Professional Documents
Culture Documents
Final Dissertation Tamer Mohamed Abbas Ali Gad PDF
Final Dissertation Tamer Mohamed Abbas Ali Gad PDF
Thesis submitted in partial fulfilment of the requirements for the degree of doctor of
philosophy in Hotel Management
This Research was done through joint supervision between the Faculty of Tourism and
Hotel Management, Helwan University and Cardiff School of Management, University
of Wales Institute, Cardiff
By
Tamer Mohamed Abbas Ali Gad
B.Sc., Hotel Management, 2002
M.Sc., Hotel Management, 2005
2010
Declaration
Declaration
I declare that this work has not previously been accepted in substance for any
degree and is not being concurrently submitted for any other degree. I further
declare that this thesis is the result of my own independent work and
investigation, except where otherwise stated (a list of references is appended).
Finally, I hereby give consent for my thesis, if accepted, to be available for
photocopying and for inter-library loan and for the title and abstract to be made
available to outside organisations.
-------------------------------------------------------------------------
Tamer Mohamed Abbas Ali Gad (Candidate)
-------------------------------------------------------------------------
Prof. Ahmed Nour El-Din Elias (Director of Studies)
--------------------------------------------------------------------------
Prof. Eleri Jones (Supervisor)
i
Approval Sheet
Approval Sheet
This thesis for the degree of doctor of philosophy in hotel management has been
approved by:
Committee in charge
ii
Dedication
Dedication
The work is dedicated to my honourable mother, my respectful father and
my dear wife
iii
Acknowledgements
Acknowledgements
I would like primarily to praise and thank ALLAH, the most Gracious, the
Greatest and the most Merciful, who gave me the ability to complete this work.
I would like to express my thanks and appreciation to all hoteliers of budget and
upscale hotels in Wales who have taken part in this research for their time and
valuable information given during the interviews, which has contributed
effectively to the completion of this research.
I would like also to thank all staff members and colleagues of the Faculty of
Tourism and Hotel Management as well as my colleagues of the Cardiff School
of Management for their cooperation, best wishes and pleasant interaction since
the first day of this journey. They make it worthwhile.
iv
Abstract
Abstract
Despite the recognition of the importance of information and communication
technology (ICT) in the hotel industry, little is known about the factors
underpinning ICT-human interaction in hotels. This study aims to develop a
diagnostic tool to support human resource management at various stages of the
employee life cycle in hotels (recruitment and selection, training, ongoing ICT
support and performance appraisal) to enhance user performance and
satisfaction. The theory of planned behaviour (TPB) has been adopted in this
study as a theoretical basis to predict and understand the behaviour of users
towards hotel information systems. The critical review of the issues, concepts,
opinions and theories provided the basis for the development of a conceptual
framework to improve IT-human interaction in hotels.
v
Table of Contents
Table of Contents
Declaration i
Approval Sheet ii
Dedication iii
Acknowledgements iv
Abstract v
Table of Contents vi
List of Tables xiiii
List of Figures xiv
List of Abbreviations vi
vi
Table of Contents
vii
Table of Contents
viii
Table of Contents
ix
Table of Contents
x
Table of Contents
xi
Table of Contents
REFERNCES xxv
APPENDICES lxxi
Appendix A: Personal profile questionnaire lxxi
Appendix B: Focus groups schedule lxxii
Appendix C: Semi-structured interviews schedules lxxv
Appendix D: Hotel end-user employees survey lxxix
Appendix E: List of the investigated hotels in Wales lxxxv
Appendix F: Descriptive statistics for the survey scales lxxxvi
Appendix G: Web-based human resource functions lxxxix
ARABIC SUMMARY
xii
List of Tables
List of Tables
Table 3.2 The main differences between inductive and deductive approaches 3-7
Table 3.3 The epistemology, theoretical perspective, methodology and methods 3-10
adopted in the study
Table 3.4 The practical objectives involved within the study 3-15
Table 3.6 The hotel classification by the Welsh Assembly Government 3-25
Table 3.8 The number of interviewees as indicated by the investigated hotel 3-33
categories
Table 3.10 The number of questionnaire forms distributed and received along the 3-35
different hotel case studies
Table 3.12 The types and characteristics of generalisation in social research 3-49
Table 7.1 A strategic action plan to improve IT-human interaction in budget and 7-35
upscale hotels
Table 7.2 The summary of the cross-case analysis, involving: budget and upscale 7-42
hotels using off-the-shelf and bespoke systems
xiii
List of Figures
List of Figures
Figure 2.8 The information system (IS) diffusion variance model 2-21
Figure 2.10 The factors influencing the utilisation of personal computers 2-23
Figure 2.12 The modified expectancy theory model for motivating hotel employees 2-26
Figure 2.17 The social cognitive theory (SCT) in the IS context 2-32
Figure 2.19 The extension of the technology acceptance model (ETAM) 2-35
Figure 2.20 The unified theory of acceptance and use of technology (UTAUT) 2-36
Figure 2.22 The influence of user age on computer skill acquisition 2-41
xiv
List of Figures
Figure 2.25 The basic concept underlying user acceptance models 2-44
Figure 2.26 The combined TTF and technology acceptance model 2-46
Figure 2.27 The Relationships among, participation, involvement and IS success 2-48
Figure 2.29 The influence of user participation and involvement on system use 2-51
Figure 2.31 The relationship between user training and ICT usage 2-54
Figure 2.35 The organisational culture factors influencing ICT usage 2-61
Figure 2.36 The relationship between ICT usage and performance 2-62
Figure 2.38 The updated DeLone and McLean IS success model 2-65
Figure 2.41 The user satisfaction and SERVQUAL expectation gaps 2-67
Figure 2.42 The impact of technology acceptance and IS quality on user 2-68
satisfaction
Figure 2.43 The relationship between end-user satisfaction and ICT beliefs 2-69
Figure 2.45 The impact of ICT resources and capabilities on performance 2-77
xv
List of Figures
Figure 2.58 The impact of decentralised strategic decision making on performance 2-102
Figure 3.1 The wheel of research in terms of induction and deduction approaches 3-6
Figure 3.4 The sources of evidence for case study research 3-18
Figure 3.8 The conducted interviews as indicated by the investigated hotel 3-33
categories
Figure 3.9 The number of questionnaire forms distributed and received along the 3-36
different hotel case studies
Figure 3.11 The epistemology, theoretical perspective, methodology and methods 3-44
adopted in the study
Figure 4.1 The user-related factors emerged by the focus group participants 4-54
xvi
List of Figures
Figure 4.2 The organisation-related factors emerged by the focus group 4-55
participants
Figure 4.3 The system-related factors emerged by the focus group participants 4-56
Figure 4.4 The IT performance impacts emerged by the focus group participants 4-56
Figure 4.5 The IT satisfaction impacts emerged by the focus group participants 4-57
Figure 5.2 The degree of computing self-efficacy emerged by the users of budget 5-15
hotels using off-the-shelf systems
Figure 5.3 The degree of computing anxiety emerged by the users of budget 5-15
hotels using off-the-shelf systems
Figure 5.4 The degree of computing self-efficacy emerged by the users of budget 5-27
hotels using bespoke systems
Figure 5.5 The degree of computing anxiety emerged by the users of budget 5-27
hotels using bespoke systems
Figure 5.6 The perceived ease of system use emerged by the users of budget 5-31
hotels using off-the-shelf systems
Figure 5.7 The perceived system usefulness emerged by the users of budget hotels 5-35
using off-the-shelf systems
Figure 5.8 The perceived system compatibility emerged by the users of budget 5-38
hotels using off-the-shelf systems
Figure 5.9 The perceived system enjoyment emerged by the users of budget hotels 5-39
using off-the-shelf systems
Figure 5.10 The perceived ease of system use emerged by the users of budget 5-44
hotels using bespoke systems
Figure 5.11 The perceived system usefulness emerged by the users of budget hotels 5-45
using bespoke systems
Figure 5.12 The perceived system compatibility emerged by the users of budget 5-46
hotels using bespoke systems
Figure 5.13 The perceived system enjoyment emerged by the users of budget hotels 5-47
using bespoke systems
Figure 5.14 The participation activities emerged by the users of budget hotels using 5-51
off-the-shelf systems
xvii
List of Figures
Figure 5.15 The perceived involvement emerged by the users of budget hotels 5-52
using off-the-shelf systems
Figure 5.16 The participation activities emerged by the users of budget hotels using 5-55
bespoke systems
Figure 5.17 The perceived involvement emerged by the users of budget hotels 5-56
using bespoke systems
Figure 5.18 The evaluation of IT training emerged by the users of budget hotels 5-70
using off-the-shelf systems
Figure 5.19 The evaluation of IT training emerged by the users of budget hotels 5-81
using bespoke systems
Figure 5.20 The evaluation of IT support emerged by users of budget hotels using 5-87
off-the-shelf systems
Figure 5.21 The evaluation of IT support emerged by the users of budget hotels 5-92
using bespoke systems
Figure 5.22 The attitude towards use emerged by the users of budget hotels using 5-96
off-the-shelf systems
Figure 5.23 The subjective norms emerged by users of budget hotels using off-the- 5-97
shelf systems
Figure 5.24 The perceived behaviour control emerged by the users of budget hotels 5-98
using off-the-shelf systems
Figure 5.25 The attitude towards use emerged by the users of budget hotels using 5-98
bespoke systems
Figure 5.26 The subjective norms emerged by the users of budget hotels using 5-99
bespoke systems
Figure 5.27 The perceived behaviour control emerged by the users of budget hotels 5-100
using bespoke systems
Figure 5.28 The degree of satisfaction emerged by the users of budget hotels using 5-109
off-the-shelf systems
Figure 5.29 The degree of satisfaction emerged by the users of budget hotels using 5-111
bespoke systems
Figure 5.30 The criteria of recruiting employees emerged by the managers of 5-123
budget hotels
Figure 5.31 The types of hotel systems emerged by the managers of budget hotels 5-124
xviii
List of Figures
Figure 5.32 The criteria of selecting hotel systems emerged by the managers of 5-124
budget hotels
Figure 5.33 The types of end-user participation emerged by the managers of budget 5-125
hotels
Figure 5.34 The types of IT training emerged by the managers of budget hotels 5-126
Figure 5.35 The frequency of IT training emerged by the managers of budget hotels 5-126
Figure 5.36 The types of IT support emerged by the managers of budget hotels 5-127
Figure 5.37 The types of end-user motivation emerged by the managers of budget 5-128
hotels
Figure 5.38 The types of performance impacts emerged by the managers of budget 5-128
hotels
Figure 5.39 The motivators for user satisfaction emerged by the managers of 5-129
budget hotels
Figure 5.40 A developed model to improve IT-human interaction in budget hotels 5-131
Figure 6.1 The degree of computing self-efficacy emerged by the users of upscale 6-11
hotels using off-the-shelf systems
Figure 6.2 The degree of computing anxiety emerged by the users of upscale 6-12
hotels using off-the-shelf systems
Figure 6.3 The degree of computing self-efficacy emerged by the users of upscale 6-21
hotels using bespoke systems
Figure 6.4 The degree of computing anxiety emerged by the users of upscale 6-21
hotels using bespoke systems
Figure 6.5 The perceived ease of system use emerged by the users of upscale 6-25
hotels using off-the-shelf systems
Figure 6.6 The perceived system usefulness emerged by the users of upscale 6-27
hotels using off-the-shelf systems
Figure 6.7 The perceived system compatibility emerged by the users of upscale 6-28
hotels using off-the-shelf systems
Figure 6.8 The perceived system enjoyment emerged by the users of upscale 6-30
hotels using off-the-shelf systems
Figure 6.9 The perceived ease of system use emerged by the users of upscale 6-34
hotels using bespoke systems
xix
List of Figures
Figure 6.10 The perceived system usefulness emerged by the users of upscale 6-35
hotels using bespoke systems
Figure 6.11 The perceived system compatibility emerged by the users of upscale 6-37
hotels using bespoke systems
Figure 6.12 The perceived system enjoyment emerged by the users of upscale 6-39
hotels using bespoke systems
Figure 6.13 The participation activities emerged by the users of upscale hotels 6-42
using off-the-shelf systems
Figure 6.14 The perceived involvement emerged by the users of upscale hotels 6-43
using off-the-shelf systems
Figure 6.15 The participation activities emerged by the users of upscale hotels 6-45
using bespoke systems
Figure 6.16 The perceived involvement emerged by the users of upscale hotels 6-46
using bespoke systems
Figure 6.17 The evaluation of IT training emerged by the users of upscale hotels 6-56
using off-the-shelf systems
Figure 6.18 The evaluation of IT training emerged by the users of upscale hotels 6-64
using bespoke systems
Figure 6.19 The evaluation of IT support emerged by the users of upscale hotels 6-69
using off-the-shelf systems
Figure 6.20 The evaluation of IT support emerged by the users of upscale hotels 6-72
using bespoke systems
Figure 6.21 The attitude towards use emerged by the users of upscale hotels using 6-75
off-the-shelf systems
Figure 6.22 The subjective norms emerged by the users of upscale hotels using off- 6-76
the-shelf systems
Figure 6.23 The perceived behaviour control emerged by the users of upscale 6-77
hotels using off-the-shelf systems
Figure 6.24 The attitude towards use emerged by the users of upscale hotels using 6-78
bespoke systems
Figure 6.25 The subjective norms emerged by the users of upscale hotels using 6-79
bespoke systems
Figure 6.26 The perceived behaviour control emerged by the users of upscale 6-79
hotels using bespoke systems
xx
List of Figures
Figure 6.27 The degree of satisfaction emerged by the users of upscale hotels using 6-87
off-the-shelf systems
Figure 6.28 The degree of satisfaction emerged by the users of upscale hotels using 6-88
bespoke systems
Figure 6.29 The criteria of recruiting employees emerged by the managers of 6-99
upscale hotels
Figure 6.30 The types of hotel systems emerged by the managers of upscale hotels 6-99
Figure 6.31 The criteria of selecting hotel systems emerged by the managers of 6-100
upscale hotels
Figure 6.32 The types of end-user participation emerged by the managers of 6-101
upscale hotels
Figure 6.33 The types of IT training emerged by the managers of upscale hotels 6-101
Figure 6.34 The frequency of IT training emerged by the managers of upscale 6-102
hotels
Figure 6.35 The types of IT support emerged by the managers of upscale hotels 6-103
Figure 6.36 The types of end-user motivation emerged by the managers of upscale 6-103
hotels
Figure 6.37 The types of performance impacts emerged by the managers of upscale 6-104
hotels
Figure 6.38 The motivators for user satisfaction emerged by the managers of 6-105
upscale hotels
Figure 6.39 A developed model to improve IT-human interaction in upscale hotels 6-106
Figure 7.1 The reasons and solutions for end-user computing anxiety 7-5
Figure 7.2 The barriers and benefits for end-user participation and consultation 7-7
Figure 7.3 The barriers and benefits for conducting on-the-job training 7-10
Figure 7.4 The barriers and benefits for conducting off-the-job training 7-11
Figure 7.8 The barriers and solutions for off-site IT support 7-15
xxi
List of Figures
Figure 7.10 The barriers and solutions for IT performance and satisfaction 7-23
Figure 7.13 The process of developing a best practice model to improve IT-human 7-28
interaction in hotels
Figure 7.14 The process of people, organisation and system interaction 7-28
Figure 7.15 A best practice model to improve IT-human interaction in hotels 7-29
Figure 7.16a A strategic action plan flowchart to improve IT-human interaction in 7-31
hotels
Figure 7.16b A strategic action plan flowchart to improve IT-human interaction in 7-32
hotels
Figure 7.16c A strategic action plan flowchart to improve IT-human interaction in 7-33
hotels
Figure 7.16d A strategic action plan flowchart to improve IT-human interaction in 7-34
hotels
Figure 8.1 The summary of the theoretical and practical objectives 8-2
xxii
List of Abbreviations
List of Abbreviations
IT Information technology
IS Information System
MM Motivational Model
BI Behavioural Intention
A Attitude
SN Subjective Norms
AB Attitudinal Beliefs
NB Normative Beliefs
xxiii
List of Abbreviations
CB Control Beliefs
MC Motivation to Comply
PF Perceived Facilitation
QM Quality Management
QM Quality Management
HR Human Resource
xxiv
INTRODUCTION
Page 1-1
Chapter One: Introduction
1.1 Background
In highly-competitive business environments, information and
communication technology (ICT) has become an essential source of
sustainable competitive advantage and a strategic weapon for the hotel
industry (Connolly, Olsen and Moore, 1998). In particular, Siguaw and
Enz (1999) pointed that ICT has a profound impact on hotels because a
large amount of information has to be processed and communicated
among internal and external customers. Therefore, the ability to make a
full exploitation of the hotel technologies to improve the efficiency of
operations and customer service will be the key to future success in the
hotel industry (Buhalis, 1995; Siguaw and Enz, 1999). In that sense, Law
and Jogaratnam (2005) reported that a new challenge for hotel managers
in the 21st century is to integrate the new, complex and varied services
and technologies into their existing business operations.
In addition, Siguaw and Enz (1999) implied that the hotel industry
extensively relies on ICT to improve employees’ productivity and
efficiency and subsequently to improve customer satisfaction. Further,
Camison (2000) reported that using ICT can result in having advantages
in competition, decreasing costs, gaining time, enhancing service quality
and acquiring and sharing information. In a similar vein, Byars and Rue
(2004) reported that ICT is also used in employee training, succession
planning and compensation management.
On the other hand, Law and Jogaratnam (2005) argued that hotel
technologies are useful when they make hotel employees more productive
and better able to serve their customers. Therefore, when managers
consider the decision to invest in ICT in an organisation, it is important to
cultivate and nurture a sense of “user satisfaction” among the employees
with the ICT systems. Otherwise, it would be difficult to fully leverage
the potential of the ICT capabilities as a result of the investment (Lo and
Darma, 2000).
Page 1-2
Chapter One: Introduction
In addition, several studies (e.g. Ross, Beath and Goodhue, 1996; Lee and
Miller, 1999; Roepke, Agarwal and Ferratt, 2000; Hasan, 2003) showed
that new ICT would not be fully accepted if barriers of human factors are
overlooked, such as unwilling to change, lack of information and
technology (IT) skills and lack of IT support. Further, other researchers
(Law and Lau 2000; Singh and Kasavana, 2005) reported that hotel
managers might resist accepting new technologies, fearing that
technologies might change their ability to provide hotel guests with the
personal attention that characterizes a typical hotel business. Therefore,
this thesis will explore the way that hoteliers deal with each of these
issues and how they can make a full exploitation of technology.
Page 1-3
Chapter One: Introduction
Page 1-4
Chapter One: Introduction
The background information and the purpose of the study raise key
questions that the study seeks to address, as follows:
(1) What are the challenges facing technology adoption in hotels?
(2) What are the critical success factors for making a full exploitation of
technology in hotels?
(3) How could technology impact end-user employees’ performance and
satisfaction in hotels?
(4) How best can IT-human interaction in hotels be improved?
Page 1-5
Chapter One: Introduction
Theory of
Technology
planned
adoption
behaviour
End-user Upscale
employees hotels
Wales, UK
The second chapter is the literature review which provides the theoretical
framework of the study aiming to achieve enhanced understanding of
technology adoption in hotels. It is divided into five sections. The first
section explores ICT in the hotel industry, its concept, benefits, uses to
create competitive advantage and ends with the human side of ICT. The
second section considers the different theories which can be used to
enhance the understanding of human behaviour towards technology
adoption. The third section focuses on the factors influencing end-user
Page 1-6
Chapter One: Introduction
The third chapter is entitled the research approach which identifies and
rationalizes the research approach adopted in the current study. It presents
the thesis’s epistemology, theoretical perspective, methodology and
methods. The chapter provides justification for the research strategy,
sampling procedures and the methods used to meet the research
objectives. It also looks at the data analysis process and considers issues
of research validity, reliability and triangulation. It finally discusses the
potential for generalisation.
Page 1-7
Chapter One: Introduction
Page 1-8
LITERATURE REVIEW
2.3 The competing theoretical models (CTMs) and theories for understanding 2-15
technology acceptance in hotels
2.4 The critical success factors for technology adoption in hotels 2-39
2.4.1 End-user traits 2-39
2.4.2 Organisational traits 2-49
2.4.3 System traits 2-56
2.4.4 ICT usage 2-59
2.5 The impact of hotel ICT on end-user computing satisfaction (EUCS) 2-63
2.5.1 End-user computing satisfaction definitions 2-64
2.5.2 End-user computing satisfaction and ICT quality 2-64
2.5.3 End-user computing satisfaction and ICT beliefs 2-68
2.5.4 End-user computing satisfaction and ICT usage 2-69
2.5.5 End-user computing satisfaction and ICT input-benefits 2-70
Page 2-1
Chapter Two: Literature Review
2.1 Introduction
This chapter presents the literature review of the thesis. It explores
information and communication technology (ICT) in the hotel industry, its
concept, benefits, uses to create competitive advantage and ends with the
human side of ICT. This chapter also explores the competing theoretical
models (CTMs) and theories for understanding technology acceptance in
hotels. It focuses on the factors influencing end-user performance and
satisfaction, including end-user traits, organisational traits, system traits and
ICT usage. It concentrates on the impact of ICT on end-users satisfaction,
including end-user satisfaction definitions, its relationship with quality, ICT
beliefs, ICT usage and ICT input-benefits. This chapter also focuses on the
impact of ICT on end-user performance, including productivity, work
effectiveness, service quality and decision-making performance impacts.
Finally, the chapter presents a developed conceptual framework to improve
IT-human interaction.
Page 2-2
Chapter Two: Literature Review
the ICT concept encompasses two dimensions, ICT resources and ICT
capabilities (Werthner and Klein, 1999).
Page 2-3
Chapter Two: Literature Review
Therefore, this study aims to identify the critical success factors relating to
hotel technological and human ICT resources as well as to identify the major
ICT-enabled intangibles. Further, this study aims to develop a tool to create
an ICT capability. The concept of ICT in the hotel industry is shown in
Figure 2.1.
Page 2-4
Chapter Two: Literature Review
Buhalis and Main (1998) stated that the hotel industry, particularly full-
service hotel firms, has yet to fully accept ICT change to become more
efficient in the service production functions. However, Law and Lau (2000)
argued that hotel managers are often resistant to accept new technologies,
fearing that technologies might change their ability to provide hotel guests
Page 2-5
Chapter Two: Literature Review
with the personal attention that characterizes a typical hotel business. For
Law and Jogaratnam (2005), a new challenge for hotel managers in the 21st
century is to integrate the new, complex and varied services and technology
systems into their existing business operations.
Several authors (Baker, Bradley and Huyton, 2000; Aksu and Tarcan, 2002)
classified hotel ICT applications into four types, front-office applications,
back-office applications, restaurant and banquet management systems and
guest-related interface applications:
According to David, Grabski and Kasavana (1996) as well as Ham, Kim and
Jeong (2005), front-office applications, back-office applications and
restaurant and banquet management systems were found to significantly
affect the performance of upscale hotels. Front-office applications were the
Page 2-6
Chapter Two: Literature Review
Page 2-7
Chapter Two: Literature Review
Dhillon (2005) revealed that ICT system has few benefits on its own. But,
the most ICT benefits are derived from employees training and educational
programmes besides providing suitable organisational environment. The ICT
benefits dependency is shown in Figure 2.2.
Formal
Training/Education
Program
Some ICT benefits can
be linked to formal
training and education Organisational
programmes Environment
Page 2-8
Chapter Two: Literature Review
According to Paraskevas and Buhalis (2002), ICT can be used as a tool for
enhancing hotel employees‟ efficiency by: (1) improving information
processing (e.g. through guest history, arrivals and departures lists), (2)
developing planning and control (through effective use of reports generated),
(3) enhancing some work processes (by eliminating routine tasks), (4) saving
time and effort in a number of administrative functions (e.g. guest
accounting, reservations, marketing) and (5) reducing costs (predominantly
labour costs).
Page 2-9
Chapter Two: Literature Review
Mckeown and Philip (2003) reported that there are a range of competitive
strategies which hotels adopt to create competitive advantage. These
strategies include organisational learning, process improvement, e.g. total
quality management (TQM) and benchmarking and use of ICT. Piccolo
(2004) argued that ICT alone does not create competitive advantage. But,
hotels should identify which ICTs can create competitive advantage in
combination with their human ICT resources. Figure 2.4 illustrates the
competitive strategies overview model.
Page 2-10
Chapter Two: Literature Review
Processes
Inputs Results
(Competitive Strategies)
Page 2-11
Chapter Two: Literature Review
In addition, Davenport (1993) stated that ICT is only useful if it helps people
do their work better and differently. Pfeffer (1994) pointed that creating ICT
business value through people means working with them, not replacing
them, eliminating the scope of their activities or viewing them as a cost to be
minimised. Kirk and Pine (1998) highlighted that the definition of
technology that can have the most relevance to hotel industry should
incorporate the human element, since technology can not be considered in
isolation of people. Thus, ICT alone does not produce sustainable
performance advantages to firms, but they should use ICT to leverage
intangible, complementary human and business resources (Powell and Dent-
Micallef 1997; Medlik and Ingram, 2000; Knox and Maklan 1998).
Inherently, Devenport (1999) argued that technology alone cannot change
the culture and transform the company. He claimed that the necessary
transformation requires a basic change in human habits, attitudes, values and
expectations. To that end, Bruque and Medina (2002) confirmed that a high
level of co-ordination between human, management resources and
technology is needed to achieve the optimal combined effect.
Page 2-12
Chapter Two: Literature Review
The impact on the ICTs can affect the identity and stress level of employees.
individuals ICTs can affect the status and satisfaction of employees.
ICTs can lead to improved efficiency of communication.
ICTs can lead to decreased face-to-face contact between employees.
ICTs can lead to an increase of total volume of communication.
ICTs can provide methods for monitoring and controlling work.
The impact on ICTs can reduce the quantity and quality of social interaction.
interpersonal relations ICTs can affect the volume of communications among employees.
The impact on inter- ICTs can affect the degree of interdepartmental conflict,
departmental relations interdependence and definition of boundaries.
The impact on ICTS can facilitate changes in the definition of physical organisational
organisational boundaries.
structure ICTs can improve the ability of the organisation to accommodate
structures changes.
Page 2-13
Chapter Two: Literature Review
Page 2-14
Chapter Two: Literature Review
Huh, Kim and Law (2009) believed that it is crucial to examine the extent to
which existing competing theoretical models (CTMs) and theories can
explain employees‟ HIS acceptance accurately. Thus, in this study twelve
CTMs and theories were examined, including:
1. The theory of reasoned action (TRA);
2. The technology acceptance model (TAM);
3. The theory of planned behaviour (TPB);
4. The innovation diffusion theory (IDT);
5. The model of personal computer utilisation (MPCU);
6. The motivational model (MM);
7. The decomposed TPB (DTPB);
8. The task-technology fit (TTF) theory;
9. The social cognitive theory (SCT);
Page 2-15
Chapter Two: Literature Review
Attitude
towards Use
Subjective
Norms
Page 2-16
Chapter Two: Literature Review
External Acceptance
Technology PerceivedModel (TAM)
Variables Usefulness
In the context of hotels, Liao and Landry (2000) suggested that short-term
and long-term satisfaction with information systems is related to employees‟
perception of system usefulness in facilitating their daily tasks. Further,
Lam, Cho and Qu (2007) believed that high-perceived usefulness of a
Page 2-17
Chapter Two: Literature Review
Attitude
towards Use
Perceived
Behavioural
Control
Page 2-18
Chapter Two: Literature Review
In the context of hotels, the TPB predicts that the more favourable an
individual evaluates a particular behaviour, the more likely the individual
will intend to perform that behaviour (Huh, Kim and Law, 2009). Further,
the more an individual perceives that others significantly think he/she should
engage in the behaviour, the greater the individual‟s level of motivation to
comply with those others (Huh, Kim and Law, 2009). Taylor and Todd,
(1995) declared that SN may be more important in an organisational setting
as in hotel because users may feel some social pressure to use the IT. In
hotels, social pressure for operative employees is likely to come from
managers (Law and Jogaratnam, 2005). Similarly, Lam, Cho and Qu (2007)
believed that managers‟ perspectives generally affect adoption and
application of IT in hotels. To that end, Huh, Kim and Law (2009)
maintained that hotel employees are more willing to accept HIS if they have
a positive attitude towards the use of HIS, want to comply with other
important people‟s (e.g. peers and supervisors) opinions on the use of HIS
and have the requisite skill, knowledge, resource and experience.
Page 2-19
Chapter Two: Literature Review
In the IS context, Moore and Benbasat (1991) expanded upon the five
factors impacting the adoption of innovations presented by Rogers (1983),
generating eight factors, which are: relative advantage, ease of use, image,
visibility, compatibility, result demonstrability, trialability and voluntariness.
Relative advantage is “the degree to which an innovation is perceived as
being better than its precursor” (Moore and Benbasat, 1991, p.195). Ease of
use is “the degree to which an innovation is perceived as being ease to use”
(Moore and Benbasat, 1991, p.195). Image is “the degree to which use of an
innovation is perceived to enhance one‟s image or status in one‟s social
system” (Moore and Benbasat, 1991, p.195). Visibility is “the degree to
which one can see others using the system in the organisation” (Moore and
Benbasat, 1991, p.195). Compatibility is “the degree to which an innovation
is perceived as being consistent with the existing values, needs and past
experiences of potential adopters” (Moore and Benbasat, 1991, p.195).
Result demonstrability is “the tangibility of the results of using the
innovation, including their observability and communicability” (Moore and
Benbasat, 1991, p.195). Trialability is “the degree to which an innovation
may be experimented with before adoption” (Moore and Benbasat, 1991,
p.195). Voluntariness of use is “the degree to which use of the innovation is
perceived as being voluntary or of free will” (Moore and Benbasat, 1991,
p.195). To that end, Agarwal and Prasad (1998) developed an IS diffusion
variance model. This model is composed of three factors which are technical
compatibility, technical complexity and relative advantage. This model is
demonstrated in Figure 2.8.
Page 2-20
Chapter Two: Literature Review
Technical Compatibility
Relative Advantage
(Perceived Need)
Page 2-21
Chapter Two: Literature Review
Social Factors
Habit Affect
Hierarchies
Intentions Behaviour
Perceived
Consequences
Facilitating
conditions
Page 2-22
Chapter Two: Literature Review
Long-Term
Consequences Affect towards
of PC Use PC Use
Social Factors
Job Fit with Utilisation of Influencing PC
PC Use PCs Use
Facilitating
Complexity of
Conditions for
PC Use
PC Use
Page 2-23
Chapter Two: Literature Review
In the IS context, Davis, Bagozzi and Warshaw (1992) applied the ETM and
SDT to explore the factors that influence technology acceptance. Intrinsic
motivation is defined as “the perception that users will want to perform an
activity for no apparent reinforcement other than the process of performing
the activity per se” (Davis, Bagozzi and Warshaw, 1992, p.1112). Extrinsic
motivation is defined as “the perception that users will want to perform an
activity because it is perceived to be instrumental in achieving valued
outcomes that are distinct from the activity itself, such as improved job
performance, pay or promotions” (Davis, Bagozzi and Warshaw, 1992,
p.1112).
Page 2-24
Chapter Two: Literature Review
Extrinsic
motivation
Intrinsic Behavioural
motivation intention to use
Perceived ease
of use
In the context of hotels, several researcher (e.g. Jex and Elacqua, 1999;
Wong, Siu and Tsang, 1999; Chiang and Jang, 2008; Maroudas, Kyriakidou
and Vacharis, 2008) believed that the nature of hotel work, its low pay and
its long working hours contribute to the high employees‟ turnover. Thus, to
effectively address turnover problem, employee motivation could be an on-
going and critical issue for hotel managers. Chiang and Jang (2008)
developed a modified expectancy theory model for hotel employee
motivation (Figure 2.12). They declared that hotel employees are motivated,
as follows: (1) if hotel employees believe that their effort will lead to desired
performance (expectancy), (2) if hotel employees believe that good
performance will lead to desired outcomes, such as self-fulfilment, self-
esteem (intrinsic instrumentality) or pay, bonus, promotion (extrinsic
instrumentality) and (3) if hotel employees receive a reward or outcome that
motivates them to work, such as feelings of accomplishment (intrinsic
valence) monetary rewards (extrinsic valence).
Page 2-25
Chapter Two: Literature Review
Figure 2.12: The modified expectancy theory model for motivating hotel employees
Intrinsic Extrinsic
Instrumentality Instrumentality
Regarding the normative beliefs, Taylor and Todd (1995) stated that
subjective norm is formed as the individual‟s normative belief (NB)
Page 2-26
Chapter Two: Literature Review
As regards the control beliefs, Taylor and Todd (1995) stated that perceived
behavioural control is formed as the sum of the control beliefs (CB)
weighted by the perceived facilitation (PF) of the control belief in either
inhibiting or facilitating the behaviour. For example, an individual may feel
that he/she does not have the skill to use IT (CB) and that skill level is
important in determining usage (PF). Several researchers (e.g. Hung and
Chang, 2005; Huang and Chuang, 2007; Huh, Kim and Law, 2009)
decomposed perceived behavioural control into the dimensions of (1) self-
efficacy and (2) technical support. Self-efficacy refers to “People's judgments
of their capabilities to organise and execute courses of action required to
attain designated types of performances” (Bandura, 1986, p.391; Martochio
and Dulebohn, 1994, p.358). In other words, CSE is not concerned only
with the skills one has but also with judgments of what one can do with
whatever skills one possesses. McDonald and Siegall (1992, p.467) defined
computer self-efficacy (CSE) as “the belief in one‟s ability to successfully
perform a technologically sophisticated new task”. In addition, Hasan (2003,
p.445) defined CSE as “one‟s interest and willingness to use and interact
with ICT”. The decomposed TPB is demonstrated in Figure 2.13.
Page 2-27
Chapter Two: Literature Review
Perceived
Ease of Use
Perceived Attitude
Usefulness towards Use
Compatibility
Peer Influence
Self-efficacy
Perceived
Behavioural
Technical Control
Support
In the context of hotels, Huh, Kim and Law (2009) believed that employees
who consider HIS to be compatible with their work style are more likely to
express a high willingness to use HIS. Further, Lame, Cho and Qu (2007)
reported that in hotels, managers‟ perspectives generally affect adoption of
IT. In the employees‟ HIS acceptance context, the expectations of peers and
superiors may be expected to differ in a hotel‟s organisational setting. Thus,
measures of subjective norms should consider the different interpersonal
influences (Huh, Kim and Law, 2009). In the employees‟ HIS acceptance
context, self-efficacy refers to “employees‟ self-assessment of their
capabilities to use HIS” (Huh, Kim and Law, 2009, p.124). Meanwhile,
technical support reflects the assistance of the information system
department with HIS difficulties and availability of network of support (i.e.
knowledgeable peers, superiors and support personnel) as declared by
Huang and Chuang (2007). To that end, Huh, Kim and Law (2009) believed
Page 2-28
Chapter Two: Literature Review
that higher levels of CSE and technical support would lead to higher levels
of behavioural intention to use HIS.
Task Performance
Characteristics Impacts
Task –
Technology Fit
Technology Utilisation
Characteristics
Page 2-29
Chapter Two: Literature Review
Task-Technology
Fit
Perceived
Usefulness
TAM
Page 2-30
Chapter Two: Literature Review
Behaviour
Page 2-31
Chapter Two: Literature Review
Computer
Encouragement Affect
Self-Efficacy
by Others
Outcome
Others’ Use Expectations Anxiety
(Performance)
Outcome
Organisational Expectations Usage
Support (Personal)
Page 2-32
Chapter Two: Literature Review
Course
Attitude
End-User
Computing
Experience Relative
Advantage
Training
Usage
Enjoyment
Support
End-User Computing
Compatibility Satisfaction
Ease of Use
Image
System
Rating
Page 2-33
Chapter Two: Literature Review
In addition, Moore and Benbasat (1991, p.195) defined image as “the degree
to which use of a technological innovation is perceived to enhance one‟s
status in one‟s social system”. In this regard, TAM2 theorizes that subjective
norm will positively influence image because if important members of a
person‟s social group at work believe that he/she should perform a behaviour
(e.g. using a system), then performing it will tend to elevate his/her standing
within the group. This social influence is known as identification.
Identification will occur whether the context of system use is voluntary or
mandatory (Venkatesh and Davis, 2000). However, several researchers
(Hartwick and Barki, 1994; Agarwal and Prasad, 1997; Venkatesh and
Davis, 2000) argued that the direct effect of subjective norm on intentions
for mandatory usage contexts will be strong prior to implementation and
during early usage, but will weaken over time as increasing direct experience
with a system provides a growing basis for intentions towards ongoing use.
Page 2-34
Chapter Two: Literature Review
Experience Voluntariness
Subjective
norm
Perceived
Image
usefulness
Intention to Usage
Job relevance use behaviour
Perceived
Output quality ease of use
TAM
Result
demonstrability
Page 2-35
Chapter Two: Literature Review
Performance Expectancy:
- perceived usefulness
- extrinsic motivation
- job-fit
- relative advantage
- outcome expectations
Effort Expectancy:
- perceived ease of use
- complexity
- ease of use Behavioural Use
Intention Behaviour
Social Influence:
- subjective norm
- social factors
- image
Facilitating Conditions:
- perceived behavioural control
- facilitating conditions
- compatibility
Page 2-36
Chapter Two: Literature Review
2.3.13 Similarities and differences among the CTMs: TAM, TPB and
DTPB
Prior studies (e.g. Taylor and Todd, 1995; Hung and Chang, 2005; Lin,
2007; Huh, Kim and Law, 2009) on the CTMs comparison have reported
some similarities and differences among TAM, TPB and DTPB. A
comparison of the three CTMs revealed the following two similarities:
The three CTMs are grounded from social psychology and have been used
to understand the determinants of users‟ behavioural intention to use IT/IS
(Taylor and Todd, 1995; Hung and Chang, 2005).
Each CTM can predict and explain users‟ acceptance of IT/IS in an
individual way (Lin, 2007).
On the other hand, there are five notable differences among the three CTMs:
The TAM, first proposed by Davis (1986), is an adoption of the Ajzen and
Fishbein‟s (1980) TRA; the TPB extends the TRA to explain behavioural
conditions not entirely under volitional control (Ajzen, 1988); the DTPB
deconstructs belief structures of the TPB into several factors (Taylor and
Todd, 1995).
To represent the antecedents of user acceptance, the TAM focuses on two
factors, perceived ease of use and perceived usefulness (Davis, 1989); the
TPB stresses the influence of attitude towards use, subjective norms and
perceived behavioural control beliefs on behavioural intention and actual
use (Ajzen, 1988); The DTPB focuses on identifying various belief factors
that influence three determinants of intention (i.e. attitude towards use,
subjective norms and perceived behavioural control).
There are varying degrees of generality among the three CTMs (Huh, Kim
and Law, 2009). TAM assumes that beliefs about perceived ease of use
and perceived usefulness are always primary determinants of users‟
Page 2-37
Chapter Two: Literature Review
decision to use the innovation, whereas the beliefs that are involved in the
TPB and DTPB are specific to each situation (Lin, 2007). Thus the TPB
and DTPB are more appropriate to apply across diverse user contexts than
the TAM (Huh, Kim and Law, 2009).
The TAM does not explicitly include any social variables (i.e. subjective
norms) whereas the TPB and DTPB do. Particularly, the DTPB has
decomposed subjective norms into multidimensional belief constructs
(Huh, Kim and Law, 2009).
The final major difference between the three CTMs is their treatment of
behavioural control, referring to the skills, resources and opportunities.
The only such variable in the TAM is perceived ease of use. Therefore the
TAM‟s perceived ease of use construct consists of perceived behavioural
control but only the internal control beliefs (Huh, Kim and Law, 2009).
In summary, Taylor and Todd (1995) found that the DTPB is superior to the
TPB and TAM in understanding behavioural intention to use IT. They
revealed that the decomposed TPB may be particularly relevant to providing
guidance during implementation efforts. Moreover, it may provide a linkage
between the study of individual IT usage and the impact of organisational IT
deployment decisions on the value of IT to the firm. In this regard, Hung and
Chang (2005) as well as Lin (2007) stated that, in DTPB, predicted attitude
towards use of HIS is better than the TAM. They mentioned that TAM is
more parsimonious than the DTPB. Similarly, Huh, Kim and Law (2009)
stated that in terms of behavioural intention to use HIS, the DTPB can
provide a better explanation of employees‟ behavioural intention to use HIS
than both the TAM and TPB. They demonstrated that the decomposition of
beliefs can provide additional insights into employees‟ behavioural intention
to use HIS.
Page 2-38
Chapter Two: Literature Review
Page 2-39
Chapter Two: Literature Review
Attitude
towards Using
Perceived
Behavioural
Control
Page 2-40
Chapter Two: Literature Review
Attitude toward
technological change
(ATTC)
In addition, Fagan, Neill and Wooldridge (2003) are in agreement with Dyck
and Smither (1994) in that less computer experience of older employees may
also affect CSE and lead to lower performance. However, Kok, Lorist,
Cremer and Snel (1994) argued that not all older people show declines in
computer performance. Many older individuals perform at levels equal to or
better than the average performance of younger people. Huuhtanen and
Leino (1992) pointed that learning computer skills requires change in
knowledge and abilities. People react to technological change differently
depending on whether they perceive the change as an opportunity or threat.
In this regard, Cant, O‟Loughlin and Legge (2001) as well as Ashman, Dror,
Houlette and Levy (2003) found no relationship between age and ATTC.
They demonstrated that new technology creates new demands and general
stress for all employees and employees with a positive ATTC may embrace
new technology through their thoughts, feelings and actions.
On the other hand, Bailey and Hansson (1995) argued that some older
employees worry more than younger employees about acquiring new
computer skills. They also maintained that older employees feel their job
security is more threatened by technology than younger employees. More
Page 2-41
Chapter Two: Literature Review
specifically, they reported that older employees may face psychological and
technological obstacles and as a result they might have negative ATTC.
Inherently, Reed, Doty and May (2005) proposed that ATTC moderates the
relationship between age and CSE.
Perceived
Usefulness TAM
Subjective
Norms
Gender Experience
Page 2-42
Chapter Two: Literature Review
Experience
with PCs
Long-Term
Consequences Affect towards
of PC Use PC Use
Social Factors
Job Fit with Utilisation of Influencing PC
PC Use PCs Use
Facilitating
Complexity of
Conditions for
PC Use
PC Use
Page 2-43
Chapter Two: Literature Review
Individual reactions
Intentions to use ICT Actual use of ICT
to use ICT
Page 2-44
Chapter Two: Literature Review
Several researchers (Ajzen and Fishbein, 1980; Ajzen 1991; Davis, Bagozzi
and Warshaw, 1989) found significant relationships between user attitude,
intention to use and ICT usage. They claimed that the computer usage is
determined by user behavioural intention (BI) and user attitude towards
using the system (A). Further, Al-Gahtani and King (1999) pointed that user
ATTC has positive impacts on ICT usage and end-user satisfaction.
Similarly, Devaraj, Fan and Kholi (2002) found that user ATTC positively
impacts user satisfaction and user performance. In a similar vein, Reed, Doty
and May (2005) implied that user ATTC has a positive impact on user CSE.
To that end, Pijpers and Montfort (2005) mentioned a significant
relationship between user ATTC and intention to use the system.
Page 2-45
Chapter Two: Literature Review
Subjective Norm
Compeau and Higgins (1995) as well as Compeau, Higgins and Huff (1999)
identified three relevant dimensions of CSE judgments: CSE magnitude,
CSE strength and CSE generalisability. CSE magnitude can be interpreted to
reflect the level of task difficulty one believes is attainable. Individuals with
a high CSE magnitude might be expected to perceive themselves as able to
accomplish more difficult computing tasks than those with lower judgments
of CSE magnitude. Alternatively, CSE magnitude might be determined in
terms of support levels required to undertake a task. Individuals with a high
magnitude of CSE might judge themselves as capable of operating with less
support and assistance than those with lower judgments of CSE magnitude.
CSE strength refers to the level of confidence an individual has regarding
his or her ability to perform computing tasks. CSE generalisability reflects
the degree to which the judgment is limited to a particular domain of
activity. Thus, individuals with high CSE generalisability would expect to be
competently able to use different software packages and different computer
systems, while those with low CSE generalisability would perceive their
capabilities as limited to particular software packages or computer systems.
Page 2-46
Chapter Two: Literature Review
Page 2-47
Chapter Two: Literature Review
Further, Barki and Hartwick (1994) as well as Hartwick and Barki (1994)
claimed that users who are active in the system development process (i.e.
users who are highly participated) are quite likely to develop beliefs that the
system is both important and personally relevant (i.e. users who are highly
involved) and the feeling that the system is good (i.e. users who have a
positive attitude towards the system). In this regard, they reported that the
effect of user participation on intentions and system use is mediated by the
psychological constructs of involvement, attitude concerning use and
subjective norms. Similarly, McGill and Klobas (2008) revealed that user
participation and involvement positively impact user satisfaction as
demonstrated in Figure 2.27.
Figure 2.27: The Relationships among, participation, involvement and IS success
System Individual
Quality Impact
Perceived User
System Quality Satisfaction
Perceived
User User Individual
Participation Involvement Impact
Page 2-48
Chapter Two: Literature Review
Page 2-49
Chapter Two: Literature Review
Barki and Hartwick (1994) as well as Hartwick and Barki (1994) have
identified three distinct dimensions of user participation: overall
responsibility, user-IS relationship and hands-on activity. Overall
responsibility refers to “user activities and assignments reflecting overall
leadership or accountability for the system development project” (Hartwick
and Barki, 1994, p.442). For example when users being responsible for
selecting hardware or software. User-IS relationship refers to “development
activities reflecting user-IS communication and influence”. For example
when users being informed by the IS staff during various stages of ISD
(Hartwick and Barki, 1994, p.442). Hands-on activity refers to “specific
physical design and implementation tasks performed by users” (Hartwick
and Barki, 1994, p.442). For example when users create a manual for user
procedures and design a user training programme (Figure 2.29).
Figure 2.29: The influence of user participation and involvement on system use
User
Participation
Overall
Responsibility
Attitude towards Attitude
the System Concerning Use
User-IS Intention System
Relationship to Use Use
Subjective Norm
User Involvement
Concerning Use
Hands-On
Activity
Page 2-50
Chapter Two: Literature Review
Page 2-51
Chapter Two: Literature Review
Product Development
Performance
User Participation
and Involvement in System Quality
ICT Quality of requirements
- Fit with user needs
- Usability
User Satisfaction
Page 2-52
Chapter Two: Literature Review
Page 2-53
Chapter Two: Literature Review
Figure 2.31: The relationship between user training and ICT usage
In addition, Lee, Kim and Lee (1995; 2006) found that ICT training has
positive impacts on computer skills, performance and new technology
acceptance. Further, Agarwal and Prasad (1999) noted that ICT training
positively improves end-users‟ perceptions of the system usefulness and
eventually influences perceived performance. In a similar vein, Venkatesh et
al. (2003) mentioned that ICT training has a positive impact on end-users‟
perceptions of the system‟s ease of use. Stone, Good and Baker-Eveleth
(2006) pointed that ICT training improves end-users‟ perception of the
system‟s ease of use and eventually positively influencing perceived
performance and end-user satisfaction. To that end, Marler, Liang and
Dulebohn (2006) developed a training technology model. This model shows
that the extent of user training and the users‟ positive reactions towards
training (i.e. perceived learning; training enjoyment; training effectiveness)
have positive impacts on users‟ perceptions of system usefulness and ease of
system use. The training technology model is shown in Figure 2.32.
Page 2-54
Chapter Two: Literature Review
Ease of Use
Extent of User
Training
Intention to Use
Usefulness
ICT
Training Reactions
- Perceived learning
- Training enjoyment
- Training effectiveness
Employee
Resources
On the other hand, Clegg et al. (1997) mentioned two constraints of ICT
training: (1) ICT training is often provided after the system is in operation
and (2) users are trained in how to operate the technology rather than in how
to do the job better. In this regard, Gallivan, Spitler and Koufaris (2005)
identified other two constraints of ICT training: (1) ICT training is often the
first expense cut when corporations need to tighten their spending and (2)
managers often perceive ICT training to be a solution that will increase user
acceptance and usage of ICT, although there may be other non-training
barriers to ICT usage. To that end, Law and Jogaratnam (2005) added other
three constraints of ICT training: (1) ICT training is time consuming, (2)
inconsistency of user‟s computer knowledge and (3) most ICT training
happens on the job, as a result skills are passed over from one employee to
another in an unstructured manner, which easily leads to inconsistent
standards of ICT utilisation.
Page 2-55
Chapter Two: Literature Review
and user performance and satisfaction. In this regard, other researchers (e.g.
Venkatesh and Davis, 2000; Venkatesh et al., 2003; Lam, Cho and Qu,
2007; Carmeli, Sternberg and Elizur, 2008; Huh, Kim and Law, 2009)
reported that the social factors construct plays a significant role as a direct
determinant of user acceptance and ICT usage. Similarly, Lam, Cho and Qu
(2007) believed that individuals who perceive that others expect that they
should use the system will have a high score on intentions to use the system,
even when they may personally not feel positive about the system.
Page 2-56
Chapter Two: Literature Review
Further, Al-Gahtani and King (1999) as well as Somers, Nelson and Karimi
(2003) pointed that perceived ease of use has positive impacts on user
attitude, ICT usage and subsequently end-user satisfaction. Moreover,
Devaraj, Fan and Kholi (2002) as well as Stone, Good and Baker-Eveleth
(2006) maintained significant relationships between perceived ease of use,
user attitude, ICT usage, end-user satisfaction and performance. To that end,
Klopping and McKinney (2004) as well as Lam, Cho and Qu (2007) claimed
significant relationships between perceived ease of use, user attitude and
intention to use the system.
Page 2-57
Chapter Two: Literature Review
Individual Traits
Organisational
Traits Ease of
System Use
Information
Quality Organisational
End-user’s
System Performance
Satisfaction
Use Impacts
System/service (Attitude)
Quality
Perceived
Usefulness
Industry Traits
Tasks Performed
Page 2-58
Chapter Two: Literature Review
With regards to the factors influencing ICT usage, Seyal, Rahim and
Rahman (2000) identified two factors influencing ICT usage, which are:
end-user parameter and organisational parameters. End-user parameters
include computer experience, computer training, educational level and
ownership of personal computer. Organisational parameters include size of
organisation, type of business and profitability of organisation. Figure 2.34
illustrates these factors influencing ICT usage.
Page 2-59
Chapter Two: Literature Review
Organisational End-user
Parameters Parameters
Size of Computer
Organisation Experience
Computer
Type of Training
ICT Usage
Business
Educational
Level
Profitability of
Organisation Ownership of
PC
Page 2-60
Chapter Two: Literature Review
Behaviour Modality
- Cognitive (belief)
The assessment of - Affective (satisfaction)
- Instrumental (action) Behaviour by
employee (x) of the
- Value (importance)
- Norms (desired)
Objects Referent
- Respondent
- Creative work Toward - Colleagues
- ICT - Manager
- ICT staff
High
or ICT Usage
Low
Several researchers (e.g. Al-Gahtani and King, 1999; Khalil and Melkordy,
1999; McGill, Hobbs and Klobas, 2003; Stone, Good and Baker-Eveleth,
2006) found a positive relationship between end-user satisfaction and ICT
usage. However, Baroudi, Olson and Ives (1988) suggested three models for
the relationship between end-user satisfaction and system usage: (1)
satisfaction and usage are not related, (2) usage influences satisfaction and
(3) satisfaction influences usage. To that end, Lo and Darma (2000) found
that end-user satisfaction has a greater effect on ICT usage than the effect of
ICT investment. For that, they suggested that in order to maximise the
potential of the ICT capabilities of an organisation (ICT usage), senior
managers must raise the satisfaction level of the users to ensure better
utilisation of the ICT capabilities rather than increase the ICT investment.
On the other hand, Lucas and Spitler (1999) proposed a negative relationship
between ICT usage and performance. They claimed that users who perform
poorly may respond by increasing their use of the ICT in the hope that it will
Page 2-61
Chapter Two: Literature Review
Collective action
Collective ICT Collective Task
Usage 3 Performance
Collective learning
Collective Collective
Individual assignment Individual assignment
enactment 2 and enactment 4 and
enactment enactment
Individual action
Individual ICT Individual Task
Usage 1 Performance
Individual learning
Page 2-62
Chapter Two: Literature Review
Page 2-63
Chapter Two: Literature Review
System Use
Quality
Individual Organisational
Impact Impact
Information User
Quality Satisfaction
Page 2-64
Chapter Two: Literature Review
Information
Quality
Intention to
Use
Use
User Satisfaction
Service Quality
Page 2-65
Chapter Two: Literature Review
Knowledge
Quality
Intention to Use
Knowledge
System Management
Quality Systems
Success
User Satisfaction (KMSS)
Service
Quality
(SVQ)
End-User
Satisfaction
Reliability Trust
Responsibility Commitment
IS service IS relationship
Tangible Quality Quality Culture
Assurance Interdependenc
e
Empathy Communication
Page 2-66
Chapter Two: Literature Review
SERVQUAL End-User
Expectation Satisfaction
Gaps
R1 RS1 A1 E1 S1
R2 RS2 A2 E2 S2
R3 RS3 A3 E3 S3
E4
Reliability Empathy
R1 - IS units do what they promise. E1 - IS units give customers individual attention.
R2 - IS units are dependable. E2 - IS units have skilled IS employees.
R3 - IS units provide their services on time. E3 - IS units have customers‟ best interest at heart.
Responsiveness E1 - IS employees understand the customers‟ needs.
RS1 - IS employees give prompt service to customers. Employee Satisfaction
RS2 - IS employees are always willing to help customers. A1 – IS employees‟ understanding of systems.
RS3 - IS employees respond quickly to customers‟ requests. A2 - Attitude of IS employees.
Assurance A3 - Communication with IS employees.
A1 - IS employees are confidence.
A2 - IS employees are courteous with customers.
A3 - IS employees have knowledge to do their job well.
To that end Devaraj, Fan and Kohli (2002) found also a positive relationship
among IS service quality, technology acceptance and EUCS. In other words
users are more likely to be satisfied if they have positive ATTC (technology
acceptance) and if they use high quality systems (see Figure 2.42).
Page 2-67
Chapter Two: Literature Review
Figure 2.42: The impact of technology acceptance and IS quality on user satisfaction
Reliability
Responsiveness
IS service
Tangible Quality
Assurance
End-User End-User
Empathy Performance
Satisfaction
Ease of use
Technology
Acceptance
Usefulness
Page 2-68
Chapter Two: Literature Review
Figure 2.43: The relationship between end-user satisfaction and ICT beliefs
End-User
satisfaction
C1 C2 C3 C4 A1 A2 F1 F2 T1 T2 E1 E2
Page 2-69
Chapter Two: Literature Review
In addition, Baroudi, Olson and Ives (1988) suggested three models for the
relationship between EUCS and system usage:
The dominant or traditional model: satisfaction and usage are not related;
Usage influences satisfaction: as system usage increases it leads to
increased EUCS. This model is based on the belief that system usage
leads users to be more familiar with the system and to discover new uses
for it which will, in turn, lead to enhanced EUCS with the system;
Satisfaction influences usage: the more satisfied the user is with the
system the more he/she will be tending to use it. This model assumes that
if a system meets a user‟s needs, satisfaction with the system should
increase, which should further lead to greater use of that system.
On the other hand, Torkzadeh and Doll (1999, pp.330-1) identified four
dimensions for individual positive impacts (system benefits/outputs), which
are: task productivity, task innovation, customer satisfaction, and
Page 2-70
Chapter Two: Literature Review
Concerning IS benefits, Au, Ngai and Cheng (2008) claimed that the IS
fulfils three categories of IS end-users‟ needs, which are: work performance
fulfilment, relatedness fulfilment, and self-development fulfilment. Work
performance fulfilment refers to “the user needs that are fulfilled from using
an IS at the workplace in carrying out assigned job duties” (Au, Ngai and
Cheng, 2008, p.47). These are the basic and fundamental needs of end-users.
Examples of such needs include the improvement of work efficiency,
functional effectiveness, better decision-making, higher productivity and
service quality (O‟Brien, 2004). Relatedness fulfilment includes “all the
socially oriented needs of the end-user that require interactions with other
human beings” (Au, Ngai and Cheng, 2008, p.47). Examples of such needs
include recognition and status, social relations and more power and control
over colleagues (Alter, 1999). Finally, self-development fulfilment refers to
“end-user self-growth, self-advancement and work promotion that are
brought from using information systems” (Rosenberg, 1997, p.88).
Page 2-71
Chapter Two: Literature Review
user will be satisfied and vice versa (Au, Ngai and Cheng, 2002). Figure
2.44 illustrates the equitable needs fulfilment model.
IS performance
Equitable
Relatedness
Fulfilment
Equitable Self-
development
Fulfilment
IS performance
Expectation
In addition, several researchers (e.g. Li, 1997; Somers, Nelson and Karimi,
2003) studied the relationship between IS outputs and EUCS. They
identified five critical success factors for EUCS, which are: accuracy of
output, reliability of output, relationship between users and the IS staff,
user‟s confidence in the system and the timeliness of output. Thus,
information that is timelier, more accurate, and more relevant can lead to
improvement in business performance, reducing costs, improving decision
performance, improving process efficiency, increasing EUCS and increasing
customer satisfaction. Boddy, Boonstra and Kennedy (2002) claimed that an
end-user will feel dissatisfied if his/her own inputs are greater than the
benefits achieved. However, Mahmood et al. (2000) argued that the inputs
and benefits for IS end-users are either not clearly specified or too narrowly
defined. For example, Goodhue (1998) and Woodroof and Kasper (1998)
Page 2-72
Chapter Two: Literature Review
identified only physical effort and time as the major inputs of IS end-users
with the use of the system.
Au, Ngai and Cheng (2008, p.46) defined IS performance as “the perceived
outcome from IS use”. Gelderman (1998) and Iivari (2005) found a positive
relationship between perceived performance and satisfaction. They claimed
that the higher the performance level of an IS, the higher the level of EUCS.
In the words of Szajna and Scamell (1993, p.494), IS performance
expectation is “a set of beliefs held by the end-user of IS associated with the
eventual performance of IS and with their performance using the system”.
Several authors (Ryker, Nath and Henson, 1997; Bhattacherjee, 2001;
Mahmood et al., 2000) found a strong positive correlation between
expectations, improved performance and end-user satisfaction levels. They
claimed that the higher the levels of expectations with regard to IS
performance, the higher the levels of EUCS.
To that end, Au, Ngai and Cheng (2008) concluded that IS performance is
the most critical factor affecting EUCS. Therefore, managers need first of all
to ensure that an IS is technically sound, with a good support service
provided to end-users. Also, managers need to ensure that an IS has the
needed functions to fulfil the work performance needs of the employees as
well as be aware of the importance of workers‟ social interaction needs at
work.
Page 2-73
Chapter Two: Literature Review
According to Bharadwaj (2000), the ICT business value is viewed from four
perspectives, which are: the microeconomic-based view, the process-based
view, the resource-based view and the digital option view. The
microeconomic-based view believes that ICT investment creates excess
return over other types of capital investments (Dewan and Min, 1997;
Siegel, 1997; Lehr and Lichtenberg, 1999). The process-based view believes
that ICT investment creates competitive advantages by improving
operational efficiency which in turn, under the appropriate conditions, leads
to better firm-level performance (Mooney, Gurbaxani and Kraemer, 1996).
The resource-based view believes that ICT investment improves firm
performance by creating sustainable competitive advantage via the firm
strategic resources and capabilities (Bharadwaj, 2000; Sambamurthy,
Bharadwaj and Grover, 2003). The digital option view believes that ICT
investment creates value by creating options and flexibility for firms in the
increasingly competitive and uncertain market environment (Benaroch and
Page 2-74
Chapter Two: Literature Review
With regards to the relationship between the human ICT resources (i.e.
technical ICT skills; managerial ICT skills) and performance, Mata, Fuerst
and Barney (1995) demonstrated that human ICT resources has been posited
to confer not only operational performance improvements such as
productivity but also competitive advantage. They concluded that
Page 2-75
Chapter Two: Literature Review
managerial ICT skills, but not technical ICT skills, are valuable and able to
confer sustainable competitive advantage. In a similar vein, Bharadwaj
(2000) found that human ICT resources are completely linked to ICT
capabilities, which are found to be positively related to firm performance.
Besides, Santhanam and Hartono (2003) confirmed the same relationship
between human ICT resources and performance and suggested
improvements in operational efficiency.
Page 2-76
Chapter Two: Literature Review
In addition Ray, Muhanna and Barney (2005) reported that flexible ICT
infrastructure facilitates rapid development and implementation of an ICT
application that enhance process performance by enabling the organisation
to respond quickly to take advantage of emerging opportunities or to
neutralise competitive threats. Figure 2.45 illustrates the impact of ICT
resources and capabilities on performance.
Figure 2.45: The impact of ICT resources and capabilities on performance
Shared Knowledge
Technological
ICT resources
ICT-enabled
intangibles
Flexible ICT
Infrastructure
Page 2-77
Chapter Two: Literature Review
Mata, Fuerst and Barney (1995) reported that investment in ICT are easily
duplicated by competitors, investment per se do not provide any sustained
advantages. Rather, it is how firms leverage their investments to create
unique ICT resources and skills that determine a firm‟s overall effectiveness.
Soh and Markus (1995) argued that ICT investment is a necessary but not
sufficient condition for superior firm performance. Hu and Quan (2005)
pointed that the impact of ICT investments on firm performance is the result
of interactions among three processes: the ICT conversion process in which
ICT investments become ICT assets, the ICT use process in which ICT
assets create impacts and the competitive process in which ICT impacts are
converted into firm performance.
Page 2-78
Chapter Two: Literature Review
Page 2-79
Chapter Two: Literature Review
identified five perspectives that may serve as a basis for understanding the
causes of the ICT productivity paradox, they are: the Nolan Cycle, strategic
necessity hypothesis, transaction cost economics, the ICT-complementary
resources, the business model approach and finally the ICT assessment
model. These causes of ICT productivity paradox are discussed below:
Management
Information
Integration
Expansion
Initiation
Maturity
Control
Time
Page 2-80
Chapter Two: Literature Review
With regard to the Nolan model, McAfee (2001) and Bruque and Medina
(2002) suggested that the organisation can only obtain economic or
competitive advantages from its investment in technologies in the control,
integration and information management stages. On the other hand, Medina-
Garrido and Bruque-Camara (2002) reported that the effects of ICT
productivity paradox appear on initiation, expansion and maturity stages.
Page 2-81
Chapter Two: Literature Review
4. ICT-Complementary Resources:
Ross, Beath and Goodhue (1996) suggested that human resource,
technological resource and relational resource help to reduce the ICT
productivity paradox and sustain positive effects of technology on
performance. Human resource refers to the degree of motivation among
technical personnel and their capacity to resolve business problems using the
technological skills acquired in training. Technology resource refers to the
existence of technical infrastructures and databases shared throughout the
organisation. Relational resource refers to the involvement of non-technical
staff in ICT design.
In the words of Powell and Dent-Micallef (1997), ICT alone does not
produce sustainable performance advantages to firms, but firms should use
ICT to leverage intangible, complementary human and business resources.
Inherently, Davenport (1999) argued that technology alone cannot change
the culture and transform the company. He claimed that the necessary
transformation requires a basic change in human habits, attitudes, values and
expectations. To that end, Bruque and Medina (2002) confirmed that a high
level of co-ordination between human, management resources and
technology is needed to achieve the optimal combined effect.
Page 2-82
Chapter Two: Literature Review
ICT Efficiency:
- Simplicity
ICT Complementarities: - Speed
- Human resources - Economies of scales
- Managerial resources
- Technologies
Page 2-83
Chapter Two: Literature Review
(+)
Nolan Stage Nolan Stage Decreasing
(+/-) (+/-)
guarantee
costs
Improved firm
performance
(+/-) (Technology paradox (+/-)
avoiding)
Positive effect of
Business model
complementary (+/-)
ICT-resources suitability
(+)
(+) (+) (+) (+)
(+) (+)
New ICT
Relational Enhancement Switching Reducing transaction
Human Technology Asset Fit of human, costs and searching structure
Resource Asset Fit managerial improving costs and
Fit and ICT customer improving
relations loyalty speed
Internal perspective External perspective
Page 2-84
Chapter Two: Literature Review
quality. To that end, Hu and Quan (2005) noted that in many industries ICT
investments indeed lead to increased productivity while in other industries
productivity also leads to increased ICT investment. They also claimed that
the impacts of ICT investments on productivity are moderated by the
employees‟ skills and capabilities.
In addition, several researchers (Barua and Lee, 1997; Rai, Patnayakuni and
Patnayakuni, 1997; Francalanci and Galal, 1998; Mahmood, Mann, Dubrow
and Skidmore, 1998; Lehr and Lichtenberg, 1999; Devaraj and Kohli, 2000;
Menon, Lee and Eldenburg, 2000; Kudyba and Diwan, 2002; Kohli and
Devaraj, 2003) who studied the effects of using ICT on productivity and
performance found a positive relationship between ICT investment and
productivity and performance; while other researchers reject this relationship
(Weil, 1992; Barua, Krieble and Mukhopadhyay, 1995; David, Grabski and
Kasavana, 1996; Shafer and Byrd, 2000; Strassmann, 2002). Ham, Kim and
Jeong (2005) argued that the relationship between ICT investment and firm
performance and productivity is complex and multi-faceted.
On the other hand, several researchers (Siguaw and Enz, 1999; Sircar,
Turnbow and Bordoloi, 2000; Hu and Plant, 2001; Shin, 2001; Hitt, Wu and
Zhou, 2002) reported that the relationship between ICT and performance and
productivity is a circular casual relationship. They claimed that investments
in ICT lead to better performance and better performance in turns leads to
higher ICT investment. Hu and Quan (2005) maintained that ICT
investments create positive impact on the performance and productivity of a
firm through improving the efficiency and effectiveness of business
processes. In addition, they implied that firm performance and productivity
could also have a positive impact on the level of ICT investments as better
performing and highly productive firms tend to invest more in ICT. The
impact of ICT investment on firm productivity is shown in Figure 2.49.
Page 2-85
Chapter Two: Literature Review
Products
Information
Intensity
Value Chain
Information
Intensity
According to Baker and Riley (1994) and Poon (2006), ICT can enhance the
efficiency of employees and subsequently improve productivity. Sigala,
Airey, Jones and Lockwood (2004) revealed that hotel productivity gains
increase not from ICT investment per se, but from the full exploitation of the
ICT networking and informalionalisation capabilities. Kilic and Okumus
(2005) countered that although various forms of ICT are widely used in
many areas in hotels, such as front office, sales, marketing, accounting, etc.,
but some managers might lack knowledge about the potential benefits of
using ICT to improve productivity. Ham, Kim and Jeong (2005) claimed that
improving productivity is the primary role of ICT in the lodging industry.
They pointed that hotel ICT has several impacts, as follows: (1) improve
productivity, (2) reduce operating costs, (3) increase positive word of mouth,
(4) increase levels of repeat business, (5) increase occupancy percentage and
(6) increase annual sales amount.
Page 2-86
Chapter Two: Literature Review
capabilities. For Sigala, Lockwood and Jones (2001), higher integration and
exploitation levels of ICT were related to higher employees‟ productivity
benefits. Ham, Kim and Jeong (2005) claimed that hotel employees are a
key element in any analysis of ICT applications since hotel employees are
uniquely positioned to assess increases or decreases in hotel performance
due to their involvement with the implementation of ICT applications. To
that end, Abouzeedan and Busler (2006) claimed that the key to high
employees‟ performance and productivity lies in the understanding and
management of five categories of inter-linked factors, which are: strategic
factors, cultural factors, organisational and operational factors, performance
review factors and equity factors.
Page 2-87
Chapter Two: Literature Review
On the other hand, Mata, Fuerst, and Barney (1995) claimed that human ICT
resources are difficult to acquire and complex to imitate, thereby serving as
sources of competitive advantage. They also argued that technical ICT skills
confer a temporary competitive advantage, while, managerial ICT skills
confer a sustainable competitive advantage for firms. They maintained that
managerial ICT skills are rare and firm specific and therefore likely to serve
as sources of sustained competitive advantage. In this regard, Bharadwaj
Page 2-88
Chapter Two: Literature Review
Page 2-89
Chapter Two: Literature Review
this regard, Santhanam and Hartono (2003) pointed that competitors may
easily duplicate investments in ICT resources by purchasing the same
hardware and software and hence ICT resources per se do not provide
sustained competitive advantage. Rather, it is the manner in which firms
leverage their ICT investments to create unique capabilities that impacts a
firm‟s overall effectiveness. Barczak, Sultan and Hultink (2007) argued that
the failure to invest in ICT resources and capabilities can put a firm at a
competitive disadvantage in terms of the performance of the service process.
Technology
Knowledge
Structure Infrastructure
Capability
Culture
Organisational
Effectiveness
Acquisition
Conversion
Knowledge Process
Capability
Application
Protection
Page 2-90
Chapter Two: Literature Review
Enterprise Quality
Infrastructure
Quality
Service Software
Quality Quality
IS Quality of
Quality Business
Processes
Supported by
Administrative Data IS
Quality Quality
Information
Quality
Page 2-91
Chapter Two: Literature Review
Page 2-92
Chapter Two: Literature Review
1. IS SERVQUAL instrument
According to Parasuraman, Zeithaml and Berry (1988) and Kettinger and
Lee (2005), SERVQUAL is an instrument designed to assess both service
expectations and perceptions of deliverables. Inherently, several researchers
(Jiang, Klein and Carr, 2002; Jiang et al., 2003; Hauser and Paul, 2006)
indicated that the SERVQUAL instrument consists of two parts. The first
part consists of 22 statements for measuring expectations. The second part
consists of the same items, but phrased to measure perceptions of the actual
service delivered. Underlying the 22 items are five dimensions used by
customers to evaluate the IS service quality, which include:
Page 2-93
Chapter Two: Literature Review
Page 2-94
Chapter Two: Literature Review
Feedback
Customer:
Service Quality
Customer: Customer:
Expectation Perception
IS Staff: IS Staff:
Expectation Perception
IS staff:
Service Quality
Feedback
Kettinger and Lee (2005) provided a new scale for measuring IS service
quality instead of the traditional SERVQUAL measure. The new measure is
called “IS zone of tolerance (ZOT) SERVQUAL”. In this measure, the
Page 2-95
Chapter Two: Literature Review
customer expectations of IS service quality exist at two levels, which are (1)
desired service: the level of IS service desired and (2) adequate service: the
minimum level of IS service customers are willing to accept. Defining these
two levels is a “zone of tolerance” (ZOT) that represents the range of IS
service performance a customer would consider satisfactory. In other words,
service expectations of IS customer are characterised by a range of levels,
rather than a single expectation point. The IS ZOT SERVQUAL measure is
presented in Figure 2.53.
Expected Service
Desired Service
Adequate Service
Perceived
Service Perceived
Superiority Service
Adequacy
Perceived Service
Page 2-96
Chapter Two: Literature Review
Environmental Factors
- Industry type In-Process Non-IS Business Non-IS
- Nature of competition Stakeholders Process Product/services
Departmental Factors
- Leadership style
In-Process IS Business IS
- Employee skills
Stakeholders Process product/services
- ICT intensity
Ray, Muhanna and Barney (2005) claimed that valuable, rare and costly to
imitate ICT capabilities such as shared knowledge is a key that affects the
service quality of the firm. Besides, several researchers (Sarin and Mahajan,
2001; Andries, Smulders and Dhondt, 2002; Osei-Bryson and Ko, 2004)
found a positive and direct relationship between ICT usage and quality
performance. Other researchers (Hartman et al., 2002; Lin and Lee, 2006;
Lin, 2007; Kim and Kim, 2008) found that the use of IS is correlated with
overall organisational performance/success, satisfaction with technology and
service quality.
Hartman et al. (2002) claimed that IS maturity and quality maturity have a
positive impact on IS service quality and performance. IS maturity
organisations are “organisations that have adopted IS in a widely base”.
Quality management (QM) maturity organisations are “organisations that
have adopted QM programmes more fully and in better ways qualitatively”.
(Hartman et al., 2002, p.928). Fok, Hartman, Patti and Razek (2000)
demonstrated that, in the IS/QM maturity organisations, users being more
extensive (in terms of the more comprehensive use of IS) and also more
Page 2-97
Chapter Two: Literature Review
effective (in terms of the quality of the programmes themselves). Figure 2.55
illustrates the relationship between QM/IS maturity and service quality.
Figure 2.55: The impact of ICT on service quality
Quality Management
Maturity
Culture Organisational
Performance
Information System
Maturity
IS Service
Quality
Page 2-98
Chapter Two: Literature Review
Perceptions Expectations
Stylianou and Kumar (2000) and Jiang et al. (2003) identified a framework
to improve IS service quality as follows: (1) focusing on customer needs and
requirements, (2) improving the relationship between employees and
management, (3) encouraging employees participation and teamwork, (4)
focusing on employees attitude and satisfaction, (5) motivating employees,
(6) providing an effective ICT training, (7) providing constructive
employees feedback, (8) rewarding employees for their achievement and (9)
evaluating the employees IS performance.
Page 2-99
Chapter Two: Literature Review
Watson, Pitt and Kavan (1998) claimed that ICT could improve the service
quality by focusing on the following points: (1) link ICT strategy to the
business strategy in order to respond to business and customers‟ needs, (2)
communicate with customers to ensure they have accurate information and
realistic expectations of the IS unit, (3) design standardised service quality
processes to ensure reliable performance, (4) train the IS employees to
improve their skills and attitudes towards service quality and (5) use reward
system to motivate IS employees to improve service quality. Figure 2.57
shows a framework for improving IS service quality.
Page 2-100
Chapter Two: Literature Review
Corporate Strategy
ICT Strategy
Service Quality
Page 2-101
Chapter Two: Literature Review
Level of Environmental
dynamism and complexity
Page 2-102
Chapter Two: Literature Review
In the words of Lee, Chung and Kim (2004), emotional schema is related to
individual‟s character and culture. Computer anxiety, trust propensity and
individualism are suggested as external variables describing the emotional
schema. Simonson et al. (1987, p.231) defined Computer Anxiety as “an
individual‟s apprehension when he/she is faced with the situation of using
computers”. Computer anxiety is a negative affective reaction towards
computer use. Lee and Turban (2000, p.79) stated that trust propensity is
viewed as “the person‟s general willingness to trust others”. To that end,
Hofstede (1997, p.75) defined individualism as “a negative subjective norm
which indicates that he/she tends to focus on his/her own tastes and interests
despite the influence or pressure coming from external environment such as
society and/or organisation they are working in”.
Page 2-103
Chapter Two: Literature Review
Computer
CA2
Anxiety
CA3
TP1
Trust Emotional
TP2 Propensity Schema
TP3
CR1 CR2
I1
Individualism
I2
Cognitive Decision
CS1
Resonance Performance
CS2
Computer
CS3 Self-efficacy
CR3 CR4
CS4
SE1
SE2
System
Experience
SE3
SE4
Page 2-104
Chapter Two: Literature Review
Seo and Barrett (2007) identified two types of user emotional feelings:
feeling-as-bias-inducer and feeling-as-decision-facilitator. Feeling-as-bias-
inducer suggests that users‟ feelings make various forms of bias into the
decision-making process that skew their decisions in certain ways. Feeling-
as-decision-facilitator suggests that users‟ affective feelings can improve
decision-making performance by facilitating and enabling decision-making
processes.
In addition, Hess, Fuller and Mathew (2006) and McNamara, Dennis and
Carte (2007) maintained that the concept of user involvement with an ICT
decision aid plays an important role in decision making, as higher levels of
user involvement are believed to positively affect the accuracy of the
decision-making performance. Involvement with an ICT decision aid is
defined as “the degree to which a user is engaged with information
technology” (Hess, Fuller and Mathew, 2006, p.18).
Page 2-105
Chapter Two: Literature Review
In Skyrius‟s (2001) view, ICT should act as: (1) an enhancing instrument for
decision search and analysis as high-level and knowledge-intensive
management activities, (2) a creativity incentive and managerial learning
tool, (3) an instrument for reduction of biased attitudes as well as insurance
from making fatal decisions and (4) an instrument for maintaining,
managing and developing the explicit part of knowledge on decision
making. In a similar vein, Kumar et al. (2007) explained the role of ICT in
decision-making performance as follows: (1) ICT helps reducing
uncertainty, (2) ICT can transform decision data volumes into manageable
levels, (3) ICT has a potential to improve confidence and insure from fatal
decision mistakes, (4) ICT is successful in creating real time solutions to
various decision-making scenarios applicable to business modules and (5)
ICT acts as a facilitator in improving the quality of decision making by
reducing the rationality bounds of human beings.
In addition, Skyrius (2001) and Kumar et al. (2007) claimed that the job of
ICT is to provide guiding and informing points to stimulate the decision
makers‟ concentration. They demonstrated that ICT is recognised to be
helpful in basic tasks, such as organizing and managing data and
information, querying databases, sharing and spreading information,
manipulating flexible models and presenting information in decision-making
processes. Speier and Morris (2003) concluded that decision accuracy and
decision time are the primary outcomes of investigating in ICT. Similarly,
Hess, Fuller and Mathew (2006) revealed that user satisfaction, decision
time and decision quality are other decision-making outcomes from using
ICT. Figure 2.60 illustrates the decision-making outcomes.
Page 2-106
Chapter Two: Literature Review
Computer Decision-Making
Playfulness Outcomes
- Satisfaction
Gender
- Understanding
Involvement with
ICT Decision Aid - Decision time
Personality
Similarity - Use of decision
aid features
Multimedia - Decision quality
vividness
According to Todd and Benbasat (1999) and Haubl and Trifts (2000),
technology is designed to support decision-making activities. Applications
referred to as decision support system (DSS) or expert support system (ESS)
are designed to encourage users to employ better decision-making strategies.
In this regard, Nah, Mao and Benbasat (1999, p.137) implied that DSS and
ESS are increasingly used in organisations to support individuals and groups
in decision making. ESSs refer to “computer-based software tools that use
artificial intelligence techniques to capture, represent and apply expert
knowledge, so as to be able to imitate the behaviour of human experts in
Page 2-107
Chapter Two: Literature Review
Speier and Morris (2003) claimed that one potential mechanism for
improving decision-making performance is information visualisation.
Tegarden (1999) pointed that information visualisation allows decision
makers to leverage individual perceptual processes more effectively. Equally
important, Kumar et al. (2007) revealed that DSS and ESS can be used to
facilitate and improve the quality of decision making by reducing
information overload and by enhancing the cognitive limitations and
rationality bounds of decision makers. To that end, Skyrius (2001) and
Kumar et al. (2007) identified the attributes of actual good or well-prepared
decision as follows: (1) accurate and easy to use information, (2) a well-
defined set of alternatives, (3) availability of appropriate and well-
understood analogies, (4) availability of analytical tools with capabilities of
different scenarios, (5) good decision-making environment and (6)
availability of a support team.
Page 2-108
Chapter Two: Literature Review
Page 2-109
Chapter Two: Literature Review
2.8 Summary
This chapter has critically reviewed and analysed the related literature on
technology adoption in hotels. It has discussed ICT in the hotel industry, its
concept, benefits, uses to create competitive advantage and impacts. It also
explored the different competing theoretical models and theories which can
be used to enhance the understanding of human behaviour towards
technology adoption with a clear focus on TPB. It identified the critical
success factors influencing end-user performance and satisfaction, including
end-user traits, organisational traits and system traits. Further, it explored the
impacts of ICT on end-user employees‟ satisfaction and performance. The
chapter ends with developing a conceptual framework to improve IT-human
interaction in hotels. The following chapter discusses the research approach
undertaken in this study.
Page 2-110
RESEARCH APPROACH
Page 3-1
Chapter Three: Research Approach
3.1 Introduction
This chapter presents the epistemological and theoretical perspective of the
research. It provides a justification of choosing the appropriate methodology
and therefore the suitable methods applied to achieve the specific research
objectives. The chapter begins with highlighting the research approach and
then moves to explore the epistemology of the research, i.e. constructionism
and to outline the theoretical perspective adopted, i.e. interpretive
phenomenology approach. Moreover, the chapter presents an introduction to
the methodology adopted, i.e. case study approach. In particular, an
exploratory single case study as well as explanatory multiple case studies
were used in order to explore and investigate the impacts of technology on
hotel end-user employees via various data collection methods, such as focus
groups, semi-structured interviews, document analysis and questionnaire.
The chapter then looks at the data analysis techniques. The chapter ends with
a discussion of issues related to the validity, reliability, triangulation, ethical
considerations and generalisation of the results.
Page 3-2
Chapter Three: Research Approach
Indeed, both approaches are flexible and the outcomes of each research often
depend on the researcher interpretation (Baxter and Eyles, 1997). Generally,
both types of research either qualitative (e.g. case study) or quantitative (e.g.
Page 3-3
Chapter Three: Research Approach
Page 3-4
Chapter Three: Research Approach
Page 3-5
Chapter Three: Research Approach
Theory/ Concept
I D
N E
D D
U U
C Abstractions Hypothesis/ Questions C
T T
I I
O O
N N
Empirical
observations
Page 3-6
Chapter Three: Research Approach
The previous figure showed that researchers probably use the deductive
approach when they test a theory by suggesting a hypothesis and investigate
deeply the achievability of this theory (the right side of the wheel); on the
other hand, the inductive approach is probably used when a researcher aims
at forming a theory from the data collected (the left side of the wheel) as
reported by Miller and Brewer (2003). Consequently, Table 3.2 summarises
the main differences between inductive and deductive approaches:
Table 3.2 : The main differences between inductive and deductive approaches
Induction Approach Deduction Approach
Focusing on facts Focusing on theory
Theory from data Data from theory
Often associated with qualitative research Often associated with natural science
Findings could be generalised to similar Hypotheses tested to confirm or
cases falsifying theory
Therefore, to achieve the aim of this study, both inductive and deductive
approaches were used. An inductive approach was adopted in the early
phases of this study by conducting focus groups in order to explore and to
investigate the impacts of ICT on end-user performance and satisfaction and,
in turn, to develop an initial IT-human interaction model (ITHIM). After
exploring and investigating the factors of the ITHIM and collecting the
appropriate facts and data, a deductive approach was used which helped to
focus on the ITHIM theory and address the research question by testing the
factors of the ITHIM in four hotel case studies by conducting semi-
structured interviews as well as using end-users questionnaire.
According to Creswell (2009), there are three criteria for identifying the
factors which affect the choice of one approach over the other; these three
criteria are: (1) match between problem and approach, (2) personal
Page 3-7
Chapter Three: Research Approach
experiences, and (3) audience. The following paragraphs show how the
research approach was chosen based on these criteria.
Page 3-8
Chapter Three: Research Approach
Page 3-9
Chapter Three: Research Approach
Table 3.3: The epistemology, theoretical perspective, methodology and methods adopted in the study
Page 3-10
Chapter Three: Research Approach
Page 3-11
Chapter Three: Research Approach
Page 3-12
Chapter Three: Research Approach
Page 3-13
Chapter Three: Research Approach
design lying behind the choice and use of particular methods and linking the
choice and use of methods to the desired outcomes”. There are quite ranges
of methodologies, which are: case study, survey research, experimental
research, archival analysis and history (Yin, 2003).
Crotty (2003) asserted that the research methodology is the strategy behind
use of specific data collection methods and linking the use of methods to the
research outcomes. In this research, phenomenological methodology „case
study methodology‟ was used in order to explore and understand the factors
influencing hotel end-user performance and satisfaction as well as to test the
explored factors in budget and upscale Welsh hotels. As discussed earlier,
the theoretical perspective informing this research is phenomenology where
the concern was with the essence or basic structure of a phenomenon
(impacts of technology). Phenomenological methodology is also consistent
with the theoretical framework of this research
This research with the aim of exploring and investigating the impacts of
hotel technology on end-user employees utilised a phenomenological
methodology that employed qualitative and quantitative research tools.
However, Kaplan and Maxwell (2005) argued that the goal of understanding
a phenomenon from the point of view of the participants and its particular
social and institutional context is largely lost when textual data are
quantified. Therefore, in this research, the development of research methods
was geared more towards qualitative methods of study.
Page 3-14
Chapter Three: Research Approach
themes that are discovered. Therefore, in this research, a series of steps were
followed to examine the phenomena, as demonstrated in Table 3.4.
Table 3.4: The practical objectives involved within the study
Phase One: Initial study Phase Two: In-depth study
Aim To develop a diagnostic tool to use in support of human resource processes
(recruitment and selection, ongoing IT support, IT training and performance
appraisal) to help hotel managers to enhance user performance and satisfaction.
Practical
To investigate technology adoption in
Objectives To identify the discrete measures the different stages of the employee life
underpinning end-user employee cycle in four Welsh case studies of
traits, organisational traits and budge and upscale hotels aiming to
system traits impacting on IT usage develop a model to improve IT-human
and user perceptions of performance interaction in hotels.
and satisfaction aiming to develop an To develop a diagnostic tool that can be
initial model to improve IT-human used to help managerial decision-
interaction. making at the different stages of the
employee life cycle in hotels.
Methods
Focus groups Semi-structured interviews
Document analysis
Questionnaire
Page 3-15
Chapter Three: Research Approach
Yin (2009) identified four stages required for conducting a case study. Stage
one is concerned with designing a case study by determining the required
skills and developing the protocol. Stage two is concerned with preparing for
the data collection and conducting interviews or focus groups. Stage three is
concerned with analysing the evidence and adopting a strategy. Finally,
stage four is about developing conclusions, recommendations and
implications based on the evidence and data collected. Figure 3.3 highlights
the main four stages required for carrying out a case study
Page 3-16
Chapter Three: Research Approach
Stake (1995) argued that although case studies are designed to bring out the
details from the viewpoint of the participants, but the data collection and
analysis methods are known to hide some details. Therefore, using multiple
sources of data is helping to maximise the range of data required in order to
reach an accurate explanation and thus accurate results.
In this research, two types of case studies were adopted. Firstly, a single
exploratory case study has been developed to explore the main factors
influencing end-users performance and satisfaction through conducting six
focus groups. In this regard, Yin (2009) reported that a single case study
may be appropriate as an exploratory tool or as a pilot test for a multiple
case study. Secondly, collective (multiple) explanatory case studies have
been developed in order to investigate the factors influencing hotel end-user
employees in more details through conducting semi-structured interviews,
using document analysis and developing questionnaire.
According to Yin (2009), a study involving multiple cases can provide more
robust insight than a single case study and are preferable to a single case in
descriptive studies. Several authors (e.g. Benbasat, Goldstein and Mead,
1987; Eisenhardt, 1989; Stake, 1994) reported that in multiple cases, each
case can be viewed and studied alone (i.e. within-case analysis) and then,
Page 3-17
Chapter Three: Research Approach
Page 3-18
Chapter Three: Research Approach
Page 3-19
Chapter Three: Research Approach
waiting for their turn to speak (Morgan and Krueger, 1998). For that, in the
present study each focus group composed of 5 participants to allow enough
time for them to express ideas without getting bored.
Page 3-20
Chapter Three: Research Approach
The relevance sampling technique has been chosen to select the focus group
texts to be analysed. Relevance sampling aims to select all textual units that
contribute to answering given research questions (Riffe, Lacy and Fico,
2005). Firstly, the conducted six focus groups were transcribed using
NVivo 8. Then all textual units that contribute to answering the research
questions were selected for analysis, excluding textual units that do not
possess relevant information.
In order to keep an effective focus group, some criteria were set, which are:
(1) participants for each group must be of similar hierarchical levels within
Page 3-21
Chapter Three: Research Approach
the organisation, (2) each group should contain a mix of males and females
within the limitation of the available workforce and (3) each group should
contain a mixture of age groups within the limitations of end-users and IT
experts available. Therefore, in this research, the focus group participants
were selected from accounting and finance, help desk, human resource and
IT departments. Moreover, a sample of UWIC IT experts (IT lecturers and
IT researchers) was selected to participate on the focus group. The
composition of participants within a focus group was carefully considered as
this can greatly affect the outcomes, particularly when individuals in a group
conflict within one another over issues that are not directly relevant to the
topic under study (Churchill, 2004).
Page 3-22
Chapter Three: Research Approach
Page 3-23
Chapter Three: Research Approach
Several researchers (e.g. Collan, 2000; Powers and Barrows, 2006; Stutts
and Wortman, 2006; Walker, 2006) argued that classification of lodging
establishments is not easy. The industry is diverse and does not present
obvious, well-defined categories. In this regard, Walker (2006) reported that
lodging establishments can be classified in several ways: location, size, level
of service, stars or diamonds, length of stay or target market.
Page 3-24
Chapter Three: Research Approach
categories: country house hotels, small hotels, town house hotels and metro
hotels, as shown in Table 3.6.
Table 3.6: The hotel classification by the Welsh Assembly Government
Hotel classification General description
Country house hotels Hotels with ample grounds or gardens in a rural or semi-rural location,
with emphasis on peace and quiet.
Small hotels Smaller hotels with a maximum of 20 bedrooms; these hotels will be
personally run by the proprietor and are likely to have limited function
business.
Town house hotels High quality town/city centre properties of individual and distinctive
style with a maximum of 50 rooms.
Metro hotels A town/city location providing full hotel services with the exception of
dinner. Within easy walking distance of a range of places to eat and
with a range of pricing.
Hotel
Classification
Budget hotels Upscale hotels Hotels using Hotels using Hotels having Hotels having
(hotels with (hotels with bespoke off-the-shelf on-site IT off-site IT
limited IT luxury IT systems systems departments departments
capability) capability)
Page 3-25
Chapter Three: Research Approach
Page 3-26
Chapter Three: Research Approach
It has been found that most of the investigated Welsh hotels were having off-
site IT department; therefore, the Welsh hotels in this study will be classified
only on their technological capability (i.e. budget vs. upscale hotels) and
their types of information systems (i.e. bespoke vs. off-the-shelf systems).
Based on this classification, there are four potential combinations of the
investigated hotels depending on their technological capability and their
types of information systems, as demonstrated in Figure 3.6.
Case Case
(1) (2)
Case Case
(4) (3)
•Upscale hotels using •Upscale hotels using
bespoke hotel off-the-shelf hotel
information systems information systems
Page 3-27
Chapter Three: Research Approach
Budget hotels
Upscale hotels using off-the-
using bespoke shelf systems
systems 16%
20%
Budget hotels
Upscale hotels using bespoke
using off-the- systems
shelf systems 16%
48%
Page 3-28
Chapter Three: Research Approach
1. Semi-structured interviews
In-depth interviews are sources of evidence which represents a significant
aspect of this research as they were used to achieve the research aim by
gaining rich insights into the participants‟ experiences, opinions and
attitudes. In that sense, May (2001, p.109) defined interviews as follows:
The method of maintaining and generating conversations with people on a
specific topic or range of topics and the interpretations which social
researchers make of the resultant data, constitute the fundamentals of
interviews and interviewing.
Page 3-29
Chapter Three: Research Approach
offer the opportunity to explore the topic in some depth (Morgan and
Symon, 2004). Such an approach was desirable given the lack of research in
the area and the explanatory nature of stage two of the research. More
specifically, May (2001, p.111) concluded:
These types of interviews are said to allow people to answer more on their
own terms than the standardised interview permits, but still provide a
greater structure for comparability over the focus interview.
Page 3-30
Chapter Three: Research Approach
and after conducting the interview. Firstly, before the interview, the websites
of the investigated hotels were checked regards the availability of employees
on-line functions, such as on-line recruitment and selection, on-line training,
on-line IT support, etc. Secondly, during the interview, the interviewed
managers and employees in each hotel were asked about the availability of
these on-line functions through their hotel websites as well as their
perceptions about these on-line functions. After conducting the interview,
another check was made against what each manager and employee said
about the on-line functions during the interview.
3. Questionnaire
In this stage, a measurement tool in the form of a questionnaire was used to
test the IT-human interaction model factors. Rossett (1999) pointed that
written questionnaires are the most frequent used techniques for gathering
information in human performance technology. The results from the focus
groups and semi-structured interviews were served as bases for
questionnaire construction. The use of techniques such as focus groups and
interviews is common practice in questionnaire construction and is strongly
recommended by a number of authors (O‟Brien, 1993; Kinney, Macias and
Rodican, 1995; Oppenheim, 2000; Morgan and Symon, 2004). The
questionnaire was initially piloted within a panel composed of twenty IT
experts, where questionnaire scale content, measurement, wording and
layout were discussed. The revised questionnaire consisted of 14 scales for
measuring: computing self-efficacy, computing anxiety, user participation,
user involvement, IT training, IT support, subjective norms, perceived easy
of system use, perceived system usefulness, perceived compatibility,
perceived enjoyment, perceived behaviour control, attitude towards use and
user satisfaction. The questionnaire forms were distributed with a sample
(N=350) of hotel end-user employees and supervisors who are using hotel
Page 3-31
Chapter Three: Research Approach
Page 3-32
Chapter Three: Research Approach
Table 3.8: The number of interviewees as indicated by the investigated hotel categories
Hotel No. of interviewed No. of interviewed Total
Hotel types %
categories managers end-users
Case-1 Budget hotels using off-the-
4 2 6 17.1
shelf systems
Case-2 Budget hotels using bespoke
4 2 6 17.1
systems
Case-3 Upscale hotels using off-the-
12 3 15 42.9
shelf systems
Case-4 Upscale hotels using
5 3 8 22.9
bespoke systems
Total 25 10 35 100
Figure 3.8 The conducted interviews as indicated by the investigated hotel categories
Budget hotels
Upscale hotels using off-the-
using bepoke shelf systems
systems 17%
23%
Budget hotels
using bespoke
Upscale hotels
systems
using off-the-
17%
shelf systems
43%
Page 3-33
Chapter Three: Research Approach
Page 3-34
Chapter Three: Research Approach
The target group for this stage were hotel end-user employees and
supervisors working at front office-departments, because further researchers
(Lo and Darma, 2000) indicated that, the job function of front-office
departments is more computerised. Therefore, a number of 350
questionnaire forms were distributed in the four hotel case studies, among
them, 303 valid forms were received (86.6%). Table 3.9 as well as Figure
3.10 illustrates the number of distributed and received forms in the different
hotel case studies.
Table 3.10: The number of questionnaire forms distributed and received along the different hotel case studies
Page 3-35
Chapter Three: Research Approach
Table 3.9: The number of questionnaire forms distributed and received along the different hotel case studies
Page 3-36
Chapter Three: Research Approach
2. Questionnaire procedures
Questionnaires were distributed using the internal mailing system and
included a covering letter explaining the purposes of the study. To guarantee
participant confidentiality and anonymity responses were returned directly to
the researcher, thus a stamped addressed envelope was included with all
questionnaires. Participants were invited to make comments at the end of the
questionnaires. A deadline was set for return of the questionnaires.
Following collection of all completed questionnaires, responses were
subjected to data analysis. Further, some of the questionnaires were
distributed on-line using the checkbox survey.
Page 3-37
Chapter Three: Research Approach
Page 3-38
Chapter Three: Research Approach
Designing
Answers to Research
Unitizing Sampling Recording Statistical Analytical Traditions of
Questions
Scheme Plan Instructions Techniques Construct the discipline
Data Making
Texts Unitizing Sampling Recording Reducing Inferring Narrating
Page 3-39
Chapter Three: Research Approach
The first recommended step with content analysis is for the data analyst to
go through a process of familiarisation with the interview transcriptions
(King, 1998). This was achieved through the researcher conducting the
focus groups/interviews, transcribing the focus groups/interviews and
checking the transcription for errors. Transcripts are recommended as a basis
for improving the reliability of data analysis as they ensure the exact
wording is used and kept for future records (Silverman, 2006).
Page 3-40
Chapter Three: Research Approach
In this research, NVivo 8 has been used to perform the following tasks: (1)
creating the project – Ph.D. dissertation, (2) gathering the source materials –
Page 3-41
Chapter Three: Research Approach
primary and secondary data, (3) creating the research nodes – node is a
container gather all the material related to a topic, (4) coding the research
themes – coding allows you to gather all the material related to a topic.
“coding is a way of labelling certain aspects of your data and sorting the
information into distinctive categories” (Walsh, 2003, p.253), (5) running
queries to find patterns in the collected data – queries enable you to question
your data and to find patterns and pursue ideas, (6) drawing models to
visualize connections in the data, (7) creating charts, (8) running reports, and
(9) exporting data (QSR International, 2008).
NVivo 8 has been used in this research to strengthen the analysis of the
conducted focus groups and interviews, as follows: the efficient and
systematic management of data for code-and-retrieve forms of analysis
(Fielding and Lee, 1998; Ezzy, 2002); increased efficiency, flexibility and
ease of retrieval (Ezzy, 2000); the largest variety of search functions (Kelle,
1997; Bazeley, 2002); ease of searching for relationships (Ozkan, 2004);
process be much faster and easier (Ezzy, 2002; Ozkan, 2004); analysis of
different types of data (Rich and Patashnick, 2002; Ozkan, 2004); the
availability to update documents mid-analysis (Ezzy, 2002); availability of
a team of users to enter data individually and merge separate projects while
still identifying the work of individuals (Asensio, 2000; Ozkan, 2004;
Calduch, 2008).
Page 3-42
Chapter Three: Research Approach
On the other hand, NVivo 8 has some weaknesses discovered during the
analysis of the conducted focus groups and interviews, as follows: the need
to have all the data in electronic format (Ezzy, 2002); the need of time to
explore and to learn how to use NVivo (Walsh, 2003; Ozkan, 2004); the
requirement of financial investment in software, hardware and technical
support (Weitzman and Miles, 1995; Ezzy, 2002; Walsh, 2003; QSR
International, 2008); increasing the amount of storage on the programme
will slow processing time and speed (Richards, 1999; Bazeley, 2002);
NVivo may force users to adopt particular analytic strategies (Lee and
Fielding, 1991; Barry, 1998); user computer anxiety and technophobia
(Ezzy, 2002); NVivo limits the richness of data that can be analysed
through the categorisation of data into groups (Mason, 1996); complexity of
coding procedures (Ezzy, 2002).
Beside the above mentioned disadvantages: NVivo may distance users from
the data and may hijack the analysis (Barry, 1998); using NVivo may not be
useful for particular types of analysis and for particular types of data
(Carmel, 1999); NVivo package does not perform the analysis but merely
assist it (Ezzy, 2002; Walsh, 2003); NVivo is unsuitable for mixed-method
approaches that use larger amounts of data (Bazeley, 2002); computer can
crash or you can forget to save your work (Ozkan, 2004); NVivo comes with
an English language interface which may be difficult for non English
speakers (Vallance and Lee, 2005); NVivo is not being able to retrieve all
the responses because it only takes into account the frequency of searched
words not meaning or synonyms (Ozkan, 2004); NVivo is less useful in
terms of addressing issues of validity and reliability in the thematic ideas
that emerge during the data analysis process (Welsh, 2002).
Page 3-43
Chapter Three: Research Approach
between four and eight hours, however, May (2001) indicated that it has
estimated to be between eight and nine hours for a one hour interview to be
fully transcribed. More specifically, Potter (2004) reported that the amount
of time needed to transcribe the interviews depended on different factors,
such as: the nature of the data; how detailed the transcript is to be; the
quality of the recording tool; the equipment used to listen to the interview
and the typing skills of the researcher. Added to the above factors, the
language could be a barrier for transcribing interviews since all interviews
and focus groups were conducted in English language which is the second
language for the researcher. Therefore, the transcription time of one hour
interview was taken more than 20 hours.
Page 3-44
Chapter Three: Research Approach
To increase the level of collected data validity, the following standards were
adopted in this research: (1) during the personal interviews, a tape recorder
was used to reduce the risk of wrongly- interpreted answers during
transcription of interviews and to be able to double-check the answers after
the interview, (2) follow-up questions were also used during interviews to
make sure that the respondents understood the questions and to allow
collecting more data.
Page 3-45
Chapter Three: Research Approach
Page 3-46
Chapter Three: Research Approach
With regards to the validity of the survey scales, Pallant (2007, p.7) defined
the validity of a scale as “the degree to which it measures what it is supposed
to measure”. Pallant (2007) stated that the validation of a scale involves the
collection of empirical evidence concerning its use. In this study, the 14
scales making up the survey were used and tested by previous researchers.
For example, the computing self-efficacy scale was used by many previous
scholars (e.g. Compeau and Higgins, 1995; Taylor and Todd, 1995;
Venkatesh et al., 2003).
Page 3-47
Chapter Three: Research Approach
coefficient alpha indicates greater reliability. In this study, all the values of
Cronbach‟s coefficient alpha were above .7 (see Appendix F).
In this research, all participants were volunteers and they were informed by
accurate information which covered all the research aspects in relation to the
aim, methods adopted and the possible research outcomes. The information,
which was presented, was simple and easy to be understood. One of the
most important aspects in this research is the protection of the participants‟
identity. All participants were informed that their personal information (e.g.
names, ages, etc.) would be treated anonymously and confidentially, would
not be used in documents related to this thesis and would not be available to
the public.
Page 3-48
Chapter Three: Research Approach
In addition, Miller and Brewer (2003) reported that total generalisation can
occur in quantitative research, as a result of the detailed similarity between
S1 and S2, the features which cover S1 should be applicable to S2. Further,
statistical generalisation can emerge most often in quantitative studies which
deal with numbers through choosing a sample according to the nature of the
study such as surveys and the study of populations. However, the same
author asserted that moderatum generalisation occurs most often in
qualitative studies when features of case studies could be similar, and thus,
the findings of one case could be generalised to other similar cases.
Page 3-49
Chapter Three: Research Approach
Miller and Brewer (2003) asserted that the weak status of qualitative
research results mostly from that case studies are lack objectivity and their
findings can not be always generalised. They indicated that one of the
reasons for this weakness is possibly the lack of appropriate sample size for
statistical testing. Therefore, a distinction between moderatum generalisation
and statistical generalisation is important. According to Elgammal (2007),
survey is an example for quantitative research and most surveys rely on
statistical generalization. In contrast, a case study is an example of
qualitative research and relies on moderatum generalisation.
Page 3-50
Chapter Three: Research Approach
3.8 Summary
This chapter presented the epistemology and theoretical perspective adopted
in this research. Moreover, it described the methodology and the data
collection techniques. In order to achieve the aim of the research,
constructionism was adopted followed by interpretivism – phenomenology
as a theoretical perspective. The case study methodology was identified as
an appropriate methodology for investigating technology adoption in hotels.
Additionally, different sources of information were used in collecting data in
order to ensure the validity and reliability of the data collected.
The chapter further described the different methods and techniques used in
the data collection stage. Indeed, this thesis was carried out through two
main phases. Phase one involved conducting focus groups in order to
explore the impacts of technology on end-user employees and, in turn
develop an initial IT-human interaction model (ITHIM) to improve IT-
human interaction. Phase two involved investigating and testing the initial
model in four hotel case studies in Wales, namely budget hotels using off-
the-shelf systems, budget hotels using bespoke systems, upscale hotels using
off-the-shelf systems and upscale hotels using bespoke systems through
using semi-structured interviews, document analysis and questionnaire. The
chapter ends with a discussion on the validity, reliability and triangulation
adopted in the research as well as generalisation of the results. Therefore, the
following chapter aims to develop an initial model to improve IT-human
interaction.
Page 3-51
Initial Development of an IT-Human Interaction Model
Page 4-1
Chapter Four: Initial Development of an IT-Human Interaction Model
4.1 Introduction
This chapter represents the next step in model development by utilising
primary research (i.e. six focus groups) to investigate the generic factors
identified in the conceptual framework (see Figure 2.61). In particular, this
stage in the model development serves to move from a generic framework to
a more specific model where factors emerging from this stage will be
investigate and tested in two Welsh case studies of budget hotels (see
chapter five) as well as two Welsh case studies of upscale hotels (see chapter
six). This chapter aims to identify the discrete measures underpinning user
traits, organisational traits and system traits impacting on IT usage and user
perceptions of performance and satisfaction. Finally, the chapter develops an
initial IT-human interaction model to improve IT-human interaction.
Page 4-2
Chapter Four: Initial Development of an IT-Human Interaction Model
Most focus group participants (e.g. PFGP-1; PFGP-5; FGLP-3) revealed that
younger users have a greater intentions and willingness to use new
technology, compared to older users. In particular, PFGP-1 pointed that
older people do not want to use new technology because they may believe
that learning new technology is a waste of time, compared to younger people
who are more eager to learn and use new technology. This finding supports
previous research into this brain area which links user age and IT usage (e.g.
Morris and Venkatesh, 2000; Venkatesh and Morris, 2000; Venkatesh et al.,
2003; Gallivan, Spitler and Koufaris, 2005):
You will never ever get these people (older people) to use computers.
There is no willingness to do that. You will not be able to bring them
culturally to work on computer systems.
[FGITTS-4]
Page 4-3
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-4
Chapter Four: Initial Development of an IT-Human Interaction Model
cope with IT in a good way and they become able to use and interact with
new technology, as demonstrated in the following quote:
But people say and perhaps the older people, you know, I am not familiar
with IT department, you know, that happens. Then you guide them
through, say, it is no problem. We will sort that for you and then they
learn and backup IT that is a problem. They may say what happened, we
tell them there is a problem with the server. We are always at the office
and ring IT and they sort it. These people [older people] may say also I
cannot do this and you just did it. If there is a problem somewhere, it
would be sort out, but for older people, it is difficult sometimes for them to
sort problems. They do not have a backup for IT.
[FGFAP-2]
On the other hand, FGITTS-1 was not of the opinion that there is a
relationship between age, computer anxiety and performance. The same IT
technical staff argued that older people are not nervous any-more when
Page 4-5
Chapter Four: Initial Development of an IT-Human Interaction Model
using new technology because they realise that so many other people use
technology, as evidenced previously. Similarly, Kok et al. (1994) argued that
not all older people show declines in computer performance. Many older
individuals perform at levels equal to or better than the average performance
of younger people. These findings have important implications for
emphasising on older users‟ beliefs and attitudes towards new technology
during the different stages of the employee life cycle.
Page 4-6
Chapter Four: Initial Development of an IT-Human Interaction Model
ATTC and ICT usage. Thus, user marital status factor will not be tested in
the final model.
Page 4-7
Chapter Four: Initial Development of an IT-Human Interaction Model
I think the more experience you have got with computers, the bigger the
universe of things to try is. You know if you never use a drag and drop
type application and do not have the knowledge of these facilities; you will
not try to use this type.
[FGITTS-3]
On the other hand, FGITTS-3 was of the opinion that there is no relationship
between computing experience and CSE. The same IT technical staff
claimed that some people are very experienced at doing their jobs with
computers but they could not able to change the way of doing things, as
demonstrated in the following quote:
I think it is the kind of computing experience that the user has got. Some
people learn to do things in a particular way and cannot generalise that
when they face a problem. If some person has always accessed a
particular file in a particular place in a particular way and that file moved
to some where else he/she does not know how to go and find it. People
could be experienced but not actually understand what they are doing.
Their knowledge is very much 'parrot fashion' and 'prescriptive'. So this is
important. But just because somebody is very experienced at doing his/her
job with computers for the last ten years and when he/she changes the way
of doing the things it would be completely lost. Where there could be
somebody using computers for only a couple of years and he/she could
easily change the way of doing the things because he/she understands the
logic of computers.
[FGITTS-3]
Page 4-8
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-9
Chapter Four: Initial Development of an IT-Human Interaction Model
and managers as well may resist technology change and may not want to
move from paper-based work to technology as a result of their negative
ATTC. In this regard, FGITTS-1 mentioned that people, with a positive
ATTC, believe that change is good for them and will add to their knowledge
and experience. On the other hand, people, with a negative ATTC, become
more anxious of breaking something in the new system. There are
similarities between these findings and those described by Ashman et al.
(2003) and Venkatesh et al. (2003), as illustrated in the following quotes:
I think most users’ problems are related to their habits. Last time I went to
Tesco Supermarket. I found only two cashiers and a long, long queue of
customers and no-one of the customers was interested to use the automatic
cash machine. People preferred to wait for a long time rather than using
technology.
[PFGP-2]
Page 4-10
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-11
Chapter Four: Initial Development of an IT-Human Interaction Model
Added to that, FGLP-1 was of the opinion that users who perceive the new
system as compatible with their tasks, are more likely to accept and use this
system (positive ATTC). He stated that “people may refuse to use
technology, if technology is not working for them. They may prefer to do
jobs manually rather than using technology”. This finding is consistent with
those of Goodhue and Thompson (1995) who claimed that the technology
will have a positive impact on individual performance and satisfaction if it is
well utilised and fitted well with the task it supports. In other words, if the
individuals find that the technology can help them perform well, they will
perceive it as useful and important to them. The evidence from these
findings suggests that organisations have to clearly focus on user ATTC in
the different stages of employee life cycle.
Page 4-12
Chapter Four: Initial Development of an IT-Human Interaction Model
agency with no email skills, no spreadsheet skills. I just think oh, he had
difficulties on answer the phone.
[FGFAP-2]
Page 4-13
Chapter Four: Initial Development of an IT-Human Interaction Model
suddenly out of control you would have huge frustration even at work or at
home situation and you do not know how to solve the error. So I think all
of that comes down to the issue of personal control, once something
happen you will lose this control and become very very frustrated.
[PFGP-3]
Page 4-14
Chapter Four: Initial Development of an IT-Human Interaction Model
have trained by myself over the years to get the knowledge and skills to use
spreadsheet and to be confident when using technology”. These findings
have important implications for developing effective training programme
focused on users‟ beliefs besides their technical abilities.
Page 4-15
Chapter Four: Initial Development of an IT-Human Interaction Model
system itself for any problems, rather than considering problems within their
role as the user, as follows:
You get two levels within computing anxiety because you might be
proficient in the use of an operating system and then you can blame a
specific package. But if a student was in front of me with a problem I
would be anxious because I would not have the knowledge.
[FGITTS-2]
Page 4-16
Chapter Four: Initial Development of an IT-Human Interaction Model
that “if the developers and organisations ignore users' needs, users will be
frustrated”.
To that end, FGLP-2; FGLP-3 and FGITTS-1 reported the effect of system
attributes (e.g. ease of system use; system usefulness) on computing anxiety.
It has been mentioned that computing anxiety is negatively associated to
ease of system use and system usefulness. The same participants declared
hat if the system is easy to use and useful, users may be less anxious when
using this system, as illustrated in the following quote:
I think the user in the photo B [disappointed] got very frustrated when the
computer systems go down and he goes back to do everything manually. It
takes a long time. If the new system is not easy to use, users may be
frustrated.
[FGLP-2]
Page 4-17
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-18
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-19
Chapter Four: Initial Development of an IT-Human Interaction Model
Besides, FGITTS-1 revealed that when users are quite participated in the
new system design, they are more likely to defend it and to be more
involved. Further, PFGP-5 claimed that if users are participated in the
system design, they will be more able to learn, understand and use the new
system effectively. These findings further support Barki and Hartwick‟s
(1994) findings which showed that users who are active in the system
development process (i.e. users who are highly participated) are quite likely
Page 4-20
Chapter Four: Initial Development of an IT-Human Interaction Model
to develop beliefs that the system is both important and personally relevant
(i.e. users who are highly involved), as demonstrated below:
In the system development phase, new systems should be bespoke,
specially designed to meet the task requirements and users capabilities
and needs. Thus, employees are involved on this phase.
[FGAP-1]
Page 4-21
Chapter Four: Initial Development of an IT-Human Interaction Model
appropriate. It was not lending itself to us, but it has changed. It is better
than it was. You get to learn and know the system. We have had many
upsets through the years to alleviate, but it was based on the purchase
side.
[FGFAP-2]
4.2.2.2 IT training
User training has received considerable critical attentions amongst most
focus group participants. More specifically, PFGLP-1 as well as FGLP-1
mentioned the effect of user training on ICT usage. They revealed that user
training has positive impacts on ICT usage and subsequently on user
satisfaction and performance. Similarly, several researches (Gallivan, Spitler
and Koufaris, 2005; Marler, Liang and Dulebohn, 2006; Stone, Good and
Baker-Eveleth, 2006) showed that ICT training improves end-users‟
perception of the system‟s ease of use. This eventually has a positive
influence on the perceived performance and end-user satisfaction:
If you have the right training, if you have the right experience that gives
you control over that box, [computer] once you have a control, once you
know what you are doing, once you can use the software you want, you
will feel satisfied.
[PFGP-3]
With regards to the user training benefits, PFGP-3; FGLP-2 together with
FGITTS-2 pointed that user training increases users‟ understanding of the
reasons and benefits of applying new systems. Further, FGLP-3 as well as
FGAP-4 believed that user training improves users‟ IT skills and increases
their willingness and intention to use the new system. Also, FGITTS-3 and
FGITTS-4 pointed that user training increases user computing experience.
These initial findings are in agreement with Gallivan, Spitler and Koufaris‟s
Page 4-22
Chapter Four: Initial Development of an IT-Human Interaction Model
(2005) findings which showed that ICT training is a key ingredient for
successful implementation and user acceptance of new technology. To that
end, FGITTS-4 mentioned the benefits of IT training, as follows:
In the last five years, we recognise the importance of the IT training. We
need to get the most users to a certain level of education of knowledge to
enable them to use the system. We do learning, we do that. We run a
development IT training on the computer backgrounds.
[FGITTS-4]
Page 4-23
Chapter Four: Initial Development of an IT-Human Interaction Model
On the other hand, most IT technical staff mentioned that there are a lot of
barriers confronting IT training. More specifically, FGITTS-4 pointed that
there is a gap between what users need from the IT training and what IT
department provides to users. The same IT technical staff also implied that
Page 4-24
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-25
Chapter Four: Initial Development of an IT-Human Interaction Model
4.2.2.3 IT support
Support from technical IT staff and suitable technological IT resources (e.g.
hardware and software) are the most important aspects of IT support as
outlined by most participants. More specifically, FGLP-1 as well as FGAP-5
mentioned that technical IT staff help and show users how to use computers
effectively. Added to that, PFGP-3 and FGLP-2 mentioned that technical IT
staff resolve computer problems. Further, FGITTS-3 stated that IT
departments tell users how to use the computer system. To that end,
FGITTS-4 implied that IT departments help users to know more about the
computer system, as demonstrated in the following quote:
We did have one problem yesterday actually. It was quite late about four
clock. The computer system was not logged on. We rang the IT department
and explained the problem for them, within probably half an hour the
problem was sorted. They sorted it pretty quickly.
[FGFAP-1]
Page 4-26
Chapter Four: Initial Development of an IT-Human Interaction Model
Howell, 1991; 1994; Taylor and Todd, 1995; Venkatesh et al., 2003; Huang
and Chuang, 2007; Huh, Kim and Law, 2009). In contrast, FGFAP-1 and
FGLP-3 believed that if there is no help or support from IT department,
users are more likely to be frustrated, impatient or panic when using
technology, as outlined in the following quote:
When there is no support from the IT department, I am finding it very
frustrating. IT department do not like you to have control over your
desktop settings and software. If somebody knows about computers, he/she
becomes very frustrating.
[PFGP-3]
Page 4-27
Chapter Four: Initial Development of an IT-Human Interaction Model
To that end, most participants implied that proper, suitable and updated
technological IT resources (hardware and software) are another aspect of
organisational IT support. In this regard, several participants (e.g. PFGP-5;
FGLP-1 and FGCP-2) maintained that technological IT resources have a
positive impact on user satisfaction and performance. In this regard, several
researches (e.g. Siegel, 1997; Bharadwaj, Bharadwaj and Konsynski, 1999;
Lehr and Lichtenberg, 1999; Hitt, Wu and Zhou, 2002) found a positive
association between aggregate measures of the technological ICT resources
and organisational performance. More specifically, Thompson, Higgins and
Howell (1991) reported that provision of support for users of personal
Page 4-28
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-29
Chapter Four: Initial Development of an IT-Human Interaction Model
Further, FGAP-5 added that organisations should manage the time scales of
technology change. Most participants maintained that organisational support
has to be extended after implementing the new system. In particular, PFGP-3
and PFGP-5 agreed that organisations should encourage and empower their
employees to learn and to use technology effectively. PFGP-5 summarised
how organisations plan for technology change, as follows:
If any hotel or organisation is gonna to apply certain technology, it has to
make a plan to it, how it is gonna to react to technology, how it is gonna to
train staff, how it is gonna to afford money to invest on technology and
how it is gonna to accommodate customer expectations.
[PFGP-5]
Page 4-30
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-31
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-32
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-33
Chapter Four: Initial Development of an IT-Human Interaction Model
If you look to that picture (unsatisfied user), the reason why people get feel
like that about computers is the feeling of lack of empowerment. It is an
error but I cannot do anything about it. Users do not understand what
causes, they do not know what to do about it and as a result the users stop
working. But the emotion you feel is not because of the problem. The
problems are all the times. But it is the problem and I could not solve it. It
is lack of empowerment. People do not like to feel unimportant.
[FGITTS-3]
On the other hand, FGITTS-4 reported that user empowerment may have
negative impacts on users and systems as well, when users are not able to
deal with computer problems. Thus, Bowen and Lawler (2006) maintained
that when technology constrains empowerment, managers can still support
end-user employees in ways that enhance their satisfaction and the service
quality they provide, as demonstrated in the following quote:
User empowerment is an important issue. But it really is not owned by our
people and in some cases several people. People in our organisation
really believe they are good at IT and the more they think they are good at
IT the worse they are. They can bring our system and services more
corruption.
[FGITTS-4]
Page 4-34
Chapter Four: Initial Development of an IT-Human Interaction Model
To that end, some of the IT technical staff mentioned some requirements for
successful user empowerment. More specifically, FGITTS-1 and FGITTS-2
suggested that to empower users to use a particular computer system, users
have to get some knowledge and basic IT skills and as a result they can deal
with computer problems and take decisions. Similarly, FGITTS-2 declared
that user empowerment can be very useful especially when users get a
scenario to deal with computer problems. So if computer errors come up,
users will be able to solve these errors. The same IT technical staff implied
that if users acquire IT knowledge and can interact with computers, in turn,
they could deal with IT problems and take correct decisions.
Therefore, the initial focus group findings showed that far too little attention
has been paid by participants to the importance of user empowerment. Thus,
user empowerment factor will not be tested in the final model.
Page 4-35
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-36
Chapter Four: Initial Development of an IT-Human Interaction Model
Yeah, user friendly, some systems are easy to use. They try to take you to
where you think you need to be and give you the choice to tell you how to
perform a certain computer task. These systems are explicit systems.
[FGITTS-4]
Page 4-37
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-38
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-39
Chapter Four: Initial Development of an IT-Human Interaction Model
demonstrated that if the new system is more accurate, users are likely to be
more satisfied, as mentioned in the following quote:
Yeah, users become very happy when computers are so much easier and
when computers do what people want to do. Also they may throw
computers from the window when computers are not working and are not
accurate.
[FGLP-3]
Page 4-40
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-41
Chapter Four: Initial Development of an IT-Human Interaction Model
To that end, most participants (e.g. PFGP-3; FGAP-1; FGAP-2) found that
user acceptance of new technology is also positively related to TTF. They
declared that if the new technology is fitted-well with users‟ tasks, they are
likely to have a positive ATTC. On the contrary, PFGP-3 and FGFAP-2
mentioned the effect of TTF on computer anxiety. They found a negative
relationship between TTF and computer anxiety. They declared that if the
new system is not fitted-well with users‟ tasks, users are likely to be more
anxious and frustrated when using this system.
Page 4-42
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-43
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-44
Chapter Four: Initial Development of an IT-Human Interaction Model
Conversely, PFGP-3 argued that technology may have some negative impact
on user productivity. The same participant mentioned that theoretically
technology increases user productivity (e.g. automated tasks), however in
practical situations, technology may diminish the quality of the exchanged
information and in turns decreases user productivity. In this regard,
Motiwalla and Fairfield-Sonn (1998) claimed that the ICT productivity
paradox occurs when measurement of worker productivity does not go up
consistently with advancing ICT investment. To that end, Kilic and Okumus
(2005) countered that although various forms of ICT are widely used in
many areas in hotels, such as front office, in sales, marketing, accounting,
etc., but some managers might lack knowledge about the potential benefits
of using ICT to improve productivity, as follows:
Really it is a very difficult question. I do not think necessarily people are
more productive. I think organisations are more productive and more
profitable as a result of technology. In terms of productivity, at an
individual level, theoretically ICT increases individual productivity, in
terms of how to use processes to make automated tasks, in terms of
communication between people, however technology creates more traffic
and information flow which is not always productive, the productivity is
offset by the extra tasks, the fact that we exchange more information by
using technology may diminishes the quality of the information exchange.
[PFGP-3]
Page 4-45
Chapter Four: Initial Development of an IT-Human Interaction Model
and easy to use. Further, PFGP-4 and PFGP-5 explained that technology is
important to add value to the products, to save money, to increase employee
work effectiveness, to increase work accuracy and to create a competitive
edge, as illustrated in the following quote:
I think ICT can increase competitive advantage. Sometimes organisations
use technology just as a habit like their competitors. Other organisations
use technology to give them differentiation and create a competitive edge.
Technology can be very very expensive to be competitive, because
companies try to leapfrog each other with regards to latest technologies.
[PFGP-3]
Page 4-46
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-47
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-48
Chapter Four: Initial Development of an IT-Human Interaction Model
through emails or through whatever. I think, also ICT changes the nature
of service quality to be much bigger.
[PFGP3]
Page 4-49
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-50
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-51
Chapter Four: Initial Development of an IT-Human Interaction Model
issues. The same IT technical staff added that IT decisions are so much
technically focused decisions, as evidenced in the following quote:
There is a lot of arguments whether IT takes the decisions or whether IT
assists people to take decisions. We have a body which is an IT body for
information services in my organisation. Any significant new system
account or service account in IT services which comes to my organisation
needs to be serviced by this IT body. The IT body turns around the new
account.. Lots of decisions around IT are to know what is the problem
around IT then we (IT board) would takes decisions in isolation because
nobody understands and nobody want to understand the IT issues. So it is
so much more technically focused decisions. So the formal IT board would
take more decisions around ICT in my organisation.
[FGITTS-4]
Page 4-52
Chapter Four: Initial Development of an IT-Human Interaction Model
On the other hand, some participants mentioned that technology may have
negative impacts on users. For example, PFGP-3 mentioned that people may
lose their jobs as a result of the introduction of new technology. Similarly
FGITTS-3 stated that there are massive jobs were lost within the
introduction of technology, such as clerical labour jobs. To that end
FGITTS-4 believed that organisations will never rely on technology because
technology things will never stop growth:
From the negative technology side, people may lose their jobs as an
introduction of the new technology. In the 80's, the technology boom made
people lose their jobs, many people lost their jobs, there is no way to get
away from that. I mean, years ago, in the 80’s, at Christmas, while I was
returning from London, I met one of my neighbours on the train, he was
working in the IT department, he was a senior manager, he just made
twenty three of his colleagues redundant because of the introduction of
technology. There is nothing we could do with the implications of
technology.
[PFGP-3]
Page 4-53
Chapter Four: Initial Development of an IT-Human Interaction Model
In addition, people sickness, stress and tiredness are other negative impacts
of technology, as outlined by participants. PFGP-3 and PFGP-5 mentioned
that using computers for a long time may affect people‟s health (i.e. people
tiredness). Further, FGCP-1 and FGCP-2 mentioned that computer sickness
and stress are more likely to happen, if people use computers for a long time.
In a similar vein, FGCP-1 revealed that if users have a good support from IT
department and colleagues, the work stress will be decreased, as follows:
Technology makes you much more available to work all the time through
emails or mobile phones, which means it is difficult to get away and stop
thinking about the work. Also using computers for a long time, affects
people health.
[PFGP-3]
Figure 4.1: The user-related factors emerged by the focus group participants
25
20
15
10
0
User age User gender User marital User Technology Computing Computing Computing
% status education acceptance experience self-efficacy anxiety
Page 4-54
Chapter Four: Initial Development of an IT-Human Interaction Model
Figure 4.2: The organisation-related factors emerged by the focus group participants
18
16
14
12
10
8
6
4
2
0
Page 4-55
Chapter Four: Initial Development of an IT-Human Interaction Model
Figure 4.3: The system-related factors emerged by the focus group participants
25
20
15
10
0
Ease of system use System usefulness System compatibility System enjoyment
%
Figure 4.4: The IT performance impacts emerged by the focus group participants
10
9
8
7
6
5
4
3
2
1
0
Productivity impact Competitive Service quality Decision-making Financial
% advantage impact impact impact performance impact
Page 4-56
Chapter Four: Initial Development of an IT-Human Interaction Model
In terms to the IT satisfaction impact, the data in Figure 4.5 reveals that ease
of system use (n = 73; 14.6%) was most frequently cited as an important
factor for user satisfaction, followed closely by information content (n = 64;
13.2%) and timeliness (n = 33; 7.2%). However, number of other system
factors, notable by their low percentage, included information format (n = 1;
.6%) and system accuracy (n = 3; .4%).
Figure 4.5: The IT satisfaction impacts emerged by the focus group participants
16
14
12
10
8
6
4
2
0
% Information content System accuracy Information format Timeliness Ease of use
In addition, the evidence from the focus groups indicates that organisational
support may have important impacts on IT performance and satisfaction. In
Page 4-57
Chapter Four: Initial Development of an IT-Human Interaction Model
Equally important, the focus group results also indicated that system
characteristics may have important impacts on IT performance and
satisfaction. In this case, most participants mentioned the importance of
system compatibility, system usefulness and ease of system use. Conversely,
a small number of participants noted the importance of system enjoyment in
IT performance and satisfaction.
Moreover, from the focus group results, it could be noticed that user
satisfaction in the system was likely to be highly influenced by user
perceptions of ease of system, quality of information content and system
timeliness as mentioned by most participants. On the contrary, a small
number of participants mentioned the importance of the quality of
information format and system accuracy in IT satisfaction.
To that end, the focus group results revealed that technology may have
different impacts on performance. In particular, most participants mentioned
the service quality, productivity and competitive advantage impacts of
technology. On the other hand, a small number of participants mentioned the
decision-making and financial performance impacts of technology.
Page 4-58
Chapter Four: Initial Development of an IT-Human Interaction Model
Page 4-59
Chapter Four: Initial Development of an IT-Human Interaction Model
4.7 Summary
This chapter has explored the perceptions of focus group participants
regarding the critical success factors influencing IT-human interaction (i.e.
user traits, organisational traits and system traits) as well as the impacts of
technology adoption on IT performance and satisfaction (i.e. productivity,
competitive advantage and service quality). The chapter ends with
developing an initial model to improve IT-human interaction. Therefore, the
following chapters aim to test this initial model in budget hotels (chapter
five) and upscale hotels (chapter six).
Page 4-60
TECHNOLOGY ADOPTION IN BUDGET HOTELS: TWO
WELSH CASE STUDIES
Page 5-1
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
5.1 Introduction
This chapter aims to investigate technology adoption in two case studies
of budget hotels in Wales, namely four budget hotels using off-the-shelf
hotel information systems and four budget hotels using bespoke hotel
information systems. More specifically, this chapter presents technology
adoption in the different stages of employee life cycle, namely:
recruitment and selection; information system development; participation
and consultation; IT training and development; IT support; motivation; IT
performance and satisfaction impacts (see Figure5.1). The chapter also
highlights the web-based human resource functions. Finally, the chapter
presents a developed IT-human interaction model to improve IT-human
interaction in budget hotels.
Figure 5.1: The hotel end-user employee life cycle
• Motivation
6
7
• IT Performannce and Satisfaction impacts
Page 5-2
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
However, Manager-2 argued that older people may have limited IT skills
as compared to younger people. Similarly, Manager-1 said that “older
people might be technologically less savvy”. Thus, older people have to
be trained properly to improve their IT skills. In this regard, Manager-3
believed that reception job is more suitable for younger people who are in
the beginning of their career. In a similar vein, Manager-1 stated that
“sometimes younger people are ambitious; they are in the way up in the
Page 5-3
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-4
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-5
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-6
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-7
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
To that end, all the interviewed managers of budget hotels reported that
they do not conduct any practical system trials for the new staff; however,
they ask general questions about system experience. More specifically,
Manager-4 stated that “we do not really go around the track giving them
like a practical test in front of the computer”. A possible explanation by
Manager-1 for this might be that managers may trust on people
experience on their C.V. Another possible explanation is that acquiring
system skills could be taught, as evidenced in the following quote:
If I am recruiting for reception, then would look to see if they used
systems before, not like a job trial. We would almost trust on their
experience on the C.V, we would trust them on what they say. We
Page 5-8
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
These findings suggest that if managers of budget hotels do not have the
facilities and time resources to train new staff, they have to recruit people
with previous system experience. Another important practical implication
is that managers of budget hotels have to conduct practical system trails
for new staff to know the degree of their system experience.
Page 5-9
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-10
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Manager-4) reported that the job specification for receptionists does not
include any IT skills, as evidenced below:
Job specification is not include any IT skills, not at all really, again it is
just, it tells as part of job description, it tells you, you will have to use a
computer but does not say you need skills in job description to do. It
just tells you, you are responsible for customer face service, for
checking people in and out of the hotel, from that point of view rather
than this is a particular skill.
[Manager-4]
Page 5-11
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-12
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-13
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-14
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.2: The degree of computing self-efficacy emerged by the users of budget hotels using off-the-shelf systems
On the other hand, the survey results showed that the computing anxiety
construct was insignificant (Mean = 2.2; Std. Dev. = 0.5). In particular,
only 30% of end-user employees mentioned that they are frightened of
using the HIS (sum = 69); 38.7% reported that they feel apprehensive
about using the HIS (sum = 89); 40.9% reported that they hesitate to use
the HIS for fear of making mistakes they cannot correct (sum = 94); 45.7%
reported that they could lose a lot of information by hitting the wrong key
(sum = 105). This is consistent with User-1 as well as User-2 who reported
that they are a little bit confident using HIS (see Figure 5.3). An
implication of these findings is that managers have to increase employees‟
confidence by showing them the right way of doing things.
Figure 5.3: The degree of computing anxiety emerged by the users of budget hotels using off-the-shelf systems
100
I feel apprehensive about using
90
the HIS.
80
70 It worries me to think that I
60 could lose a lot of information
50 by hitting the wrong key.
40 I hesitate to use the HIS for fear
of making mistakes I cannot
30 correct.
20 I am frightened of using the HIS.
10
0
%
Computing anxiety scale items
Page 5-15
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-16
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
and older people are easily to be trained on the system because it is easy
to use. Similarly, Manager-7 said that “I think is nothing to do with Bart
system, Bart is easy for any age”. Another possible explanation by
Manager-5 for this might be that it is better to recruit people with good
personality as well as good customer service regardless of their age. This
is consistent with Manager-7 who stated that “it depends on what person
so like at the interview, I have to find out what type of personality they
had, it would not go on age; it depends on people‟s personality”. This is
demonstrated in the following quote:
I do not see a difference between younger and older people, if they
initially know how to go and turn computer on really. We have got two
night receptionists they both in their sixties, late sixties and they can
use it easily and they do not own computers at home, so that is how
easy the system is.
[Manager-6]
Page 5-17
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
know like the shortcuts on the keyboard etc., but they still coming every
day willing to do what they can.
[Manager-7]
In the same way, there are several possible advantages of recruiting and
selecting older people for the reception job as emerged by some
managers. In particular, Manager-8 reported that “older people may be
more experienced with customer service than younger people”. Another
possible advantage of recruiting older people reported by Manager-8 is
that “they are more reliable, more trust with and they dedicated
themselves bit more than younger generation does”. Therefore, managers
of budget hotels have to recruit people who have good personality as well
as good customer service regardless of their age. Another important
practical implication is that managers of budget hotels have to develop a
training programme to improve the IT knowledge of their staff members
with a clear focus on improving the IT skills of older people.
Page 5-18
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Conversely, Manager-8 argued that female users are better than male
users in using hotel information systems. A possible explanation for this
is that using hotel information systems might require more mental skills
rather than physical skills; therefore, female users might be more suitable
for this job than male users, as demonstrated by Manager-8 in the
following quote:
I would see girls use the system better than guys, I do not know why, I
think because using the system is more mental work as opposed to
physical work, so it is a little bit suitable for females, I do not know, but
I think women work on the system better.
[Manager-8]
Page 5-19
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-20
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-21
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
“we check how much knowledge they have in the first trial shift, if they
have relevant experience that is nice, if not we train them”, as below:
Like I said training is a bit easy, if they have got no computer
experience at all, they can be a bit slower from that way because
obviously they do not know how to work the way around the system
anyway, but generally teaching somebody how to make a reservation,
or how to check somebody in is the same steps you would take anyway,
so if they are quick learners generally is pretty easy.
[Manager-6]
Page 5-22
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Word or Excel because these skills are not linked to the actual bespoke
system as well as they are used by managers only, as evidenced below:
We do use Word and Excel for obviously letter templates and things
like that, but it is not linked to actual hotel reservation system, so if you
do a reception position you would not necessary need to use anything
else. The only other thing we use generally Excel and Word which quite
simple themselves, so I never get stressed when using the computer.
Excel and Word are used for managerial work, so it is just putting
rotas in place and things like that, so nothing to do with the actual
reservation point of view.
[Manager-6]
Page 5-23
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-24
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-25
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-26
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.4: The degree of computing self-efficacy emerged by the users of budget hotels using bespoke systems
On the other hand, the survey results showed that the computing anxiety
construct was insignificant (Mean = 2.2; Std. Dev. = 0.7). In particular,
only 33.2% of end-user employees mentioned that they are frightened of
using the HIS (sum = 63); 36.3% reported that they feel apprehensive
about using the HIS (sum = 69); 40.5% reported that they hesitate to use
the HIS for fear of making mistakes they cannot correct (sum = 94); 58.4%
reported that they could lose a lot of information by hitting the wrong key
(sum = 111). An implication of these findings is that managers have to
increase employees‟ confidence by showing them the right way of doing
things. This is demonstrated in Figure 5.5.
Figure 5.5: The degree of computing anxiety emerged by the users of budget hotels using bespoke systems
100
I feel apprehensive about using
90
the HIS.
80
70 It worries me to think that I could
60 lose a lot of information by
hitting the wrong key.
50
I hesitate to use the HIS for fear
40
of making mistakes I cannot
30 correct.
20 I am frightened of using the HIS.
10
0
Page 5-27
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-28
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-29
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
with the initial focus group findings (e.g. FGLP-3; FGAP-1) who implied
that new systems should be simple, proper, user friendly, easy to monitor
and more flexible to be updated and changed, as follows:
I do not personally consider hotel management systems to be over
complicated. Protel system is more complicated than Opera probably. I
would consider that, or can use the word friendly. Protel is less
friendly and Opera is more users friendly because it is windows-based
system which makes it easier. You can use mouse to interface with it
which makes it quicker and you can use the keyboard.
[Manager-1]
Page 5-30
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.6: The perceived ease of system use emerged by the users of budget hotels using off-the-shelf systems
100
Learning to operate the HIS is easy
90
for me in my job.
80
70 I would find it easy to get the HIS to
do what I want it to do.
60
50 Interacting with the HIS does not
require a lot of my mental effort.
40
30 It is easy to become proficient in
20
using the HIS.
10
Overall, I believe the HIS is easy to
0 use in my job.
Page 5-31
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-32
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-33
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
respect, Manager-3 said that “Opera system has more reports than Fidelio
has, which is an advantageous”. This finding is consistent with the focus
groups initial findings (e.g. PFGP-1; FGITTS-3) which showed that new
systems have to provide precise, sufficient, proper and valuable
information and reports that users need. Similarly, this finding is
consistent with the literature review (e.g. Rai, Lang and Welker, 2002;
DeLone and McLean, 2003). An implication of this finding is that
managers of budget hotels have to select the system that provides the
needed information and reports, as follows:
The last one you want to do is to be handy around the computer system
to try finding something should be there, so anything relating to a
particular guest or a particular room should be all reported, interacted
and be called up early.
[Manager-4]
Page 5-34
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.7: The perceived system usefulness emerged by the users of budget hotels using off-the-shelf systems
100
Using the HIS in my job enables me
90 to improve my productivity.
80
Using the HIS in my job enables me
70 to enhance my effectiveness.
60 Using the HIS improves the quality
50 of my work.
40 Using HIS improves my decision
making.
30
20 Using the HIS improves my
performance in my job.
10
Overall, I believe using the HIS is
0
useful in my job.
% Perceived usefulness scale items
Page 5-35
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-36
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
With regards to the size compatibility, Manager-3 reported that the hotel
information system needs to be compatible with the size of the hotel.
More specifically, budget hotels do not require more advanced system
with a lot of functions as compared to upscale hotels. Therefore,
managers of budget hotels should select the hotel information systems
that comply with their hotel size, facilities and functions, as below:
However, you also must take into consideration the size of the hotel. A
hotel which is a sixty four bed rooms like ours and owns a small
restaurant does not need something which is interfaced with Micros. If
you have got a big hotel lets say a hundred and thirty rooms. You have
got a room service, a couple of bars, a restaurant, a cafe then you will
need a something like Micros because you will get much better
information and more consistency all over the day. You still have
people leave their departments and come down stairs to reception and
posting manually. It makes sense to have something like Micros. It is
time-consuming and it is open to mistakes.
[Manager-3]
Page 5-37
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
work; 74.3% of end-user employees (sum = 171) reported that using the
HIS fits well with the way they work (see Figure 5.8).
Figure 5.8: The perceived system compatibility emerged by the users of budget hotels using off-the-shelf systems
100
90
80
70
60 Using the HIS is compatible
with all aspects of my work.
50
40 Using the HIS fits well with the
way I work.
30
20
10
0
% Perceived compatibility scale items
Page 5-38
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
However, these findings do not support the previous research (e.g. Al-
Gahtani and King, 1999). An implication of these findings is that ease of
system use, system usefulness and system compatibility should be taken
into account when selecting a new hotel information system for budget
hotels, as demonstrated in the following quote:
The system does not have to be enjoyable, it helps. I think, I am not
sure enjoyable is the right word, I think people happier if it is simple
and it is not too many things they have to do the process through. So
from that point of view, it causes more stress if it is harder, yeah.
[Manager-4]
Figure 5.9: The perceived system enjoyment emerged by the users of budget hotels using off-the-shelf systems
100
90
80
70 I find using the HIS to
60
be enjoyable.
50
I have fun using the
40 HIS.
30
20
10
0
% Perceived enjyment scale items
Page 5-39
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Manager-1 said that “cost would be a requirement, how much they gonna
to cost when installing a system, each system cost different money”. In
that sense, Manager-3 pointed that budget hotels are always looking for
the cheapest systems. A possible explanation of this trend is that budget
hotels might have limited resources to purchase more expensive systems,
as evidenced below:
It is really down to the price of the hotel if it is budget. If your hotel is
on a rate titled budget you will not go for Opera or Fidelio you will go
for other much cheapest systems which exist out there but they are not
so effective.
[Manager-3]
In addition, Manager-3 declared that the cost of the new system may
include different types of fees, such as software installation fees, IT
support fees, maintenance fees and training fees. Therefore, managers of
budget hotels have to take into account the cost of the new system as well
as the functionality of the system, as demonstrated in the following quote:
If a management decide to go ahead and select a certain property
management system whether Fidelio or Opera they will never turn
around and ask the receptionists something to do that. It mostly goes
with price, mostly is go to be with price and interface because if you
think about it. Opera is going to be expensive because you are not just
paying for the software installation you also paying for the backup, you
know, any point if you get stuck with Opera let say crashes and your
server, you cannot get through to your server and you cannot turn
around and solve issues yourself. You need to be able to call a call
centre who at twenty four-hours. You also have to pay a maintenance
contract.
[Manager-3]
Page 5-40
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-41
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-42
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-43
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.10: The perceived ease of system use emerged by the users of budget hotels using bespoke systems
100
Learning to operate the HIS is easy
90 for me in my job.
80
70
I would find it easy to get the HIS
to do what I want it to do.
60
50 Interacting with the HIS does not
require a lot of my mental effort.
40
30 It is easy to become proficient in
using the HIS.
20
10 Overall, I believe the HIS is easy to
0 use in my job.
Page 5-44
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
100
Using the HIS in my job enables
90 me to improve my productivity.
80 Using the HIS in my job enables
70 me to enhance my effectiveness.
60 Using the HIS improves the quality
of my work.
50
40
Using HIS improves my decision
making.
30
Using the HIS improves my
20 performance in my job.
10 Overall, I believe using the HIS is
0 useful in my job.
Page 5-45
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.12: The perceived system compatibility emerged by the users of budget hotels using bespoke systems
100
90
80
70 Using the HIS is compatible with
all aspects of my work.
60
50
Using the HIS fits well with the
40 way I work.
30
20
10
0
Page 5-46
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
100
90
80
70
60 I find using the HIS to be
enjoyable.
50
40 I have fun using the HIS.
30
20
10
0
Page 5-47
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-48
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-49
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-50
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.14: The participation activities emerged by the users of budget hotels using off-the-shelf systems
On the other hand, the survey results showed that the user involvement
construct was initially significant (Mean = 3.9; Std. Dev. = 0.8). The
majority of end-user employees (sum = 195; 84.8%) considered the new
system to be important as well as 71.7% of end-user employees (sum =
165) who considered the new system to be relevant to them. Therefore,
end-user employees are more likely to have a positive attitude towards
using HIS. This is shown in Figure 5.15.
Page 5-51
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.15: The perceived involvement emerged by the users of budget hotels using off-the-shelf systems
100
90
80
70
60 I consider the new system to
50 be important.
40
I consider the new system to
30 be relevant to me.
20
10
0
% User involvement scale items
Page 5-52
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-53
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
If staff had an idea how to make Bart system better, there is a forum
through the whole company, they fill up a form and send it to the head
office and they discuss it with say forty yard of our hotels and if they
sorted it as a good idea then they put it forward and they would get it
changed or modified. Like I said when people thought oh that does not
work or that should not be there, then they contact this forum who
discuss the changes then that goes to the IT department who make the
changes. So users have had a lot of inputs into the new system anyway.
The selection of the system happened in 2000 then the system put into
place and then between then and now people giving their opinion, so
the system changes slightly over the years.
[Manager-7]
Page 5-54
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.16: The participation activities emerged by the users of budget hotels using bespoke systems
100
I had main responsibility for the
90 development of the HIS (during
system definition/ during physical
80 design/ during implementation).
70 I formally reviewed the work done
by information system staff (during
60 system definition/ during physical
50
design/ during implementation).
I designed the user training
40 programme for the HIS.
30
Page 5-55
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
On the other hand, the survey results showed that the user involvement
construct was initially significant (Mean = 3.5; Std. Dev. = 0.8). The
majority of end-user employees (sum = 157; 82.6%) considered the new
system to be important as well as 76.8% of end-user employees (sum =
146) who considered the new system to be relevant to them. Therefore,
end-user employees are more likely to have positive attitude towards
using HIS. This is shown in Figure 5.17.
Figure 5.17: The perceived involvement emerged by the users of budget hotels using bespoke systems
100
90
80
70
I consider the new system to be
60
important.
50
40 I consider the new system to be
30 relevant to me.
20
10
0
Page 5-56
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
With regards to the hotel training team, Manager-2 reported that the
internal IT training is conducted by the departments heads, e.g. front-
office manager. This is consistent with Manager-1 who said that “if it is a
training issue, it would be referred to duty manager or heads of
departments or their assistances”. Further, Manager-1 pointed that the
internal training could be conducted by their external IT support team, as
demonstrated below:
We have somebody who manages Protel from the head office, his job is
to manage the hotel system, it is important, he manages upgrades, he
manages system downtimes, he manages latest features, training,
everything that is for all twenty one hotels now.
[Manager-1]
Page 5-57
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-58
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-59
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-60
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-61
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
problem you may get from management point of view is if mistakes have
been made in front of customers”. Another possible disadvantage of on-
the-job training as reported by Manager-2 is that if the new recruits do not
find any customers to interact with, as follows:
Sometimes it can be quite boring if there is a quiet time and if we are
trying to train someone and nothing is happening, you are waiting for
somebody to come in so they can learn something. So it is depending
on the needs of the business, so it is quite varied.
[Manager-2]
Page 5-62
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
On the other hand, Manager-3 revealed that limited time and money
resources could be possible barriers confronting conducting off-the-job
training in budget hotels. In other words, Manager-3 said that “I do not
have enough time to be able to take receptionists off from their job to
bring them in the back office for couple of hours training”. Further,
Manager-4 reported that people do not get the real-life scenario when they
are trained off the job, “they have not got customers in front of them; they
have not got the real-time experience; so they can do it a little bit slower”.
This is demonstrated as follows:
Luxury hotels are able to take more people from the front desk one time
to make off-job-training for them. However, I have a small budget hotel
to run and small department. Here when you doing with small hotel,
you must think if you take a receptionist from the front desk who is
going to cover the front desk. So it is important that you do have
somebody to cover you on the front desk when you are conducting off-
the-job training. However, saying that it is not always possible.
[Manager-3]
Page 5-63
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-64
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Obviously do review for them at certain times and get feedback from
them and observe them to know how they perform at the actually desk
on the system and test them as well, you know, ask them few questions
to see how they respond to the training.
[Manager-4]
Page 5-65
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
hotels do not have enough time and money to train people regularly, as
evidenced in the following quote:
When I worked for a bigger hotel we had off-the-job training which
was constant because of many other things. However, when you have a
small company like this for example after we train the people who are
at the front desk initially for induction for two or three weeks we leave
them alone for a long time until we need to conduct more training.
[Manager-3]
Page 5-66
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-67
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-68
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
user employees (sum = 135) reported that the HIS training provided was
excellent. In the same way, 57.4% of end-user employees reported that
they enjoyed the HIS training (sum = 132) as well as 56.1% of end-user
employees who pointed that the HIS training met their expectations (sum
= 129). These findings are consistent with User-a as well as user-2. This is
Page 5-69
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.18: The evaluation of IT training emerged by the users of budget hotels using off-the-shelf systems
100
In my organisation, the HIS
90 training is readily available.
80 The HIS trainers are well qualified.
70
40
I am satisfied with my level of
learning from the HIS training.
30
The HIS training sessions met my
20 expectations.
10
Overall, I enjoyed the HIS training.
0
% IT training scale items
Page 5-70
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-71
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-72
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
explanation by Manager-6 for this might be that they do not have enough
staff to release some people for training. Another possible explanation
reported by Manager-7 for this is that they do not have enough time to
conduct off-the-job training, as follows:
On-the-job training is the only way to go, there is no way to go off-the-
job training, there are some courses available through our hotel chain,
but personally I have been in a lot of them and I do not personally feel
they were very useful. The training has to be on the desk because we do
not get enough hours giving to us to actually go out the office;
somebody has to be on the desk twenty-four hours because customers
always do around here.
[Manager-7]
Page 5-73
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
they sign it, but when we feel they competent and confident that is when
we sign it”. In that sense, Manager-6 claimed it is better for employees to
learn how to use hotel information systems on their own. A possible
explanation by Manager-5 for this might be that employees would be less
forgetful when doing things by themselves than if somebody teach them
how to do it, as demonstrated in the following quote:
We have got what is called skills work book, which is basically how
they do a particular task comes up on the computer and fill in details
as they doing it, they learned that way, you filling on details in the
skills work book rather than you been told the details, so you have to
find out by yourself.
[Manager-6]
Page 5-74
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
not want to be checked by somebody who just learns the system; it takes
time because obviously they do not sure how it runs”. Similarly,
Manager-7 reported that “obviously new trainees are slower, so
sometimes the customers get a bit upset”. Manager-5 reported that
employees‟ anxiety might be another possible barrier facing on-the-job
training. In that respect, Manager-8 mentioned that “on-the-job training,
there are always mistakes in front of the customers, employees feel a little
bit inhibited”. Added to that, Manager-6 revealed that the limited time as
well as the limited number of trainers might be another possible barriers
confronting on-the-job training, as demonstrated in the following quote:
Obviously, just general time, you need staff to do the training, the
trainer receptionist has check the daily function routines and things
like that, obviously if they doing that they cannot train the person, but
that is normally scheduled around the training, the training becomes a
priority than somebody else does bit some pops.
[Manager-6]
Page 5-75
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-76
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Furthermore, there are several possible ways to know whether the new
employees need to be trained. More specifically, Manager-8 reported that
Page 5-77
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-78
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
change quite often, so every month there is new changes, there is new
procedures, there is new policies, so just keep users up-to-date and
make sure they know, because you have got with Premier Inn so many
things, so many updates , it just keeps things fresh in their minds, also
in Premier Inn you have got so many things you have to say to every
person checking in or things you have to do on day-to-day basis, I just
remind them, make sure they know what they suppose to do in
everyday, that is why we need monthly training.
[Manager-7]
However, Manager-6 argued that they do not conduct any sort of regular
training; whereas refresher training is only provided. A possible
explanation by Manager-5 for this is that employees are quite experienced
with the system; therefore they do not need to be trained regularly.
Another possible explanation by Manager-6 is that the system is easy to
use, therefore it is easy to train employees how to use it from the first
time, as demonstrated in the following quote:
It is initial training when they start the job and then after that just
refresher training, just questionnaire to find that they actually do know
what they doing so how they do a deposit for instance that is every
couple of month then. We do not conduct any regular training; like I
said when they know the system we do not really need it.
[Manager-6]
Page 5-79
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-80
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.19: The evaluation of IT training emerged by the users of budget hotels using bespoke systems
100
In my organisation, the HIS
90 training is readily available.
80
The HIS trainers are well
70 qualified.
Page 5-81
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-82
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
between let say sixty and hundred and thirty rooms do not have an IT
manager because it is very hard to justify an on-site IT manager all the
times, an on-site IT manager is going to be paid an original from
eighteen to twenty four thousands pounds and it is very difficult
because that person does not generate you money, he/she is not a sales
person working in reservations, meeting and events or perhaps in sales
team making money for the company that person is just used in the
backup.
[Manager-3]
Page 5-83
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-84
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
The support is only a phone call away and if you need physical
equipment it can be carried or posted with a day. So I do not see it as a
problem.
[Manager-1]
Page 5-85
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-86
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.20: The evaluation of IT support emerged by the users of budget hotels using off-the-shelf systems
100
The information system department
90 is available for assistance with HIS
difficulties.
80 To interact with the HIS, I have
knowledgeable IT technical staff.
70
Page 5-87
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
and you went down and you do not know how to restart it, reboot it
then you could loose potentially ten thousands of pounds a day and this
something is need to be considered.
[Manager-3]
Page 5-88
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Moreover, all the interviewed managers reported that they only have
support from their IT help desk and they do not have any other external
support. A possible explanation by Manager-5 for this is that their IT help
Page 5-89
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
desk might be more experienced with their chain systems than any other
external company. In that respect, Manager-7 declared that “it is
beneficial for us to have somebody who knows our system and not going
out for a different company who does not know the system as well as we
do”. Similarly, Manager-8 pointed that their off-site IT help desk can
solve the system problems on the phone. In particular, Manager-7 implied
that “for Bart system, all the IT problems can be solved through the
phone”. This is demonstrated in the following quote:
It is better to have off-site IT department like now. I think because it is
literately just a telephone call and somebody asking, dealing with the
issue, talking to staff, trying to find the problem themselves. So, staff
members know they get somebody they can call and get it sorted. We
have never placed a call and have not got it sorted; so off-site IT
department is pretty good.
[Manager-6]
Page 5-90
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
that “the IT help desk might have problems from more than five hundreds
hotels at the same time; it can happen because Bart system is actually
linked to every single hotel in that company”. To that end, Manager-8
claimed that employees as well as managers might be frustrated if the
problems are not solved quickly, as demonstrated in the following quote:
I could fix the problem myself. Receptionist phone me, if they can fix it
they phone me, if they cannot fix then they can phone like the help desk,
but I am always available on the phone and obviously I have been with
the company for a while I know a lot of things that we can do to
actually fix different problems. If I am not on the shift they also call me,
I am manager available all the times anyway, it can make stress on me
sometimes but I find it better to actually deal with the problem on the
time instead of leaving them and I coming after my two days off and it
escalated from little problem to huge problem.
[Manager-8]
Page 5-91
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.21: The evaluation of IT support emerged by the users of budget hotels using bespoke systems
100
The information system department
90
is available for assistance with HIS
difficulties.
80 To interact with the HIS, I have
knowledgeable IT technical staff.
70
The number of the IT technical
60
staff is adequate.
50
The IT technical staff resolve HIS
40 problems quickly.
30
I have the technological IT
20 resources (e.g. hardware and
software) necessary to use the HIS.
10 The technological IT resources
(e.g. hardware and software) are of
0 high quality.
% IT support scale items
Page 5-92
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-93
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-94
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Only if they have a really bad day with the system, if the system is
particularly slow then they get frustrated, but they do not need
motivation to use the system because I think it is quite simple system to
use, there is no motivation, may be if the computer being really slow
and they get frustrated because they often get away from the system to
catch up with them, but they do not need motivation to use it.
[Manager-6]
Page 5-95
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.22: The attitude towards use emerged by the users of budget hotels using off-the-shelf systems
100
90
80
Using the HIS is a good
70 idea.
60 Using the HIS is a wise
idea.
50
Using the HIS is pleasant.
40
30
I like the idea of using the
20 HIS.
10
On the other hand, the survey results showed that the subjective norms
construct was initially insignificant (Mean = 1.9; Std. Dev. = 0.5). The
survey results revealed that most end-user employees had low normative
beliefs concerning their referents (i.e. superiors; peers; customers) as well
as low motivation to comply with their referents‟ opinions. From one
hand, a small number of end-user employees believed that their superiors
(sum = 122; 53%); their peers (sum = 113; 49.1%); their customers (sum =
54; 23.5%) would think that they should have the knowledge and ability
Page 5-96
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
to use the HIS. From the other hand, to a lesser extent, only 31.3% of end-
user employees who wanted to comply with their superiors‟ opinions
concerning using HIS, followed by 28.3% of end-user employees who
wanted to comply with their peers‟ opinions concerning using HIS; 23.5%
of end-user employees wanted to comply with their customers‟ opinions
concerning using HIS, as demonstrated in Figure 5.23. These findings are
inconsistent with those of Burnkrant and Page (1988) who reported that
peers and superiors have a profound effect on employees‟ technology
acceptance.
Figure 5.23: The subjective norms emerged by the users of budget hotels using off-the-shelf systems
60
My superiors would think that I
should have the knowledge and
50 ability to use the HIS.
Generally speaking, I want to do
40 what my superiors think I should
30
do.
Customers would think that I
20 should have the knowledge and
ability to use the HIS.
10 Generally speaking, I want to do
what customers think I should do.
0
Page 5-97
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.24: The perceived behaviour control emerged by the users of budget hotels using off-the-shelf systems
100
90
I feel that there is no gap
80 between my existing skills and
knowledge and those required
70 by the HIS.
Using the HIS is entirely within
60
my control.
50
20
10
0
% Perceived behaviour control scale items
Figure 5.25: The attitude towards use emerged by the users of budget hotels using bespoke systems
100
90
80
Using the HIS is a good idea.
70
10
0
% Attitude towards use scale items
Page 5-98
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
On the other hand, the survey results also showed that the subjective
norms construct was initially insignificant (Mean = 2.1; Std. Dev. = 0.8).
The survey results revealed that most end-user employees had low
normative beliefs concerning their referents (i.e. superiors; peers;
customers) as well as low motivation to comply with their referents‟
opinions. From one hand, a small number of end-user employees believed
that their superiors (sum = 107; 56.3%); their peers (sum = 103; 54.2%);
their customers (sum = 70; 46.8%) would think that they should have the
knowledge and ability to use the HIS. From the other hand, to a lesser
extent, only 42.1% of end-user employees who wanted to comply with
their superiors‟ opinions concerning using HIS, followed by 40.5% of
end-user employees who wanted to comply with their peers‟ opinions
concerning using HIS; 36.8% of end-user employees wanted to comply
with their customers‟ opinions concerning using HIS, as demonstrated in
Figure 5.26. These findings are consistent with those of the interviewed
end-user employees (User-3; User-4).
Figure 5.26: The subjective norms emerged by the users of budget hotels using bespoke systems
100
My peers would think that I should
90 have the knowledge and ability to
use the HIS.
80 Generally speaking, I want to do
what my peers think I should do.
70
60
My superiors would think that I
should have the knowledge and
50 ability to use the HIS.
Generally speaking, I want to do
40 what my superiors think I should
do.
30
Customers would think that I
20 should have the knowledge and
ability to use the HIS.
10 Generally speaking, I want to do
what customers think I should do.
0
Page 5-99
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
= 153; 80.5%) reported that they had the knowledge and ability to make
use of the HIS, followed by 77.9% of end-user employees who reported
that there is no gap between their existing skills and knowledge and those
required by the HIS; 74.2% of end-user reported that using the HIS is
entirely within their control. This is shown in Figure 2.27.
Figure 5.27: The perceived behaviour control emerged by the users of budget hotels using bespoke systems
100
90
80
I feel that there is no gap between
my existing skills and knowledge
70 and those required by the HIS.
60
Using the HIS is entirely within
50 my control.
40
30
I have the knowledge and ability to
20 make use of the HIS.
10
%
Perceived behaviour control scale items
Page 5-100
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-101
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-102
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-103
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-104
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-105
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Another possible explanation for this might be that employees spend more
time with the customers because the information system helps employees
to accomplish their tasks more quickly. In particular, Manager-6 said that
with computer systems customer service is better because “it is quicker
than doing it manually, people can talk to the guests and computer
systems do what they need to do”. To that end, Manager-7 declared that
doing tasks using computer systems is quicker than using the manual
system, as evidenced in the following quote:
For example, checking somebody in using the Bart system takes less
time, less than five minutes, I would say it is quicker on the computer
because with this company is more what you have to say to the
customers, like you have to say certain things and that takes just the
same amount of time as it takes to actually go through the computer
system and check people in.
[Manager-7]
Page 5-106
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-107
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-108
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.28: The degree of satisfaction emerged by the users of budget hotels using off-the-shelf systems
100
The HIS provides sufficient
90 information and reports.
80
I am satisfied with the accuracy of
70 the HIS.
60
The HIS provides clear information
50 and reports.
40
Using the HIS in my job enables
30 me to accomplish tasks more
quickly.
20
Overall, I am satisfied with the HIS
10 at work.
0
Page 5-109
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-110
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.29: The degree of satisfaction emerged by the users of budget hotels using bespoke systems
100
The HIS provides sufficient
90 information and reports.
80
I am satisfied with the accuracy
70 of the HIS.
60
The HIS provides clear
50 information and reports.
40
Using the HIS in my job enables
30
me to accomplish tasks more
20 quickly.
10 Overall, I am satisfied with the
HIS at work.
0
% User satisfaction scale items
Page 5-111
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-112
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-113
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-114
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-115
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-116
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-117
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
In addition, all the interviewed managers reported that they do not prefer
to interview people on-line; however, they prefer to conduct face-to-face
interviews. In this respect, Manager-4 reported that “when you see people
face-to-face that is the best thing and you always get good feedback when
you see people face-to-face, but from the screen point of view it might be
different”.
On the contrary, all the interviewed managers reported that they do not
prefer to interview people on-line; however, they prefer to conduct face-
to-face interviews. Manager-5 pointed that “people apply on-line but
when we select them if the application is put forward then we do face-to-
face interviews because you can get the feeling before employing
people”. This is consistent with Manager-7 who said that “I prefer face-
to-face recruitment because you get better feeling about people, like you
can get better idea of the personality”. The advantages of face-to-face
interviews are demonstrated in the following quote:
Face-to-face recruitment is much better than on-line recruitment
because you cannot make on-line recruitment sound brilliant, you have
to be able to talk to somebody, you have to see whether you be able to
work with them, you know what I mean. Theoretically you can put it
down on a paper, which sounds really very good, but it is very difficult
on a piece of paper to say that whether that person is any good.
[Manager-8]
Page 5-118
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
On the other hand, some of the interviewed managers reported that they
do only conduct face-to-face training and they do not conduct on-line
training. In particular, Manager-1 said that “we do not have on-line
training, if there is a training website setup for Opera users, it would be
Page 5-119
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-120
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-121
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-122
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.30: The criteria of recruiting employees emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
25
20
15
10
0
% End-user age End-user gender End-user End-user system Basic IT skills End-user End-user
hospitality experience computing self- customer service
education efficacy experience
Page 5-123
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.31: The types of hotel systems emerged by the managers of budget hotels
Bespoke
systems
32%
Off the shelf
systems
68%
Figure 5.32: The criteria of selecting hotel systems emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
35
30
25
20
15
10
5
0
% Ease of System System System System cost System System System
system use usefulness compatibility Enjoyment popularity flexibility reliability
Page 5-124
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.33: The types of end-user participation emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
25
20
15
10
0
% Consultative participation Representative participation Consensus participation No participation
Page 5-125
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.34: The types of IT training emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
70
60
50
40
30
20
10
0
% Internal IT training External IT training On-the-job training Off-the-job training
Figure 5.35: The frequency of IT training emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
12
10
0
% Regular training Refresher training on Refresher training on Refresher training on
system upgrades request problems
Page 5-126
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
45
40
35
30
25
20
15
10
5
0
% On-site IT department Off-site IT department Off-site system vendor
Page 5-127
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Table 5.37: The types of end-user motivation emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
45
40
35
30
25
20
15
10
5
0
% On-site IT department Off-site IT department Off-site system vendor
Figure 5.38: The types of performance impacts emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
12
10
8
6
4
2
0
% Productivity impact Competitive advantage Service quality impact Decision-making impact
impact
Page 5-128
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Figure 5.39: The motivators for user satisfaction emerged by the managers of budget hotels
Budget hotels using off-the-shelf systems Budget hotels using bespoke systems
4
3.5
3
2.5
2
1.5
1
0.5
0
% Ease of system use System usefulness System enjoyment System experience Participation and
consultation
Page 5-129
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
With regards to the budget hotels using bespoke systems, the results
showed that CSE and customer service experience are the most important
criteria for recruiting and selecting people for the reception job. Further,
ease of system use, system usefulness, system compatibility and system
reliability are the most important criteria for designing bespoke hotel
information systems. The results also indicated that user consultation and
participation in the system development, IT training and IT support are
important factors to improve IT-human interaction in budget hotels and
subsequently increase user satisfaction, productivity and improve service
quality.
Page 5-130
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
5.13 Summary
This chapter explored technology adoption in the budget hotels using off-
the-shelf systems as well as budget hotels using bespoke systems. More
specifically, this chapter presented technology adoption in the different
stages of employee life cycle, namely: recruitment and selection; hotel
information system development; participation and consultation; IT
training; IT support; motivation; IT performance and satisfaction impacts.
The chapter also highlighted the web-based human resource functions
Page 5-131
Chapter Five: Technology Adoption in Budget Hotels: Two Welsh Case Studies
Page 5-132
TECHNOLOGY ADOPTION IN UPSCALE HOTELS: TWO
WELSH CASE STUDIES
Page 6-1
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
6.1 Introduction
This chapter aims to investigate technology adoption in two case studies
of upscale hotels in Wales, namely twelve upscale hotels using off-the-
shelf hotel information systems and five upscale hotels using bespoke
hotel information systems. It presents technology adoption in the different
stages of the employee life cycle, namely: recruitment and selection; hotel
information system development; participation and consultation; IT
training and development; IT support; motivation; IT performance and
satisfaction impact. It highlights the web-based human resource functions.
Finally, the chapter presents a developed IT-human interaction model to
improve IT-human interaction in upscale hotels.
Page 6-2
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
relationship between age and user ATTC as well as the findings of budget
hotels (e.g. Manager-2; Manager-4; Manager-6; Manager-7). Therefore,
managers have to recruit and select people who are more suitable for the
job regardless of their age. This is demonstrated as follows:
The people’s age does not really matter, you know, if younger people
and older people have similar experience of using computers, then it
does not matter, if the younger does not know anything about
computers and the other person knows a lot, I will choose the other
person, it is not only people age which matter, it is also other things.
[Manager-21]
There are several possible reasons for not considering age as a deciding
factor for recruiting people. More specifically, Manager-22 said that “a lot
of people now are more computer literate than used to be, my night
manager is in his sixties and he is very computer literate”. In that sense,
Manager-23 pointed that there is no age discrimination, as long as people
are legally allowed to work, i.e. people who are over eighteen years old.
Another possible reason reported by Manager-22 is that both younger and
older people are trained on the system, as below:
We have various ages working at the front desk, we just adopt the
whole training to their needs and how they actually use the system;
obviously I am looking at the weakness and strengths and training them
around that on the system.
[Manager-16]
Page 6-3
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
There is some difference, I think you have to sort of, I think, if you look
at age, yes you can see difference in performance because I think
younger people nowadays are taught IT skills through schools, through
colleges, whereas older people, obviously, it requires a bit more
teaching, a bit more one-to-one training rather than may be someone
who has just come out of college or university for example.
[Manager-10]
Page 6-4
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
The gender does not really matter, it is the same, I would say females
they are quite often more customer focused, so they can provide better
customer service, they are gentle and much better in dealing with
customers, but if talking purely about using computers, it does not
matter if it is a man or a woman.
[Manager-21]
Page 6-5
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-6
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
For my staff, when they start with us they have a training schedule, so
they spend time obviously learn the system and go through different
aspects. So they do not need to know everything about the system
because they all are trained and sometimes it is easier if they have no
previous system experience with a computer system such as Fidelio
because you could not change the bad training habits as well as you
can train them on how you want them to be.
[Manager-16]
Page 6-7
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
However, other managers reported that basic IT skills are essential skills
for recruiting people for the reception job. In particular, Manager-17 said
that “basic computer knowledge is obviously essential; they need to use
Word, Email and Excel this kind of packages”. This is in agreement with
Manager-21 who claimed that more IT skills are essential for the
reception job. This is demonstrated in the following quote:
People need to be computer literate, at least the basic knowledge is
essential, if someone needs to learn how to use the reservation system
they need to have a basic knowledge, they need to have this basic
knowledge of computers in general.
[Manager-12]
Page 6-8
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-9
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-10
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
100
I could complete a task using the HIS if
90 there was no-one around to help me.
Page 6-11
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
On the other hand, the survey results showed that the computing anxiety
construct was insignificant (Mean = 2.6; Std. Dev. = 0.9). In particular,
only 47.6% of end-user employees mentioned that they are frightened of
using the HIS; 50.2% reported that they feel apprehensive about using the
HIS; 53.8% who reported that they hesitate to use the HIS for fear of
making mistakes they cannot correct; 60% reported that they could lose a
lot of information by hitting the wrong key. An implication of these
findings is that managers have to increase employees’ confidence by
showing them the right way of doing things (see Figure 6.2).
Figure 6.2: The degree of computing anxiety emerged by the users of upscale hotels using off-the-shelf systems
100
I feel apprehensive about using the
90
HIS.
80
20
I am frightened of using the HIS.
10
0
Computing anxiety scale items
%
Page 6-12
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-13
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
same because they can know the system; we have got people over sixty
years old”. Further, Manager-19 said that confidence and willingness to
use the system are the most important criteria regardless of age. To that
end, Manager-18 reported that age is not a deciding factor because both
younger and older people are easily trained on the system, as evidenced in
the following quote:
The age is not a requirement, obviously the age is required to be legal
for working, but it does not matter what the age is, as long as they are
competent enough to use the system. I mean the system that we use does
not require like very specific training, it just basic training, I am sure
anybody can do it, you know, does not matter what age is.
[Manager-18]
Page 6-14
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
that “I do not think age or sex will make any difference in the use of the
system”. In that sense, Manager-20 pointed that both male and female
users have the same IT skills. Further, Manager-24 reported that both
male and female users have the same capability to learn and to use the
system. This is consistent with Manager-25 who reported that:
The both are the same; we do not look at the gender of the people. The
girls and the guys are the same exactly, nowadays there is no
difference between girls and guys they can do the system the same;
there is no difference at all for us.
[Manager-25]
Page 6-15
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-16
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-17
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-18
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
old system and the system was always crashing and slow, people
checking in were really frustrated”. This is shown as follows:
If the system crashes, people may worry about it, we do get a very good
backup system here where if something happens, such as the computer
shutdown, or power cut, or the system crashed then we have got a
backup and we have got reports that printed every hour, so in case of
everything happens we have got everything packed in files and on
papers, so we can just go to manual check-in if we want to or manual
check-out.
[Manager-24]
Page 6-19
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
You can change a person’s personality, you can change how they use
things, there is always the elements of panic of the unknown, the main
reason of panic is unknown, uncertainly, fear, now if that person knows
if that dies I go to step B, C, D, E and it is a very streamlined logical
procedure, once you get that in place you limit a personality’s ability to
panic or opportunity to panic. So yes there is always people who panic
but as long you have got full procedures behind the scenes which they
can move into and know about them it does limit them panicking.
[Manager-20]
Page 6-20
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.3: The degree of computing self-efficacy emerged by the users of upscale hotels using bespoke systems
100
I could complete a task using the HIS if
there was no-one around to help me.
90
On the other hand, the survey results showed that the computing anxiety
construct was insignificant (Mean = 2.7; Std. Dev. = 0.9). In particular,
45.2% of end-user employees mentioned that they are frightened of using
the HIS; 47.4% reported that they hesitate to use the HIS for fear of
making mistakes they cannot correct; 59.5% reported that they feel
apprehensive about using the HIS; 59.5% reported that they could lose a
lot of information by hitting the wrong key. An implication of these
findings is that managers have to increase employees’ confidence by
showing them the right way of doing things (see Figure 6.4).
Figure 6.4: The degree of computing anxiety emerged by the users of upscale hotels using bespoke systems
100
90
I feel apprehensive about using the
80 HIS.
70
It worries me to think that I could
60 lose a lot of information by hitting
the wrong key.
50
I hesitate to use the HIS for fear of
40 making mistakes I cannot correct.
30
I am frightened of using the HIS.
20
10
Page 6-21
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-22
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
to adapt with any new system. This is consistent with the results of the
budget hotels using off-the-shelf systems (e.g. Manager-2; Manager-4).
Another possible benefit of using off-the-shelf hotel information systems
is the possibility of staff transfer across the hotel chains which use the
same system package, as demonstrated below:
So the bigger the system I think the better and also means if you do
have staff come from other hotels the chances they view that system
before which means quicker turn around and get them trained up,
which means if you lose staff members quickly, you can get someone
very fast or you know if I am very short staffed I can borrow
receptionists from another hotel because they are trained on the same
system, so sharing staff members as well sharing resources.
[Manager-22]
Page 6-23
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-24
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
100
Learning to operate the HIS is easy
90
for me in my job.
80
10
Overall, I believe the HIS is easy to
0 use in my job.
%
Perceived ease of use scale items
Page 6-25
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-26
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
making. In other words, the results revealed that effectiveness impact and
decision-making impact were insignificant. Overall, most end-user
employees (sum = 582; 86.2%) believed using the HIS is useful in their
jobs. This is shown in Figure 6.6.
Figure 6.6: The perceived system usefulness emerged by the users of upscale hotels using off-the-shelf systems
100
Using the HIS in my job enables me
90 to improve my productivity.
80
Using the HIS in my job enables me
70 to enhance my effectiveness.
40
Using HIS improves my decision
making.
30
Using the HIS improves my
20 performance in my job.
10
Overall, I believe using the HIS is
0 useful in my job.
%
Perceived usefulness scale items
Page 6-27
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
mean they constantly work together, also we have got system in place
call Bartech and that we use at the minibar, it is electronic, that means
everything picked up go straight through the interface to front desk.
[Manager-23]
100
90
80
70 Using the HIS is
compatible with all aspects
60 of my work.
50
40 Using the HIS fits well
with the way I work.
30
20
10
0
Page 6-28
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-29
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 5.9: The perceived system enjoyment emerged by the users of budget hotels using off-the-shelf systems
100
90
80
70 I find using the HIS to be
enjoyable.
60
50
I have fun using the HIS.
40
30
20
10
0
Perceived enjoyment scale items
%
Page 6-30
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-31
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-32
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-33
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.9: The perceived ease of system use emerged by the users of upscale hotels using bespoke systems
100
Learning to operate the HIS is easy
90 for me in my job.
80
70 I would find it easy to get the HIS
to do what I want it to do.
60
50 Interacting with the HIS does not
require a lot of my mental effort.
40
30 It is easy to become proficient in
20 using the HIS.
10 Overall, I believe the HIS is easy to
0 use in my job.
% Peceived ease of use scale items
Page 6-34
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.10: The perceived system usefulness emerged by the users of upscale hotels using bespoke systems
100
Using the HIS in my job enables me to
90 improve my productivity.
80
Using the HIS in my job enables me to
70 enhance my effectiveness.
Page 6-35
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-36
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.11: The perceived system compatibility emerged by the users of upscale hotels using bespoke systems
100
90
80
70 Using the HIS is compatible
with all aspects of my work.
60
50
Using the HIS fits well with
40 the way I work.
30
20
10
0
% Perceived compatibility scale items
Page 6-37
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
perform and use well, as long as, it is easy of use included and has got
all the functions we need, it is a tool, it likes pen or a calculator, I
would not say I am picking up a pen to be enjoyable, it is a tool we use
without thinking and that how we look at IT system here. It is a tool to
meet our guest needs, the enjoyable part of our job is to interact with
the guests, to have that conversation, to have that personal interaction
not to use the computer because we want the team looking at the guest,
talking to the guest we do not want them have so much fun with the
computer that detracting from what they doing which is guest service.
[Manager-20]
Page 6-38
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.12: The perceived system enjoyment emerged by the users of upscale hotels using bespoke systems
100
90
80
70 I find using the HIS to be
60
enjoyable.
50
I have fun using the HIS.
40
30
20
10
0
% Percieved enjoyment scale items
Page 6-39
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-40
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Therefore, both the needs and preferences of end users should be taken
into account when selecting hotel information systems. In that respect,
Manager-13 recommended that “managers have to ask the reception team
what works best and what does not, so positive and negative sides of
using the system”. Similarly, Manager-17 said that end users have to give
their feedback about the system because “the system here is obviously set
in a particular way so certain staff will be restricted on what they can do
in the system”. To that end, Manager-23 mentioned the benefits of
involving users in the new system design, as demonstrated in the
following quote:
Page 6-41
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
When users are participated and involved in the new system design, the
system becomes easy to use and makes fewer mistakes, which makes it
easy for the management.
[Manager-23]
Figure 6.13: The participation activities emerged by the users of upscale hotels using off-the-shelf systems
On the other hand, the survey results showed that the user involvement
construct was initially significant (Mean = 3.9; Std. Dev. = 0.9). The
majority of end-user employees (sum = 548; 81.2%) considered the new
system to be important as well as 73.9% of end-user employees (sum =
499) who considered the new system to be relevant to them. Therefore,
end-user employees are more likely to have positive attitudes towards
Page 6-42
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
using HIS. This is shown in Figure 6.14. These results are consistent with
User-5 as well as User-6.
Figure 6.14: The perceived involvement emerged by the users of upscale hotels using off-the-shelf systems
100
90
80
70
60 I consider the new system to
be important.
50
40 I consider the new system to
be relevant to me.
30
20
10
0
User involvement scale items
%
Page 6-43
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-44
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
asserted that “people do not always understand what behind the scenes of
the system and the importance of tasks and procedures”. To that end,
Manager-24 stated that it is difficult for end-user employees to test the
system because it would take too much time, as evidenced below:
This is a very big company, so I am sure that the people who make the
selection of the system, they make it for a long term benefits, obviously
staff, any staff member, will think always about their own benefits
rather than company benefits, so that is why we do not involve users.
We take into consideration some comments to save time to do the task
may be to escape some parts of the system or use a new part in the
system but not obviously change the whole system because staff are not
experienced enough to decide what system to use.
[Manager-18]
Figure 6.15: The participation activities emerged by users of upscale hotels using bespoke systems
100
I had main responsibility for the
90 development of the HIS (during
system definition/ during physical
80 design/ during implementation).
70 I formally reviewed the work done by
information system staff (during
60 system definition/ during physical
design/ during implementation).
50
I designed the user training
40 programme for the HIS.
30
20
I created the user procedure manual
10 for the HIS.
0
% User participation scale items
Page 6-45
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
On the other hand, the survey results showed that the user involvement
construct was initially significant (Mean = 3.9; Std. Dev. = 0.8). The
majority of end-user employees (sum = 336; 80%) considered the new
system to be important as well as 74.8% of end-user employees (sum =
314) who considered the new system to be relevant to them (see Figure
6.16). There are similarities between these findings and those reported by
the interviewed end-user employees (User-9; User-10).
Figure 6.16: The perceived involvement emerged by the users of upscale hotels using bespoke systems
100
90
80
70 I consider the new system
to be important.
60
50
I consider the new system
40 to be relevant to me.
30
20
10
0
Page 6-46
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
When they understand it, they accept it but until they do have this
knowledge of the system and procedures they are always gonna think it
is a problem.
[Manager-20]
Page 6-47
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Furthermore, Manager-11 declared that when they had the new system in
place, they conducted internal training by the front-office manager. In a
similar vein, Manager-14 reported that their end-user employees are
trained in-the house by the training manager. This is consistent with
Manager-17 who pointed that they train their employees internally; “it is
done by me or by the deputy training manager”.
Page 6-48
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
the system to do the shift and then, you know, as people go along with
the experience that is, pick up all the rest of system requirements. If
they never used the system before depending on individuals obviously I
would say it can take up to a month to be trained by an external
company really to have a reasonable understanding of it.
[Manager-17]
Page 6-49
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-50
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-51
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-52
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-53
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-54
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
we will start again with the training, we do that anyway, after few
months we re-train them just to keep everyone up-to-date, keep them
fresh.
[Manager-14]
Page 6-55
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.17: The evaluation of IT training emerged by the users of upscale hotels using off-the-shelf systems
100
In my organisation, the HIS
90 training is readily available.
80 The HIS trainers are well
70 qualified.
Page 6-56
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-57
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-58
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-59
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-60
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-61
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-62
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
could take ten minutes, but it is just on one topic, you know, you do not
spend an hour doing five topics and people probably forget half of it at
the end, so if you do ten minutes short training in one topic you can do
couple of times a week or you could do every day, but we tend to do
couple of topics per week.
[Manager-24]
On the other hand, some of the interviewed managers reported that they
do not train their employees on a regular basis. In particular, Manager-20
as well as Manager-24 pointed that they only provide refresher training
when system procedures are changed. In a similar vein, Manager-18
revealed limited time, resources and staff could be possible reasons for
not conducting regular training, as demonstrated in the following quote:
We do not have regular training, we have training for the new staff just
when they start to introduce them the system and then if there is any
new procedure coming into the place within the system that is when we
schedule training. Whether get fixed day training it depends on the
number of the staff, the time, what we have and what resources we have
got as well.
[Manager-18]
Page 6-63
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
100
In my organisation, the HIS
90 training is readily available.
80 The HIS trainers are well
70 qualified.
60 The HIS training provided is
always excellent.
50
40 I am satisfied with my level of
learning from the HIS training.
30
The HIS training sessions met my
20
expectations.
10
Overall, I enjoyed the HIS
0 training.
% IT training scale items
Page 6-64
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-65
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-66
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Furthermore, some of the managers reported that they do not have an on-
site IT department because hotel information systems do not crash enough
times to justify the recruitment of an on-site IT manager. In that sense,
Manager-16 said that “the system does not crash so far, so it is very
irregular that we would need somebody on site”. This is consistent with
Manager-10 who reported that they do not have many system problems as
well as their support team are able to dial into the network and fix any
problems quite quickly. Similarly, Manager-11 was of the opinion that
they do not need to have IT department on site, as evidenced below:
There is no need to have an internal IT support, there is no need
because you have not got problems with IT all the times, you may have
a problem once a week, so that can always be managed centrally, you
do not need to have them within the hotel all the times.
[Manager-11]
Page 6-67
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-68
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.19: The evaluation of IT support emerged by the users of upscale hotels using off-the-shelf systems
100
The information system department
90 is available for assistance with HIS
difficulties.
80 To interact with the HIS, I have
knowledgeable IT technical staff.
70
60
The number of the IT technical staff
is adequate.
50
The IT technical staff resolve HIS
40 problems quickly.
30
I have the technological IT
20 resources (e.g. hardware and
software) necessary to use the HIS.
10 The technological IT resources (e.g.
hardware and software) are of high
0 quality.
% IT support scale items
Page 6-69
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-70
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-71
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.20: The evaluation of IT support emerged by the users of upscale hotels using bespoke systems
100
The information system department is
90 available for assistance with HIS
difficulties.
80 To interact with the HIS, I have
knowledgeable IT technical staff.
70
The number of the IT technical staff is
60
adequate.
50
The IT technical staff resolve HIS
40 problems quickly.
30
I have the technological IT resources
(e.g. hardware and software) necessary
20
to use the HIS.
10 The technological IT resources (e.g.
hardware and software) are of high
0 quality.
Page 6-72
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-73
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
the system; they just need to use the system to talk to their job, so
nothing we can do with that.
[Manager-17]
Page 6-74
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.21: The attitude towards use emerged by the users of upscale hotels using off-the-shelf systems
100
90
80
Using the HIS is a good idea.
70
60
Using the HIS is a wise idea.
50
%
Attitude towards use scale items
Page 6-75
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
In addition, the survey results showed that the subjective norms construct
was initially insignificant (Mean = 2.5; Std. Dev. = 0.9). The survey results
revealed that most end-user employees had low normative beliefs
concerning their referents (i.e. superiors; peers; customers) as well as low
motivation to comply with their referents’ opinions. From one hand, a
small number of end-user employees believed that their peers (sum = 412;
61%); their superiors (sum = 381; 56.4%); their customers (sum = 328;
48.6%) would think that they should have the knowledge and ability to
use the HIS. From the other hand, to a lesser extent, only 48.9% of end-
user employees who wanted to comply with their peers’ opinions
concerning using HIS, followed by 48.4% of end-user employees who
wanted to comply with their superiors’ opinions concerning using HIS;
39.6% of end-user employees wanted to comply with their customers’
opinions concerning using HIS, as demonstrated in Figure 6.22. These
findings are inconsistent with those of Burnkrant and Page (1988) who
reported that peers and superiors have a profound effect on employees’
technology acceptance. However, these findings are consistent with User-
5 as ell as User-7 who reported that they use HIS regardless the
perceptions of their superiors, peers or customers because they believe
that using the HIS is obligatory in the hotel work.
Figure 6.22: The subjective norms emerged by the users of upscale hotels using off-the-shelf systems
100
My peers would think that I should
90
have the knowledge and ability to
use the HIS.
80 Generally speaking, I want to do
what my peers think I should do.
70
My superiors would think that I
60
should have the knowledge and
50 ability to use the HIS.
Generally speaking, I want to do
40 what my superiors think I should
do.
30
Customers would think that I should
20 have the knowledge and ability to
use the HIS.
10 Generally speaking, I want to do
what customers think I should do.
0
Page 6-76
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
and knowledge and those required by the HIS, followed by 78.1% of end-
user employees who reported that they had the knowledge and ability to
make use of the HIS that; 76.4% of end-user reported that using the HIS
is entirely within their control (see Figure 6.23). These findings are
consistent with User-6 and User-7 who reported that they have the
knowledge, skills and facilities to use the HIS.
Figure 6.23: The perceived behaviour control emerged by the users of upscale hotels using off-the-shelf systems
100
90
80
I feel that there is no gap between
my existing skills and knowledge
70 and those required by the HIS.
60
Using the HIS is entirely within my
50 control.
40
30
I have the knowledge and ability to
20 make use of the HIS.
10
0
Perceived behaviour control scale items
%
Page 6-77
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.24: The attitude towards use emerged by the users of upscale hotels using bespoke systems
100
90
Using the HIS is a good idea.
80
70
50
30
In addition, the survey results showed that the subjective norms construct
was initially insignificant (Mean = 2.2; Std. Dev. = 0.6). The survey results
revealed that most end-user employees had low normative beliefs
concerning their referents (i.e. superiors; peers; customers) as well as low
motivation to comply with their referents’ opinions. From one hand, a
small number of end-user employees believed that their peers (sum = 261;
62.1%); their superiors (sum = 217; 51.7%); their customers (sum = 175;
41.7%) would think that they should have the knowledge and ability to
use the HIS. From the other hand, to a lesser extent, only 37.4% of end-
user employees wanted to comply with their superiors’ opinions
concerning using HIS, followed by 34.5% of end-user employees who
wanted to comply with their peers’ opinions concerning using HIS; 29%
of end-user employees wanted to comply with their customers’ opinions
concerning using HIS, as demonstrated in Figure 6.25. These findings are
consistent with those of User-9 and User-10 who reported that using the
HIS is a part of their jobs, therefore, they use it regardless of the
perceptions of their superiors, peers or customers.
Page 6-78
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.25: The subjective norms emerged by the users of upscale hotels using bespoke systems
100
My peers would think that I should
90 have the knowledge and ability to
use the HIS.
80 Generally speaking, I want to do
what my peers think I should do.
70
and knowledge and those required by the HIS, followed by 78.8% of end-
user employees who reported that they had the knowledge and ability to
make use of the HIS; 75% of end-user reported that using the HIS is
entirely within their control (see Figure 6.26). This is consistent with
User-8 as well as User-9.
Figure 6.26: The perceived behaviour control emerged by the users of upscale hotels using bespoke systems
100
90
30
I have the knowledge and ability
20 to make use of the HIS.
10
%
Percived behaviour control scale items
Page 6-79
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-80
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
automatically, the system does things on its own”. Further, hotel systems
help users to perform their tasks quickly. In that sense, Manager-25
claimed that “the manual systems in the front office slow down the
productivity but the computer systems speed up the productivity”.
Page 6-81
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-82
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
get them doing a lot of things. So if the guest in London has the Times
Newspaper, we know he has Times Newspaper we order it for him/her
ready, so it makes sense more proactive, make them feel personalised.
[Manager-22]
Page 6-83
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
However, Manager-25 claimed that the hotel information system does not
improve service quality because “it is not the system that increases the
service quality, it would be the personality of the person”. Therefore,
Manager-20 recommended that employees have to be trained to provide
good customer service as well as the system has to be designed in a
simple way to facilitate the interaction with the customers, as below:
The system is a tool to meet our guest needs; the enjoyable part of our
job is to interact with the guests. The main thing is not the use of the
system, it is the guest interaction. So obviously give them a little bit of
training on how to interact with the guest, it is not relying on the
system, it is relying on the guest service and using the system to the
best possibility. So yes the system can help but it is not the important
point of the interaction. We do not want them have so much fun with
the computer that might detract from what they doing which is guest
service. We try to tailor our job descriptions to the end result what we
want, so for my reception team the end result is good service.
[Manager-20]
Page 6-84
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-85
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-86
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.27: The degree of satisfaction emerged by the users of upscale hotels using off-the-shelf systems
100
The HIS provides sufficient
90 information and reports.
80
I am satisfied with the accuracy of
70 the HIS.
60
The HIS provides clear information
50
and reports.
40
30
Using the HIS in my job enables
me to accomplish tasks more
20 quickly.
Page 6-87
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.28: The degree of satisfaction emerged by the users of upscale hotels using bespoke systems
100
The HIS provides sufficient
90 information and reports.
80
I am satisfied with the accuracy of
70
the HIS.
60
Page 6-88
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-89
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-90
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-91
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-92
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Marriott hotel has what we called the on-line interview section, so, for
example, if you are succeed obviously you will be asked to be part of an
on-line interview basically and you are asked twenty questions, the
twenty questions are picked up randomly and obviously that comes
back to the hotel where you come back as a referral, not recommended
or recommended and obviously the hotel makes then the second
interview from there. Marriott has so many applications every sort of
month so the system would pick out key people and that sort of
feedback to the hotel rather than the hotel interviews every application
that comes in, obviously it is time factor and cost factor involved in
that.
[Manager-10]
Page 6-93
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
On the other hand, all the interviewed managers reported that they do not
prefer to interview people on-line; however, they prefer to conduct face-
to-face interviews. More specifically, Manager-24 reported that face-to-
face interviews are better than on-line interviews because “I can see
people, I can see how they react; I can see their manners, their body
language, so it needs to be personally”. Similarly, Manager-20 reported
that they do not use on-line interviews for recruiting and selecting people
because computer systems only do quantitative selection and not
qualitative selection, as demonstrated in the following quote:
We obviously have the on-line job advertising and on-line application
forms but the actual selection process is done in person. The person is
invited by our HR team and passed to the various managers. I do not
think the computer system is good for recruitment and selection
because obviously with the system your information is passed by the
computing system, really quantitative selection process is on-line, it
shows listing, it could miss a good candidate because it is only looking
at specific quantitative selection, if you can design a programme that
can do qualitative selection for C.Vs and things like that, you would
make a lot of money.
[Manager-20]
Page 6-94
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-95
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
On the other hand, some of the interviewed managers reported that they
do not prefer to conduct on-line training for system skills; however, they
prefer to conduct face-to-face training. In that sense, Manager-18 said that
“there is no on-line training here; it is all a role play, one-to-one training
or on-the-job training”. Further, Manager-20 claimed that on-line training
is not an effective tool because you need to interact with the customers
during the training. To that end, Manager-24 said that “I think on-the-job
training can be more effective than if someone just sits on his/her own
learn at the computer because people remember things more if someone
teaches them”.
Page 6-96
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
help desk; however, if the system problem is urgent they have to phone
the IT help desk, as demonstrated below:
If problems stop you working then you can ring the off-site IT
department and they can usually fix it over the phone and over the
Internet because the system is connected; IT help desk can access the
computers from anywhere on the planet, so they actually can fix the
problem from another desks. If it is not immediate problem, say one
user’s password does not work for example then we just email them.
[Manager-23]
Page 6-97
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
need to send them an email to update them and keep them in the loop,
so yes there is an email support for networks but the initial contact is
done through the phone.
[Manager-20]
Page 6-98
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.29: The criteria of recruiting employees emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
30
25
20
15
10
0
% End-user age End-user End-user End-user Basic IT skills End-user End-user
gender hospitality system computing self- customer
education experience efficacy service
experience
Figure 6.30: The types of hotel systems emerged by the managers of upscale hotels
Upscale hotels
using bespoke
systems
Upscale hotels 37%
using off-the-shelf
systems
63%
Page 6-99
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.31: The criteria of selecting hotel systems emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
60
50
40
30
20
10
0
% Ease of system System usefulness System System System cost System
use compatibility Enjoyment popularity
Page 6-100
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.32: The types of end-user participation emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
25
20
15
10
Figure 6.33: The types of IT training emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
100
90
80
70
60
50
40
30
20
10
0
Page 6-101
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.34: The frequency of IT training emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
25
20
15
10
0
% Regular training Refresher training on Refresher training on Refresher training on
system upgrade request problems
Page 6-102
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.35: The types of IT support emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
20
18
16
14
12
10
8
6
4
2
0
% On-site IT department Off-site IT department Off-site system vendor
Figure 6.36: The types of end-user motivation emerged by the managers of upscale hotels
%
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
14
12
10
8
6
4
2
0
Intrinsic motivation Extrinsic motivation No motivation
Page 6-103
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.37: The types of performance impacts emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
16
14
12
10
8
6
4
2
0
% Productivity impact Competitive advantage Service quality impact Decision-making
impact impact
Page 6-104
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Figure 6.38: The motivators for user satisfaction emerged by the managers of upscale hotels
Upscale hotels using off-the-shelf systems Upscale hotels using bespoke systems
Page 6-105
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
Page 6-106
Chapter Six: Technology Adoption in Upscale Hotels: Two Welsh Case Studies
6.14 Summary
This chapter explored technology adoption in upscale hotels using off-
the-shelf systems as well as those using bespoke systems. More
specifically, this chapter presented technology adoption in the different
stages of employee life cycle, namely: recruitment and selection; system
development; participation and consultation; IT training; IT support;
motivation; IT performance and satisfaction impacts. The chapter also
highlighted the web-based human resource functions (web-based
recruiting and selecting; web-based IT training; web-based IT support).
The chapter ends with developing an IT-human interaction model to
improve IT performance in upscale hotels using off-the-shelf systems as
well as upscale hotels using bespoke systems. Therefore, the following
chapter aims to evaluate and discuss technology adoption in the four hotel
case studies.
Page 6-107
AN EVALUATION AND DISCUSION OF TECHNOLOGY
ADOPTION ACROSS ALL CASES STUDIED
Page 7-1
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
7.1 Introduction
This chapter aims to present an evaluation and discussion of technology
adoption in the four case studies of budget and upscale hotels in Wales. In
particular, a cross-case analysis was developed to evaluate and discuss the
findings from budget hotels using off-the-shelf and bespoke hotel
information systems, along with upscale hotels using off-the-shelf and
bespoke hotel information systems. This chapter further evaluate the
findings in respect of the theory of planned behaviour (TPB). The analysis
process was approached and designed with the aim of developing a best
practice model to improve IT-human interaction in hotels. This chapter
ends up with developing a strategic action plan to improve IT-human
interaction in hotels.
Page 7-2
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-3
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-4
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Lack of Lack of
Reasons
Selecting Set of
right IT training IT support Consultation Motivation system
employees procedures
Page 7-5
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
experience is a deciding factor for recruiting people for the reception job.
In essence, they declared that system experience could be taught;
however, customer service experience could not be taught because it is a
part of people’s personality. Another possible explanation for this might
be that hospitality industry in general relies more on customer service.
Therefore, employees have to get good communication skills because the
reception is the first and last interaction point with every customer
Page 7-6
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
asserted that their end-user employees have not been consulted in the
selection of the new hotel information systems. Indeed, the decision has
been made by the hotel head management. They also declared that their
employees had no choice to select the hotel information systems;
however, they were reinforced to change from an old system to a new
system. Evidently, they pointed that the system has been selected by their
IT department because who are quite experienced than employees.
End-user Participation/Consultation
Increased Increased
Increased Reduced Increased Decreased Increased
Benefits
Ease of computing
employees’ employees’ employees’ training employees’ employees’
system self-
acceptance mistakes confidence costs satisfaction productivity
efficacy
Page 7-7
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
7.2.2.2 IT training
In terms the type of training conducted in the investigated four case
studies, the study had identified a clear distinction between the hotels
using off-the-shelf systems and those using bespoke systems. In
particular, all the managers of budget and upscale hotels using off-the-
shelf systems pointed that they conduct two types of training: internal
training (by the hotel training team) and external training (by the system
vendor, training company or other hotel). More specifically, the managers
of budget hotels prefer to train their employees internally because external
IT training is more expensive as compared to internal training. Another
possible explanation for this is that budget hotels do not have enough staff
to release some of them for external training. However, the managers of
upscale hotels prefer to train their employees by the system vendor
because they are experienced in the system more than the hotel training
team. An implication of these findings is that both internal and external
training have to be conducted. In other words, when the new system is
installed the system vendor has to conduct training for managers and end-
Page 7-8
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
On the other side, all the managers of budget and upscale hotels using
bespoke systems reported that it is better to train their end-user employees
internally by the hotel training team. A possible explanation for this is
that the system is designed by the hotel IT team; therefore they might
have a better understanding of the system than any other training
company. Another possible explanation for this is that they train their
employees internally because the system is easy to use. These findings
have a number of important practical implications for future practice. An
implication of these findings is that the hotel IT team have to train
managers and end-user employees as well to enable them to use the
system. Another important practical implication is that managers of hotels
have to conduct refresher training for their end-user employees on a
regular basis to keep them up-to-date with changes.
Page 7-9
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Figure 7.3: The barriers and benefits for conducting on-the-job training
Barriers
Limited Long time End-user
Limited Interruption Dissatisfied
trainers to perform computing
time customers
tasks anxiety
On-the-Job Training
Increased Increased
Benefits
Page 7-10
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Figure 7.4: The barriers and benefits for conducting off-the-job training
Limited
time money resources staff scenario training
Off-the-Job Training
Increased
Benefits
Employees'
mistakes
Mystery Monitoring
shopper employees
Measuring
Training
Effectiveness
Testing Revieweing
employees employees
Page 7-11
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Regular
training
Refresher Refresher
training on training on
employees' new
requests
Training procedures
Frequency
Refresher Refresher
training on training on
system system
problems upgrades
Page 7-12
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
End-user Training
Solutions
Page 7-13
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
7.2.2.3 IT support
In terms the type of IT support, a clear concurrence had been reported
between the budget and upscale hotels. In particular, it was apparent that
almost all the investigated hotels (24 hotels out of 25 hotels) do not have
on-site IT departments; however, they have off-site IT departments based
on their head offices. In essence, hotels might not have enough budgets to
hire an on-site IT manager. Indeed, the managers declared that hotel
information systems do not crash enough times to justify the recruitment
of an on-site IT manager. It was also noted that with the advanced
technology nowadays it is easy to dial in and rectify IT problems from off
site.
In addition, the study had identified a disparity between hotels using off-
the-shelf systems and those using bespoke systems in respect of the type
of off-site IT support. More specifically, the managers of budget and
upscale hotels using off-the-shelf systems identified two types of off-site
IT support, namely off-site IT support by the hotel central IT department
and off-site IT support by the system vendor. In other words, if it is a
hardware problem, it is better to contact the off-site IT department and if
it is a system problem, it is better to contact the system vendor. A possible
explanation for this is that system vendor team might be more
experienced by the system problems than the hotel IT team. On the other
side, all the managers of budget and upscale hotels using bespoke systems
reported that if they face any problem with their bespoke chain systems,
Page 7-14
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
they contact only their off-site IT help desks. A possible explanation for
this is that their IT help desk might be more experienced with their
bespoke chain systems than any other external company.
The study had identified several possible barriers facing IT support (see
Figure 7.8). It was noted that lack of IT knowledge; difficulty to contact
off-site IT help desk at night and on weekends as well; limited number of
IT support team; long time to solve system problems; limited speed of the
systems; employees frustration could be possible barriers confronting IT
support. These findings are consistent with previously-published results
(e.g. Hitt, Wu and Zhou, 2002; Santhanam and Hartono, 2003).
Therefore, the previous findings have a number of important implications
for future practice. In particular, hotels have to invest on some managers
(super managers) as well as employees (super users) to be able to solve
the IT problems on their own. It was also apparent that conducting IT
training regularly; keeping more IT support team all the times; using
system help icons before contacting the IT help desk; developing set
system procedures to be used on system problems; keeping a direct
communication between IT help desk staff and end-user employees could
be possible ways to improve the off-site IT support.
Long time
Barriers
Off-site IT Support
Solutions
Page 7-15
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
7.2.2.4 Motivation
The study had identified a disparity between budget and upscale hotels in
respect of motivating end-user employees. Indeed, most of the
interviewed managers of upscale hotels reported that their end-user
employees do not need to be motivated to use the system. In essence, they
declared that the system is a basic tool to do the job; therefore, employees
do not need to be motivated to use this tool which is part of their job.
Further, most of the managers of budget hotels using bespoke systems
implied that bespoke systems are usually designed to be easy to use;
therefore, employees do not need to be motivated to use easy systems.
Evidently, some mangers argued that employees do not need to be
motivated to use the system; however, they need to be motivated to
provide a good customer service.
On the other side, most of the managers of budget hotels using off-the-
shelf systems mentioned some possible ways of motivating people to use
the system. It was noted that they motivate their end-user employees to
use the system by making them more interested and helping them to enjoy
using the system (intrinsic motivation). This is consistent with previously-
published results (e.g. Davis, Bagozzi and Warshaw, 1992; Ryan and
Deci, 2000; Chiang and Jang, 2008). Another possible way of motivating
end-user employees to use the system is by rewarding them (extrinsic
motivation). This supports Fagan, Neill and Wooldridge’s (2008) findings
which showed that users who enjoy the process of using technology may
tend to underestimate its difficulty and find it easier to use.
Page 7-16
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
However, on the other side, hotels using their bespoke chain systems
might face some problems. In particular, it is difficult for employees to
cross brands if they have experienced only bespoke systems. More
specifically, it was claimed that any hotel using its bespoke system has to
be large enough as well as it needs to have an expert IT team to be able to
upgrade and maintain its system properly. An implication of this finding
is that hotels have to design their bespoke systems to comply with their
budget, facilities and staff skills.
Page 7-17
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-18
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-19
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-20
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-21
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Computing
self-
efficacy
System
Consultation
compatibility
System
usefulness
Satisfaction IT training
Ease of
system IT support
use
Motivation
Page 7-22
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Figure 7.10: The barriers and solutions for IT performance and satisfaction
Barriers
Page 7-23
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
The analysis using TPB revealed that the attitude component had a
significant effect on end-user employees and managers’ behavioural
intentions to use hotel information systems. It was noted that, if hotel end-
user employees and managers have positive attitudes towards information
systems adoption (i.e. perceived ease of use; perceived usefulness;
perceived compatibilty), they are more likely to use those systems. From
the standpoint of the perceived behavioural control component, the study
had proved that perceived behavioural control had a significant effect on
end-user employees and managers’ behavioural intentions to use hotel
information systems. In other words, it was also revealed that if end-user
employees and managers have the requisite end-user computing self-
efficacy (internal constraints), consultation, IT training and IT support
(external constraints), they are more likely to use hotel information
systems effectively.
Page 7-24
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
On the other hand, the subjective norms component had a small effect on
end-user employees’ behavioural intentions to use hotel information
systems. In other words, the managers revealed that a few number of end-
user employee perceives that others (managers; peers; cutomers)
significantly think he/she should use the hotel information system.
However, most of the managers declared that end-user employees do not
need to be motivated by others to use hotel information systems because
using hotel systems is a part of their job (see section 7.2.2.4). This is
consistent with previous research (Davis, Bagozzi, and Warshaw, 1989;
Ajzen, 1991) which provided little support to the role of subjective norms
as a predictor of intentions to perform the behaviour in TRA and TPB.
Theses results also are consistent with the survey results as well as the
interviewed end-user employees.
This research proved that the TPB with its main components (attitude,
subjective norms and perceived behavioural control) was still not
adequate to predict and/or explain the behaviour of end-user employees in
relation to technology adoption and additional factors needed to be
incorporated. In that sense, several previous studies (Cheung, Chan and
Wong, 1999; Terry, Hogg and White, 1999; Davies, Foxall and Pallister
2002; Davis and Morgan, 2008; Radwan, 2009) used TPB in predicting
the behaviour and similarly indicated that TPB was not sufficient in
explaining the behaviour and so additional factors should be incorporated.
Therefore, four modifications were applied to the TPB to provide
additional insights into employees’ behavioural intention to use hotel
information systems (see Figure 7.12).
Indeed, it has been found that the subjective norms component had a
small effect on end-user employees’ behavioural intentions to use hotel
information systems; therefore, the first modification to the TPB was to
remove the subjective norms component. This is consistent with several
researchers (Hartwick and Barki, 1994; Agarwal and Prasad, 1997;
Venkatesh and Davis, 2000) who argued that the direct effect of
Page 7-25
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
The third modification to the TPB was to decompose the attitude and
perceived behavioural control components into various belief factors that
influence end-user employees’ attitude towards use hotel information
systems. In particular, the attitude component was decomposed into
attitudinal beliefs (e.g. perceived ease of use, perceived usefulness and
perceived compatibility). Further, the perceived behavioural control
component was decomposed into internal control beliefs (i.e. end-user
computing self-efficacy; end-user customer service skills) and external
control beliefs (i.e. consultation; IT training; IT support). This is
consistent with previously-published studies (e.g. Taylor and Todd, 1995;
Hung and Chang, 2005; Huang and Chuang, 2007; Lin, 2007; Huh, Kim
and Law, 2009) which showed that the decomposition of beliefs can
provide additional insights into employees’ behavioural intention to use
hotel information systems. The last modification to the TPB was to add a
behaviour outcomes component in order to measure the impact of using
hotel information systems (i.e. end-user computing satisfaction; IT
performance).
Page 7-26
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-27
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Figure 7.13: The process of developing a best practice model to improve IT-human interaction in hotels
The best practice model comprises three main parts, namely the IT-human
critical success factors, the theory of planned behaviour and the
technology-related outcomes. Concerning the IT-human critical success
factors, it was apparent that most the critical factors are either related to
people (i.e. end-user employees), organisations (i.e. hotels) and
technology (i.e. hotel information systems) as demonstrated in Figure
7.14. The study had identified the end-user employees’ critical factors
(i.e. computing self-efficacy; customer service skills), the organisational
critical factors (i.e. consultation; IT training; IT support) and the system
critical factors (i.e. ease of system use; system usefulness; system
compatibility).
System
Organisation
People
Page 7-28
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
The theory of planned behaviour is the second part of the developed best
practice model. As discussed earlier in section 7.3, the TPB main
components are attitude towards use, subjective norms and perceived
behaviour control. The last part of the developed best practice model
explores the technology-related outcomes incorporating end-user
computing satisfaction and IT performance (i.e. productivity and service
quality). The developed best practice mode with its main three parts is
demonstrated in Figure 7.15.
Page 7-29
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
The first stage of the SAPF focused on the criteria relating to recruiting
and selecting people for the reception job, namely customer service skills,
computing self-efficacy, system experience and basic IT knowledge. The
second stage of the SAPF concerned with the criteria of selecting hotel
information systems. More specifically, some managers mentioned ease
of use, usefulness and compatibility criteria (see Figure 7.16a). The third
stage of the SAPF dealt with the process of participating and consulting
end-user employees in the system development. The fourth stage of the
SAPF concerned with training end-user employees either internally,
externally, off the job or on the job as well as the frequency and the
evaluation of training effectiveness (see Figure 7.16b).
The fifth stage of the SAPF focused on the procedures that have to be
undertaken if end-user employees face any system problem, such as try to
solve the problem on their own, call the IT help desk or call the system
vendor. The sixth stage of the SAPF concerned with motivating end-user
employees to provide good customer service using hotel information
systems (see Figure 7.16c). In the final stage of the SAPF, a clear focus
has been given to improve end-user employees’ satisfaction and IT
performance (see Figure 7.16d).
Page 7-30
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-31
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-32
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-33
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Page 7-34
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
√ √
Hotel Information
Select/design the hotel information system that complies with your hotel facilities and number of rooms. √ √
Select/design the hotel information system that complies with your end-user employees’ needs, capabilities and skills. √ √ √ √
Select/design the hotel information system that is easy to use, simple and straightforward (using shortcuts). √ √ √ √
Select/design the hotel information system that backs data up easily at the night. √ √ √ √
Select/design the hotel information system that backs data up quickly at the night. √ √ √ √
Select/design the hotel information system that is easy to learn. √ √ √ √
(continued)
Page 7-35
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.1: A strategic action plan to improve IT-human interaction in hotels (continued)
Stage Indicators/ Activities Case 1 Case 2 Case 3 Case 4
Select/design the hotel information system that performs tasks quickly. √ √ √ √
Select/design the hotel information system that provides employees and managers with sufficient information and reports. √ √ √ √
Select/design the hotel information system that is accurate. √ √ √ √
Select/design the hotel information system that keeps and retrieves guests’ records easily. √ √ √ √
Hotel Information System Development
Select/design the hotel information system that is compatible with employees’ tasks. √ √ √ √
Select/design the hotel information system that asks end-user employees questions and gives guidance on procedures. √ √ √ √
Select/design the hotel information system that corrects end-user employees’ mistakes. √ √ √ √
Select/design the hotel information system that has step-by-step instructions (system help guide). √ √ √ √
Select/design hotel information system that has minimal options and categories. √ √ √ √
Select/design the hotel information system that has advanced functions in order to help users doing their job easily. X X √ X
Select/design the hotel information system that does what end-user employees need to do. √ √ √ √
Select/design the hotel information system that is enjoyable. X X X X
Select/design the hotel information system that includes IT support, maintenance and IT training as a part of its initial cost. √ X √ X
Select/design the hotel information system that is widely used within the hotel industry. √ X X X
Select/design the hotel information system that is flexible to be used. √ X X X
Select/design the hotel information system that is reliable and meets end-user employees’ expectations. X √ X X
Select/design the hotel information system that is windows-based to allow people to use both mouse and keyboard as well. √ √ √ √
Increase end-user employees’ awareness of the importance of participating in the system development process. √ √ √ √
Participation and
√ √ √ √
Consultation
Page 7-36
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.1: A strategic action plan to improve IT-human interaction in hotels (continued)
Stage Indicators/ Activities Case 1 Case 2 Case 3 Case 4
Ask end-user employees to participate in the selection of the new hotel information system. √ √ √ √
Participation and
Keep direct contact with the end-user employees during the various stages of the system development. √ √ √ √
Ask key end-user employees to create a manual for user procedures. √ √ √ √
Ask key end-user employees to design a user training programme. √ √ √ √
Test the hotel information system to check the system functionality. √ √ √ √
Get employees’ feedback about the system in a regular basis. √ √ √ √
Train end-user employees as well as managers by the system vendor. √ X √ X
Train end-user employees as well as managers by the hotel IT team (internal training). √ √ √ √
Train end-user employees as well as managers by an external training company (if needed). √ X √ X
Train end-user employees as well as managers in another hotel (if needed). √ X X X
Train end-user employees internally or in-house by the hotel training team. √ √ √ √
Training and Development
Train new end-user employees practically on the system training version (off-the-job training). √ √ √ √
Train new end-user employees theoretically in a training room (off-the-job training) √ √ √ √
Train new end-user employees on the system basics on line (give new employees user name and password). √ √ √ √
Train new end-user employees ‘on the job’ by senior staff (pairing the new employee with a more experienced staff member) √ √ √ √
Train managers as well as senior staff members on how to solve system problems on their own. √ √ √ √
Train all end-user employees to increase their self-confidence. √ √ √ √
Train older end-user employees to improve their basic IT skills. √ √ √ √
Train end-user employees on a regular basis to keep them up-to-date with the system. √ √ √ √
Train end-user employees when they regularly make mistakes. √ √ √ √
Train end-user employees when the system is updated. √ √ √ √
Train end-user employees when a new procedure is added. √ √ √ √
Train end-user employees when they request training in a particular function. √ √ √ √
(continued)
Page 7-37
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.1: A strategic action plan to improve IT-human interaction in hotels (continued)
Stage Indicators/ Activities Case 1 Case 2 Case 3 Case 4
Schedule the training programme for a longer time. √ √ √ √
Conduct short-take training for a longer period of time. √ √ √ √
Use different ways of learning because people might have different learning capabilities. √ √ √ √
Training and Development
Page 7-38
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.1: A strategic action plan to improve IT-human interaction in hotels (continued)
Stage Indicators/ Activities Case 1 Case 2 Case 3 Case 4
Make sure that the number of people in the IT help desk is suitable for the number of calls (head office). √ √ √ √
End-User IT Support
Make sure that any physical equipment is replaced within twenty-four hours (head office). √ √ √ √
Empower one manager to be able to solve the IT problems on his/her own, such as front-office manger (super manager). √ √ √ √
Provide the appropriate resources and training to end-user employees to be able to solve the system problems on their own (super user). √ √ √ √
Keep direct contact with end-user employees to know their common IT problems (IT department). √ √ √ √
Upgrade the system on a regular basis to keep the system fast (IT department). √ √ √ √
Establish a manual for the common IT problems and how to rectify them (IT department). √ √ √ √
Encourage end-user employees to work better and to provide a good customer service (intrinsic motivation). √ √ √ √
End-User Motivation
Design a system manual to standardise the system functions (may be on-line system manual). √ √ √ √
Design a training manual to standardise the provided training for all employees (may be on-line training manual). √ √ √ √
Allocate more budgets for end-user employees training. √ √ √ √
Allocate more time for end-user employees training. √ √ √ √
Add more visual posters on the walls to remind end-user employees of the system procedures. √ √ √ √
Update the hotel information system regularly to increase its speed. √ √ √ √
Train end-user employees to provide good customer service using the hotel information systems. √ √ √ √
Identify the knowledge gaps of the new end-user employees to train them. √ √ √ √
Encourage end-user employees to learn on their own. √ √ √ √
(continued)
Page 7-39
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.1: A strategic action plan to improve IT-human interaction in hotels (continued)
Stage Indicators/ Activities Case 1 Case 2 Case 3 Case 4
Learn by yourself how to solve the hotel information system problems (employees and managers). √ √ √ √
Add the required IT skills to the job specifications. √ √ √ √
IT performance and Satisfaction
Page 7-40
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
7.6 Conclusion
This chapter discussed technology adoption in the four hotel case studies in
Wales. In particular, a cross-case analysis was developed to evaluate and
discuss the findings from the budget hotels using off-the-shelf and bespoke
hotel information systems, along with the upscale hotels using off-the-shelf
and bespoke hotel information systems. This study had identified significant
variations between the budget and upscale hotels in respect of technology
adoption (see Table 7.2). The chapter also revealed that the TPB with its main
components (attitude, subjective norms and perceived behaviour control) is
not adequate in explaining and/or predicting technology acceptance in hotels
and additional factors needed to be incorporated; therefore, a modified theory
of planned behaviour (MTPB) has been recommended to make a better
understanding of IT-human critical factors (see Figure 7.12). The analysis
process had led to the development of a best practice model to improve IT-
human interaction in hotels. The model comprises three main parts, namely
the IT-human critical success factors, the theory of planned behaviour and the
technology-related outcomes. The chapter ends with developing a strategic
action plan to improve IT performance in budget and upscale hotels using off-
the-shelf and bespoke systems. The next chapter gives an overall conclusion
and recommendations.
Page 7-41
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.2: The summary of the cross-case analysis, involving: budget and upscale hotels using off-the-shelf and bespoke systems
Budget hotels using off-the-shelf Upscale hotels using off-the-shelf
Construct Budget hotels using bespoke systems Upscale hotels using bespoke systems
systems systems
End-user age
Age is not essential factor for recruiting and selecting people for the reception job.
End-user gender
Gender is not essential for recruiting and selecting people for the reception job.
End-user hospitality
education End-user hospitality education is not essential for recruiting people for the End-user hospitality education is desirable for recruiting people, but it is not
reception job. essential.
End-user computing
experience End-user computing experience is End-user computing experience is not End-user computing experience is End-user computing experience is not
essential for recruiting people for the essential for recruiting people for the desirable for recruiting people, but essential for recruiting people for the
reception job. reception job. it is not essential. reception job.
Basic IT skills
Basic IT skills, i.e. Word and Excel are Basic IT skills, i.e. Word and Excel are Basic IT skills, i.e. Word and Excel Basic IT skills, i.e. Word and Excel are
essential for recruiting people for the not essential for recruiting people for are desirable for recruiting people, not essential for recruiting people for
reception job. the reception job. but they are not essential. the reception job.
End-user computing
self-efficacy End-user computing self-efficacy is essential for recruiting and selecting people for the reception job.
End-user customer
service experience End-user customer service experience is essential factor for recruiting and selecting people for the reception job.
Ease of system use
The hotel information system has to be easy to use and user friendly.
System usefulness
The hotel information system has to be fast, efficient, accurate and it needs to have sufficient information and reports.
System compatibility
The hotel information system has to be compatible with user tasks and it has to be compatible with the hotel size.
System enjoyment
The hotel information system does not need to be enjoyable; however, it has to be easy to use, useful and compatible.
(continued)
Page 7-42
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.2: The summary of the cross-case analysis, involving: budget and upscale hotels using off-the-shelf and bespoke systems (continued)
Budget hotels using off-the-shelf Upscale hotels using off-the-shelf
Construct Budget hotels using bespoke systems Upscale hotels using bespoke systems
systems systems
System cost
System cost is a managerial deciding System cost is not a deciding factor for System cost is a managerial deciding factor for selecting/designing hotel
factor for selecting hotel information designing hotel information systems. information systems.
systems.
System popularity
System popularity is essential for System popularity is not essential for System popularity is desirable for System popularity is not essential for
selecting hotel information systems. designing hotel information systems. selecting hotel information systems. designing hotel information systems.
System flexibility
System flexibility is essential for System flexibility is not essential for System flexibility is desirable for System flexibility is not essential for
selecting hotel information systems. designing hotel information systems. selecting hotel information systems. designing hotel information systems.
System reliability
System reliability is not essential for System reliability is essential for
selecting hotel information systems. designing hotel information systems. System reliability is not essential for selecting hotel information systems.
End-user participation
End-user employees have not been End-user employees have been End-user employees have not been End-user employees have been
consulted in the hotel information consulted in the hotel information consulted in the hotel information consulted in the hotel information
system development. system development. system development. system development.
End-user training Internal training is conducted by
Internal training is conducted by the Internal training is only conducted by Internal training is only conducted by
the hotel team as well as external
hotel team as well as external the hotel team. the hotel team.
training by the system vendor or
training by the system vendor or by On-the-job training and off-the-job On-the-job training and off-the-job
by an external training company.
an external training company or by training are provided. training are provided.
On-the-job training and off-the-
another hotel. Monitoring employees on the job, Monitoring employees on the job,
job training are provided.
On-the-job training and off-the-job testing employees and using skills conducting personal development
Monitoring employees on the job,
training are provided. work book are used to measure the reviews and using a task list are used
conducting performance reviews
Monitoring employees on the job, training effectiveness. to measure the training effectiveness.
are used to measure the training
conducting performance reviews and Regular as well as refresher training Regular as well as refresher training
effectiveness.
testing employees are used to are provided. are provided.
Regular as well as refresher
measure the training effectiveness.
training are provided.
Refresher training is provided.
(continued)
Page 7-43
Chapter Seven: An Evaluation and Discussion of Technology Adoption Across All Cases Studied
Table 7.2: The summary of the cross-case analysis, involving: budget and upscale hotels using off-the-shelf and bespoke systems (continued)
Budget hotels using off-the-shelf Upscale hotels using off-the-shelf
Construct Budget hotels using bespoke systems Upscale hotels using bespoke systems
systems systems
IT support
Off-site IT support is provided either Off-site IT support is provided only by Off-site IT support is provided Off-site IT support is provided only by
by the IT department or by the system the IT department. either by the IT department or by the IT department.
vendor. the system vendor.
End-user motivation
End-user employees need to be
motivated to use the system because End-user employees do not need to be motivated to use the system because using the system is part of their job.
the system might be difficult to use.
End-user satisfaction
Ease of system use, system speed, Ease of system use, system speed, Ease of system use, system speed, Ease of system use, system speed,
system compatibility, computing system compatibility, training and system compatibility, computing system compatibility, confidence,
experience, training and motivation consultation positively impact end-user experience, training, motivation and training and consultation positively
positively impact end-user computing computing satisfaction. consultation positively impact end- impact end-user computing
satisfaction. user computing satisfaction. satisfaction.
Productivity impact
Hotel information systems positively impact productivity; help users to accomplish their tasks quickly in an efficient way.
Competitive advantage
impact The hotel information systems do not The hotel information systems do not The hotel information systems do The hotel information systems do not
create competitive advantage for hotels create competitive advantage for hotels not create competitive advantage create competitive advantage for hotels
or end-user employees because off-the- or end-user employees because for hotels or end-user employees or end-user employees because
shelf systems are the same. bespoke system are designed for because off-the-shelf systems are bespoke system are designed for
specific chains. the same. specific chains.
Service quality impact
Hotel information systems positively impact service quality; help users to keep customer records and to provide standardised service.
Decision-making
impact Hotel information systems do not impact employees’ decisions because the computer system is a tool to do the task, but it cannot take decisions
Page 7-44
CONCLUSIONS
8.4 Limitations of the research and opportunities for further research 8-16
Page 8-1
Chapter Eight: Conclusions
8.1 Introduction
This chapter concludes this study on measuring the impact of hotel
information systems on end-user employees in the different stages of the
employee life cycle. It opens up with a review of the research objectives
and provides an overview of the research major findings. The chapter then
moves onto outline the significant contributions of the study to theory and
practice. It highlights the limitations of the study and identifies
opportunities for further research. The chapter ends up with the
researcher’s final thoughts and reflections on the research process.
• Objective Two: Identify the discrete measures underpinning user traits, organisational traits and
system traits impacting on IT usage and user perceptions of performance and satisfaction aiming to
Chapter
develop an initial model to improve IT-human interaction.
Four
• Objective Three: Investigate technology adoption in the different stages of the employee life cycle
Chapter in four multiple Welsh case studies of budge and upscale hotels aiming to develop a model to
Five; Six improve IT-human interaction in hotels.
• Objective Four: Develop a diagnostic tool that can be used to help managerial decision-making at
Chapter the different stages of the employee life cycle in hotels.
Seven
• Objective Five: Make recommendations to improve IT-human interaction in hotels with particular
Chapter emphasis on end-user computing satisfaction and IT performance.
Eight
Page 8-2
Chapter Eight: Conclusions
Page 8-3
Chapter Eight: Conclusions
In addition, from the focus group initial findings, it was noted that user
perceptions of ease of system, quality of information content and system
timeliness are the most critical motivators for end-user computing
satisfactions. On the contrary, a small number of participants mentioned
Page 8-4
Chapter Eight: Conclusions
Page 8-5
Chapter Eight: Conclusions
recruiting and selecting people for the reception job. It was also noted that
ease of system use, system usefulness, system compatibility, system
popularity and system flexibility are the most important criteria for
selecting off-the-shelf hotel information systems. This model also
indicates that user consultation and participation in the system
development, IT training, user motivation and IT support are important
factors to improve the IT-human interaction in budget hotels and
subsequently increase user satisfaction, productivity and improve service
quality.
In terms of the budget hotels using bespoke systems, this model shows
that end-user CSE and customer service experience are the most
important criteria for recruiting and selecting people for the reception job.
Further, ease of system use, system usefulness, system compatibility and
system reliability are the most important criteria for designing bespoke
hotel information systems. This model also indicates that user
consultation and participation in the system development, IT training and
IT support are important factors to improve the IT-human interaction in
budget hotels and subsequently increase user satisfaction, productivity
and improve service quality.
Page 8-6
Chapter Eight: Conclusions
The best practice model comprises three main parts, namely IT-human
critical success factors, the TPB and the technology-related outcomes (see
Figure 7.15). The best practice model reveals the end-user employees’
critical factors (i.e. CSE; customer service skills), the organisational
critical factors (i.e. consultation; IT training; IT support) and the system
critical factors (i.e. ease of system use; system usefulness; system
compatibility). The TPB is the second part of the developed best practice
model. The TPB main components are attitude towards use, subjective
norms and perceived behaviour control. The last part of the developed
best practice model explores the technology-related outcomes
incorporating end-user computing satisfaction and IT performance (i.e.
productivity and service quality).
Page 8-7
Chapter Eight: Conclusions
The first stage of the SAPF focused on the criteria relating to recruiting
and selecting people for the reception job, namely customer service skills,
CSE, system experience and basic IT knowledge. The second stage of the
SAPF concerned with the criteria of selecting hotel information systems.
More specifically, some managers mentioned ease of use, system
usefulness and compatibility criteria (see Figure 7.16a). The third stage of
the SAPF dealt with the process of participating and consulting end-user
employees in the system development. The fourth stage of the SAPF
concerned with training end-user employees either internally, externally,
off the job or on the job as well as the frequency and the evaluation of
training effectiveness (see Figure 7.16b).
The fifth stage of the SAPF focused on the procedures that have to be
undertaken if end-user employees face any system problem, such as try to
solve the problem on their own, call the IT help desk or call the system
vendor. The sixth stage of the SAPF concerned with motivating end-user
employees to provide good customer service using hotel information
systems (see Figure 7.16c). In the final stage of the SAPF, a clear focus
has been given to improve end-user employees’ satisfaction and IT
performance (see Figure 7.16d).
To order to achieve the last research objective, a best practice model (see
Figure 7.15) and a strategic action plan (see Figure 7.16) were evolved to
improve IT-human interaction in hotels. Both tools implied a number of
recommendations to different associated stakeholders, including: hotel
Page 8-8
Chapter Eight: Conclusions
Recruit and select people who are willing to learn and to use the hotel
information systems.
Recruit and select people who are quite confident and calm. Use a
self-confidence test for the new recruits to know the degree of their
computing self-efficacy.
Page 8-9
Chapter Eight: Conclusions
Page 8-10
Chapter Eight: Conclusions
Make sure that the off-site IT help desk is open twenty-four hours/
seven days per week (including bank holidays).
Make sure that the number of people in the IT help desk is suitable
with the number of calls.
Make sure that the IT help desk solves the system problems quickly. If
they cannot solve it on phone they should send somebody from the IT
department to solve the system problem on site and to replace any
physical equipment within twenty-four hours.
Page 8-11
Chapter Eight: Conclusions
Use the system reports to help you to take the correct decisions.
Try to solve the IT problem on your own before contacting the IT help
desk. Follow the system help procedures if you face a problem with
the system.
Call the IT help desk (if you could not solve the IT problem on your
own). Call the system vendor (if the off-site IT department could not
solve the IT problem).
Page 8-12
Chapter Eight: Conclusions
Page 8-13
Chapter Eight: Conclusions
Indeed, it has been found that the subjective norms component had a
small effect on end-user employees’ behavioural intentions to use hotel
information systems; therefore, the first modification to the TPB was to
remove the subjective norms component. This is consistent with several
researchers (Hartwick and Barki, 1994; Agarwal and Prasad, 1997;
Venkatesh and Davis, 2000) who argued that the direct effect of
subjective norms on intentions for mandatory usage contexts will be
strong prior to implementation and during early usage, but will weaken
over time as increasing direct experience with a system provides a
growing basis for intentions towards ongoing use. It was also apparent
that in hotel mandatory context, end-user employees might not have any
intention to use hotel information systems, they have to use systems as a
part of their job role; therefore the second modification to the TPB was to
remove the behavioural intention component.
The third modification to the TPB was to decompose the attitude and
perceived behavioural control components into various belief factors that
influence end-user employees’ attitude towards using hotel information
systems. In particular, the attitude component was decomposed into
attitudinal beliefs (e.g. perceived ease of use, perceived usefulness and
perceived compatibility). Further, the perceived behavioural control
component was decomposed into internal control beliefs (i.e. end-user
CSE; end-user customer service skills) and external control beliefs (i.e.
consultation; IT training; IT support). This is consistent with previously-
published studies (e.g. Taylor and Todd, 1995; Hung and Chang, 2005;
Huang and Chuang, 2007; Lin, 2007; Huh, Kim and Law, 2009) which
showed that the decomposition of beliefs can provide additional insights
into employees’ behavioural intention to use hotel information systems.
The last modification to the TPB was to add a behaviour outcomes
component in order to measure the impact of using hotel information
systems (i.e. end-user computing satisfaction; IT performance).
Page 8-14
Chapter Eight: Conclusions
Page 8-15
Chapter Eight: Conclusions
Page 8-16
Chapter Eight: Conclusions
Another possible limitaion of this study is that the developed best practice
model as well as the stategic action plan flowchart have not been tested in
hotels. Thus an initial opportunity for further research would be to trial
the best practice model as well as the strategic action plan flowchart with
hoteliers in Wales and wider across the UK.
My main reason for choosing this topic is personal interest. Indeed, I was
interested to conduct multi-disciplinary research across the areas of
information technology and human resource management/development.
This research has really added to my knowledge and contributes
effectively in developing my research’s ability and skills. During the
research journey, I have acquired and explored issues which I find
interesting, especially those that came up while developing the model,
conducting the interviews with the different associated stakeholders and
the search for appropriate methodology and theoretical perspective.
Page 8-17
REFERENCES
Aksu, A. and Tarcan, E. (2002). The internet and five-star hotels: a case
study from the Antalya Region in Turkey. International Journal of
Contemporary Hospitality Management, 14 (2), pp.94-97.
xxv
References
xxvi
References
Ashman, O., Dror, I., Houlette, M. and Levy, B., (2003). Preserved risk-
taking skill in old age. North American Journal of Psychology, 5 (1),
pp.397-407.
Au, N., Ngai, E. and Cheng, T. (2008). Extending the understanding of end
user information systems satisfaction formation: an equitable needs
fulfillment model approach. MIS Quarterly, 32 (1), pp.44-53.
xxvii
References
xxviii
References
xxix
References
xxx
References
xxxi
References
xxxii
References
Clegg, C., Axtell, C., Damodaran, L., Farbey, B., Hull, R., Lloyd-Jones, R.,
Nicholls, J., Sell, R. and Tomlinson, C. (1997). Information technology: a
study of performance and the role of human and organisational factors.
Ergonomics [Internet], 40 (9), September, pp.851-871. Available from:
<http://dx.doi.org/10.1080/001401397187694> [Accessed 11 April 2008].
xxxiii
References
Compeau, D., Higgins, C. and Huff, S. (1999). Social cognitive theory and
individual reactions to computing technology: a longitudinal study. MIS
Quarterly, 23 (2), pp.145-158.
xxxiv
References
xxxv
References
xxxvi
References
Doll, W., Deng, X., Raghunathan, T., Torkzadeh, G. and Xia, W. (2004).
The meaning and measurement of user satisfaction: a multigroup
invariance analysis of the end-user computing satisfaction instrument.
Journal of Management Information Systems, 21 (1), pp.227-239.
xxxvii
References
Ezzy, D. (2000). Illness narratives: time, hope and HIV. Social Science and
Medicine, 50 (5), pp.605-617.
xxxviii
References
http://www.commerce.otago.ac.nz/tourism/current-issues/homepage.htm>.
[Accessed 30/11/2008].
Fok, L., Hartman, S., Patti, A. and Razek, J. (2000). The relationship
between equity sensitivity, growth need strength, organisational citizenship
behaviour and perceived outcomes in the quality management
environment: a study of accounting professionals. Journal of Social
Behaviour and Personality, 15 (1), pp.100-115.
xxxix
References
xl
References
Gupta, H., Jones, E. and Coleman, P. (2004). SMEs and visitWales. In:
Jones, E. and Haven, C. eds. Proceeding of the First Combined CHME
Hospitality Research and CHME Learning and Teaching Conference, 25th
Birthday Celebrations, April 14th – 16th 2004, UWIC Press, Cardiff, UK,
pp.269-277.
Hair, J., Anderson, R., Tatham, R. and Black, W. (2006). Multivariate data
analysis. Sixth edition. Upper Saddle River, Pearson Prentice Hall.
xli
References
Hartman, S., Fok, L., Fok, W. and Li, J. (2002). Relationships among
quality management, IS use and organisational performance in the health
care and non-health care setting. Total Quality Management, 13 (7),
pp.921-934.
xlii
References
xliii
References
Jiang, J., Klein, G., Tesch, D. and Chen, H. (2003). Closing the user and
provider service quality gap: a method for measuring service quality that
includes both the user and IS service provider perspectives.
Communication of the ACM, 46 (2), pp.62-80.
xliv
References
xlv
References
Kim, T., Lee, J. and Law, R., (2008). An empirical examination of the
acceptance behaviour of hotel front-office systems: an extended technology
acceptance model. Tourism Management, 29 (3), pp.500-513.
xlvi
References
Kok, A., Lorist, M., Cremer, R. and Snel, J. (1994). Age-related differences
in mental work capacity: effects of task complexity and stressors on
performance. In: Snel, J. and Cremer, R., eds. Work and aging: a European
perspective. Taylor and Francis, London, pp.42-60.
xlvii
References
Kumar, B., Selvam, J., Meenakshi, V., Kanthi, K., Suseela, A. and Kumar,
V. (2007). Business decision making, management and information
technology. Ubiquity [Internet], 8 (8), March, pp.1-6. Available from:
<http://www.acm.org/ubiquity/views/pf/v8i08_lalith.pdf.> [Accessed 25
June 2008].
Lam, T., Cho, V. and Qu, H. (2007). A study of hotel employee behaviour
intentions towards adoption of information technology. International
Journal of Hospitality Management, 26 (1), pp.49-65.
Law, R. and Lau, M. (2000). The computer millennium bug’s impact on the
hotel industry: a case study of the Kowloon Hotel. International Journal of
Contemporary Hospitality Management, 12 (3), pp.168-182.
xlviii
References
Lee, S., Kim, Y. and Lee, J. (1995). An empirical study of the relationships
among end user information systems acceptance, training and
effectiveness. Journal of Management Information Systems, 12 (2), pp.306-
322.
xlix
References
l
References
Marshall, C., Prusak, L. and Shpilberg, D. (1996). Financial risk and the
need for superior knowledge management. California Management Review,
38 (3), pp.82-99.
li
References
lii
References
liii
References
Morgan, D. and Krueger, R. (1998). The focus group kit. London, Sage
Publications Ltd.
liv
References
Namasivayam, K., Enz, C. and Siguaw, J. (2000). How tired are we?: the
selection and use of new technology in U.S. hotels. Cornell Hotel and
Restaurant Administration Quarterly, 41 (2), pp.40-48.
Noyes, J., Starr, A. and Frankish, C. (1996). User involvement in the early
stages of development of an aircraft warning system. Behaviour &
Information Technology, 15 (2), pp.60-72.
lv
References
lvi
References
Pitt, L., Berthon, P. and Lane, N. (1998). Gaps within the IS department:
barriers to service quality. Journal of Information Technology, 13 (1),
pp.192-199.
lvii
References
lviii
References
Reed, K., Doty, D., May, D. (2005). The impact of aging on self-efficacy
and computer skill acquisition. Journal of Managerial Issues, XVII (2),
pp.212-225.
lix
References
Riffe, D., Lacy, S. and Fico, F. (2005). Analyzing media messages: using
quantitative content analysis in research. Second edition. London,
Lawrence Erlbaum.
lx
References
Sahadev, S. and Islam, N. (2005). Why hotels adopt ICTs: a study on the
ICT adoption propensity of hotels in Thailand. International Journal of
Contemporary Hospitality Management, 17 (5), pp.391-401.
lxi
References
Sigala, M., Airey, D., Jones, P. and Lockwood, A. (2004). ICT paradox
lost? A stepwise DEA methodology to evaluate technology investments in
Tourism setting. Journal of Travel Research, 43 (2), pp.174-185.
lxii
References
Siguaw, J., Enz, C. and Namasivayam, K. (2000b). How wired are we? The
selection and use of new technology in U.S. hotels. Cornell Hotel and
Restaurant Administration Quarterly, 41 (4), pp.40-48.
lxiii
References
lxiv
References
lxv
References
lxvi
References
Triandis, H., (1971). Attitude and attitude change. New York, John Wiley
and Sons, Inc.
lxvii
References
Venkatesh, V. and Morris, M. (2000). Why don’t men ever stop to ask for
directions? Gender, social influence and their role in technology acceptance
and usage behaviour. MIS Quarterly, 24 (1), pp.115-139.
lxviii
References
Welsh Assembly Government (2006). A guide for star grading scheme for
hotels. Welsh Assembly Government [Internet], July 2006, available from:
<http://wales.gov.uk/depc/publications/tourism/grading/schemes/serviced/
Hotels.pdf?lang=en>. [Accessed 15 June 2009].
Welsh, E. (2002). Dealing with data: using NVivo in the qualitative data
analysis process. Forum Qualitative Social Research [Internet]. Available
from:<http://www.qualitative-research.net/fqs-texte/2-02/2-02welsh- e.htm
> [Accessed 12 June 2009].
lxix
References
Wilson, A., Bekker, M., Johnson, P. and Johnson, H. (1997). Helping and
hindering user involvement – a tale of everyday design. Conference on
Human Factors in Computing Systems (CHI), 1997, Atlanta. ACM,
pp.178-185.
Yin, R. (2003). Case study research: design and methods. Third edition.
California, Sage Publications, INC.
Yin, R. (2009). Case study research: design and methods. Forth edition.
California, Sage Publications, INC.
lxx
PERSONAL PROFILE QUESTIONNAIRE
Gender:
On average, how much time do you spend using system every day:………….
Position:…………………………………………………………….…………..
Department.:…………………………………………………………………….
lxxi
FOCUS GROUPS SCHEDULE
Moderator: First of all, my deepest thanks that you are here and that despite all the
traffic you have actually succeeded in getting here.
Moderator: There is no wrong answer; there is also no right answer. It is just to find
out what your reactions are, or what you feel or what you think or what
you know. Everybody thinks about the things in life in a different way.
Moderator: Before we begin, would you please complete the personal profile
questionnaire form.
Moderator: In your opinions, what are the user-related factors that influence
performance and satisfaction?
Moderator: In your opinions, what are the organisation-related factors that influence
performance and satisfaction?
Moderator: In your opinions, what are the system-related factors that influence
performance and satisfaction?
lxxii
Appendix B: Focus Groups Schedule
Moderator: In your judgement, what are the causes of the problems you have
identified?
lxxiii
Appendix B: Focus Groups Schedule
lxxiv
SEMI-STRUCTURED INTERVIEWS SCHEDULE
The following semi-structured interview schedule was used in stage two of the
research in interviews with hotel managers and employees. It should be noted that
flexibility within the interview was maintained and questions may not have been
asked in the same order.
1. Do you consider specific IT-related criteria when recruiting to jobs in the hotel?
2. Which criteria do you use to select employees for a job involving use of IT
systems in your hotel?
End-user age.
End-user gender.
End-user education.
End-user computing experience.
End-user computing skills.
End-user computing confidence.
5. Which type of hotel information systems does your organisation use? and why?
Off-the-shelf hotel information system.
Bespoke hotel information system.
6. What considerations do you take into account when selecting a new hotel
information system?
Ease of system use.
System usefulness.
System compatibility.
System enjoyment.
lxxv
Appendix C: Semi-structured Interviews Schedule
7. Can you provide details of how users are participated and involved in the new
system development and implementation?
Do users have the responsibility to select the new system?
Do users approve the work of IT department?
Do users create a manual for user procedure or design a user training
programme?
8. In your opinion, what are the barriers, if any, confronting user participation and
involvement in the new system development and implementation?
To this organisation.
To end-user employees of this organisation.
10. Do you identify the training requirements of a particular job involving the use of
IT and the training needs of your employees? and how?
12. In your opinion, what are the barriers, if any, confronting IT training?
To this organisation.
To end-user employees of this organisation.
14. Which type of IT supports does your organisation provide? and why?
Internal IT support.
External IT support.
lxxvi
Appendix C: Semi-structured Interviews Schedule
15. In your opinion, what are the barriers, if any, confronting IT support?
To this organisation.
To end-user employees of this organisation.
17. How could you motivate and encourage end-user employees of the IT systems in
your organisation?
Intrinsic motivation (self-fulfilment).
Extrinsic motivation (rewards).
18. Does your organisation use a particular human resource information system
(HRIS), or Internet, to perform the following human resource management
(HRM) functions:
On-line employee recruitment and selection.
On-line employee training.
On-line employee IT support.
On-line payrolls.
Intranet (training, managers and employees communications).
Internet (managers and employees communication)
19. In your opinion, what are the barriers, if any, confronting on-line HRM
functions?
To this organisation.
To end-user employees of this organisation.
22. Overall, how does your organisation could improve IT performance and
satisfaction?
lxxvii
Appendix C: Semi-structured Interviews Schedule
23. What problems, if any, can you identify concerning the use of IT in your
organisation?
To this organisation.
To end-user employees of this organisation.
24. In your judgement, what are the causes of the problems you have identified?
lxxviii
HOTEL END-USER EMPLOYEES SURVEY
The Researcher
Tamer Gad
lxxix
Appendix D: Hotel End-user Employees Survey
5 4 3 2 1
1. I could complete a task using the HIS if there was no-
one around to help me.
lxxx
Appendix D: Hotel End-user Employees Survey
5 4 3 2 1
13. I designed the user training programme for the HIS.
lxxxi
Appendix D: Hotel End-user Employees Survey
5 4 3 2 1
33. Customers would think that I should have the
knowledge and ability to use the HIS.
47. Using the HIS fits well with the way I work.
lxxxii
Appendix D: Hotel End-user Employees Survey
5 4 3 2 1
53. Using the HIS is a good idea.
lxxxiii
Appendix D: Hotel End-user Employees Survey
Gender:
On average, how much time do you spend on the HIS every day:……………
Position:…………………………………………………………….………….
Department/ Hotel:…………………………………………………………….
lxxxiv
LIST OF THE INVESTIGATED HOTELS IN WALES
Mercure Lodge Hotel, Cardiff Budget Hotel Off-the-shelf system General Manager
The Royal Hotel Cardiff Budget Hotel Off-the-shelf system Front-office Manager
Travelodge Cardiff Atlantic Wharf Budget Hotel Off-the-shelf system Front-office Manager
Premier Inn Cardiff Roath Budget Hotel Bespoke system Front-office Manager
Premier Inn Cardiff North Budget Hotel Bespoke system General Manager
Premier Inn Cardiff South Budget Hotel Bespoke system Front-office Manager
Barceló Cardiff Angel Hotel Luxury Hotel Off-the-shelf system Operations Manager
Cardiff Marriott Hotel Luxury Hotel Off-the-shelf system Asst. Front-office Manager
Holiday Inn Cardiff City Luxury Hotel Off-the-shelf system Front-office Manager
Mercure Holland House Hotel Luxury Hotel Off-the-shelf system Asst. Front-office Manager
Park Inn Cardiff City Centre Luxury Hotel Off-the-shelf system Human Resource Manager
Park Plaza Cardiff Luxury Hotel Off-the-shelf system Asst. Front-office Manager
Park Plaza Cardiff Luxury Hotel Off-the-shelf system Human Resource Manager
The Copthorne Hotel Cardiff Luxury Hotel Off-the-shelf system Front-office Manager
The Parc Hotel, by Thistle Luxury Hotel Off-the-shelf system Front-office Manager
Vale Hotel, Golf & Spa Luxury Hotel Bespoke system Front-office Manager
The Celtic Manor Resort Luxury Hotel Off-the-shelf system Human Resource Manager
The St David's Hotel & Spa Luxury Hotel Off-the-shelf system Front-office Manager
The St David's Hotel & Spa Luxury Hotel Off-the-shelf system Night Manager
lxxxv
DISCRIPTIVE STATISTICS FOR THE SURVEY SCALES
Perceived compatibility
PC1 to PC2 .915 .883 .863 .922
scale items 1to 2
lxxxvi
Appendix F: Descriptive Statistics for the Survey Scales
Case study (1) Case study (2) Case study (3) Case study (4)
Scale
items Std. Std. Std. Std.
N Range Mean N Range Mean N Range Mean N Range Mean
Deviation Deviation Deviation Deviation
CSE1 46 2 4.17 .570 38 4 4.53 .762 135 4 4.22 .895 84 4 4.14 .730
CSE2 46 2 3.93 .680 38 4 4.08 .969 135 4 4.08 .763 84 4 4.05 .710
CSE3 46 3 3.93 .712 38 4 4.16 .916 135 4 3.91 .981 84 4 3.81 .814
CSE4 46 3 3.83 .709 38 4 3.84 .718 135 4 3.87 .910 84 4 3.79 .906
CSE5 46 3 3.74 .828 38 4 3.66 .994 135 4 3.81 .885 84 4 3.81 .898
CSE6 46 3 3.80 .654 38 4 3.53 .797 135 4 3.81 .910 84 4 3.83 .862
CA1 46 3 3.11 .737 38 4 1.82 .982 135 4 2.51 1.227 84 4 2.43 1.245
CA2 46 2 2.28 .544 38 3 2.92 .784 135 4 3.13 1.348 84 4 2.98 1.151
CA3 46 2 1.93 .574 38 3 2.47 .647 135 4 2.54 1.226 84 4 2.37 1.230
CA4 46 1 1.50 .506 38 4 1.66 .966 135 4 2.38 1.221 84 4 2.83 1.325
UP1 46 3 1.85 .759 38 2 1.66 .781 135 4 2.50 1.376 84 4 1.99 1.177
UP2 46 3 1.57 .620 38 2 1.58 .793 135 4 2.28 1.268 84 3 1.60 .762
UP3 46 0 1.00 .000 38 1 1.18 .393 135 4 1.47 1.057 84 0 1.00 .000
UP4 46 0 1.00 .000 38 1 1.18 .393 135 4 1.39 .890 84 0 1.00 .000
UI1 46 3 4.24 .794 38 2 3.61 .679 135 4 4.06 .920 84 4 4.00 .850
UI2 46 3 3.59 .805 38 3 3.32 .904 135 4 3.70 .987 84 4 3.74 .880
UT1 46 3 3.37 .853 38 4 3.92 .673 135 4 3.70 1.053 84 4 3.68 .894
UT2 46 2 3.00 .699 38 4 3.97 .677 135 4 3.59 1.141 84 4 3.61 .878
UT3 46 2 2.93 .680 38 4 3.66 .815 135 4 3.63 .968 84 4 3.19 1.000
UT4 46 2 3.02 .745 38 4 3.97 .677 135 4 3.50 .992 84 4 3.19 1.000
UT5 46 2 2.80 .749 38 3 3.45 .686 135 4 3.46 1.013 84 4 3.27 1.022
UT6 46 2 3.09 .694 38 2 3.63 .541 135 4 3.53 1.028 84 4 3.31 1.041
ITS1 46 4 3.57 1.003 38 3 3.61 .638 135 4 3.78 .920 84 2 4.04 .735
ITS2 46 2 3.30 .756 38 3 3.76 .634 135 4 3.66 .932 84 2 3.93 .773
ITS3 46 3 3.04 .759 38 4 4.05 .733 135 4 3.39 1.127 84 4 3.55 .987
ITS4 46 3 3.13 1.024 38 4 4.11 .649 135 4 3.35 .987 84 4 3.48 .988
ITS5 46 2 3.41 .748 38 4 3.79 .843 135 4 3.53 .976 84 4 3.43 .985
ITS6 46 2 3.30 .866 38 4 3.53 .797 135 4 3.56 .907 84 4 3.43 1.009
SNs1 46 3 2.46 .808 38 4 2.71 1.250 135 4 3.46 1.131 84 4 3.11 1.064
SNs2 46 2 1.50 .587 38 4 2.68 1.093 135 4 2.44 1.268 84 3 1.87 .708
SNs3 46 3 2.65 .737 38 4 2.76 1.195 135 4 2.82 1.326 84 4 2.58 1.100
lxxxvii
Appendix F: Descriptive Statistics for the Survey Scales
Case study (1) Case study (2) Case study (3) Case study (4)
Scale
items Std. Std. Std. Std.
N Range Mean N Range Mean N Range Mean N Range Mean
Deviation Deviation Deviation Deviation
SNs4 46 2 1.57 .620 38 4 1.87 1.070 135 4 2.42 1.330 84 3 1.63 .724
SNs5 46 3 2.04 .965 38 4 2.34 .878 135 4 2.58 1.181 84 3 2.08 .908
SNs6 46 2 1.50 .624 38 4 2.21 .875 135 4 2.44 1.219 84 3 2.04 .828
PEOU1 46 2 3.93 .611 38 3 3.82 .563 135 4 4.16 .857 84 3 4.01 .843
PEOU2 46 2 3.91 .590 38 3 3.82 .563 135 4 4.09 .748 84 3 3.87 .741
PEOU3 46 3 3.74 .801 38 3 3.00 .771 135 4 3.80 .960 84 3 3.75 .726
PEOU4 46 3 3.50 .782 38 4 3.39 .946 135 4 3.93 .779 84 3 3.68 .779
PEOU5 46 2 3.85 .470 38 3 3.82 .563 135 4 3.98 .815 84 3 3.73 .827
PU1 46 4 4.26 .773 38 4 3.74 .828 135 4 4.00 .970 84 4 3.98 .944
PU2 46 4 2.37 .974 38 4 3.26 1.131 135 4 2.24 1.272 84 4 2.30 1.278
PU3 46 4 4.07 .772 38 4 3.71 .802 135 4 4.11 .903 84 4 3.95 .930
PU4 46 3 2.15 .842 38 4 3.26 1.155 135 4 2.20 1.233 84 4 2.27 1.264
PU6 46 4 4.09 .812 38 4 4.16 .855 135 4 4.31 .728 84 4 4.26 .778
PC1 46 4 3.98 .774 38 4 4.18 .834 135 4 4.00 .867 84 3 4.19 .702
PC2 46 4 3.72 .807 38 4 3.84 .638 135 4 3.85 .842 84 3 3.99 .799
PE1 46 4 2.85 .894 38 4 3.05 .868 135 4 3.07 .866 84 5 2.99 1.146
PE2 46 3 2.09 .694 38 3 3.03 .822 135 3 3.06 .799 84 4 2.19 .988
PBC1 46 4 4.04 .698 38 4 3.71 .768 135 4 3.93 .852 84 2 4.13 .533
PBC2 46 4 3.78 .786 38 3 3.89 .509 135 4 3.90 .775 84 2 3.94 .628
PBC3 46 4 3.87 .778 38 4 4.03 .592 135 4 3.92 .847 84 3 3.75 .726
ATU1 46 4 4.04 .868 38 4 4.45 .891 135 4 4.37 .800 84 3 4.62 .710
ATU2 46 4 3.39 .906 38 4 3.82 .766 135 4 4.26 .819 84 3 4.38 .743
ATU3 46 4 3.43 .834 38 3 3.47 .725 135 4 3.82 1.078 84 3 4.06 .750
ATU4 46 4 3.89 .737 38 3 3.53 .687 135 4 4.06 .780 84 3 3.99 .768
US1 46 4 3.74 .999 38 4 4.00 .615 135 3 4.15 .842 84 3 3.99 .857
US2 46 4 3.67 .920 38 4 3.92 .539 135 3 4.17 .728 84 3 4.11 .807
US3 46 4 3.67 .920 38 4 3.92 .539 135 4 4.08 .829 84 3 4.15 .736
US4 46 4 3.83 .973 38 4 3.92 .539 135 3 4.22 .740 84 4 3.93 1.015
US5 46 4 3.78 .867 38 4 3.97 .592 135 3 4.25 .789 84 3 4.33 .700
lxxxviii
WEB-BASED HUMAN RESOURCE FUNCTIONS
lxxxix
Appendix G: Web-Based Human Resource Functions
xc
Appendix G: Web-Based Human Resource Functions
xci
Appendix G: Web-Based Human Resource Functions
xcii
Appendix G: Web-Based Human Resource Functions
xciii
Appendix G: Web-Based Human Resource Functions
xciv
Appendix G: Web-Based Human Resource Functions
xcv
Appendix G: Web-Based Human Resource Functions
xcvi
Appendix G: Web-Based Human Resource Functions
xcvii
Appendix G: Web-Based Human Resource Functions
xcviii
Appendix G: Web-Based Human Resource Functions
xcix
Appendix G: Web-Based Human Resource Functions
c
Appendix G: Web-Based Human Resource Functions
ci
Appendix G: Web-Based Human Resource Functions
cii
Appendix G: Web-Based Human Resource Functions
ciii
Appendix G: Web-Based Human Resource Functions
civ
Appendix G: Web-Based Human Resource Functions
cv
2002
2005
2010
تأثير تكنولوجيا المعلومات علي العنصر البشرى في صناعة الفنادق
1
-1-
Theory of Planned Behaviour
-2-
-3-
-4-
1
-5-
-6-
-7-
2
-8-