNECTIONS 2013

65

facilitating interactive features on the e-commerce website is to increase consumers’

perceived consumption value and, in turn, to satisfy and retain them” (Yoo et al 2010

p 89) by providing a more positive and enjoyable customer experience. Providing

more value to customers is critical to ensure purchases and repurchases from the

perspective of the online store (Childers et al 2001).

Methodology

It is essential to understand the different emotions and reasons for purchasing between

an online and offline situation, therefore two models will be incorporated to compare

the two situations within a similar product area. Brands will be chosen which are

available online and offline across a range of the brand classes.

Both qualitative and quantitative methods will be used to enhance reliability of the

study. Initially some qualitative research will be undertaken in the form of

Webnography to research blogs, social networks, websites etc. to try and establish the

types of emotions and different types of languages induced by consumers who are

reporting on a branded type of purchase through different distribution channels. Focus

groups may also be carried out if required. A pilot questionnaire will then be designed

to support this and to find brands which are popular and readily available within the

luxury industry and to understand to what extent emotions are most regularly

experienced. The research study will use a quantitative survey employing likert type

scales to find out to what extent these emotions can affect the outcome.

Contribution to knowledge

This research has the aim of research value in use and experiential value of

distribution channels to find the effects these can have on behavioral intention of the

consumer. The following questions will be raised:

What emotions are provoked during the transaction process and how do they

differ according to distribution channel

Does experiential value differ with distribution channel

What experience benefits are created and how do they motivate the consumer

The effect of customer experience on behavioral intention

Do the same emotions occur online to offline

Can the same model be used for an online scenario and an offline scenario

Does value in use have a direct effect on customer experience

How service dominant logic transgresses into experience

The conceptual framework, links individual concepts which have an influence on

consumer behaviour, these will then be applied to both purchasing channels. This

insight into consumer behaviour is essential to businesses to provide what the

consumer needs to boost sales. A major challenge of this research is to define when

an experience begins and when it finishes. This refers back to service dominant logic

where the relationship becomes more important than the goods consumed.

Page 79: NASCENT CONNECTIONS 2013

66

Emphasis will be placed on the comparison of the distribution channels and their

effect on behavioral intention.

References

Cai, S. , & Yunjie Xu Department of Management Science, S. (2011). Designing not

just for pleasure: Effects of web site aesthetics on consumer shopping value.

International Journal of Electronic Commerce, 15(4), 159-188.

Childers, T.L., Carr, C.L., Peck, J., Carson, S., 2001. Hedonic and utilitarian

motivations for online retail shopping behaviour. Journal of Retailing 77 (4),

511–535.

Eroglu, S.A.; Machleit, K.A.; and Davis, L.M. Atmospheric qualities of online

retailing: A conceptual model and implications. Journal of Business Research,

54, 2 (2001), 177–184.

Eroglu, S.A.; Machleit, K.A.; and Davis, L.M. Empirical testing of a model of online

store atmospherics and shopper responses. Psychology and Marketing, 20, 2

(2003), 139–150.

Fazio, R.H.; Roskos-Ewoldsen, D.R.; Powell, M.C.; Niedenthal, P.M.; and Kitayama,

S. Attitudes, perception, and attention. In P.M. Niedenthal and S. Kitayama

Page 80: NASCENT CONNECTIONS 2013

67

(eds.), The Heart’s Eye: Emotional Influences in Perception and Attention. New

York: Academic Press, 1994, pp. 197–216

Fiore, A.M., Kim, J., Lee, H.-H., (2005). Effect of image interactivity technology on

consumer responses toward the online retailer. Journal of Interactive Market- ing

19 (3), 38–53.

Fiske, J. (1990), Introduction to Communication Studies, Routledge, London

Forsythe, S. , Liu, C. , Shannon, D. , & Gardner, L. (2006). Development of a scale to

measure the perceived benefits and risks of online shopping. Journal of

Interactive Marketing (John Wiley & Sons), 20(2), 55-75

Hallnas, L., and Redstrom, J. From use to presence: On the expressions and aesthetics

of everyday computational things. ACM Transactions on Computer–Human

Interaction, 9, 2 (2002), 106–124.

Hassanein, K., and Head, M. The impact of infusing social presence in the Web

interface: An investigation across product types. International Journal of

Electronic Commerce, 10, 2 (2005–6), 31–55.

Hirschman, E.C., Holbrook, M.B., 1982. Hedonic consumption: emerging concepts,

methods, and propositions. Journal of Marketing 46 (3), 92–101.

Holbrook, M. B. (1999). Consumer value: A framework for analysis and research.

London: Routledge.

Hoffman, D.L., Novak, T.P., 1996. Marketing in hypermedia computer-mediated

environments: conceptual foundations. Journal of Marketing 60 (3), 50–68.

Ismail, A. , Melewar, T. , Lim, L. , & Woodside, A. (2011). Customer experiences

with brands: Literature review and research directions. Marketing Review, 11(3),

205-225

Kim, S., and Stoel, L. Apparel retailers: Website quality dimensions and satisfaction.

Journal of Retailing and Consumer Services, 11, 2 (2004), 109–117.

Kotler, P. Atmospherics as a marketing tool. Journal of Retailing, 49, 4 (1973–4), 48–

64.

Okonkwo, U. (2009). Sustaining the luxury brand on the Internet. Journal Of Brand

Management, 16(5/6), 302-310

Sarkar, A. (2011). Impact of utilitarian and hedonic shopping values on individual's

perceived benefits and risks in online shopping. International Management

Review, 7(1), 58-65.

Sautter, P.; Hyman, M.R.; and Lukosius, V. E-tail atmospherics: A critique of the

literature and model extension. Journal of Electronic Commerce Research, 5, 1

(2004), 14–24.

Shaw, C., & Ivens, J. (2002). Building great customer experiences. Basingstoke:

Palgrave Macmillan

Sirdeshmukh, D.; Singh, J.; and Sabol, B. Consumer trust, value, and loyalty in

relational exchanges. Journal of Marketing, 66, 1 (2002), 15–37.

Thompson, J.B. (1995), The Media and Modernity: A Social Theory of the Media,

Cambridge: Polity Press.

Page 81: NASCENT CONNECTIONS 2013

68

Tadajewski, M., & Brownlie, D. T. (2008). Critical marketing: Contemporary issues

in marketing. Chichester, UK ; Hoboken, NJ: Wiley.

Tractinsky, N. Toward the study of aesthetics in information technology. In

Proceedings of the Twenty-Fifth International Conference on Information

Systems. Atlanta: AIS, 2004, pp. 11–20.

Tractinsky, N., and Lowengart, O. Web-store aesthetics in e-retailing: A conceptual

framework and some theoretical implications. Academy of Marketing Science

Review, 11, 1 (2007), 1–18.

Van Der Heijden, H. Factors influencing the usage of Websites: The case of a generic

portal in the Netherlands. Information and Management, 40, 6 (2003), 541–549.

Vargo, S. , & Lusch, R. (2004). Evolving to a new dominant logic for marketing.

Journal of Marketing, 68(1), 1-17

Veblen, T. (1899/1979), The Theory of the Leisure Class, New York:Kelly

Vigneron, F. , & Johnson, L. (2004). Measuring perceptions of brand luxury. Journal

of Brand Management, 11(6), 484-506

Vilnai-Yavetz, I., and Rafaeli, A. Aesthetics and professionalism of virtual

servicescapes. Journal of Service Research, 8, 3 (2006), 245–259.

Yoo, Weon-Sang; Yunjung Lee, & JungKun Park, . (2010). The role of interactivity

in e-tailing: Creating value and increasing satisfaction. Journal of Retailing and

Consumer Services, 17(2), 89-96

Page 82: NASCENT CONNECTIONS 2013

69

The Impact of Online Social Networking on Music Consumption and

Identity

Richard Warr, Adrian Palmer, Antje Cockrill

This study explored potential links between online social networking, music consumption,

and identity formation. Existing theories suggest that an inherently social element is present

in identity construction which can be influenced by how a person perceives themselves and

how they are seen, or would like to be seen, by others. Music consumption choices can also

be used to express aspects of one’s self. The rise of online virtual communities has provided

further platforms for social aspects of identity formation, including engaging with other

community members and the sharing of music consumption choices. Whilst previous studies

have dealt with engagements in both offline and online social environments (Livingstone,

2008), there is currently no research which explores this topic in relation to music

consumption and identity.

Seraj (2012) noted how consumers now use online communities to engage with others around

brands, with certain characteristics of communities delivering value to consumers and

instigating such engagements. This includes interactive environments which enable

relationship building and therefore provide social value. It is suggested that online music

social groups may constitute elements of brand communities, which have also recently been

the focus of netnographic research methodology by Seraj (2012), as well as the

multidimensional aspects and dynamism of consumer engagement in such environments

which may be governed by users’ interactive experiences and reflected in value co-creation

with other participants (Brodie et al., 2013). As such, this paper used an observatory

webnographic data collection to investigate the impact of online social networking on

individuals’ music choices and identity formation. This involved a qualitative methodology

that captures data from Internet-based platforms such as forums, chat rooms, and news

boards. The study focused on virtual communities dealing with a wide variety of musical

genres. This data was collated, categorised, and then analysed.

It was found that four key areas emerged from the data that was collected. Firstly,

interactions though online communities were extensively used to expand consumers’

experience of music consumption. Secondly, this form of social networking is used by

consumers who perceive their own musical tastes, and with that their identity, to be different

from that of their offline social peer groups, suggesting that they wish to share their

experiences with like-minded individuals in the online environment. Thirdly, online

communities may also be used considerably in the promotion of live music shows and

festivals. Finally, the data suggests that music consumption is heavily-incorporated by

people into their identity, lifestyle, and everyday routines.

This exploratory research established a number of themes which could be explored much

further in quantitative research, especially the link between online social networking and

identity formation. Webnographic research has some inherent limitations which could be

addressed by adding additional research elements. For example, the results could be

supported by a quantitative study that looks at the issues raised across a larger sample.

Page 83: NASCENT CONNECTIONS 2013

70

References

Brodie, R. J., Ilic, A., Juric, B., & Hollebeek, L. (2013). Consumer Engagement in a Virtual

Brand Community: An Exploratory Analysis. Journal of Business Research, 66(1), 105-114.

Livingstone, S. (2008). Taking Risky Opportunities in Youthful Content Creation: Teenagers'

Use of Social Networking Sites for Intimacy, Privacy and Self-expression. New Media &

Society, 10(3), 393-411.

Seraj, M. (2012). We Create, We Connect, We Respect, Therefore We Are: Intellectual,

Social, and Cultural Value in Online Communities. Journal of Interactive Marketing, 26,

209-222.

Page 84: NASCENT CONNECTIONS 2013

71

The Impact of Gamification on Brand Perception Enhancement

Yang Yang, Antonis Simitiras, Antje Cockrill

The aim of this study is to assess the effect of gamification on brand perceptions. Developing

a conceptual model termed ‘gamification branding’, the purpose is to examine the

gamification determinants using social media (i.e., the engagement in game-playing, the level

of involvement, the enjoyment with the game(s), social communication and gamified design)

as brand perception enhancers. This area is neglected in the literature despite the proliferation

of games and efforts to use them in branding strategies (i.e., see Coca Cola, Nike, IBM etc.).

The importance of gamification and social media in branding has recently recognized in the

relevant literature. Gamification can be considered as a powerful branding strategy for

influencing and motivating consumers. Game-playing branding can also be regarded as an

efficient way of influencing consumers. It has the power to improve customers’ engagement

and enhance brand perception through engagement and involvement, flow experience,

gamified mechanics and content, and personal and social influence. Besides, gamification’s

own distinct characteristics (e.g. fun, multi-media combination, mutual interaction) are

considered advantageous for branding as they attract customers’ attention and appeal to

fundamental human desires such as recognition, rewards, status, achievement, competition,

collaboration, self-expression and altruism. Besides, brand perception (i.e., customer’s ability

to identify a specific brand under different conditions including brand image and brand

associations) has always been considered of great importance for both companies and

customers. Meanwhile, social media today connecst people through sharing of contents,

entertainment and interaction, and offers opportunities for using gamification as a brand

enhancing platform.

This research aims to fulfil the research gap in the ‘gamification branding’, by identifying

gamification factors on brand perception dimensions and deciphering the relationship

between gamification-related factors and brand perceptions. By providing a new theoretical

model and insights of how companies can practically develop specific gamification processes

to enhance their brands, this study aims to make its theoretical and managerial contributions.

Page 85: NASCENT CONNECTIONS 2013

72

HRM at Low Fares Airlines in BRICs: Commitment and Insecurity

Daniel Wintersberger, Alison Pullen, Helen Williams

Abstract

This research seeks to contribute to a better understanding of individual (employee) level

experiences of high performance work systems. By examining these in a ‘BRICs’ context, it

responds to calls in the HRM and comparative industrial relations literature for an increased

focus of attention on the emerging economies. Moreover, by drawing primarily on qualitative

data derived from interviews and focus groups with aviation workers, it makes a

methodological contribution by providing the direly-needed rich data which the ubiquitous

existing large-scale quantitative studies are found to be lacking. Respondents in both

countries link low fares airlines to work intensification, job insecurity, and union decline.

However, in attempts to safeguard employee commitment and discretionary effort, these

airlines are also found to be implementing some elements of high performance work systems.

Labour within such airlines therefore appears to be treated both as dependable and

disposable. Worker experiences of such strategies are discussed with reference to an

alternative, neo-Fordist labour process conceptualisation of high performance work systems.

The sustainability of this approach is questioned from a labour and corporate perspective.

Key words: High performance work systems; neo-Fordism, low cost airlines; HRM; BRICs

Introduction

In an industry where labour still comprises around one third of total operating costs (Doganis

2006: 119), and all other major operating costs (fuel, taxes, airport landing charges) are out of

the direct influence of airline management (Doganis 2006: 125), it is not surprising that low

fares airlines (LFAs) primarily turn to labour in attempts to compete on costs. Due to the pro-

cyclical nature of civil aviation, it is also clear that labour cost-reduction attempts on the side

of airlines primarily aim at making labour as variable a cost as possible, by increasing its

temporal, numerical, financial, and geographical flexibility (Harvey and Turnbull 2012), via

temporary contracts, outsourcing, and performance-based elements of variable pay (Harvey

and Turnbull 2012: 6). As a result of this emphasis on labour flexibility, LFAs are widely

associated with contractual and financial insecurity (Harvey and Turnbull 2012: 27;

Wintersberger et al. 2013).

The low cost airline industry is however also becoming increasingly heterogeneous with

regards to competitive strategy, as some LFAs, given a proliferation of competitors, are

increasingly attempting to pursue a dual source of competitive advantage based on cost

leadership, as well as service quality. Similarly to other service sectors, deregulation of

national civil aviation industries has facilitated a ‘customer victory’ (DuPuy 1999;

Korczysnki 2002: 12), insofar as what is increasingly scarce is the customer, rather than the

product. A common response of European LFAs to increased competition in the low cost

segment has been diversification, with many seeking a dual competitive advantage on cost

and service quality. The result is an increasingly heterogeneous low cost segment, where

some discern as many as four distinctive approaches, ranging from the 'short-haul

Page 86: NASCENT CONNECTIONS 2013

73

fundamentalism' of Ryanair, to the 'hybrid' approach of Air Berlin, which offer most of the

'frills' associated with FSCs, albeit at a lower cost (Harvey and Turnbull 2012: 12). The

theoretical implications of these strategies are subsequently discussed.

Theoretical Background

Given that 'matching models' of HRM predict congruency between a firm’s competitive

strategy and its HRM practices (Beer et al. 1984; Devanna et al. 1984), the low-road labour

utilisation strategies of LFAs, as detailed earlier are not surprising. More specifically, firms

pursuing a ‘cost leadership’ strategy (Porter 1980) are said to be subservient to the product

market logic insofar as their market positioning necessitates rigorous labour cost

minimisation as the primary labour utilisation objective. In a civil aviation context therefore,

matching models of HRM would predict that LFAs first and foremost would adopt ‘hard’

HRM practices, which emphasise direct (Friedman 1977), and process-based managerial

control (Bamberger and Meshoulam 2000), rather than an approach aimed at fostering

employee commitment. The employment contract thus would be expected to be rather

transactional, akin to the ‘market model’ of HRM, outlined by Beer et al. (1984).

Matters arguably become more complex where LFAs concomitantly draw on a cost-

leadership and quality enhancement strategy. Once again, stressing the congruency which

matching models of HRM attribute to the link between competitive strategy and HRM

practices, LFAs, pursuing for example a ‘hybrid’ strategy would be expected to deploy HRM

practices akin to the soft, developmental humanist, rather than hard, utilitarian instrumentalist

model (Storey 1987; Legge 1995), and a workforce that is committed to, rather than just

compliant with organisational goals (Walton 1985).

Southwest Airlines (SWA) is one widely-cited example of an LFA successfully straddling a

concomitant focus on cost-leadership and quality enhancement via high commitment

management (HCM) practices (Gittell and Bamber 2010; Gittell 2003). For example, by

empowering front-line (passenger-facing) employees the airline appears to emphasise

responsible autonomy, rather than direct control (Friedman 1977). Moreover, an emphasis on

outcome, rather than process-based control (Bamberger and Meshoulam 2000) is reflected in

attempts on the side of the airline to 'manage performance broadly', rather than to closely

monitor individual performance (Gittell 2003: 149). The practices deployed by SWA reflect

those advocated in 'best practice' frameworks of HRM (see for example Pfeffer 1998). The

airline has however not only implemented those practices (employee empowerment, high

proportions of performance-based pay) which are potentially conducive to maintaining a

flexible workforce, but also those that would at first glance seem counter-intuitive in an

industry as pro-cyclical and volatile as civil aviation. For example, contrary to the prevailing

labour utilisation trends, particularly in the US market, SWA have also chosen to partner with

trade unions, and to make explicit commitments to employee job security through a strict ‘no

layoff’ (Gittell 2003: 242) policy, which so far has withstood 9/11 and a triple-dip recession.

SWA thus are evidently subscribing to a key notion in the high performance work systems

(HPWS) literature, namely that HRM best practices work better in bundles rather than when

they are individually implemented (MacDuffie 1995).

Page 87: NASCENT CONNECTIONS 2013

74

LFAs in India and Brazil

Contrary to their ailing full service carrier (FSC) counterparts, the recent performance of low

fares airlines (LFAs) in emerging economies has been stellar. In Brazil and India, two BRIC

hotspots of air traffic growth, LFAs now hold a domestic market share of over fifty and

seventy per cent respectively (Wintersberger et al. 2013). In these countries, as was the case a

decade or two earlier in Europe and North America, LFAs have transformed air travel by

allowing an ever-increasing number of travellers access to what was once an unaffordable

luxury for them. Beyond transforming air travel for the wider public, these LFAs arguably

have also introduced changes to working arrangements and terms and conditions with

profound impacts on labour, as later sections will show.

Both in India (IndiGo, SpiceJet, GoAir), and Brazil (Gol, Azul, Webjet, Trip), newly-

emerged LFAs are increasingly engaging in fierce competition with each other, in what, less

so due to market saturation, but more due to infrastructural constraints1 for further flight

capacity expansion (Herszenhaut 2011), is becoming a market with limited short- to mid-term

growth prospects. Therefore, similarly to LFAs in 'mature' aviation markets, Indian and

Brazilian LFAs respond to heightened competition by seeking a dual source of competitive

advantage on cost and service quality. For example, all of the examined LFAs operate with a

generous checked baggage allowance, pre-assigned seating, and provide at least rudimentary

complementary snacks and refreshments on board. Moreover, some Indian LFAs such as

‘IndiGo’ are increasingly encroaching into the mid to long-haul sectors which call for a high

level of service quality.

The focus on the side of Indian and Brazilian LFAs on service quality, according to

respondents is also underpinned by what have been claimed to be somewhat excessive

expectations on the side of their passengers, due to the novelty of air travel as a mass-form of

transportation. While in Europe, some argue that LFA passenger are prepared to 'crawl naked

over broken glass to get low fares'2, In India and Brazil it appears that LFAs (somewhat

cynically it may be argued) have deliberately failed to downwardly-manage passenger service

quality expectations to more closely match the realities of low cost flying. In other words,

LFAs appear to be perpetuating the enchanting myth of customer sovereignty (Korczynski

2002), despite the inherent cost-cutting pressures associated with LFA modes of operation.

This has the consequence that, despite the proliferation of LFAs, 'rudimentary' service

demands on the side of passengers in these countries entail more than just a flight from A to

B:“Crush them on top of each other into a plane with no food? Not with us! (…) Even only

for a few hours. For most of our passengers, flying is a special experience, and they want to

be treated that way” (Cabin crew representative, India).

HRM at LFAs in India and Brazil

As a result of the aforementioned service quality demands, it perhaps comes as expected that

LFAs in both countries appear to be transcending the 'command and control' strategies which

matching models would attribute to firms pursuing a pure cost-leadership strategy. This is

1 India and Brazil lack 'LFA friendly' infrastructure such as secondary airports, and existing airports

are already operating at peak capacity. 2 Ryanair CEO Michael O’Leary in the Telegraph, 2012

Page 88: NASCENT CONNECTIONS 2013

75

reflected for example in work organisation and supervisory styles, where Indian and Brazilian

LFAs appear to be actively pursuing practices that are conducive to eliciting employee

commitment and discretionary effort. These take the form of flat hierarchies, ad-hoc work

organisation, and the facilitation of extensive cross-functional as well as bottom-up

communication and coordination, similar to the 'relational coordination' (Gittell 2003: 25)

found at SWA. More specifically, Brazilian LFAs Azul and Webjet have various informal

‘suggestion schemes’ in place, and operate a management ‘open-door’ policy. As an

alternative to ‘micro-managing’ (interview notes) employees, both LFAs offer substantial

performance-based elements of variable pay. At LFAs in India, sales commission is an

integral component of earnings, while kilometre-based pay for cabin and flight crew

incentivises a maximisation of aircraft utilisation at Brazilian LFAs. Therefore, as 'matching'

models of HRM would predict, Indian and Brazilian LFAs emphasise outcome, rather than

process-based control, and responsible autonomy, rather than direct control.

Employee attitudes towards these practices, superficially at least appear to be positive.

Particularly the ad-hoc work organisation, and substantial degrees of empowerment are found

to be appreciated by the predominantly young employees who view these LFAs as helpful

work experience, and as a favourable alternative to the rigid, bureaucratically-run FSCs (such

as the state-owned Air India) where promotion has been argued by respondents to be slow

and tenure- rather than merit-based. One respondent at Webjet for example proudly

proclaimed that, despite her youth, she was promoted to the role of duty supervisor at check-

in after only one year of job tenure (interview notes). These, at first glance positive employee

attitudes appear to be further nurtured by the airlines in an array of paternalistic practices to

foster employee affective commitment to the firm. Both Azul and rival Brazilian LFA Webjet

for example periodically organise sporting and social events for their employees, breeding an

organisational culture of fun and camaraderie.

However, different employee attitudes are found when scraping beneath the veneer of high

commitment rhetoric. For example, the performance-based elements of variable have been

found to be a mixed blessing, particularly for cabin and flight crew. In this case the

kilometre-based pay is reported to have significantly intensified work pressure, and

reportedly led to an increase in the mutual monitoring of individual performance. A large

proportion of airborne workers, driven by the desire to maximise their contingent pay, report

that they often find themselves “pushing colleagues on the ground to work faster” (interview

notes). Moreover, this policy has created a deep rift between airborne workers and their

colleagues on the ground insofar as the former feel that the latter, due to lack of effort are

depriving them of their variable pay. It strongly appears that this practice, in addition to

leading employees to voluntarily participate in an intensification of their labour process, is

also eroding cross-functional solidarity of labour in a perfect 'divide and rule' (Edwards 1979)

manner.

LFAs also appear to be giving away to cost-cutting pressures by turning to some short-

sighted HRM practices more closely reflecting the hard, utilitarian instrumentalist model

outlined earlier. For example, an emphasis on labour flexibility is reflected in a rise in

temporary employment and high levels of job insecurity. This is where Indian and Brazilian

Page 89: NASCENT CONNECTIONS 2013

76

LFAs appear to depart from the successful trajectory of SWA, an integral component of

which is an explicit commitment to employee job security (Gittell 2003: 242). In both

countries, workers of essentially all functions are recruited only on temporary (usually three-

year) contracts, often with a first year on probation which often is terminated on relatively

minor grounds (interview notes). The emergence of LFAs has also been paralleled by an

increase in agency labour provided by domestic as well as multinational ground-handling

service providers such as Swissport and Servisair. Where FSCs have established low cost

subsidiaries (Air India Express for example), these are usually staffed through a recruitment

agency established by the parent airline through which they can employ staff under inferior

terms and conditions compared to their permanent counterparts. Given such developments, it

is not surprising that in interviews, job insecurity was expressed as a major topic of concern

by respondents. This is similarly reflected in survey responses, where a combined 86.5% of

respondents reported that it is ‘possible’ or ‘very likely’ that they will lose their job over the

next two years (Wintersberger et al. 2013: 28). Both the performance-based elements of

variable pay and the increase in temporary employment therefore arguably constitute an

increase in employee insecurity via a transfer of economic risk from capital to labour (Heery

and Salmon 2000).

Beyond insecurity, a second major topic of concern was the work intensity, where a large

proportion of respondents from LFAs have complained about ‘unbearable workloads’

(Wintersberger et al. 2013: pnr.). In Brazil for example, over 90% of employees at Webjet

reported that their job entails an excessive amount of work, while just over 50% of their

counterparts at full service carrier ‘TAM’ report this (Wintersberger et al. 2013: 10). Both a

quantitative and qualitative dimension can be discerned from respondent complaints about

the issue of work intensity. While the quantitative dimension governs a general acceleration

of the pace of work, the qualitative dimension is closely associated with the substantial

degrees of responsibility vested on labour as a result of the ‘empowerment’ and ad-hoc work

organisation, as well as normative control present within these LFAs. This culminated in one

young duty supervisor at Webjet, who earlier praised the empowerment and promotion

prospects at her airline, breaking out in tears when prompted in an interview to speak about

the issue of work pressure and responsibility.

By offering ‘empowerment’ without commitments to employee job security, the LFAs in

India and Brazil appear to be engaging in a ‘cherry-picking’ of HRM practices to suit their

needs, rather than those of labour. This runs contrary to the aforementioned notion in the

HPWS literature that ‘best practices’ are better implemented in bundles, rather than in an ad-

hoc manner. Perhaps as a result of their ad-hoc implementation, employee level experiences

of such practices appear to be more in line with the neo-Fordist (Palloix 1976) labour process

conceptualisation of the causal link between HPWS practices and firm performance (Ramsay

et al. 2000), which holds that organisational gains from such practices occur not through an

increasingly satisfied workforce, but at the expense of work intensification, job insecurity,

and stress (Harley 1995). The findings therefore lend support to a conflicting outcomes'

model’ (Wood et al. 2012) of high performance work systems which holds that increased

employee stress accounts for positive organisational outcomes.

Page 90: NASCENT CONNECTIONS 2013

77

Conclusions and Implications for Theory and Practice

By concomitantly casualising labour (through short-term contracts and outsourcing), and

eliciting its commitment, it appears that the airlines are attempting to build a workforce

which is as dependable as it is disposable (Hyman 1987). From a managerial vantage point,

the short-run outcomes of this strategy appear to be positive, as exemplified in the operational

and financial success of LFAs detailed earlier. From a labour perspective this practice is

problematic and has only led to rather univocal gains for the airlines, at the expense of

employee wellbeing. Beyond the obvious ethical implications, one must also question the

sustainability of such a strategy with regards to airline operational efficiency as well as flight

safety, given the adverse impacts of employee fatigue, burnout and subsequent concentration

lapses. The well-trodden path of SWA makes for compelling evidence that the low cost

model is not incompatible with ‘mutual gains’, partnership with trade unions, and

commitments to employee job security. LFAs in BRICs are urged to follow this trajectory,

rather than attempting to ‘cherry-pick’ HRM practices for univocal gains.

References

Bamberger, P. and Meshoulam, I. (2000) Human Resource Strategy: Formulation,

Implementation and Impact. Thousand Oaks, California: Sage.

Beer, M., Spector, B., Lawrence, P.R., Quin Mills, D. and Walton, R.E. (1984) Managing

Human Assets. New York: Free Press.

Devanna, M.A., Fombrun, C.J. and Tichy, N.M. (1984) A framework for strategic human

resource management. In Fombrun, C.J., Tichy, N.M. and Devanna, M.A. (eds)

Strategic Human Resource Management (pp.3-18), New York: Wiley and Sons.

Doganis, R. (2006) The Airline Business – 2nd

Ed. Oxon: Routledge

Edwards, R. (1979) Contested Terrain: The Transformation of the Workplace in the

Twentieth Century. London: Heinemann.

Friedman, A. (1977) Industry and Labour: Class Struggle at Work and Monopoly Capitalism.

London: MacMillan.

Gittell, J. H. (2003). The Southwest Airlines way: using the power of relationships to achieve

high performance. New York, McGraw-Hill.

Gittell, J.H. and Bamber, G.J. (2010) High- and low-road strategies for competing on costs

and their implications for employment relations. International Journal of Human

Resource Management, 21(2), pp. 165-179.

Harvey, G. and Turnbull, P. (2012) Development of the Low Cost Model in Europe. Report

for the European Transport Workers Federation, Brussels.

Harvey, G., Turnbull, P., and Wintersberger, D. (forthcoming) ‘Outsourcing the Low Cost

Model.’ Paper to be presented at the Global Value Chains Conference, Birmingham

University, UK.

Heery, E. and Salmon, J. (2000) The Insecure Workforce. London: Routledge.

Herszenhaut, M. (2011) Strategies of Low Cost Airlines in Emerging Countries. London:

Lambert Academic Publishing.

Hyman, R. (1987) “Strategy or structure? Capital, labour and control” Work, Employment &

Society March 1987 1: pp.25-55.

Page 91: NASCENT CONNECTIONS 2013

78

Korczynski, M (2002) Human Resource Management in Service Work. Basingstoke:

Palgrave.

Legge, K. (2005) Human Resource Management: Rhetorics and Realities - Anniversary ed.

Basingstoke, Palgrave.

MacDuffie, J. P. (1995) Human resource bundles and manufacturing performance:

Organizational logic and flexible production systems in the world auto industry.

Industrial and Labor Relations Review, 48(2), pp.197-221.

Palloix, C. (1976) ‘The Labour Process: from Fordism to neo-Fordism’, in: The Labour

Process and Class Strategies, Sage, London.

Pfeffer, J. (1998) The Human Equation: Building Profits by Putting People First. Harvard

Business School Press.

Porter, M. (1980) Competitive Strategy. New York: Free Press

Ramsay, H., Scholarios, D. and Harley, B. (2000) Employees and high-performance work

systems: Testing inside the black box. British Journal of Industrial Relations, 38(4)

pp501-31

Walton, R. (1985) From control to commitment in the workplace. Harvard Business Review,

63(2), pp.77-84.

Wintersberger, D.; Harvey, G.; Turnbull, P. (2013) ‘Development of the Low Cost Model in

India and Brazil’ - Report for the International Transport Workers Federation,

London.

Wood, S., Van Veldhoven, M.,Croon, M. and de Menezes, L.M. (2012) Enriched job design,

high involvement management and organizational performance: The mediating roles

of job satisfaction and well-being. Human Relations, 65(4) pp.419-445.

Page 92: NASCENT CONNECTIONS 2013

79

Barriers of culture, gender and family facing Kuwaiti mothers employed in

high and middle management in the education sector

Al-Suwaileh Mai, Alison Pullen, Sheena Vachhani

Abstract

Since the Second World War, Kuwait has undergone significant changes and made

remarkable economic and political advances due to the discovery of oil and to globalization.

The economic and political changes have enabled Kuwait to become a modern, developed

country. However, despite this modernization and wealth of the country, Kuwaiti society

continues to differ from those of Western countries in terms of the position and status of

women. Many studies have evaluated this contrast between men and women exclusively in

terms of religious injunctions and traditional norms, which are seen as governing conditions

for women. The principal purpose of the present research is to undertake an in-depth

qualitative analysis of the barriers facing employed Kuwaiti mothers, given the complexity of

the interrelations between culture, gender and management in modern Kuwaiti society. It also

seeks to explore work-life balance and the tensions between work and family roles.

Specifically this project has three objectives:

• To examine how Kuwaiti cultural values influence women’s attitudes to work.

• To investigate the challenges facing mothers employed as middle to higher-level managers

because of their gender and to determine how these affect their working lives and the ways in

which they raise their families.

• To explore work-life balance in the Kuwaiti context by focusing on mothers employed as

middle to higher-level managers in the education sector.

The study uses specific concepts to classify the main cultural and gender-related issues

affecting employed Kuwaiti mothers’ working and family lives. It addresses the problem of

work-life balance among mothers employed as managers in the Kuwaiti context in order to

help such employed mothers to succeed in both spheres. A review of literature—on topics

including aspects of employment, women in modern Kuwaiti society, cultural and religious

perspectives, effects on women’s working lives, state incentives for employed Kuwaiti

females, work-family balance, work-family conflict and its negative outcomes—facilitates a

clear and rich understanding of Kuwaiti women’s circumstances and the contradictory roles

that they face when combining work and the care of a large family, following the

modernisation and increased wealth of the country. To assess the relative impacts of the

various elements, a qualitative research methodology will be adopted.

The contribution of this thesis will be to provide new theoretical, empirical and

methodological knowledge surrounding Kuwaiti mothers employed in management roles.

Indeed it is the first thesis to critique Western literature on female managers, motherhood,

work-life balance from a cultural perspective in a Kuwaiti context. Importantly the

Page 93: NASCENT CONNECTIONS 2013

80

interactions between relatively distinct literature will be brought together to investigate the

everyday life experiences of working women from a qualitative perspective.

Keywords: culture, gender, management, mothers, Kuwait

Page 94: NASCENT CONNECTIONS 2013

81

The Influence of Social and Cultural Factors on the Turnover Intentions of

Saudi Female Nurses

Matrah Alkothami, Alison Pullen, Helen Williams

Abstract

The primary purpose of the proposed research project is to review the influence of social

attitudes, sociodemographic, and work-related factors on the turnover intentions of Saudi

female nurses. Special attention will be given to geographical differences (urban vs. rural

hospitals) and how location can influence the turnover intentions of female nurses.

Keywords: nursing turnover intention, Saudi female nurses

Introduction

The nursing profession in Saudi Arabia is experiencing a severe shortage of female nurses,

and healthcare organisations have been attempting to cope with the situation by utilising

foreign nurses (Tumulty, 2001). According to Dr. Sabah Abu Zinadah, Chairperson of the

Scientific Board of Nursing in Saudi Arabia, the turnover among Saudi female nurses has

increased to 50%, which may place the profession in a serious crisis (Zinadah, 2010). Due to

the adoption of sex segregation and the conservative nature of Saudi society, which perceives

the nursing profession as inappropriate for women because it requires them to engage with

men at work,

Saudi Arabian society has a negative attitude toward Saudi female nurses. There are

additional factors that may influence female Saudi nurses, such as sociodemographic and

work-related factors. However, different social and cultural beliefs exist across regions

(Pharaon, 2004), and considering urban and rural areas will provide more useful data and

enhance our understanding of the problem.

Electronic databases were used to conduct keyword searches of the following terms: nursing

turnover, turnover intention, anticipated turnover, intent to resign/leave/quit, and

Saudi nurses. Recent Western and Saudi researches related to the topic were reviewed. The

findings reveal a lack of Saudi studies on nursing turnover. Additionally, the key factors that

influence nursing turnover can be categorised into organizational, work, individual, and

external factors (Takase, 2010). The literature results will be investigated further to reveal

their relationship to the study context and to recommend future studies on nursing turnover.

References

Zinadah, S. (2010). Saudi Female Nurses Turnover reached 50%. Al Riyadh Newspaper.

Retrieved November 20, 2012, from

http://www.alriyadh.com/2010/04/10/article515049.html

Pharaon, N. (2004). Saudi women and the Muslim state in the twenty-first century. Sex roles,

51(5), 349–366.

Page 95: NASCENT CONNECTIONS 2013

82

Takase, M. (2010). A concept analysis of turnover intention : Implications for nursing

management. Collegian, 17(1), 3–12.

Tumulty, G. (2001). Educational needs of nurse administrators in the Middle East. The

Journal of nursing administration, 31(7-8), 386–90.

Page 96: NASCENT CONNECTIONS 2013

83

The analysis of failure data and warranty claims data: A comparison and

some lessons for automotive manufacturers

Patrick Tudor, We Predict, Alan J. Watkins

This paper considers why manufacturers collect and analyse different types of failure data

and the methods used to carry out such analysis. Different types of failure data have unique

characteristics and these are analysed. In particular the paper considers failure data from a

testing environment, and warranty claims data for automotive manufacturers and identify

particular traits of both. Automotive warranty claims data is provided courtesy of We Predict

to help illustrate real examples of warranty analysis.

Keywords: failure data, claims data, claims behaviour, Weibull distribution, non-parametric

distribution

Introduction

In automotive quality analysis, the terms ‘failure’ and ‘claim’ are often used interchangeably

and, for the most part, are assumed to mean the same. This is, to an extent, understandable

because for the majority of the time, it is a vehicle component failure that leads to a claim

being made, and hence the two processes go hand in hand. For example, a headlight bulb in a

six month old vehicle blows, the customer realises the light is no longer working and returns

the vehicle to the dealer to have the bulb replaced at the expense of the manufacturer. In this

case, the bulb blowing is the failure and the customer returning the vehicle to their chosen

dealership to have the bulb replaced is the claim. It could be reasonable therefore to assume

that a claim refers to a component failure and a component failure will lead to a claim, and

therefore the two should be treated in the same way with regards to analysis. However it is

naive to assume this. Failures and claims have individual behavioural traits that make the two

processes very different on certain levels. A distinction between the two becomes very

important when there is a need to analyse the behaviour of a component for quality or cost

issues. An engineer may wish to consider the lifetime of the component to identify areas of

excessive load or fatigue in order to improve quality for future versions, whereas a manager

may want to know about the cost of the component, i.e. the claims pattern, during the lifetime

of the host vehicle for budgeting purposes. This is an important point to make, because

current industrial analysis doesn't always distinguish differences between the two processes

when attempting to model component behaviour.

In this paper we hope to describe some of these characteristics of failures and claims, and

demonstrate two comparative ways to model data.

Why Do We Consider Failures?

Testing and subsequent failure analysis are important to manufacturers for a number of

reasons. Testing programs are established for individual components, component sub-systems

and even full vehicles to provide accelerated testing and hence test and failure data,

simulating the conditions experienced during a 10-15 year vehicle lifespan. Failure analysis

Page 97: NASCENT CONNECTIONS 2013

84

of failed components provides understanding of the failure modes involved. Detailed

understanding of the product lifetime and failure modes allows components that are under or

over engineered to be identified, i.e. insufficient lifetime, or excessive lifetime respectively.

Table 1 gives improvement examples to under and over designed components.

Level of Engineering Design Improvement Examples

Under Design Selection of improved materials to increase life

Increase in component dimensions to reduce stress

Change in component shape or function to cope with stress and

environment for under designed components

Over Design Selection of cheaper materials for cost saving

Reduction in component dimensions to reduce weight

Reduce functionality of the component to simplify production and

reduce cost

Table 1: Examples of design improvements for different levels of engineering

Failure Data and Its Analysis

A failure occurs when a component can no longer perform a task to a required standard. This

results when challenges to the component outweigh the capacity of the product (Modarres,

Kaminskiy & Krivstov, 2010). Conditions exposed to the product can both increase or

decrease the challenges to the component and the capacity of the product. Table 2 gives

examples of challenges, capacity and conditions.

Factor

Capacity (Internal Factors):

Design and material selection

Challenges (External Factors):

Operational conditions

Local environment

External environment

Examples

Tolerance, yield point and UTS, toughness,

fatigue strength, corrosion resistance.

Static loading and fatigue loading, User

miss-use and road damage.

Operating and ambient temperature,

humidity and corrosive environment.

Table 2: Factors influencing failures of components

Component test data is recorded during a component testing program where parts are tested

to a set number of cycles or time or are tested to failure. Where failure occurs the age at

failure (e.g. hours, days, months, years) or usage at failure (e.g. mileage, cycles, revolutions)

is recorded, as are the test conditions i.e. static or dynamic loading applied, loading rate,

temperature and humidity cycles and any corrosive environments the component was

exposed to up to and at the point of failure.

Collecting failure data in this way is vital for correct component design but is expensive and

time consuming. To allow component development and hence vehicle launch in the required

time frames specified by the Original Equipment Manufacturer’s (OEM) test programs have

Page 98: NASCENT CONNECTIONS 2013

85

to be carefully designed and controlled to get the maximum amount of information from a

relatively limited number of tests.

There are many different parametric distributions used to model data in reliability analysis.

Some have very specific applications, whereas others are used to model a variety of data for a

range of problems. In this paper we concentrate on one of the most popular parametric

distributions; the Weibull distribution, which is widely used in industry for modelling

lifetimes of units and components. This is due to its flexibility and ability to generalise

certain distributions (Exponential) and resemble others (Log Normal) with appropriate

parameters values. The Weibull cumulative distribution (cdf) function is given as

( ) [ (

)

]

where , is the time or usage at failure and β and α are shape and scale parameters

respectively; see, for instance, Modarres, Kaminskiy & Krivtsov, (2010). The choice of shape

and scale parameter values changes the shape and location of the distribution and estimates of

these parameters will depend on data values. We use maximum likelihood estimation (MLE)

to estimate parameters for each set of data.

Example 1

Table 3 contains a well-known failure dataset detailing the millions of revolutions to failure

of a sample of 23 ball bearings. It provides a suitable simple example for fitting the Weibull

distribution. Using MLE, we find that the shape and scale parameter estimates are

and respectively. Figure 1 shows the resulting plotted Weibull distribution

compared to the empirical ball bearing data. The Weibull distribution seems to be a

reasonable fit to the data, and can be used to make inferences on the parent population.

17.88 28.92 33.00 41.52 42.12 45.60

48.48 51.84 51.96 54.12 55.56 67.80

68.64 68.64 68.88 84.12 93.12 98.64

105.12 105.84 127.92 128.04 173.40

Table 3: The millions of revolutions to failure of 23 ball bearings (Caroni, 2002)

Page 99: NASCENT CONNECTIONS 2013

86

Figure 1: The Weibull distribution (line) modelling 23 ball bearing lifetime values (dots).

Censored Data

It is often not realistic to wait for all units to fail during testing. The testing may only last for

a pre-specified amount of time, which some units may surpass prior to failure, and hence the

time at failure can only be estimated for these units. For example, if we consider the ages of

vehicles at failure during the three year (1095 days) warranty coverage period. A vehicle in

this set may be yet to fail when it reaches an age of 1095 days, but we know that it has an age

of at least 1095 days when it does eventually fail. This is an example of censoring. We can

adapt our parameter estimation methods to allow Weibull to take censoring into account.

Limitation of Failure Data and the Use for Claims Data

Ideally, failure data would be used to determine component quality, but, as noted, it is

expensive and difficult to collect in order to offer any real quality insight. Field failure data,

often collected through warranty claims, provides an alternative and readily accessible source

of component reliability information. Component failures in the field need to be repaired in

order for the product to perform satisfactorily. Most products come with a warranty coverage

period and in the event of a repair the costs are charged back to the OEM as a warranty claim.

Repairs made outside the warranty coverage period are normally charged to the customer.

Warranty claims data typically contains information on the product under repair, the type of

repair and the parts used, the cost of the repair, and who performed the repair and hence

submitted the claim (i.e. a dealership). Included in the product information are both age and

usage values, which provide insight into the age and usage of the product at failure and can

hence be used in a similar way to the failure values recorded in component testing.

Example 2

Figure 2 shows the cumulative population claims percentage of 14 parking brake cable claims

from a population of 30,056 of a particular make and model of vehicle at 24 months after the

vehicle was released. A Weibull distribution has been fitted to the 14 claims and the vehicle

population by incorporating censoring. This allows us to extrapolate to a chosen point in time

to determine a projected claims rate. In this example, the projected claims rate at three years

is 0.08%. The shape parameter also indicates a decreasing ( ) or increasing ( )

Page 100: NASCENT CONNECTIONS 2013

87

failure rate. Here, and so claims are assumed to be decreasing. Although this

example uses 24 months’ worth of data, projections are often made even earlier.

Figure 2: A Weibull distribution (line) fitted to 14 parking brake cable claims (dots) for

30,056 vehicles at 24 months after the vehicle is released. Maximum likelihood estimates of

β and α are and 14,704,850.68 (days) respectively.

Modelling With Empirical Data

An alternative method of modelling data is to use the empirical data as the model, and

building these models is trivial. This method is referred to as ‘non-parametric’ since it

doesn’t require fitting a parametric distribution to the data.

Example 2 (Continued)

Figure 3 shows the cumulative claims distribution of Parking Brake Cable claims made for a

particular make and model of small family cars (this dataset is the completed claims dataset

for the claims used earlier in this example). The warranty coverage period of these vehicles is

three years (1095 days). In total, there are 150 claims in this dataset. The distribution has

some interesting features. Over 80% of all claims are made during the final 9 months of

warranty coverage. This is almost certainly the result of vehicle dealerships discovering and

proactively repairing any failing parking brake cables during the vehicle’s final service before

warranty expires. The customers are not aware of any such problem and, as a result, have not

reported an issue beforehand, indeed, the brake cable may still be working, but a claim has

been made anyway. After the three year warranty coverage, there are only a few further

claims made, and this is due to dealer goodwill. The claims after three years are no longer

representative of the population.

Page 101: NASCENT CONNECTIONS 2013

88

Figure 3: The complete non-parametric cumulative population claims percentage for 150

parking brake cable claims made on a group of cars with three years warranty coverage.

Figure 3 shows that the pattern of disclosed claims is not consistent with actual failure

disclosure. The customer and dealer behaviour towards the end of warranty coverage

disguises true failure behaviour, and the few claims experienced after warranty coverage are

not representative of the population, since many equivalent claims will now be charged to the

customer instead.

From further study with We Predict’s automotive data, some general remarks about claims

data can be made:

OEMs are at the mercy of their customers and dealers for disclosing component

failures. This often results in delayed failure disclosure.

Claims cluster around service intervals and end of warranty services. The process of

reporting claims is therefore predictable for different types of repairs.

The local environment affects claims behaviour. Weather conditions can determine

when a claim is reported and different demographics have different attitudes towards

warranty.

Results and Discussion

Figure 4 compares the reported claims and projected claims rate from Example 2 with what

actually happened in terms of claims rate once all the claims had been reported.

The estimated claims rate after 24 months was 0.08%, but turned out to be 0.44%. This small

difference in probabilities equates, in a large population of vehicles, to a substantial

difference in the number of claims experienced: in this case, there is an under-allowance of

108 claims. If an average Parking Brake Cable claims costs $120, the OEM is under-

budgeting by $12,960 for just one component. As there are hundreds of possible component

repairs on a vehicle, it is easy to see that inaccurate claims rate projections can seriously

impact warranty budgeting.

Clearly the claims behaviour seen in Figure 3 has a substantial impact on the eventual claims

rate at the end of the three year warranty coverage period, and since there is no warning

Page 102: NASCENT CONNECTIONS 2013

89

during the first two years of coverage about this late claims behaviour, Weibull has no way of

making allowances for this in its projections.

Figure 4: A comparison of a Weibull distribution claims rate projection (0.08%) after 24

months in service (line and dots) and the eventual claims rate once warranty coverage had

finished (0.44%) (triangles).

Study of automotive claims data shows a clear customer effect on the disclosure of failures,

with claims behaviour for components often consistent from model year to model year.

Therefore, creating non-parametric distributions of historic claims behaviour can give

valuable insight into current component claims and can help make more accurate claims rate

projections for current model years. This inevitably has a significant effect on a

manufacturer’s ability to budget accurately for warranty spend and the benefits that go with

this.

Acknowledgements

We wish to thank We Predict for allowing the use of warranty claims data and for reviewing

initial drafts of this paper. We also wish to thank two anonymous referees from Swansea

University for their generous comments and feedback.

References

Caroni, C. (2002) The Correct “Ball Bearings” Data. Lifetime Data Analysis, 8, 395-399.

Modarres, M., Kaminskiy, M. & Krivtsov, V. (2010). Reliability Engineering and Risk

Analysis, Second Edition. Boca Raton: CRC Press.

We Predict. www.wepredict.co.uk

Page 103: NASCENT CONNECTIONS 2013

90

Ali Alawan

Mohammad Alryalat

Kawaljeet Kapoor

Sian Miller

Nripendra Rana

Francesca Sibbald

Emma Slade

Richard Warr

Daniel Wintersberger

Other contributors: Fatmah Alatawi, Khalid Alhamzi, Wassan Alkhowaiter, Matrah

Alkothami, Mai Alsuwaileh, Abdullah Baabdullah, Patrick Tudor, Yang Yang.

Contributors