62 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
ABSTRACTIn the Business Intelligence Systems (BIS) use context, the well-researched dimension of intensity of use is not broad enough to capture its meaningful use. The authors therefore investigate the whole spectrum of its use that encompasses effective utilization. The post-adoption research of Information System (IS) use is still under-researched; the study therefore brings novel insights to this area. The authors have conceptualized three dimensions of BIS use that capture the intensity of BIS use, the extent of BIS use, and BIS embeddedness. Confirmatory Factor Analysis (CFA) was used to determine convergent and discriminant validities proving construct validities, based on survey data gathered from BIS users in medium and large sized organizations. The results of our study provide sound evidence for apprehending these three constructs as different concep-tualizations. This work adds to the literature by emphasizing the role of post-adoptive behavior that can lead to greater and effective utilization in the studied BIS environment, and potentially to a better organizational performance.
Three Dimensions of Business Intelligence
Systems Use BehaviorTanja Grublješič, Academic Unit for Business Informatics and Logistics, University of
Ljubljana, Ljubljana, Slovenia
Jurij Jaklič, Academic Unit for Business Informatics and Logistics, University of Ljubljana, Ljubljana, Slovenia
Keywords: Business Intelligence Systems (BIS), BIS Use, Embeddedness of Use, Extent of Use, Intensity of Use
INTRODUCTION
The research stream examining adoption and acceptance is one of the richest and most mature streams in the IS field (e.g. Davis, 1989, Ven-katesh & Davis, 2000; Venkatesh, Morris, Davis & Davis, 2003; Venkatesh & Bala, 2008). But, in contrast, post-adoptive use behavior is still under-researched, and often conceptualized as increasing intensity or greater frequency of use (Jasperson, Carter & Zmud, 2005). Some efforts
have already been made and show that post-adoptive use behavior may also diminish over time with gained experience (Bhattacherjee, 2001), or on the other hand become habitualized and routinized in individuals’ work routines (Jasperson et al., 2005). Undoubtedly, research on technology acceptance and initial use can enrich our understanding of post-adoptive use behaviors (Hernandez, Jimenez & Martin, 2008), but distinctions between pre- and post-adoptive beliefs and behaviors have already
DOI: 10.4018/ijeis.2014070105
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014 63
been observed (Agarwal & Karahanna, 2000). Understanding the three different dimensions of effective use in a specific BIS utilization context is central to this work. Deng and Chi (2013) argue that the Business Intelligence (BI) application context offers an ideal opportunity to examine a variety of post-adoptive system uses.
In the IS literature, the positive impact of the information provided by Business Intelligence Systems (BIS) on decision-making has been emphasized, particularly when organizations operate in highly competitive environments (Popovič, Hackney, Coelho, & Jaklič, 2012; Harison, 2012). These technological innova-tions are one of the main sources of competitive advantage for the long-term survival of orga-nizations (Jourdan, Rainer & Marshal, 2008), although their benefits can only be fully realized in situations where these promising innova-tions are completely accepted and effectively used. User acceptance is also crucial to BIS success, but in this context, in contrast with operational information systems (IS), there is a particularly pronounced difference between using or accepting the system and long-term routinization (Bhattacherjee, 2001) of the use of information provided by the system as part of management of the organization and business processes (Popovič et al., 2012).
There are two motivations for this study. First, previous research in the field of IT ac-ceptance has mainly focused on general IS and thereby only considered the narrower aspect of use, merely the frequency of use and not how IS is used (Davis, Bagozzi & Warshaw, 1989; Venkatesh & Davis, 2000; Venkatesh & Bala, 2008), treating system use simply and solely as a measure of the relevant behavior consequent to technology acceptance. This work represents a step in the direction advocated by Jasperson et al. (2005) who call for richer conceptualizations of system use by also treating system use as a theoretical construct. Second, it also responds to the call by Burton-Jones and Straub (2006) to develop the conceptualization of usage and select usage constructs and measures for specific contexts. The specific features of BIS use as compared to operational IS motivate the three
conceptualizations of BIS use. For BIS it is important if BIS are deeply embedded within the business (Shanks et al., 2012). Therefore, BIS use behavior should be measured by several dimensions to yield a rich understanding of its utilization. In addition to quantitative measures of how much a BIS is used (frequency or dura-tion) (Davis et al., 1989), we are also interested in a qualitative measure of how a BIS is used in the organization. The aims of this study are therefore to:
• Conceptualize and develop relevant mea-sures for the three constructs of BIS use behavior, namely intensity, extent, and embeddedness; and
• Empirically test and evaluate the construct reliability and validity of these three con-ceptualizations of BIS use.
The structure of the paper is as follows. In the next section, the specifics of BIS and the three conceptualizations of its use are elaborated. Further on the research design, methodology, and results of the estimations are given. This is followed by a discussion of the results, including the implications for research and practice, and a conclusion.
SPECIFICS OF BIS USE
There are many definitions of BIS, but all of them state that BIS provide the ability to analyze business information in order to support and improve management decision-making across a broad range of business activities (Elbashir, Collier & Davern, 2008; Yeoh, Koronios & Gao, 2008). Their growing strategic importance is seen from the rising volume of investments in BIS (Gartner Research, 2013) which empha-sizes the need to give them greater attention in research studies.
To study the use of BIS, one must un-derstand the specific characteristics of BIS as compared to operational or transactional IS, particularly in the post-technology adoption phase. BIS are different from operational IS
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
64 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
from the use point view in several respects. The use of BIS is mostly voluntary, whereas for operational IS the use is mostly manda-tory or necessary for carrying out the business processes. Soltani, Elkhani & Bardsiri (2014) already identified the importance of volun-tariness of use and user’s willingness to use when studying continued IS usage behavior. In general, compared to operational IS the benefits of BIS are much more indirect and long-term (Gibson, Arnot & Jagielska, 2004) which may negatively affect their perceived usefulness and consequently their acceptance and use. The structuredness of the information needs and processes within which an IS is used, and the structuredness of instructions for using the BIS is much lower since the use is usually more research-oriented and innovative in nature based on performance management (Popovič et al., 2012; Mouakket, 2010). Concerning the problems of the quality of information with information provided by operational IS, the focus is primarily on traditional problems of data quality (accuracy, completeness, etc.), while with BIS it is primarily a question of the relevance of the information provided by a BIS because a key problem of information quality in unstructured business processes is providing relevant information to managers (Delone & McLean, 2003; Eppler, 2006; Mandal, 2006). All these specific characteristics of BIS sug-gest the need for an expanded definition of its use in order to capture the whole spectrum of effective BIS utilization.
CONCEPTUALIZATION OF THE THREE CONSTRUCTS OF BIS USE
To ensure the better performance of the or-ganization and the value added of BIS users should accept, use and take full advantage of their capabilities. Understanding the effective use (Burton-Jones & Grange, 2013) of BIS is thus “critically important” (Straub & Guidice, 2012, p. iii) for achieving their designed goals and benefits. According to Burton-Jones and
Grange (2013, p. 636), effective use at the individual level is defined as “using a system in a way that helps attain the goals for using a system”.
As the objects of use investigation in accep-tance models have mostly been operational IS, where using an IS is seamlessly integrated with execution of the business process, the use of IS has primarily been measured by the frequency, intensity, and duration of use (e.g. Davis et al., 1989). However, for BIS use these measures are not enough since, for BIS to be effectively used, mere intensity does not reflect the desired and promised outcomes of these systems as it is central for them to be deeply embedded within the business (Shanks et al., 2012). The issue of the intensity of use not capturing the breadth and depth of BIS use leading to their success was also raised by practitioners in BIS use case study research (Grublješič & Jaklič, 2014). Frequency and duration of use do not capture the difference between successful or meaningful use and unsuccessful time spent using the system (Doll & Torkzadeh, 1989; Deng & Chi, 2013).
Moving from the use to the effective use of BIS requires an understanding of the nature and purpose of BIS. Burton-Jones and Straub (2006) elaborate that in IS for the decision-making domain researchers typically study IS characteristics that improve user decision-making. Thus, informed action is necessary for effective BIS use in the sense of acting upon the information obtained from BIS (See-Pui Ng, 2012). We therefore employ Burton-Jones and Straub’s (2006) dimensions of system us-age measured as the use of information from BIS, which are the frequency or intensity of use, the extent of use, and the nature of use. The embeddedness of BIS encompasses the preferred or desired nature of use.
Intensity of BIS Use
The intensity of use is the dimension most commonly used in the literature to measure the usage of IS (Davis et al., 1989; Venkatesh & Davis, 2000; Venkatesh et al., 2003; Venkatesh
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014 65
& Bala, 2008; Venkatesh, Brown, Maruping & Bala, 2008). Ideally, the intensity of use should be understood as “cognitive absorption” which Agarwal and Karahanna (2000) use to charac-terize the “extent to which a user is absorbed when using a system”. But this dimension of use has most often been conceptualized and operationalized as the frequency or duration, based on users’ self-assessment of the time spent on using a system or the duration of their usage via system logs (Taylor & Todd, 1995). These conceptualizations only capture the quantitative aspect of how long the system is used, overlooking any unsuccessful time spent using a system or if an employee has actually completed a business task by using the applica-tion (Deng & Chi, 2013). Unproductively lost time using a system may negatively impact the task performance of an individual, certainly leading in the opposite direction of organizations reaping benefits from system implementation.
Extent of BIS Use
The extent of BIS use should capture the “extent to which the user employs the system to carry out the task” (Burton-Jones & Straub, 2006, p. 233). In the post-adoption context, more use is not always considered desirable. There is a plethora of social and economic impacts at the level of the individual, the work group, and the organization which are not only captured by the intensity of use measure (Doll & Torkzadeh, 1998). The value of BIS is not solely generated by the use of BIS, but by activities based on the information provided by BIS that are go-ing in the right direction to achieve successful business performance management (Popovič et al., 2012). Therefore, it is important for BIS use whether users are acting on the basis of the information provided by BIS.
In the BIS context there is a need for multidimensional measures of how extensively a BIS is utilized in an organizational context for different tasks. We therefore employ and operationalize this dimension by adapting Doll & Torkzadeh’s (1998) measures captur-ing the utilization of BIS for decision support (problem-solving and decision rationalization),
work integration (horizontal and vertical inte-gration), and customer service functions. The decision support function relates to improving the decision-making process, and making sense of the data, thus amplifying creative judgment in problem-solving. The horizontal and vertical in-tegration function captures the communication and coordination of work activities with others in the organization. Finally, the customer service function involves creating value for customers by improving customer service (Hirschhorn & Farduhar, 1985). This multidimensional concept of system use “identifies key performance-related usage behaviors” (Doll & Torkzadeh, 1998, p. 173) capturing the social and economic impacts of BIS in the organizational work envi-ronment. Doll & Torkzadeh (1998, p. 172) state that “how extensively IT is used to perform these functions defines how effectively it is used in the organizational context”. In relation to this, Po-An Hsieh and Wang (2007) introduce the term “extended use” that refers to using several of the complex system’s features to support an individual’s task performance.
Embeddedness of BIS
Embeddedness represents a qualitative leap in use and can be understood as the level “to which the use of BIS is an integral part of organizational activity” (Furneaux & Wade, 2011, p. 579). Embeddedness has been conceptualized and named in several different ways in the literature.
Cooper & Zmud (1990) say that, from the technology diffusion perspective in the post-adoption phase of the stage model of IT implementation, use should evolve from initial acceptance through the routinization phase to infusion. ElSawy (2003) says the fusion of BIS evolves when the BIS and business correspond to the “oneness-with-environment property”. In the context of BIS, according to Shanks et al. (2012) fusion involves deeply embedding BIS within the business to create “BI-driven decision-making routines and BI-enabled organizational processes that take managerial decision making to new levels of understand-ing and foresight”. Burton-Jones and Straub (2006, p. 236) conceptualize the dimension
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
66 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
of deep structure usage as exploitive system usage, which can occur in the way a person restructures information or in any other way that evokes interesting new ways of seeing. In connection to this, Straub and Guidice (2006) also introduce the notion of transformative uses of systems which are rarer and different and occur when users utilize the IS capabilities to create something new, an invention, or a new perspective. Jasperson et al. (2005) elaborate that much post-adoptive behavior or continuing IT use is likely to reflect a “habitualization of action, where the decision to use the IT applica-tion feature occurs more or less automatically via a subconscious response to a work situation” and Ortiz de Guinea and Markus (2009) sup-port this habitual and automatic use. Limayem, Hirt and Cheung (2007) further argue that more comprehensive usage of IS is more likely to become habitual and that habitual IS usage is also less prone to discontinuance.
All these conceptualizations imply that after having successfully integrated IS within the organizational environment, the breadth and depth of IS use can create synergies,
leading to gained competence, the creation of a competitive advantage and ultimately an organization’s better performance. Since BIS provide innovative and competitive information (Elbashir, Collier & Sutton, 2011) usage that is deeply embedded into the routines of workers can enhance these organizational goals.
Figure 1 presents a conceptualization of the three dimensions of BIS use capturing the effective use of BIS.
RESEARCH DESIGN AND METHODOLOGY
In the following we describe how the data and results were obtained by explaining the research design, the data collection, and the methodology used for analyzing the data.
Research Instrument
Our questionnaire was developed by building on previous theoretical bases to assure content validity. To ensure face validity, pre-testing was conducted using a focus group involving
Figure 1. Conceptualization of the three constructs of BIS use
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014 67
selected university staff and IS academics from the field who were not included in the subsequent research. Minor changes were made based on their suggestions, mostly involving adaptation of the questionnaire items to suit the specific context of BIS use. We used a structured ques-tionnaire with seven-point Likert scales, with anchors ranging from totally disagree (1) to totally agree (7) for the items used to measure the intensity of use and embeddedness of BIS, while the extent of BIS use was measured with anchors from not at all (1) to a great deal (7).
Measurement Items
The measurement items were developed based on the literature review and supported by expert opinions. Use behavior was measured as a reflective composite index of three di-mensions capturing the intensity, extent, and embeddedness of BIS use, following Burton-Jones and Straub’s (2006) classification. The three intensity of use items were adapted from Wixom and Todd (1995), capturing the increas-ing intensity of BIS use. Extent of BIS use was measured by adapting Doll and Torkzadeh’s (1998) measures. Each concept was measured with three item scales having the highest fac-tor loadings (Doll and Torkzadeh, 1998). No established measures were specifically available for measuring embedded use. Nevertheless, Shanks et al. (2012) provide three dimensions for embedding BIS into the organization, which were used to operationalize embedded BIS use, capturing whether the use of BIS is seamlessly integrated with business process execution, whether the BIS is embedded into the decision-making routines of decision-makers across the organization, and whether the importance and use of insights from the BIS are embedded within the business strategy formulation pro-cess, leading to the alignment of the BIS and the business strategy (Shanks et al., 2012). All three manifest items had large factor loadings in the confirmatory factor analysis, proving the reliability and validity of these measures for the BIS embeddedness construct. Table 1 provides a detailed list of all the indicators used in the measurement model.
Data Collection
The empirical data were collected through a survey of 2,173 medium- and large-sized busi-ness organizations in an EU country, namely Slovenia. Organizations were selected from an official database published by the national Agency for Public Legal Records and Related Services. The questionnaires were addressed to a wide range of employees, that is, all BIS users (top management, heads of departments and divisions, IS managers, etc.). The question-naires were sent to the contact persons available in the database, with a request to distribute the questionnaires to relevant users of BIS. A total of 195 completed surveys was collected after a follow-up round. The final response rate was 9.3%.
Data Analysis
The measurement model specifies the re-lationships between the indicators and the latent variables. Our measurement model is reflective, which means that “the direction of causality is from the construct to the indicators; thus observed measures are assumed to reflect the variation in the latent variable” (Henseler, Ringle & Sinkovics, 2009, p. 289). Each in-dicator therefore represents an error-afflicted measurement of the latent variable. Changes in the constructs are expected to be manifested in changes in all of their indicators (Nunally & Bernstein, 1994).
To conduct the data analysis, particularly the factorial validity, a Confirmatory Factor Analysis (CFA) was used where the pattern of loadings of the measurement items on the latent constructs is specified explicitly in the model (Gefen & Straub, 2005). Factorial valid-ity is important in the context of establishing the validity of latent constructs because these are research abstractions that cannot be mea-sured directly (variables such as beliefs and perceptions) (Gefen & Straub, 2005). Practice dictates that latent variables can be measured indirectly through several items in a research instrument (i.e. Anderson & Gerbing, 1988; Gefen & Straub, 2005). Each measurement
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
68 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
Table 1. Indicators of the measurement model
Use of BIS
INTENSITY OF BIS USE IU1 I use BIS as a routine part of my job.
IU2 I use BIS at every opportunity.
IU3 I have been increasingly using BIS.
EXTENT OF BIS USE
DECISION SUPPORT:
Problem-solving PS1 I use BIS to help me think through problems.
PS2 I use BIS to make sure the data matches my analysis of problems.
PS3 I use BIS to check my thinking against the data.
Decision rationalization:
Explaining decisions ED1 I use BIS to help me justify my decisions.
ED2 I use BIS to help me make explicit the reasons for my decisions.
ED3 I use BIS to rationalize my decisions.
Improving decisions ID1 I use BIS to control or shape the decision process.
ID2 I use BIS to improve the effectiveness and efficiency of the decision process.
ID3 I use BIS to make the decision process more rational.
WORK INTEGRATION:
Horizontal integration HI1 My work group and I use BIS to coordinate our activities.
HI2 I use BIS to coordinate activities with others in my work group.
HI3 I use BIS to exchange information with people in my work group.
Vertical integration:
Work planning WP1 I use BIS to help me manage my work.
WP2 I use BIS to monitor my own performance.
WP3 I use BIS to get feedback on job performance.
Vertical communication VC1 I use BIS to communicate with people who report to me.
VC2 I use BIS to communicate with people I report to.
VC3 I use BIS to keep my supervisor informed.
CUSTOMER SERVICE CS1 I use BIS to serve internal and/or external customers.
CS2 I use BIS to improve the quality of customer service.
CS3 I use BIS to more creatively serve customers.
BIS EMBEDDEDNESS EMB1 Use of BIS is seamlessly integrated with business process execution. Processes in which there is an information need for analytical decision-making are carried out without interruption due to the use of BIS.
EMB2 BIS is embedded into the decision-making routines of decision-makers across the organization.
EMB3 The importance and use of insights from BIS are embedded within the business strategy formulation process, leading to alignment of the BIS and the business strategy.
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014 69
item is thus assumed to reflect one and only one latent variable.
The fit of this pre-specified model is examined to determine its convergent and dis-criminant validities since these are components of the larger scientific measurement concept of construct validity. This factorial validity deals with whether the pattern of loadings of the mea-surement items corresponds to the theoretically anticipated factors (Gefen & Straub, 2005). The estimations were performed using Smart PLS (Ringle, Wende & Will, 2005).
RESULTS
We examined the reliability and validity mea-sures for our reflective measurement model.
Measurement of Reliability and Convergent Validity
The results of the reliability and convergent validity test can be seen in Table 2. First, the loadings of the items were tested against the value 0.7 (Hulland, 1999) on the construct being measured and, as can be seen from the results, all the loadings were satisfactory. Further, all of Cronbach’s alphas by far exceeded the 0.7 threshold (Nunnally & Bernstein, 1994). With-out exception, the latent variables’ composite reliabilities are higher than 0.8 and in all cases even higher than 0.9 (which are the thresholds for more advanced stages of research), showing the high internal consistency of the indicators measuring each construct and thus confirming construct reliability (Nunally & Bernstein, 1994). As suggested by Fornell and Larcker (1981), the Average Variance Extracted (AVE) was used as a criterion of convergent validity. The AVE is higher than 0.6, thus exceeding the threshold of 0.5 (Fornell & Larcker, 1981), demonstrating the convergent validity of the constructs. The reliability and convergent valid-ity of our model were also confirmed by com-puting standardized loadings for the indicators and Bootstrap t-statistics for their significance (also see Table 3). All standardized loadings of
the indicators exceeded (or were marginal to) the 0.7 threshold and without exception were found to be significant at the 0.001 significance level, thus confirming the high indicator reli-ability and convergent validity.
Measurement of Discriminant Validity
The discriminant validity is shown by the following two procedures: (1) a comparison of the item cross-loadings with the construct correlations (Gefen & Straub, 2005); and (2) a determination of whether each latent variable shares more variance with its own measurement variables or with other constructs (Fornell & Larcker, 1981; Chin, 1998).
The assessment of the indicator loadings on their corresponding constructs is the first procedure for testing the discriminant validity. In Table 3, the figures shown in bold indicate manifest variable correlations with their theo-retically assigned latent variables that are an order of magnitude larger than other loadings on other constructs (Gefen & Straub, 2005). Since the loadings in bold are larger than the other values in the same rows, that is the cross-loadings (Henseler et al., 2009), all the item loadings met the criteria of the first procedure for assessing discriminant validity.
In the second procedure we compared the square root of the AVE for each construct with the correlations with all other constructs in the model (see Table 4). Theory suggests that the square root of the AVE of each construct should be much larger than the correlation of the spe-cific construct with any of the other constructs in the model (Chin, 1998) and should be at least 0.50 (Fornell & Larcker, 1981). It can be observed that all of the square roots of the AVE are significantly higher (and also substantially larger than the threshold) than the correlations between the constructs, thus confirming that they are sufficiently discriminable. Based on the results of both tests, we conclude that all the constructs show evidence of acceptable validity.
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
70 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
DISCUSSION WITH IMPLICATIONS FOR RESEARCH AND PRACTICE
Understanding the three conceptualizations of BIS use (intensity, extent, and embeddedness) responds to the calls of Burton-Jones and Straub
(2006) and Burton-Jones and Grange (2013) to develop the conceptualization of usage and select usage measures for specific contexts. The rich measurement of different types of usage reacts to the observation of Jasperson et al. (2005, p. 544) that researchers have examined use “quite simplistically in terms
Table 2. Reliability and validity measures of the measurement model
Constructs Indicator Initial model Estimates
Loadings t-Values Cronbach’s Alpha
Composite reliability
Average Variance Extracted
Intensity of BIS use IU1 0.8970 32.8202 0.8879 0.9304 0.8168
IU2 0.9304 92.7760
IU3 0.8833 26.1379
Extent of BIS use PS1 0.7569 17.2411 0.9738 0.9757 0.6577
PS2 0.8435 30.3366
PS3 0.8473 32.7674
ED1 0.8261 23.2312
ED2 0.8764 38.4005
ED3 0.8713 36.4255
ID1 0.8779 41.0467
ID2 0.8758 37.6814
ID3 0.8853 42.8322
HI1 0.8205 25.8931
HI2 0.8212 23.4496
HI3 0.8210 22.6901
WP1 0.7749 14.3216
WP2 0.7397 18.5075
WP3 0.7387 17.5119
VC1 0.7316 15.0580
VC2 0.7485 14.4860
VC3 0.7616 15.1343
CS1 0.7800 19.5023
CS2 0.8044 21.4949
CS3 0.7955 21.1395
BIS embeddedness EMB1 0.8891 35.3388 0.9123 0.9450 0.8514
EMB2 0.9513 83.1864
EMB3 0.9266 54.0618
Note: t-statistics values above 3.29 show statistical significance at p<0.0001
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014 71
Table 3. Comparison of the item cross-loadings
Indicator Intensity of BIS use
Extent of BIS use BIS Embeddedness
Intensity of BIS use IU1 0.8970 0.7154 0.6587
IU2 0.9302 0.6945 0.6626
IU3 0.8836 0.6650 0.6460
Extent of BIS use PS1 0.6586 0.7564 0.6089
PS2 0.6861 0.8433 0.5959
PS3 0.6923 0.8472 0.5725
ED1 0.6673 0.8259 0.5509
ED2 0.7277 0.8763 0.6103
ED3 0.7385 0.8711 0.6189
ID1 0.7035 0.8778 0.5946
ID2 0.7208 0.8757 0.6050
ID3 0.7006 0.8852 0.6101
HI1 0.6222 0.8205 0.5280
HI2 0.6066 0.8213 0.5269
HI3 0.5711 0.8213 0.5081
WP1 0.5349 0.7751 0.5016
WP2 0.4867 0.7397 0.4666
WP3 0.4975 0.7387 0.4480
VC1 0.4891 0.7321 0.4346
VC2 0.4808 0.7492 0.4155
VC3 0.5180 0.7623 0.4290
CS1 0.5828 0.7800 0.5771
CS2 0.5740 0.8043 0.5550
CS3 0.5990 0.7955 0.5726
BIS embeddedness EMB1 0.7209 0.6459 0.8888
EMB2 0.6636 0.6243 0.9514
EMB3 0.6208 0.5931 0.9269
Table 4. Correlations between the latent variables and square roots of the average variance extracted
Intensity of BIS use Extent of BIS use BIS embeddedness
Intensity of BIS use 0.9038
Extent of BIS use 0.7646 0.8110
BIS embeddedness 0.7250 0.6736 0.9227
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
72 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
of the frequency, or level, of use of the whole technology rather than capturing users’ patterns of use regarding the technology’s features”, therefore they encourage researchers to move beyond such simplistic views of use in order to “expose the sufficiently rich depictions of use history required to surface, study, model, and understand the path-dependent episodes of use leading to routinized or habitual use of an IT application”.
Our work also builds on Venkatesh et al. (2008) who have also developed different con-ceptualizations of use that go “beyond simply treating system use as a measure of the relevant behavior consequent to technology adoption to treating it as a theoretical construct”. Their measurement of use still captures only the fre-quency, intensity, and duration of use; therefore, our study provides an extension with more profound conceptualizations of effective use. Further, a clearer and deeper understanding of BIS use gives insights into post-adoptive use behavior and other downstream consequences (Jasperson et al., 2005; Burton-Jones & Straub, 2006; Venkatesh et al., 2003; Venkatesh et al., 2008).
Our findings provide proof supporting the conceptualizing of the three different dimen-sions of BIS use. We particularly introduce the dimension of the embeddedness of BIS that has not previously been included and studied as a use construct. This significantly adds to under-standing of the deep structural use of BIS that contributes to the success of BIS. The literature suggests that IS are increasingly being used in “new ways” that hold substantial implications for the nature of work, productivity and eco-nomic growth (Doll & Torkzadeh, 1998). The embeddedness of BIS into workers’ routines should induce a fusion of doing and learning, trigger improvements in business processes, improve firm performance and create competi-tive advantage (Shanks et al., 2012).
Arvidsson, Holmstrom and Lyytinen (2014) argue that conceptualizations of stra-tegic IS use within organizations commonly rely on the assumption that, for a system to be strategically successful, the system should
just be successfully embedded in relevant practices. However, this is not enough for this assumption to be true. The “strategic chal-lenge concerns the organizational capability to enact IT-enabled change: transforming and re-configuring local practices to align both system use and related organizational practices with the strategic intent” (Arvidsson et al., 2014, p. 47; Pita, Cheong & Corbitt, 2011). In response to this concern, our conceptualization of BIS embeddedness therefore also captures the aspects of the alignment of the BIS and the business strategy, given that insights into the use of BIS are being embedded within the business strategy formulation process.
One of the challenging tasks managers face today is how to enhance BIS use (Venkatesh et al., 2008). Despite huge investments in BIS in recent years (Gartner Research, 2013), there is a concern “that the implemented systems are underutilized and that users restrict themselves only to using the basic functionalities of the sys-tem” (Venkatesh et al., 2008, p. 498; Jasperson et al., 2005). The current work enhances our ability to understand and predict different stages of BIS use. Research has already emphasized the importance of human and sociological factors for the performance success of enterprise-wide systems (Nair, Reddy & Samuel, 2014; Nour & Mouakket, 2011). The contribution to practice is that managers can now consider interventions in the post-implementation phase to positively influence an individual’s effective BIS utiliza-tion and particularly focus on the embeddedness of BIS in the workers’ routines, representing higher added value of BIS use. As Wixom and Todd state (2005), “this can help with manage-ment activities such as task prioritization and resource allocation”. Limayem et al. (2007) in this context mention offering repetitive training in order to develop knowledge for more compre-hensive use and promoting knowledge sharing among users. Another important contribution to practice is helping organizations identify and select metrics of BIS usage that can explain and lead to relevant organizational outcomes from using BIS, such as better performance, greater user satisfaction, quality of work life, and so on.
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014 73
CONCLUSION
Although this study provides new and valuable results, it also has some limitations that should encourage future related research. A limitation of this study is that it examined a cross-section of interviewees’ perceptions of different dimen-sions of use. It would be beneficial to perform a longitudinal study that would capture different understandings of BIS use as they evolve over time. Future research should also study the antecedents that drive each dimension of use in order to understand how to induce and enhance them. A study of how the embeddedness of BIS actually impacts organizational performance would also be beneficial.
Meaningful BIS use requires capturing both quantitative and particularly qualitative measures that lead to greater and effective BIS utilization. The model estimation provides sound support for the conceptualization of the three dimensions of use, namely intensity, extent and embeddedness as different constructs. Over-all, the findings enrich our understanding of the phenomena of post-adoption BIS use behavior, leading towards the embeddedness of BIS in an organization’s work system and strategy.
ACKNOWLEDGMENT
The authors would like to thank the anonymous reviewers and the editor for their insightful comments and suggestions.
REFERENCES
Agarwal, R., & Karahanna, E. (2000). Time flies when you’re having fun: Cognitive absorption and beliefs about information technology usage. Management Information Systems Quarterly, 24(4), 665–694. doi:10.2307/3250951
Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recom-mended two-step approach. Psychological Bulletin, 103(3), 411–423. doi:10.1037/0033-2909.103.3.411
Arvidsson, V., Holmstrom, J., & Lyytinen, K. (2014). Information systems use as strategy practice: A mul-tidimensional view of strategic information system implementation and use. The Journal of Strategic Information Systems, 23(1), 45–61. doi:10.1016/j.jsis.2014.01.004
Bhattacherjee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. Management Information Systems Quarterly, 25(3), 351–370. doi:10.2307/3250921
Burton-Jones, A., & Grange, C. (2013). From use to effective use: A representation theory perspective. Information Systems Research, 24(3), 632–658. doi:10.1287/isre.1120.0444
Burton-Jones, A., & Straub, D. W. Jr. (2006). Re-conceptualizing system usage: An approach and empirical test. Information Systems Research, 17(3), 228–246. doi:10.1287/isre.1060.0096
Chin, W. W. (1998). Issues and opinions on struc-ture equation modeling. Management Information Systems Quarterly, 22(1), vii–xvi.
Cooper, R. B., & Zmud, R. W. (1990). Information technology implementation research: A technologi-cal diffusion approach. Management Science, 36(2), 123–139. doi:10.1287/mnsc.36.2.123
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information tech-nology. Management Information Systems Quarterly, 13(3), 319–339. doi:10.2307/249008
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A compari-son of two theoretical models. Management Science, 35(8), 982–1003. doi:10.1287/mnsc.35.8.982
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten year update. Journal of Management Informa-tion Systems, 19(4), 9–30.
Deng, X. N., & Chi, L. (2013). Understanding post-adoptive behaviors in information systems use: A longitudinal analysis of system use problems in the business intelligence context. Journal of Management Information Systems, 29(3), 291–325. doi:10.2753/MIS0742-1222290309
Doll, W. J., & Torkzadeh, G. (1998). Developing a multidimensional measure of system-use in an organi-zational context. Information & Management, 33(4), 171–185. doi:10.1016/S0378-7206(98)00028-7
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
74 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
El Sawy, O. A. (2003). The IS Core IX: The 3 Faces of IS Identity: Connection, immersion, and fusion. Communications of the Association for Information Systems, 12(1), 588–598.
Elbashir, M. Z., Collier, P. A., & Davern, M. J. (2008). Measuring the effects of business intelligence sys-tems: The relationship between business process and organizational performance. International Journal of Accounting Information Systems, 9(3), 135–153. doi:10.1016/j.accinf.2008.03.001
Elbashir, M. Z., Collier, P. A., & Sutton, S. G. (2011). The role of organizational absorptive capacity in strategic use of business intelligence to support integrated management control systems. Accounting Review, 86(1), 155–184. doi:10.2308/accr.00000010
Eppler, M. J. (2006). Managing information quality: Increasing the value of information in knowledge-intensive products and processes (2nd ed.). Berlin: Springer Berlin, Heidelberg.
Fornell, C., & Larcker, D. F. (1981). Evaluating struc-tural equation models with unobservable variables and measurement error. JMR, Journal of Marketing Research, 18(1), 39–50. doi:10.2307/3151312
Gartner Research. (2013). Gartner executive program survey of more than 2,000 CIOs shows digital tech-nologies are top priorities in 2013. Available at http://www.gartner.com/newsroom/id/2304615
Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-graph: Tutorial and an-notated example. Communications of the Association for Information Systems, 16(5), 91–109.
Gibson, M., Arnott, D., & Jagielska, I. (2004). Evalu-ating the intangible benefits of business intelligence: Review & research agenda, In Proceedings: Decision Support in an Uncertain and Complex World: The IFIP TC8/WG8.3 International Conference 2004.
Grublješič, T., & Jaklič, J. (2014). (Forthcoming). Conceptualization of the business intelligence extended use model. Journal of Computer Informa-tion Systems.
Harison, E. (2012). Critical success factors of busi-ness intelligence system implementations: Evidence from the energy sector. International Journal of Enterprise Information Systems, 8(2), 1–13. doi:10.4018/jeis.2012040101
Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. Advances in International Marketing, 20, 227–319.
Hernandez, B., Jimenez, J., & Martin, M. J. (2008). Business acceptance of information technology: Ex-panding TAM using industry sector and technological compatibility. International Journal of Enterprise Information Systems, 4(4), 62–79. doi:10.4018/jeis.2008100105
Hirschhor, L., & Farduha, K. (1985). Productivity, technology and the decline of the autonomous profes-sional. Office: Technology and People, 2, 245–265.
Jasperson, J., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. Management Information Systems Quarterly, 29(3), 525–557.
Jourdan, Z., Rainer, R. K., & Marshall, T. E. (2008). Business intelligence: An analysis of the literature. Information Systems Management, 25(2), 121–131. doi:10.1080/10580530801941512
Limayem, M., Hirt, S. G., & Cheung, C. M. K. (2007). How habit limits the predictive power of intention: The case of information systems continu-ance. Management Information Systems Quarterly, 31(4), 705–737.
Mandal, P. (2006). Behavioral factors and information technology infrastructure considerations in strategic alliance development. International Journal of Enter-prise Information Systems, 2(4), 77–88. doi:10.4018/jeis.2006100105
Mouakket, S. (2010). Extending the technology acceptance model to investigate the utilization of ERP systems. International Journal of Enterprise Information Systems, 6(4), 38–54. doi:10.4018/jeis.2010100103
Nair, J., Reddy, D. B. S., & Samuel, A. A. (2014). Conceptualizing Dimensions of Enterprise Resource Planning Systems Success: A SocioTechnical Perspective. International Journal of Enterprise Information Systems, 10(1), 53–75. doi:10.4018/ijeis.2014010104
Nour, M. A., & Mouakket, S. (2011). A classification framework of critical success factors for ERP systems implementation: A multi-stakeholder perspective. International Journal of Enterprise Information Systems, 7(1), 56–71. doi:10.4018/jeis.2011010104
Nunnally, J. C., & Bernstein, I. H. (1994). Psycho-metric theory (3rd ed.). New York, NY: McGraw-Hill.
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014 75
Ortiz de Guinea, A., & Markus, M. L. (2009). Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing infor-mation technology use. Management Information Systems Quarterly, 33(3), 433–444.
Pita, Z., Cheong, F., & Corbitt, B. (2011). A maturity model of strategic information systems planning (SISP): A comprehensive conceptualization. Inter-national Journal of Enterprise Information Systems, 7(3), 30–57. doi:10.4018/jeis.2011070102
Po-An Hsieh, J. J., & Wang, W. (2007). Explaining employees extended use of complex information systems. European Journal of Information Systems, 16(3), 216–227. doi:10.1057/palgrave.ejis.3000663
Popovič, A., Hackney, R., Coelho, P. S., & Jaklič, J. (2012). Towards business intelligence systems suc-cess: Effects of maturity and culture on analytical decision making. Decision Support Systems, 54(1), 729–739. doi:10.1016/j.dss.2012.08.017
Ringle, C. M., Wende, S., & Will, S. (2005). Smart-PLS 2.0 (M3) Beta, Hamburg, URL: http://www.smartpls.de
See-Pui Ng, C. (2012). A case on ERP custom add-on in Taiwan: Implications to system fit, acceptance and maintenance costs. International Journal of Enter-prise Information Systems, 8(4), 44–62. doi:10.4018/jeis.2012100102
Shanks, G., Bekmamedova, N., Adam, F., & Daly, M. (2012). Embedding business intelligence systems within organisations. In A. Respício, & F. Burstein (Eds.), Fusing Decision Support Systems into the Fabric of the Context (Vol. 238, pp. 113–124). IOS Press.
Soltani, S., Elkhani, N., & Bardsiri, V. K. (2014). The effects of perceived organizational support and organizational citizenship behaviors on continuance intention of enterprise resource planning. Interna-tional Journal of Enterprise Information Systems, 10(2), 81–102. doi:10.4018/ijeis.2014040105
Straub, D., & Guidice, M. d. (2012). Use. Manage-ment Information Systems Quarterly, 36(4), iii–vii.
Taylor, S., & Todd, P. (1995). Assessing IT us-age: The role of prior experience. Management Information Systems Quarterly, 19(4), 561–570. doi:10.2307/249633
Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on in-terventions. Decision Sciences, 39(2), 273–315. doi:10.1111/j.1540-5915.2008.00192.x
Venkatesh, V., Brown, S. A., Maruping, L. M., & Bala, H. (2008). Predicting different conceptu-alizations of system use: The competing roles of behavioral intention, facilitating conditions, and behavioral expectation. Management Information Systems Quarterly, 32(3), 483–502.
Venkatesh, V., & Davis, F. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204. doi:10.1287/mnsc.46.2.186.11926
Venkatesh, V., Morris, M. G., Davis, G. B., & Da-vis, F. D. (2003). User acceptance of information technology: Towards a unified view. Management Information Systems Quarterly, 27(3), 425–478.
Wixom, H. B., & Todd, P. A. (2005). A theoreti-cal integration of user satisfaction and technology acceptance. Information Systems Research, 16(1), 85–102. doi:10.1287/isre.1050.0042
Yeoh, W., Koronios, A., & Gao, J. (2008). Managing the implementation of business intelligence systems: A critical success factors framework. International Journal of Enterprise Information Systems, 4(3), 79–94. doi:10.4018/jeis.2008070106
Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
76 International Journal of Enterprise Information Systems, 10(3), 62-76, July-September 2014
Tanja Grublješič has a B.Sc. degree in the field of Management and Organization and holds a M.Sc. in International Economics from the Faculty of Economics, University of Ljubljana. She is currently a Ph.D. student in the Information Management program at the Faculty of Economics. Her current main research and teaching interests include the topics of the adoption, acceptance, embeddedness, use and success of Business Intelligence Systems in organizations.
Jurij Jaklič is a Professor of Information Management at the Faculty of Economics of the Uni-versity of Ljubljana and visiting professor at the ISEGI-UNL. He holds a bachelor degree in ap-plied mathematics from the University of Ljubljana, an M.Sc. in Computer Science from Houston University (USA) and a PhD in Information Management from the Faculty of Economics of the University of Ljubljana. His current main research interests encompass the fields of information quality, business intelligence and business process management. He is the (co)author of around 100 papers and research reports; many of them have been published in international scientific journals such as Decision Support System, Supply Chain Management, Information Research, and Simulation. He has been involved in several research and consulting projects in the areas of business intelligence, business process renovation and IS strategic planning.
Top Related