User participation in knowledge update of expert systems
Information and Management
Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption
Information Systems Research
Software engineering practice versus evidence-based software engineering research
REBSE '05 Proceedings of the 2005 workshop on Realising evidence-based software engineering
Journal of Management Information Systems
International Journal of Electronic Commerce
Investigating mobile wireless technology adoption: An extension of the technology acceptance model
Information Systems Frontiers
Exploring the influencing factors on inertia source of knowledge flow
Proceedings of the 11th International Conference on Electronic Commerce
Task-technology fit and user acceptance of online auction
International Journal of Human-Computer Studies
e-Learning continuance intention: Moderating effects of user e-learning experience
Computers & Education
Editor's comments: perspectives on time
MIS Quarterly
Building Consumer-to-Consumer Trust in E-Finance Marketplaces: An Empirical Analysis
International Journal of Electronic Commerce
Safe Contexts for Interorganizational Collaborations Among Homeland Security Professionals
Journal of Management Information Systems
The effects of organizational learning environment factors on e-learning acceptance
Computers & Education
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Journal of Management Information Systems
Understanding users' initial trust in mobile banking: An elaboration likelihood perspective
Computers in Human Behavior
Argument form and spokesperson type: The recommendation strategy of virtual salespersons
International Journal of Information Management: The Journal for Information Professionals
Forecasting the evolution of wireless technologies: the Loglet analysis approach
International Journal of Business Information Systems
The impact of electronic word-of-mouth communication: A literature analysis and integrative model
Decision Support Systems
Online information product design: The influence of product integration on brand extension
Decision Support Systems
Editor's comments: why top journals accept your paper
MIS Quarterly
Examining success factors of open source software repositories: the case of OSOR.eu portal
International Journal of Business Information Systems
An investigation of information sharing and seeking behaviors in online investment communities
Computers in Human Behavior
Modeling the Impact of Biometric Security on Millennials' Protection Motivation
Journal of Organizational and End User Computing
Semantic Recommendation of Information Sources for Lifelong Learning
Journal of Integrated Design & Process Science
Hi-index | 0.00 |
This study examines how processes of external influence shape information technology acceptance among potential users, how such influence effects vary across a user population, and whether these effects are persistent over time. Drawing on the elaboration-likelihood model (ELM), we compared two alternative influence processes, the central and peripheral routes, in motivating IT acceptance. These processes were respectively operationalized using the argument quality and source credibility constructs, and linked to perceived usefulness and attitude, the core perceptual drivers of IT acceptance. We further examined how these influence processes were moderated by users' IT expertise and perceived job relevance and the temporal stability of such influence effects. Nine hypotheses thus developed were empirically validated using a field survey of document management system acceptance at an eastern European governmental agency. This study contributes to the IT acceptance literature by introducing ELM as a referent theory for acceptance research, by elaborating alternative modes of influence, and by specifying factors moderating their effects. For practitioners, this study introduces influence processes as policy tools that managers can employ to motivate IT acceptance within their organizations, benchmarks alternative influence strategies, and demonstrates the need for customizing influence strategies to the specific needs of a user population.