You are on page 1of 13

Understanding Information and Communication

Technology Behavioral Intention to Use: Applying the


UTAUT Model to Social Networking Site Adoption by
Young People in a Least Developed Country

Bangaly Kaba and Bakary Touré


International University of Grand-Bassam, Gand-Bassam, Route de Bonoua, BP: 564 Grand-Bassam, Cote
D’Ivoire. E-mail: kbangaly@hotmail.com; bstoure@yahoo.fr

According to many studies, social network sites (SNS) people’s use of these websites (Pelling & White, 2009). Our
have become some of the most popular online destina- research fills this gap by explaining, employing the unified
tions. It has been pointed out that very little is known
theory of acceptance and use of technology (UTAUT), why
about the psychosocial variables that predict people’s
use of these websites. In this article, our general objec- and how people use social networking websites in a selected
tive is to understand behavioral intentions to use SNS African country.
employing the well-known unified theory of acceptance Our objective in this study is to understand behavioral
and use of technology (UTAUT), which has been vali- intentions to use SNS. Specifically, we want to determine the
dated in a number of studies. Data were collected
factors that explain SNS use. The UTAUT provides an
through a questionnaire survey from a final sample of
1,039 social networking website users in Africa. We have appropriate framework to understanding and predicting peo-
shown that there are contexts, such as the African ple’s use of SNS. The aim of this study is to further validate
context, in which the UTAUT does not hold up. Explana- the UTAUT in the context of SNS use in Sub-Saharan
tions are provided to support the findings. Africa. The rationale behind using the UTAUT is that it
explains 70% of the variance (adjusted R2) in usage inten-
Introduction tion, better than any of the information and communication
technology (ICT) adoption models alone. In this research we
Social network sites (SNS) have become some of the considered—as Venkatesh, Morris, Davis, and Davis (2003)
most popular online destinations in recent years in western and Karahanna, Evaristo, and Srite (2005) have suggested—
countries (boyd & Ellison, 2007; comScore, 2007a, 2007b) that contextual factors such as age, gender, and voluntarism
as well as in Africa. Academic researchers have started of use can moderate the relations between the intention of
studying the use of SNS with a focus on identity construc- ICT use and prior beliefs.
tion and expression (boyd & Heer, 2006), building and Finally, SNS is an online virtual community platform, so
maintenance of social capital (Ellison, Steinfeld, & Lampe, knowing psychological factors behind the adoption of these
2007), and privacy concerns (Hodge, 2006). These findings sites presents advantages, and businesses should consider
may not apply to the reality of other countries, especially virtual communities as a new market place because their
those located in Sub-Saharan Africa. Furthermore, boyd and members are current or future customers. According to
Ellison (2007), the pioneers in the area, have clearly indi- Gangadharbatla (2008) and eMarketer (2006), advertising
cated that there is a limited understanding of who the users spending in the social networking area reached $2 billion by
of SNS are, and for what purpose a social network site is the year 2011, representing almost 8.5% of total online
used outside the United States. It also has been noted that spending.
little is known about the psychosocial variables that predict There is a need to understand the determinants of
members’ intentions to participate in virtual communities
(Hsiu-Fen, 2006). Understanding users’ behavioral use
Received August 29, 2012; revised July 1, 2013; accepted July 1, 2013
intention is important for both scholars interested in
© 2014 ASIS&T • Published online 18 March 2014 in Wiley Online theoretical research and professionals focused on adding
Library (wileyonlinelibrary.com). DOI: 10.1002/asi.23069 value through user-generated content sites or using these

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 65(8):1662–1674, 2014
sites as advertising vehicles (Gangadharbatla, 2008) because rather than actual obstacles to IT adoption. Such a distinction
the success of SNS for advertising, business, and social is crucial because it determines the factors one should focus
activism depends on the number of users that subscribe to on when deploying IT to save time and money. It is also
the sites. important to note that the same IT adoption factors can vary
Many African governments have, or are planning to insti- depending on the circumstances (Markus, 1983). Although
tute web-based information and communication technolo- classical theories pay little attention to the influence of the
gies to improve the socioeconomic and political status of situation or context of IT adoption decision making, these
their populations. However, there has not been much decisions can vary depending on environmental or contextual
research that explores the effectiveness of web-based tech- situations (Chiasson & Lovato, 2001; Gallivan, 2001;
nologies such as SNS in the region. To this end, it is impor- Karahanna, Straub, & Chervany, 1999; Markus, 1983;
tant to ascertain the perceived usefulness of ICT from the Venkatesh & Davis, 2000). Currently, theories that focus on a
users’ perspective. By better understanding these percep- specific context and identify relevant predictors and mecha-
tions, the results of this study can help policy makers make nisms are considered to be essential to provide a better
informed investment decisions by using these technologies understanding of a phenomenon under study and an oppor-
more effectively. Moreover, it can help tool designers tunity to meaningfully extend theories (Venkatesh et al.,
improve their systems to make them more attractive in an 2012). Thus, studying UTAUT in SNS acceptance in an
environment such as Sub-Saharan Africa. African context represents an opportunity to make an impor-
The study helps the key players in the adoption and tant theoretical contribution.
diffusion of technologies to understand the main factors that Each classical model mentioned previously focused on a
influence the use of SNS because the nonuse or the underuse particular aspect of IT adoption and use. This explain the
of technological innovations in Africa appears to be the necessity of having an integrated view of all the contributions
principal reason for their noncontribution to individual and made by different theoretical models. In the absence of such
organizational productivity increases as well as other a view, there is the risk of ignoring the contribution of other
improvements (Anandarajan, Igbaria, & Anakwe, 2002; studies when a particular model is chosen as a theoretical
Kaba, N’Da, Meso, & Mbarika, 2009; Odedra, Bennett, framework in a given research study or IT adoption project.
Goodman, & Lawrie, 1993). This is important because it is Because of this potential problem, Venkatesh et al. (2003)
not the acquisition of technology that provides benefits but proposed a unified model of information technology adoption
rather its use (Orlikowski, 2000): understanding postadop- and use. The main objective was to present a synthetic view of
tion behavior is crucial, as benefits from technology occur the contributions of major IT adoption and use models. Their
through sustained use. model took into consideration all the pertinent factors found
in the classical theories.
Venkatesh et al. (2003) proposed a more complete model
Background
for the understanding of the acceptance and adoption of IT.
There are a number of mainstream theories of technology Their model builds upon and extends the well-established
use—such as the technology acceptance model (TAM), the theory of acceptance model. Our study uses this new
theory of planned behavior, the decomposed theory of UTAUT to further validate the model and enhance our
planned behavior, social cognitive theory (SCT), and task– understanding of the adoption of SNS. Determining the
technology fit theory—that have made important contribu- factors of SNS adoption which seem to be a success can lead
tions to understanding the adoption and use of ICT. In to understanding the adoption of other ICTs.
particular, these theories assess the impact of technology Although numerous studies are based on the classical
attributes on the beliefs, attitudes, and behavior of the indi- theories of information technology adoption and use, includ-
vidual in adopting a new ICT. ing the UTAUT, it is worth noting that most of them were
The classical theories of information technology (IT) limited to testing or confirming the IT adoption and use
espouse the paradigm of rationality. It is worth mentioning models. As a result, the opportunities for contribution to the
that human behavior is not exclusively determined by ratio- IT community are more and more restrained if important
nality. According to Simon (1977), people fall short of theoretical advancements are not proposed. The classical
achieving high levels of rationality; they have a simplified theories pay little attention to the influence of the context of
view of reality and are prompted to act by immediate stimuli. technological innovation acceptance or rejection decisions.
In doing so, they rely on incomplete solutions and analysis. Indeed, those decisions may vary according to contextual or
Thus, in this situation, the decision to accept IT is not gov- environmental situations (Chiasson & Lovato, 2001;
erned solely by rational criteria based on the perceived char- Gallivan, 2001; Karahanna et al., 1999; Markus, 1983;
acteristics of innovation. Other factors need to be explored Venkatesh & Davis, 2000) .
(Bagozzi, 2007; Venkatesh, Thong, & Xin, 2012). Bandyopadhyay and Fraccastoro’s (2007) study exam-
The classical theories (mentioned previously) do not dis- ines the effect of culture through the social influence
tinguish the different factors behind IT acceptance. This variable of the UTAUT model on user acceptance of an
makes it difficult to distinguish between the motivating IT-based innovation in India. Social influence represents
factors and those that are simply sources of dissatisfaction societal pressure on users to engage in a certain behavior.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014 1663
DOI: 10.1002/asi
This social pressure on an individual to adopt a particular
behavior varies by culture. The study confirms the proposi-
tion that culturally based social influence provides addi-
tional explanatory power concerning consumers’ intentions
to use a technology.
Junelee (2002) advises that the problem is not just
sending IT into developing countries; challenges are
raised by the ways IT is managed. He also states that new IT
should be tailored to a country’s culture, regulations, and
population needs. If these conditions are not met, developing
countries will struggle and remain behind developed
countries.
Underresearched geographical areas such as Africa
(Mbarika, Okoli, Byrd, & Datta, 2005) have cultures that
may be considered to be fairly consistent, and users’ IT FIG. 1. Unified theory acceptance and use of technology model from
acceptance behavior models could not fit its context (Kaba Venkatesh et al. (2003).
et al., 2009). It is therefore important for models that may be
affected by cultural differences to be evaluated in nonwest-
ern contexts. Previous research on technology acceptance
behavior has been cautious regarding the applicability of a
western-developed model of technology acceptance in other important in one culture than in others. Bandyopadhyay and
cultures (Anandarajan, Igbaria, & Anakwe, 2000; McCoy, Fraccastoro (2007) argue that the existing ICT adoption and
Galletta, & King, 2007; Schepers & Wetzels, 2007). use studies such as the UTAUT have not established clear
Consequently, examining technology acceptance models relationships between cultural variables and IT usage deter-
in nonwestern cultures, especially in this era of advanced minants. Even when culture is examined, as in the UTAUT,
technology, to bridge the gap between the two clusters it is generally organizational culture that is considered
(western and nonwestern) is a contemporary issue worthy of (Bandyopadhyay & Fraccastoro, 2007). We propose to
inquiry and research. The current study is undertaken in examine the effects of one country’s culture on the existing
Côte d’Ivoire, an example of a nonwestern country. UTAUT model and test it outside its original setting, the
Although the Internet is a relatively recent phenomenon in United States.
Côte d’Ivoire, its use is spreading rapidly. Also, Cóte The original UTAUT was developed to examine informa-
d’Ivoire is among the African countries where a number of tion and communication technology adoption in business
digitalization efforts have been made by both local govern- organizations. The model’s suitability for predicting general
ment and international aid agencies. These reasons make individual acceptance, especially in SNS adoption in an
Côte d’Ivoire an ideal test-bed for applying a well-validated African country, needs to be explored because Hong and
western technology acceptance and use model. Tam (2006) found that the determinants of consumer infor-
mation system adoption are different from employee infor-
mation system adoption. Thus, users do apply different
Research Model and Hypotheses
decision-making processes depending on the context—that
The study by Venkatesh et al. (2003) has many strengths. is, the characteristics and usage contexts of the technology
It provides an overview and criticism of previous work done (Orlikowski & Iacono, 2001).
in the field of IT adoption and proposes, after a longitudinal Although the UTAUT is more integrative, similar to
study, a model that integrates the technology adoption TAM it suffers from the limitation of being predictive but
factors from classical studies that explain a greater propor- not particularly useful in providing explanations that can be
tion of the variance in IT use. The UTAUT captures infor- used to design interventions that foster adoption (Brown,
mation about social and behavioral control factors. As these Dennis, & Venkatesh, 2010). Brown et al. elaborate by
factors are crucial to understanding social networking sites, stating that far less attention has been paid to technology-
the UTAUT serves as an ideal theoretical foundation for our specific antecedents that may provide significantly stronger
study focused on understanding SNS adoption in different guidance for the successful design and implementation of
sociocultural contexts. specific types of systems.
Although the UTAUT model is robust and is widely used Given this backdrop, in the present study we propose to
in the field of information and technology, it does not fully contextualize the UTAUT for the particular setting of Côte
capture the influence of external factors that potentially d’Ivoire. Côte d’Ivoire, a country located in West Africa,
inhibit or facilitate the performance of a behavior (Lin & has emerged as a key economic player with substantial ICT
Bhattacherjee, 2008). According to Venkatesh and Zhang implementation in business and in society.
(2010), the model or theory may perform differently in other A graphic representation of a unified model of technol-
cultures, and some variables could become more or less ogy acceptance is presented in Figure 1.

1664 JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014
DOI: 10.1002/asi
In this study, we are interested in the causal mechanisms remains significant in both voluntary and mandatory settings
that shape continued intent to use SNS in a volitional use (Venkatesh et al., 2003). According to Bolar (2009), social
context. Specifically, the context is one where users have networking websites are used for their utility. More specifi-
access to the technology and information about it but also cally, people use those sites for information-gathering and
have direct experience with the use of the technology. These problem-solving. They are generally seeking, from the right
conditions, then, enable users to form stable behavioral people, the right information that could be useful in their
intentions for continued use in the future. Although work. For example, students look for help in specific com-
behavioral intention is the best predictor of future behavior munities regarding their assignments. It is worth noting that
when the behavior is volitional and the individual has the there is a distinction between men’s and women’s behavior
information to form stable behavioral intentions (Ajzen, (Peluchette & Katherine, 2008). For example, men were
1991; Karahanna et al., 1999), some researchers have significantly more likely than women to place self-
recommended investigating actual behavior (e.g., Kim promoting and risqué pictures or comments (involving
& Malhotra, 2005). This may be especially useful when alcohol) on their profile. Barker (2009) reported that men
investigations are concerned with the causal mechanisms, show more instrumental interest in SNS use for social com-
other than behavioral intention, that influence behavior in pensation, learning, and social identity gratification than
nonvolitional or quasi-volitional contexts or when the focus women and were more likely to report SNS use for these
is on the consequences of ICT use (Hsieh, Rai, & Keil, reasons.
2008). As we have noted previously, however, in the current Awoleye, Siyanbola, and Oladipupo (2008), based on
study the respondents are freely choosing to adopt SNS for research undertaken in an African country, showed that about
their own purposes and do not feel pressured to use it. 92% of undergraduate students have embraced the Internet
Therefore we will focus on continued behavioral use inten- and are using it consistently. Their analysis revealed that
tion rather than actual use. gender attitude is also an important issue; male students
Furthermore, the UTAUT has four key constructs—per- appear to use the Internet more than their female counter-
formance expectancy, effort expectancy, social influence, parts. From that we can argue that the rationale for explaining
and facilitating conditions—that influence behavioral inten- the gender and age differences with regards to performance
tion to use a technology and/or technology use. We have expectancy will not be very different from the outcome of the
established a direct link between facilitating conditions and original UTAUT studies conducted in their original setting.
behavioral intention to use which does not appear in the Thus, we expect that the influence of performance expec-
original UTAUT as developed by Venkatesh et al. (2003). tancy is moderated by both gender and age. Hence, the
According to Venkatesh et al. (2012), in the UTAUT, the following hypothesis:
facilitating conditions construct is hypothesized to influ- H1: The influence of performance expectancy on behavioral
ence technology use directly based on the idea that, in an intention is moderated by gender and age, such that the effect
organizational environment, facilitating conditions can is stronger for men and particularly for younger men.
serve as the proxy for actual behavioral control and influ-
ence behavior directly. However, outside of an organiza-
Effort Expectancy
tion, such facilitation is not available to each individual at
the same strength; it varies significantly across users. In Effort expectancy is defined as the degree of ease associ-
this context facilitating conditions will act more like per- ated with the use of the system (Venkatesh et al., 2003).
ceived behavioral control in the theory of planned behavior This construct is very close to “ease of use” defined earlier
and influence intention (Ajzen, 1991; Venkatesh et al., by Davis (1989). The successful adoption of social network-
2012). This is why in the context of this study, as ing sites depends on the perceived ease of use (Davis,
Venkatesh et al. (2012), we follow the general theory of Bagozzi, & Warshaw, 1989), often conceptualized as
planned behavior model and link facilitating conditions to Internet self-efficacy for Internet technologies (Daugherty,
behavioral intention. Gangadharbatla, & Kim, 2005; Gangadharbatla, 2008). The
Below, we define the constructs and state the hypotheses finding of Gangadharbatla (2008) implies that users’ inten-
describing the relationships between the variables defined in tion to use a SNS is related to their level of Internet self-
the research model with regard to the context of the current efficacy. Females have less positive attitudes toward the
study. Internet than males and they are less confident in their abili-
ties in using the Internet (Li, Kirkup, & Hodgson, 2001).
Joiner et al. (2005) acknowledged the gender difference in
Performance Expectancy
Internet-based technology use.
Performance expectancy is defined as the degree to In a Sub-Saharan Africa context, ICTs were perceived as
which an individual believes that using the system will help tools for educated elite; gender inequality in terms of edu-
him or her to gain a specific reward (Venkatesh et al., 2003). cation and language skills indirectly disadvantages women
As such, it is quite similar to usefulness in TAM. The per- (who tend to be less educated and less proficient in English)
formance expectancy construct within each individual IT in their use of ICTs, which in turn contributes to the gender
acceptance model is the strongest predictor of intention and digital divide (Geldof, 2011).

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014 1665
DOI: 10.1002/asi
These gender-based constraints help to explain dispari- women, and particularly in mandatory settings in the early
ties in access and use of ICT, as evidenced by men having stages of experience.
better knowledge about, more ownership of, and more
experience with the use of ICT than women (Geldof, Facilitating Conditions
2011). Facilitating conditions are defined as the degree to which an
From the foregoing, we can argue that the basis for individual believes that an organizational and technical infra-
explaining the gender and age differences with regard to structure exists to support the use of the system (Venkatesh
effort expectancy is different from the outcome of the origi- et al., 2003). The influence of facilitating conditions upon the
nal UTAUT studies held in the original setting. Thus, we use of ICTs has been widely discussed in the literature through
propose that effort expectancy is most salient for women, various models (Ajzen, 1991; Karahanna et al., 1999;
particularly those who are older and have relatively little Mathieson, Peacock, & Chin, 2001; Taylor & Todd, 1995;
experience with the system. Thompson et al., 1991). Triandis (1980) states that a behavior
H2: The influence of effort expectancy on behavioral inten- cannot be carried out if the objective conditions of the environ-
tion is moderated by gender, age, and experience, such that ment prevent it. These objective conditions that encourage or
the effect is stronger for women, particularly older women, discourage the adoption of a behavior, in our case the use
and particularly at early stages of experience.
of SNS, are called facilitating conditions. According to
Mathieson et al. (2001), resources including expertise, the
Social Influence availability of help in case of problems, money, and documen-
tation such as a user’s guide represent the facilitating condi-
Social influence is defined as the degree to which an
tions for the adoption and use of an ICT. Rogers (1995) names
individual perceives that important others believe he or she
risk-taking, education, and the quality of the social network as
should use the new system (Venkatesh et al., 2003). Social
facilitating conditions for the use of an innovation.
pressure refers to the belief of an individual that he or she
In most cases, an Internet connection in Côte d’Ivoire is
should conform to the practices accepted by those who
achieved through a sub-marine cable linking Africa to
enjoy a high social status in his or her environment.
Europe and Asia. In addition to the service provided by
Anandarajan et al. (2002) have shown that social pressures
Internet service providers using a rented link from Côte
are among the dominant factors explaining the use of an
d’Ivoire Télécom (the telephone and Internet services pro-
ICT in the African context. Subjective norm or social influ-
vider) in most cases, there are mobile service companies that
ence emerge as significant predictors of intention to engage
provide Internet access either through a mobile device
in high-level SNS use, suggesting that young adults with a
(mobile phone or Ipad) or through a computer using a
more favorable attitude toward high-level SNS use, and
special device. The existence of infrastructure facilities
who feel more pressure from others to use these websites
along with cost decreases contributed to an increase in Inter-
at high levels, are more likely to intend to engage in high-
net subscribers from 160,000 in 2005 to 660,000 in 2008
level SNS use (Pelling & White, 2009). The Internet is an
(CIA World Factbook, 2010). The Internet is a relatively
extremely social medium, and SNS is all about being
recent innovation in the Côte d’Ivoire, but it is spreading
social. It has been demonstrated in many studies that both
rapidly, and people, especially young men, are taking advan-
men and women adopt and use new technology because of
tage of it. Women are facing more challenges in accessing
social pressure.
and using and therefore in benefiting from these new ICTs
When it comes to social media, women are more sen-
than men are, particularly in Africa. We can point out that
sitive to social pressure than men, particularly in the
the rationale of explaining the gender and age differences
African context. Therefore, we expect to observe more
with regard to facilitating conditions is different from the
gender moderating effect on the relationship between
outcome of the original UTAUT studies held in its original
social influence and users’ intentions. Thioune (2003) has
setting.
found during research in other African countries that
Thus, when moderated by gender and age, facilitating
women felt that ICTs were “instruments not made for
conditions have a significant influence on behavioral
them.” Consequently, women were less likely to be using
intention.
these ICTs, as doing so would carry a social stigma
(Geldof, 2011). We can claim that the basis for explaining H4: The influence of facilitating conditions on behavioral
the gender and age differences with regard to social influ- intention is moderated by age and experience, such that the
effect is stronger for older women, particularly with high
ence is different from the outcome of the original UTAUT
experience levels.
studies conducted in the original setting. Thus, we propose
that social influence is most salient for women, particularly
those who are older and with relatively little experience Method
with the system. In this section, we define the method and instruments
H3: The influence of social influence on behavioral intention used to reach our research objectives. More specifically, we
is moderated by gender, age, voluntariness, and experience, present the questionnaire development processes and the
such that the effect is stronger for women, particularly older data collection strategy.

1666 JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014
DOI: 10.1002/asi
Questionnaire Development TABLE 1. Sociodemographic profile.

The data for this study were collected through a ques- Items Frequency Percentage
tionnaire survey adapted from Venkatesh et al. (2003). A Gender Males 509 52.8
section of the questionnaire was devoted to each variable of Females 388 40.2
the research model: performance expectancy, effort expec- Missing values 67 7.0
tancy, facilitating conditions, social influence, and the Age <15 years 18 1.9
behavioral continued use of the users. A 7-point Likert scale 16–21 615 63.8
22–27 237 24.8
(1 = strong disagreement and 7 = strong agreement) was 28–33 16 1.7
used to measure all the variables of the model, except the 34–39 7 .7
moderator variables such as age, sex, experiences, and vol- >46 2 .2
untariness of use. The items to measure those variables were Missing values 69 7.2
inspired by Venkatesh et al. (2003) and adapted to the Experiences <1 year 121 12.6
in using Internet 1–2 177 18.4
context of this study. The measures consist largely of inter- 2–3 127 13.2
val scales composed of multiple items. 3–4 101 10.5
A pretest of the questionnaire was performed to ensure its 4–5 80 8.3
content validity before its final distribution to the respon- >5 293 30.4
dents. First, we designed a preliminary version of the ques- Missing values 65 6.7
Education level University 287 29.8
tionnaire from the Venkatesh et al. (2003) study. This High School 619 64.2
version was translated into French and retranslated back Technical 19 2.0
into English to ensure its content validity. Then the French Missing values 39 4.0
version was given to researchers in the field of IT and infor-
mation systems and to industry experts familiar with the
African context. Each individual provided some comments
on the formulation, the syntax, and the number of items
included in the questionnaire. Taking into account the
investigators met with the respondents in their classrooms or
various comments, we made minor changes to the question-
on their campuses to invite the students to voluntarily com-
naire. The comments also permitted us to eliminate biases
plete and return the questionnaire.
that could exist in the questionnaire. We conducted face-to-
face interviews with to ensure that the meaning or content
of the questionnaire was well understood before we
Analysis and Results
administered at a large scale. This pretest allowed us to
clarify and refine the meanings of questions that were not The administration of the survey produced responses
well understood. from a total of 1,350 questionnaires distributed. Of the
received responses, 20 were dropped from the sample for
various reasons, among them incomplete responses and
Data Collection selection of more than one indicator for the same item.
Therefore, a total of 1,030 responses were used in the sta-
There are many ways of administering a questionnaire:
tistical assessment of the hypotheses for this study. This
direct contact, postal mailing, telephone, and online. To the
represents a response rate of 77%.
best of our knowledge, there were no listings of all SNS
The statistical analysis for this study employed the SPSS
subscribers in Côte d’Ivoire from which we could have
statistical software (SPSS 12.0.1) and the partial least
identified their mailing addresses and contacted them by
squares (PLS) statistical analysis method as supported by
mail. The investment required to compose such a list was
the SmartPLS software (Ringle, Wende, & Will, 2009)
beyond the scope of this study. Due to these limitations, the
running on a personal computer. The assessment of the col-
survey in this study was conducted using the direct contact
lected data’s descriptive statistics was performed using
method. We carefully chose 10 investigators who were
SPSS features, and the study’s hypotheses analysis, con-
attentive to the demands of precision and rigor in this study.
struct validity, and testing of the indicators’ reliabilities were
These individuals were trained to perform the survey’s
conducted in PLS. PLS provides for the simultaneous testing
tasks.
of the measurement model and the structural model that
We used a random stratified sampling. The strata were the
articulate the research hypotheses (Chin & Todd, 1995;
public or government schools and private and semiprivate
Ringle et al., 2009; Wixom & Watson, 2001).
schools. We selected randomly the constituents from each
group. More specifically, we randomly chose 27 high
schools and four universities where we contacted respon-
Descriptive Statistics
dents. A student sample is justified because SNS users fit the
demographics of college students between the ages of 18 to As shown in Table 1, the sociodemographic variables
30 years (Gangadharbatla, 2008). The researchers and the examined in this study are gender, age, experience using the

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014 1667
DOI: 10.1002/asi
TABLE 2. Composite reliability. TABLE 3. Convergent validity.

Variable Composite reliability Variables AVE

Effort expectancy 0.76 Effort expectancy 0.52


Facilitating conditions 0.85 Facilitating conditions 0.54
Intention 0.77 Intention 0.53
Performance expectancy 0.78 Performance expectancy 0.54
Social influence 0.81 Social influence 0.59
Voluntariness 0.86 Voluntariness 0.675

greater than the variance shared between the construct and


other constructs in the model (Fornell & Bookstein, 1982).
Internet, and education level. Of the respondents, 52.8% are As is evident in Table 4, the AVE of each construct except
males and 40.2% are females. Respondents are relatively facilitating conditions is greater than the construct’s corre-
young, almost 65.7% younger than 28; more than 58% had lations. Therefore they have satisfactory discriminant valid-
been using the Internet for 3 or more years. ity. Furthermore, we calculated item cross-loadings based on
the procedure suggested for PLS (Gefen & Straub, 2005).
We see in Table 5 that each item loaded higher on its
Testing for Validity principal construct than on other constructs. Therefore all
A construct validity test ensures that the scale measure- constructs have satisfactory discriminant validity.
ments of the questionnaire provide a good representation
of the phenomenon measured. In other words, it tests the Assessment of the Structural Model
ability of the instrument (questionnaire) to accurately
The PLS procedure has become popular among IS
measure the concepts and variables targeted in the study.
researchers in recent years (Aubert, Rivard, & Patry, 1994;
Churchill (1979) and Peter (1981) recommend testing reli-
Compeau & Higgins, 1995) because of its ability to model
ability, convergent validity, and discriminant validity in
latent constructs under conditions of nonnormality (Chin,
assessing construct validity. This was done following the
Marcolin, & Newsted, 2003). According to Chin et al., PLS
rules suggested by Nunnally, (1967), Fornell and Larcker
as a modeling technique is similar to regression, but it simul-
(1981), and Wixom and Watson (2001).
taneously models the structural paths (i.e., theoretical rela-
tionships among latent variables) and measurement paths
Reliability of measurements. In PLS, the psychometric (i.e., relationships between a latent variable and its indica-
properties of the scales used to measure the hypothesized tors). In this sense, PLS is preferable to techniques such as
model’s reliability and the validity of its constructs are mea- regression which assumes error-free measurements.
sured and articulated by the measurement model. Measures To validate the research model in Figure 1, the PLS algo-
of reliability include the composite reliability of each con- rithm was performed to evaluate item weight, and bootstrap-
struct’s indicators. The results for the composite reliability ping was performed to evaluate t statistics (Ringle, Wende,
of each individual construct are presented in Table 2. The & Will, 2005). A two-tailed t test is considered with 1.645,
composite reliability value for each latent variable was 1.96, and 2.576 as critical values of t at significant levels (P
above the threshold value of 0.7 recommended for empirical value) 0.1, 0.05, and 0.01, respectively (Chin & Todd, 1995;
research (Nunnally, 1967). Nunnally, 1978; Ringle et al., 2005).
The results for assessing the research model in this
article are graphically presented in Figure 1, and the sta-
Convergent validity. The tests for convergent validity are
tistical information pertaining to the hypotheses are sum-
(a) that each construct’s Average Variance Extracted (AVE)
marized in Table 6. As shown, the path coefficients of all
needs to be greater than or equal to 0.5 (Fornell & Larcker,
hypothesized relationships except the influences of perfor-
1981; Wixom & Watson, 2001)—Table 3 provides these
mance expectancy and the interaction of social influence
results—and (b) that each item’s loading onto its respective
and voluntariness on intention are rather weak. This was a
construct should be greater than or equal to 0.5 (Wixom &
surprising finding given the extensive validation of the
Watson, 2001).
UTAUT in different contexts. We address the probable
reasons for lack of support in the Data Analysis section.
Discriminant validity. The objective of this test is to assess Tables 6 and 7 reveal that only two of four hypotheses
the independence of the variables. The AVE for each con- have been partially supported. The collected data enabled us
struct was assessed in order to determine the model’s dis- to evaluate the relative influence of performance expectancy,
criminant validity. A model’s discriminant validity is effort expectancy, and social influence on intention to con-
satisfactory if the AVE of each construct in the model is tinue to use SNS. Table 7 addresses various aspects where

1668 JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014
DOI: 10.1002/asi
TABLE 4. Assessment of discriminant validity.

Variables Effort expectancy Facilitating conditions Intention Performance expectancy Social influence Voluntariness

Effort expectancy 0.52


Facilitating conditions 0.39 0.55
Intention 0.42 0.44 0.53
Performance expectancy 0.45 0.39 0.49 0.54
Social influence 0.49 0.56 0.42 0.38 0.59
Voluntariness 0.36 0.57 0.37 0.35 0.43 0.67

TABLE 5. Assessment of construct discriminant validity using loadings of indicators onto respective constructs.

Construct Indicator Original sample Sample mean Standard error t statistic

Behavioral intention to use Intend to use 0.62 0.47 0.35 1.79


Plan to use 0.68 0.63 0.29 2.28
Predict to use 0.86 0.80 0.24 3.61
Effort expectancy Ease to use 0.65 0.60 0.26 2.51
InteraClear 0.79 0.71 0.21 3.72
Learning 0.71 0.65 0.25 2.83
Facilitating conditions Assistance 0.83 0.76 0.28 2.90
Financial resources 0.83 0.73 0.31 2.73
No restrictions to use 0.81 0.73 0.31 2.59
Resources 0.62 0.56 0.30 2.05
Performance expectancy Getting friends 0.74 0.69 0.25 2.96
Stay in touch 0.72 0.65 0.24 3.01
Useful 0.75 0.69 0.26 2.85
Social influence People important 0.72 0.66 0.28 2.57
People influence 0.83 0.79 0.23 3.59
People support 0.74 0.68 0.26 2.89
Voluntariness of use Not expected 0.85 0.81 0.17 5.02
Not required 0.74 0.71 0.25 2.93
No obligation (not obligatory) 0.86 0.80 0.20 4.38

the results diverged from the UTAUT’s original predictions. expectancy. Previous research has most often supported the
As can be seen, the primary outcome of continued intention conjecture that perceived usefulness, similar to perfor-
to use is explained by performance expectancy and the mance expectancy, is a major determinant of users’ inten-
interaction effect of social influence and voluntariness. The tion to use a new ICT across technologies and cultures. The
remaining paths or hypotheses framed in the original results of this study of SNS continued use intention in a
UTAUT were not validated in the current study. The expla- different cultural context do not challenge the traditional
nations are provided below. view of the role of perceived usefulness. We may then con-
clude that perceived performance expectancy transcends
national culture.
Discussion
The hypothesis related to the relationship between facili-
The results showed that performance expectancy has a tating conditions and behavioral intention was not supported.
positive influence on behavioral intention but the interac- Humans have an innate desire to communicate, and this
tion of performance expectancy, gender, and age was not desire drives them to communicate with whatever means/
significant as theorized in the original UTAUT. Indeed, technology is available. The Internet is a relatively recent
more than 90% of the respondents in this study are younger innovation in the Côte d’Ivoire, but it is spreading rapidly and
than 28 and nearly half have been using Internet-related the barriers to using it, such as connection cost, are narrow-
technologies for at least 4 years. Similar to other young ing. The majority of the respondents get their connection
people around the world, they are more technology-ready either at cyber cafes or school facilities where there are
and sensitive to new trends, so they are less likely to be people who provide them with assistance when they need it.
influenced by technology characteristics and referents’ These facts explain why facilitating conditions are no longer
opinions than older users. Based on the data collected, the issues that impact SNS continued use intention.
analysis shows that SNS users’ continued use intention The effects of effort expectancy and its moderators on
behavior was influenced by their perceived performance behavioral intention were not significant. The results showed

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014 1669
DOI: 10.1002/asi
TABLE 6. Statistical analyses of hypothesized relationships.

Paths Paths coefficient Standard error t statistics

Age → Intention 0.00 0.24 0.01


Effort Expectancy → Intention 0.10 0.09 1.07
Effort Expectancy * Age → Intention 0.10 2.50 0.04
Effort Expectancy * Experiences → Intention 0.11 1.26 0.09
Effort Expectancy * Gender → Intention −0.09 2.67 0.03
Experiences → Intention 0.00 0.07 0.04
Facilitating Conditions → Intention 0.03 0.09 0.28
Facilitating Conditions * Age → Intention 0.00 0.94 0.00
Facilitating Conditions * Experiences → Intention 0.04 0.84 0.05
Gender → Intention 0.00 0.22 0.02
Performance Expectancy → Intention 0.26 0.12 2.22*
Performance Expectancy * Age → Intention −0.06 4.23 0.01
Performance Expectancy * Gender → Intention −0.02 4.27 0.01
Social Influence → Intention 0.07 0.14 0.48
Social Influence * Age → Intention 0.00 6.76 0.00
Social Influence * Experiences → Intention −0.15 1.12 0.14
Social Influence * Gender → Intention −0.12 6.75 0.02
Social Influence * Voluntariness → Intention 0.44 0.27 1.65#
Voluntariness → Intention −0.06 0.05 1.16

Path coefficient is significant at: *P < 0.05; #P < 0.1.

TABLE 7. Statistical analyses of hypothesized telationships Regarding the social influence variable, we have theo-
Paths or hypotheses
rized the same relationship as is assumed in the original
UTAUT. Only the moderating role of voluntariness was
Not supported in this study verified in our study. This is inconsistent with the finding of
Age → Intention Anandarajan et al. (2002), who indicated that social pressure
Effort Expectancy → Intention
Effort Expectancy * Age → Intention
is the main driver of ICT technology adoption and use. The
Effort Expectancy * Experiences → Intention social influence captured in the original UTAUT is based on
Effort Expectancy * Gender → Intention organizational culture, which may sometimes differ from
Experiences → Intention national or societal culture. Also, the social influence on an
Facilitating Conditions → Intention individual to perform a behavior varies by culture. A pos-
Facilitating Conditions * Age → Intention
Facilitating Conditions * Experiences → Intention
sible partial explanation of the nonvalidation of social
Gender → Intention influence in the setting of the current study may be the
Voluntariness → Intention differences between U.S. culture and African culture.
Performance Expectancy * Age → Intention Bandyopadhyay and Fraccastoro (2007), after theorizing
Performance Expectancy * Gender → Intention the social pressure or social influence based on Indian
Social Influence → Intention
Social Influence * Age → Intention
culture, confirmed that social influence based in national
Social Influence * Experiences → Intention culture provides additional explanatory power concerning
Social Influence * Gender → Intention users’ intention to use a technology outside of the work-
Supported in this study and UTAUT place. In the same vein, theorizing social influence based on
Performance Expectancy → Intention African culture could lead to a stronger influence on users’
Social Influence * Voluntariness → Intention
IT acceptance.
On the other hand, previous studies, such as work by
Karahanna et al. (1999), have established the influence of
time on IT adoption and use behavior in preadoption and
postadoption periods. These authors found that social influ-
that the majority of the respondents have embraced the Inter- ence impacts ICT use only at the early stage. Because we are
net and are using it consistently. The average respondent’s studying the SNS postadoption occurred, our results tend to
experience with Internet use is between 3 and 5 years. ICT is confirm that social influence would be significant in the late
easy to master for a young person when compared with the stages of adoption and use, if there is a context free of any
elderly who are apt to have less ability to learn new systems. mandatory action.
Researchers and practitioners should also be aware that as In comparing our results to the original UTAUT where
Internet communication technology usage is so common the explained variance was 70%, it appears that the UTAUT
today, usability and social aspects are now less important in explained only 42.10% of the variance in behavioral inten-
shaping attitudes, intentions, and behavior. tion to use SNS. The discrepancy in the explained variance

1670 JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014
DOI: 10.1002/asi
suggests that there may be additional factors relevant to SNS per capita income. It would then be appropriate to consider
behavioral intention to use that deserve further consider- cost issues related to social networking adoption and use as
ation. Such factors may include perceived media richness Venkatesh et al. (2012) proposed.
and perceived personal network (PPN).
Perceived media richness is related to the ability of the
Theoretical and Practical Contributions
communication medium to convey feelings and emotions
(the presence of multiple indicators: tone of voice, gestures, According to our results, it seems that the UTAUT did
oral and written language). In a high-context culture such as not address all the weaknesses of the well-known, and criti-
the Ivorian culture, words transmit only a portion of the cized, technology acceptance models. We are recommend-
meaning of a message. The rest of the message must often be ing going beyond the UTAUT by adding additional factors
inferred or interpreted according to the situation, body lan- for a more powerful explanation of ICT acceptance and to
guage, location, and relationship between people communi- address ICT continued use issues.
cating. Communication media such as SNS seem to TAM, as does the UTAUT, suggests that individuals’
facilitate that communication requirement in a high-context beliefs about the features offered by the information systems
culture, which may contribute to explaining their adoption explain their adoption and use. According to these theories,
and use. the totality of a person’s beliefs serves as the informational
Indeed, given that social influence does not hold in all base that ultimately determines the user’s intention and
adoption contexts, we recommend adding PPN exposure to behaviors. Humans are considered as essentially rational,
the UTAUT. PPN exposure is different from social influence using the information at their disposal to make judgments,
in that it captures the proportion of the adopters in a person’s form evaluations, and make decisions. According to the
network. The SNS is an Internet-based technology like other findings of this research, when it comes to social media, the
types of collective or interactive ICT; for a person to adopt conventional parameters for adoption do not hold up well.
them requires the existence of other adopters or users. Thus, Perhaps this is because the technology (social media) is
the adoption and diffusion of these technologies is not only synonymous with the web and the web is already widely
explained by the attributes of the system, as indicated by a accepted. Perhaps it is because the motivators to use social
number of theories in the literature. The larger the number of media technology are not only technological; rather, they are
persons using an interactive technology as SNS in a person’s more related to social interaction and human needs to com-
network, the greater the person’s willingness to adopt and municate. The use of social networking websites strengthens
use the technology. social relationship ties. In a high-context culture such as
In line with critical mass theory, we may suppose that African, information technologies which are facilitating
the greater the degree of the personal exposure, the higher message transmission are adopted even though traditional
the probability of the person’s willingness to continue to attributes such as those defined in the adoption model are
use SNS. unfavorable.
Social networking websites as virtual tools can be con- Unfortunately, the research to date on ICT adoption, use,
strued as hedonistic systems where users experience and dissemination has focused on IT characteristics rather
pleasure or fun when using the system (Al-Shafi & than taking into consideration the information and interac-
Weerakkody, 2009). Such uses may include socializing, tion aspects involved in the use of a system such as an SNS.
romantic encounters, shopping for desirable personal items, The use of such a system requires the exchange of verbal and
customizing one’s personal appearance, playing games, nonverbal messages conveying emotion and information.
fantasy, the creation of an alter ego (Hemp, 2006), and other Thus, research needs to consider the implications of both the
experiences that may, for example, contribute to building informational and technology aspects of a communication
self-esteem, social bonding, and self-actualization (Al-Shafi technology adoption and use decision. With the convergence
& Weerakkody, 2009). To have a pleasurable experience, of telecommunications, computing, and multimedia applica-
individuals often seek sensations on multiple sensory chan- tions, new social networking technologies are offering new
nels (Van der Heijden, 2003), and clearly virtual systems perspectives for a number of innovative applications in a
such as SNS are equipped, by design, to provide such mul- global and culturally diverse world.
timedia experiences (Al-Shafi & Weerakkody, 2009). Unfor- The UTAUT, as developed and used by Venkatesh et al.
tunately, an information systems adoption and use theory (2003) in a workplace context, espouses a systematic
such as the UTAUT is built primarily on the utilitarian approach based on a balance of efficacy (productivity gain)
paradigm of providing instrumental value to the user. The and efficiency (effective use of resources including time). It
recent study by Venkatesh et al. (2012) has indicated strong may not apply to ICT adoption in a nonwork setting where
support for use intentions driven by both utilitarian and the goals are not always productivity and efficiency. In the
hedonistic values of the system. work place, performance expectancy means that no one
We may reasonably think that cost could be viewed as an makes the decision to acquire new IT if it is not offering any
issue for using an SNS even though the cost is decreasing in benefit, while social influence refers to pressure from col-
Côte d’Ivoire. Furthermore, Internet connection charges in leagues and supervisors, and effort expectancy is the degree
Côte d’Ivoire are not cheap when compared to the average to which a person believes that using new IT would be easy. In

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014 1671
DOI: 10.1002/asi
the organizational context, people tend to use IT, regardless of finding into consideration. More efforts are needed to find
favorable or unfavorable attitudes toward it, if they believe the factors that do truly explain intention to use new com-
that it offers certain advantages, such as getting a promotion munication platforms such as social media. Future research
or increasing productivity. That statement makes sense in on ICT adoption and use in Africa should address this
today’s work environments which require flexibility and problem so that individuals can benefit from the full poten-
achieving results in limited time. The fact that IT has the tial of those tools and raise socioeconomic standards on
possibility to enrich a job and ensure efficiency increases its the continent.
probability to be used. The results presented here clearly
show that the UTAUT does not hold in all the adoption
contexts and it may not be used cross-culturally, outside its References
original country and language of origin. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior
Finally, our study contributes to IS research on culture. It and Human Decision Processes, 50, 179–211.
has been highlighted that the role of culture in ICT adoption Al-Shafi, S., & Weerakkody, V. (2009, June). Modeling use continuance in
virtual worlds: The case of second life. In ECIS 2009: Proceedings of
and use is not totally understood. Our research not only
17th European Conference on Information Systems, Helsinki, Finland.
shows the cultural differences, it also indicates the cultural Retrieved from http://aisel.aisnet.org/ecis2009/101
similarities with regards to ICT adoption and use behavior, Anandarajan, M., Igbaria, M., & Anakwe, U. (2000). Technology accep-
by demonstrating that performance expectancy resists tance in the banking industry: A perspective from a less developed
culture difference in SNS use. The study suggests that country. Information Technology and People, 13(4), 298–312.
Anandarajan, M., Igbaria, M., & Anakwe, U.P. (2002). IT acceptance in a
culture and context are contingency factors that should be
less-developed country: A motivational factor perspective. International
taken into account. Journal of Information Management, 22, 47–65.
Aubert, B., Rivard, S., & Patry, M. (1994, December). Development of
measures to assess dimensions of is operation transactions. In Proceed-
Study Limitations ings of ICIS.
Awoleye, M.O., Siyanbola, W.O., & Oladipupo, O.F. (2008). Adoption
As is typical, this research has limitations. It is possible
assessment of Internet usage amongst undergraduates in Nigerian uni-
that the data collected on the SNS are not easily generalized versities: A case study approach. Journal of Technology Management and
to other ICTs, and the UTAUT should be tested on other Innovation, 3(1), 84–89.
technologies to assess the external validity of the study. Bagozzi, R.P. (2007). The legacy of the technology acceptance model and
Another limitation of the study is that it is cross-sectional, a proposal for a paradigm shift. Journal of the Association for Informa-
tion Systems, 8(4), article 12.
and thus does not reflect the evolution of the variables
Bandyopadhyay, K., & Fraccastoro, K.A. (2007). The effect of culture on
studied over time. In this sense, it would be advisable for user acceptance of information technology. Communications of the
future research to conduct a longitudinal study to examine Association for Information Systems, 19, 522–543.
the evolution of beliefs and intention over time (before, Barker, V. (2009). Older adolescents’ motivations for social network site
during, and after the adoption of a technology), as was the use: The influence of gender, group identity, and collective self-esteem.
CyberPsychology & Behavior, 12(2), 209–213.
case with the original UTAUT study.
Bandyopadhyay, K., & Fraccastoro, K. (2007).The effect of culture on user
acceptance of information technology. Communications of the Associa-
tion for Information Systems, 19, 522–543.
Conclusion
Bolar, K.P. (2009). Motives behind the use of social networking sites:
The aim of this study was to further validate the An empirical study. The Journal of Management Research, 8(1), 75–
84.
UTAUT in the context of SNS use and adoption. We tested
boyd, D., & Ellison, N. (2007). Social network sites: Definition, history and
the determinants or factors from the UTAUT that explain scholarship. Journal of Computer-Mediated Communication, 13(1),
the use of SNS by young students in Côte d’Ivoire. This 210–230.
helps to further provide researchers and policy makers with boyd, D., & Heer, J. (2006, January). Profiles as conversation: Networked
prescriptive directions to address ICT adoption and diffu- identity performance on friendster. In Proceedings of the Hawai’i Inter-
national Conference on System Sciences (HICSS-39). IEEE Computer
sion in Côte d’Ivoire, creating the basis for sustainable ICT
Society.
development. Previous research has undertaken some work Brown, S.A., Dennis, A.-R., & Venkatesh, V. (2010). Predicting collabora-
to cross-culturally validate and culturally extend technol- tion technology use: Integrating technology adoption and collaboration
ogy acceptance models, such as the TAM. However, the research. Journal of Management Information Systems, 279(2), 9–53.
UTAUT, a more recent instrument, which combines exist- Chiasson, M., & Lovato, C. (2001). Factors influencing the formation of a
user’s perceptions and use of a DSS software innovation. Database:
ing models of technology acceptance including TAM, has
Advances in Information Systems, 32(3), 16–35.
been validated in few studies outside of its original Chiasson, M.W., & Lovato, C.Y. (2001). Factors influencing the formation
context. This study addressed this shortfall by applying the of a user’s perceptions and use of a DSS software innovation. ACM
UTAUT to a contemporaneous technology in a different SIGMIS – Database for Advances in Information Systems, 32(3), 16–35.
cultural context. We have shown that there are contexts, doi:10.1145/506724.506727
Chin, W.W., Marcolin, B., & Newsted, P. (2003). A partial least squares
such as Africa, in which the UTAUT does not hold up. The
latent variable modeling approach for measuring interaction effects:
findings also indicate that the adoption process differs Results from a Monte Carlo simulation study and an electronic-mail
from one technology and society to the next. ICT adoption emotion/adoption study. Information Systems Research, 14(2), 189–
and implementation projects should take that specific 217.

1672 JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014
DOI: 10.1002/asi
Chin, W.W., & Todd, P.A. (1995). On the use, usefulness, and ease of use Junelee, P. (2002). Information technology in Nepal: What role for the
of structural equation modeling in MIS research: A note of caution. MIS government? EJISDC, 8(3), 1–11.
Quarterly, 19(2), 237–246. Kaba, B., N’Da, K., Meso, P., & Mbarika, V. (2009). Micro factors influ-
Churchill, G.A. (1979). A paradigm for developing better measure of mar- encing the attitudes toward and the use of a mobile technology: A model
keting construct. Journal of Marketing Research, 16(1), 63–73. of cellular phones use in Guinea. IEEE Transactions on Professional
CIA World Factbook. (2010). Internet users. Retrieved from www.cia.gov/ Communication, 52(3), 272–290.
library/publications/the-world-factbook/geos/iv.htm Karahanna, E., Evaristo, J.R., & Srite, M. (2005). Levels of culture and
Compeau, D., & Higgins, C. (1995). Computer self-efficacy: Development individual behavior: An integrative perspective. Journal of Global Infor-
of measure and initial test. MIS Quarterly, 19(2), 189–210. mation Management, 13(2), 1–20.
comScore. (2007a). comScore Media Metrix releases top 50 Web ranking Karahanna, E., Straub, D., & Chervany, N. (1999). Information technology
for July. Reston, VA. Retrieved from http://www.comscore.com/press/ adoption across time: A cross-sectional comparison of pre-adoption and
release.asp?press1582 post-adoption beliefs. MIS Quarterly, 23(2), 183–213.
comScore. (2007b). Social networking goes global. Reston, VA. Retrieved Kim, S., & Malhotra, N. (2005). Predicting system usage from intention
from http://www.comscore.com/press/release.asp?press=1555 comScore and past use: Scale issues in the predictors. Decision Sciences, 36(1),
Daugherty, T., Gangadharbatla, H., & Kim, K. (2005). Polychronic media 187–196.
consumption: Exploring attitudes toward simultaneous media use. In C. Li, N., Kirkup, G., & Hodgson, B. (2001). Cross-cultural comparison of
La Ferle (Ed.), Proceedings of the American Academy of Advertising women students’ attitudes toward the internet and usage: China and the
Conference (pp. 74–75). United Kingdom. CyberPsychology & Behavior, 4(3), 415–426.
Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and Lin, C-P., & Bhattacherjee, A. (2008). Learning online social support: An
user acceptance of information technology. MIS Quarterly, 13(3), investigation of network information technology based on UTAUT.
19–340. CyberPsychology & Behavior, 11(3), 268–272.
Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989). User acceptance of Mahler, A., & Everett, R.M. (2000). The diffusion of interactive commu-
computer technology: A comparison of two theoretical models. Manage- nication innovations and the critical mass: The adoption of telecommu-
ment Science, 35, 982–1003. nication services by German banks. Telecommunication Policy, 23,
Ellison, N.B., Steinfeld, C., & Lampe, C. (2007). The benefits of Facebook 719–740.
“Friends”: Social capital and college students’ use of online social Markus, L. (1983). Power, politics, and MIS implementation. Communi-
network sites. Journal of Computer-Mediated Communication, 12(4). cations of the ACM, 26(6), 430–444.
doi: 10.1111/j.1083-6101.2007.00367 Mathieson K., Peacock, E., & Chin, W.W. (2001). Extending the technol-
eMarketer. (2006). User-generated content: Will Web 2.0 pay its way? ogy acceptance model: The influence of perceived user resources.
Retrieved from at http://www.eMarketer.com Database for Advances in Information Systems, 32(3), 86–112.
Fornell, C., & Bookstein, F.L. (1982). Two structural equation models: Mbarika, V., Okoli, C., Byrd, T., & Datta, P. (2005). The neglected
LISREL and PLS applied to consumer exit-voice theory. Journal of continent of IS research: A research agenda for Sub-Saharan Africa.
Marketing Research, 19, 440–452. Journal of the Association for Information Systems (JAIS), 6(5), 130–
Fornell, C., & Larcker, D.F. (1981). Evaluating structural equation models 170.
with unobservable variables and measurement error. Journal of Market- McCoy, S., Galletta, D., & King, W. (2007). Applying TAM across cul-
ing Research 18(1), 39–50. tures: The need for caution. European Journal of Information Systems,
Gallivan, M.J. (2001). Organizational adoption and assimilation of complex 16(1), 81–90.
technological innovations: Development and application of a new frame- Nunnally, J.C. (1967). Psychometric theory. New York: McGraw-Hill.
work. ACM SIGMIS – Database for Advances in Information Systems, Nunnally, J.C. (1978). Psychometric theory (2nd ed.). New York: McGraw-
32(3), 51–85. Hill.
Gangadharbatla, H. (2008). Facebook me: Collective self-esteem, need to Odedra, M., Bennett, M., Goodman, S., & Lawrie, M. (1993). Sub-Saharan
belong, and Internet self-efficacy as predictors of the igeneration’s atti- Africa: A technological desert. Communications of the ACM, 36(2),
tudes toward social networking sites. Journal of Interactive Advertising, 25–29.
8(2), 5–15. Orlikowski, W.J. (2000). Using technology and constituting structures: A
Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using practice lens for studying technology in organizations. Organizational
PLS-Graph: Tutorial and annotated example. Communications of the Sciences, 11(4), 149–160.
Association for Information Systems, 16. Retrieved from http:// Orlikowski, W. J., & Iacono, C.S. (2001). Research commentary: Desper-
aisel.aisnet.org/cais/vol16/iss1/5 ately seeking the “IT” in IT research—A call to theorizing the IT artifact.
Geldof, M. (2011). Earphones are not for women: Gendered ICT use among Information Systems Research, 12(2), 121–134.
youths in Ethiopia and Malawi. Information Technologies & Interna- Pelling, E.L., & White, K.M. (2009). The theory of planned behavior
tional Development, 7(4), 69–80. applied to young people’s use of social networking web sites. Cyber-
Hemp, P. (2006). Avatar-based marketing. Harvard Business Review, 84(6), Psychology & Behavior, 12(6), 755–759.
48–56. Peluchette, J., & Katherine, K. (2008). Social networking profiles: An
Hodge, M.J. (2006). The Fourth Amendment and privacy issues on the examination of student attitudes regarding use and appropriateness of
“new” Internet: Facebook.com and MySpace.com. Southern Illinois Uni- content. CyberPsychology & Behavior, 11(1), 95–97
versity Law Journal, 31, 95–123. Peter, J.P. (1981). Construct validity: A review of basic issues and market-
Hong, S.J., & Tam, K.Y. (2006). Understanding the adoption of multipur- ing practices. Journal of Marketing Research, 18, 133–145.
pose information appliances: The case of mobile data services. Informa- Ringle, C.M., Wende, S., & Will, A. (2005). SmartPLS 2.0 beta. Hamburg,
tion Systems Research, 17, 161–179. Germany: SmartPLS. Retrieved from http://www.smartpls.de
Hsieh, J.J., Rai, A., & Keil, M. (2008). Understanding digital inequality: Ringle, C.M., Wende, S., & Will, A. (2009). SmartPLS 2.0. Retrieved from
Comparing continued use behavioral models of the socio-economically www.smartpls.de
advantaged and disadvantaged. MIS Quarterly, 32(1), 97–126. Rogers, E.M. (1995). Diffusion of innovation, 4th edition. New York: The
Hsiu-Fen, L. (2006). Understanding behavioral intention to participate New Press.
in virtual communities. Cyber Psychology & Behavior, 9(5), 540– Schepers, J., & Wetzels, M. (2007). Meta-analysis of the technology accep-
547. tance model: Investigating subjective norm and moderation effects.
Joiner, R., Gavin, J., Duffield, J., Brosnan, M., Crook, C., Durndell, A., . . . Information and Management, 44(1), 90–103.
Lovatt, P. (2005). Gender, Internet identification, and Internet anxiety: Simon, H.A. (1977). The new science of management decision, 2nd edition.
Correlates of Internet use. CyberPsychology & Behavior, 8(4), 371–378. Englewood Cliffs, NJ: Prentice Hall.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014 1673
DOI: 10.1002/asi
Taylor, S., & Todd, P.A. 1995. Understanding information technology Venkatesh, V., & Davis, F.D. (2000). A theoretical extension of the tech-
usage: A test of competing models. Information Systems Research, 6(2), nology acceptance model: Four longitudinal field studies. Management
144–176. Science, 46(2), 186–204.
Thioune, R.M.C. (2003). Information and communication technologies for Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F. D. (2003). User
development in Africa: Opportunities and challenges for community acceptance of information technology: Toward a unified view. MIS
development. Volume 1. Ottawa: IDRC. Retrieved from www.idrc.ca Quarterly, 27(3), 425–478.
Thompson, R.L., Higgins, C.A., & Howell, J.M. (1994). Influence of expe- Venkatesh, V., Thong, L.J.Y., & Xin, X. 2012. Consumer acceptance
rience on personal computer utilization: Testing a conceptual model. and use of information technology: Extending the unified theory of
Journal of management information systems, 11(1), 167–187. acceptance and use of technology. MIS Quarterly, 36(1), 157–178.
Triandis, H.C. (1980). Values attitudes, and interpersonal behavior. Venkatesh, V., & Zhang, X. (2010). Unified theory of acceptance and use of
Nebraska Symposium on Motivation, Beliefs, Attitudes, and Values (pp. technology: U.S. vs. China. Journal of Global Information Technology
195–259). Lincoln, NE: University of Nebraska Press. Management, 13(1), 5–27.
Van der Heijden, H. (2003). User acceptance of hedonic information Wixom, B.H., & Watson, H.J. (2001). An empirical investigation of the
systems. MIS Quarterly, 28(4), 695–704. factors affecting data warehousing success. MIS Quarterly, 25, 17–41.

1674 JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY—August 2014
DOI: 10.1002/asi

You might also like