You are on page 1of 24

Computer Self-Efficacy: Development of a Measure and Initial Test

Author(s): Deborah R. Compeau and Christopher A. Higgins


Reviewed work(s):
Source: MIS Quarterly, Vol. 19, No. 2 (Jun., 1995), pp. 189-211
Published by: Management Information Systems Research Center, University of Minnesota
Stable URL: http://www.jstor.org/stable/249688 .
Accessed: 30/06/2012 05:38

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp

.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact support@jstor.org.

Management Information Systems Research Center, University of Minnesota is collaborating with JSTOR to
digitize, preserve and extend access to MIS Quarterly.

http://www.jstor.org
ComputerSelf-Efficacy-Measurement

organizations. The existence of a reliable


Computer and valid measure of self-efficacy makes
assessment possible and should have impli-
Self-Efficacy: cations for organizationalsupport,training,and
Development of a implementation.

Measure and Initial Keywords: User behavior,psychology,measure-


ment, causal models, partialleast squares
Test ISRLCategories: GB03,GB02

By: Deborah R. Compeau Introduction


School of Business Administration
Carleton University Understandingthe factors that influencean indi-
vidual'suse of informationtechnology has been
Ottawa, ON K1S 5B6 a goal of MIS research since the mid-1970s,
CANADA when organizationsand researchers began to
dcompeau@ccs.carleton.ca findthat adoptionof new technologywas not liv-
ing up to expectations. Lucas (1975, 1978) pro-
Christopher A. Higgins vides some of the earliest evidence of the
School of Business Administration individualor behavioralfactorsthat influencedIT
The University of Western Ontario adoption. The first theoretical perspective to
London, ON N6A 3K7 gain widespread acceptance in this research
CANADA was the Theory of Reasoned Action (Fishbein
and Ajzen, 1975). This theory maintainsthat in-
chiggins@novell.business.uwo.ca
dividualswould use computersif they could see
that there would be positive benefits (outcomes)
Abstract associated withusing them.
This theoryis stillwidely used today in the IS lit-
This paper discusses the role of individuals'
erature and has demonstrated validity. How-
beliefs about their abilities to competentlyuse
ever, there is also a growing recognitionthat
computers (computer self-efficacy) in the additional explanatory variables are needed
determination of computer use. A survey of
Canadian managers and professionals was (e.g., Thompson,et al., 1991; Webster and Mar-
conducted to develop and validatea measure of tocchio, 1992). One such variable,examined in
this research, comes fromthe writingsof Albert
computer self-efficacy and to assess both its Banduraand his work on Social CognitiveThe-
impacts and antecedents. Computer self-
efficacy was found to exert a significant ory (Bandura,1986).
influence on individuals' expectations of the Self-efficacy,the belief that one has the capabil-
outcomes of using computers, their emotional ity to performa particularbehavior,is an impor-
reactions to computers (affect and anxiety), as tant constructin social psychology. Self-efficacy
well as their actual computer use. An in- perceptions have been found to influence deci-
dividual's self-efficacy and outcome expect- sions about what behaviors to undertake (e.g.,
ations were found to be positivelyinfluencedby Bandura,et al., 1977; Betz and Hackett, 1981),
the encouragement of others in their work the effortexerted and persistence in attempting
group, as well as others' use of computers. those behaviors(e.g., Barlingand Beattie, 1983;
Thus, self-efficacy represents an important Brown and Inouye, 1978), the emotional re-
individualtrait, which moderates organizational sponses (includingstress and anxiety)of the in-
influences (such as encouragementand support) dividual performing the behaviors (e.g.,
on an individual'sdecision to use computers. Bandura,et al., 1977; Stumpf,et al.,1987), and
Understandingself-efficacy,then, is importantto the actual performanceattainmentsof the indi-
the successful implementationof systems in vidualwith respect to the behavior(e.g., Barling

MISQuarterly/June
1995 189
Computer Self-Efficacy-Measurement

and Beattie, 1983; Collins, 1985; Locke, et al., formance in a nomological network, through
1984; Schunk, 1981; Wood and Bandura, 1989). structural equations modeling. A research
These effects have been shown for a wide vari- model for this purpose was developed with ref-
ety of behaviors in both clinical and managerial erence to literature from social psychology, as
settings. Within a management context, self-effi- well as prior IS research.
cacy has been found to be related to attendance
(Frayne and Latham, 1987; Latham and Frayne, The paper is organized as follows. The next
1989), career choice and development (Betz section presents the theoretical foundation for
and Hackett, 1981; Jones, 1986), research pro- this research. The third section discusses the
ductivity (Taylor, et al., 1984), and sales per- development of the self-efficacy measure. The
formance (Barling and Beattie, 1983). research model is described and the hypothe-
ses are presented in the following section. Then,
Several more recent studies (Burkhardt and
the research methodology is outlined, and the
Brass, 1990; Gist, et al.,1989; Hill, et al., 1986; results of the analyses are presented. The pa-
1987; Webster and Martocchio, 1992; 1993)
have examined the relationship between self-ef- per concludes with a discussion of the implica-
tions of these findings and the strengths and
ficacy with respect to using computers and a va- limitations of the research.
riety of computer behaviors. These studies
found evidence of a relationship between self-
efficacy and registration in computer courses at
universities (Hill, et al., 1987), adoption of high
technology products (Hill, et al., 1986) and inno- Theoretical
vations (Burkhardt and Brass, 1990), as well as
performance in software training (Gist, et al.,
Background-Social
1989; Webster and Martocchio, 1992; 1993). All Cognitive Theory
of the studies argue the need for further re- Social Cognitive Theory (Bandura, 1977; 1978;
search to explore fully the role of self-efficacy in 1982; 1986) is a widely accepted, empirically
computing behavior. validated model of individual behavior. It is
This paper describes the first study in a program based on the premise that environmental influ-
of research aimed at understanding the impact ences such as social pressures or unique situ-
of self-efficacy on individual reactions to com- ational characteristics, cognitive and other
puting technology. The study involves the devel- personal factors including personality as well as
opment of a measure for computer self-efficacy demographic characteristics, and behavior are
and a test of its reliability and validity. The reciprocally determined. Thus, individuals
measure was evaluated by examining its per- choose the environments in which they exist in

Person

Environment 1-.A- bL*.- Behavior


Figure 1. Triadic Reciprocality or Reciprocal Determinism

190 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

addition to being influenced by those environ- Martocchio, 1992; 1993). These studies provide
ments. Furthermore, behavior in a given situ- initial evidence that self-efficacy has an impor-
ation is affected by environmental or situational tant influence on individual reactions to comput-
characteristics, which are in turn affected by be- ing technology.
havior. Finally, behavior is influenced by cogni-
tive and personal factors, and in turn, affects
those same factors. This relationship, which Definingself-efficacy
Bandura refers to as "triadic reciprocality," is Bandura (1986) defines self-efficacy as:
shown in Figure 1.
People's judgments of their capabilities to
While Social Cognitive Theory has many dimen- organize and execute courses of action re-
sions, this research is particularly concerned quired to attain designated types of perform-
with the role of cognitive factors in individual be- ances. It is concerned not with the skills one
havior. Bandura advances two sets of expecta- has butwithjudgmentsof what one can do with
tions as the major cognitive forces guiding whateverskillsone possesses (p. 391).
behavior. The first set of expectations relates to This definition highlights a key aspect of the
outcomes. Individuals are more likely to under- self-efficacy construct. Specifically, it indicates
take behaviors they believe will result in valued the importance of distinguishing between com-
outcomes than those they do not see as having ponent skills and the ability to "organize and
favorable consequences. The second set of ex- execute courses of action." For example, in dis-
pectations encompasses what Bandura calls cussing driving self-efficacy, Bandura (1984)
self-efficacy, or beliefs about one's ability to per- distinguishes between the component skills
form a particular behavior. Self-efficacy influ- (steering, braking, signalling) and the behaviors
ences choices about which behaviors to one can accomplish (driving in freeway traffic,
undertake, the effort and persistence exerted in navigating twisting mountain roads). Similarly,
the face of obstacles to the performance of Collins (1985) distinguishes between the com-
those behaviors, and thus, ultimately, the mas- ponent skills of mathematics (choice of opera-
tery of the behaviors. tions and basic arithmetic skills) and mathe-
Outcome expectations have been considered by matics behaviors (solving particular word prob-
many IS researchers. The usefulness construct lems). Thus, computer self-efficacy represents
measured by Davis (1989) and Davis, et al. an individual's perceptions of his or her ability to
(1989) reflects beliefs (or expectations) about use computers in the accomplishment of a task
outcomes, as does the salient beliefs construct (ie., using a software package for data analysis,
used by Davis, et al. (1989). Thompson, et al. writing a mailmerge letter using a word proces-
(1991) tested a model of personal computer use sor), rather than reflecting simple component
based on Triandis (1980), which included per- skills (ie., formatting diskettes, booting up a
ceived consequences as a central determinant computer, using a specific software feature such
of behavior. Questions measuring attitudes, as "boldingtext" or "changing margins").
such as those used by Robey (1979), also fre- The concept of self-efficacy, while representing
quently reflect outcome expectations. a unique perception, is similar to a number of
While outcome expectations have been consid- other motivational constructs such as effort-per-
ered by many IS researchers, the role of self-ef- formance expectancy (Porter and Lawler, 1968),
ficacy has received less attention. A few studies locus of control, and self-esteem. Gist (1987)
(e.g., Cheney and Nelson, 1988) have tried to provides a detailed discussion of the similarities
develop measures of computer skill using self- and differences between self-efficacy and these
reports. These measures would incorporate other motivational constructs.
some aspects of computer self-efficacy, but are
designed to measure actual capability rather Dimensions of Self-Efficacy
than self-efficacy. Only a handful of studies ex-
plicitly consider the role of self-efficacy in com- In defining self-efficacy, it is also important to
puting behavior (Burkhardt and Brass, 1990; consider the relevant dimensions of self-efficacy
Gist, et al., 1989; Hill, et al., 1987; Webster and judgments. Self-efficacy judgments differ on

MISQuarterly/June
1995 191
Computer Self-Efficacy-Measurement

three distinct, but interrelated, dimensions: mag- capability expected. Individuals with a high com-
nitude, strength, and generalizability. The mag- puter self-efficacy magnitude might be expected
nitude of self-efficacy refers to the level of task to perceive themselves as able to accomplish
difficulty one believes is attainable. Individuals more difficult computing tasks than those with
with a high magnitude of self-efficacy will see lower judgments of self-efficacy. Alternatively,
themselves as able to accomplish difficulttasks, computer self-efficacy magnitude might be
while those with a low self-efficacy magnitude gauged in terms of support levels required to
will see themselves as only able to execute sim- undertake a task. Individuals with a high magni-
ple forms of the behavior. tude of computer self-efficacy might judge them-
selves as capable of operating with less support
Self-efficacy strength refers to the level of con- and assistance than those with lower judgments
viction about the judgment. It also reflects the of self-efficacy magnitude.
resistance of self-efficacy to apparently discon-
firming information (Brief and Aldag, 1981). Indi- Strength. The strength of a computer self-effi-
viduals with a weak sense of self-efficacy will be cacy judgment refers to the level of conviction
frustrated more easily by obstacles to their per- about the judgment, or the confidence an indi-
formance and will respond by lowering their per- vidual has regarding his or her ability to perform
ceptions of their capability. By contrast, the various tasks discussed above. Thus, not
individuals with a strong sense of efficacy will only would individuals with high computer self-
not be deterred by difficult problems, will retain efficacy perceive themselves as able to accom-
their sense of self-efficacy, and as a result of plish more difficult tasks (high magnitude), but
their continued persistence are more likely to they would display greater confidence about
overcome whatever obstacle was present. their ability to successfully perform each of
those behaviors.
Generalizability of self-efficacy indicates the ex-
tent to which perceptions of self-efficacy are lim- Generalizability. Self-efficacy generalizability
ited to particular situations. Some individuals reflects the degree to which the judgment is lim-
ited to a particular domain of activity. Within a
may believe they are capable of performing
some behavior, but only under a particularset of computing context, these domains might be
considered to reflect different hardware and
circumstances, while others might believe they
can execute the particular behavior under any software configurations. Thus, individuals with
circumstances and also perform behaviors that high computer self-efficacy generalizability
would expect to be able to competently use dif-
are slightly different.
ferent software packages and different computer
systems, while those with low computer self-effi-
cacy generalizability would perceive their capa-
bilities as limited to particular software packages
Computer Self-Efficacy
or computer systems.
Computer self-efficacy, then, refers to a judg-
ment of one's capability to use a computer. It is
not concerned with what one has done in the
past, but rather with judgments of what could be
done in the future. Moreover, it does not refer to Development of a Computer
simple component subskills, like formatting disk-
ettes or entering formulas in a spreadsheet. Self-Efficacy Measure
Rather, it incorporates judgments of the abilityto The first step in our research program involved
apply those skills to broader tasks (e.g., prepar- the development of a measure of computer self-
ing written reports or analyzing financial data). efficacy. A few studies had previously measured
Below, the dimensions are defined further in the self-efficacy in a computing context (Burkhardt
context of computer self-efficacy. and Brass, 1990; Gist, et al., 1989; Hill, et al.,
1986; 1987; Webster and Martocchio, 1992;
Magnitude. The magnitude of computer self-ef- 1993), and a review of these measures contrib-
ficacy can be interpreted to reflect the level of uted to the development of the current measure.

192 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

Previous approaches to computer spreadsheet cell, ratherthan the potentialto use


the softwarein the accomplishmentof a task.
self-efficacy measurement
This examinationof existing measures of com-
A review of the literatureconcerning self-effi-
puter self-efficacy indicated the need for addi-
cacy and computers uncovered five existing tional development work. The Gist, et al.
measures. One utilized a three-item scale to measure focused on component skillsof behav-
measure computerself-efficacyin a study of the ior ratherthan assessments of one's abilityto
early adoptionof computingtechnologies (Burk- carry out some task and is thus an inadequate
hardt and Brass, 1990). This measure request- reflectionof self-efficacy. The Hill,et al. meas-
ed general perceptions about an individual's ure, and to some extent the Webster and Mar-
abilityto effectively use computers in his or her tocchio measure, incorporatedother constructs
job. Another measure studied the influence of in additionto self-efficacy. Thus, while existing
computer self-efficacy on enrollmentin a com- measures could provideuseful insights into the
puter course (Hill, et al., 1987). The measure measurementof computerself-efficacy,we felt it
used a four-item scale, revised from a scale was importantto develop a measure that would
used in an earlier study (Hill,et al., 1986). This overcome these limitations.
measure did not, however, appear to be meas-
uring self-efficacy. Three of the items used
measured general perceptions about the nature The currentapproach to
of computing,such as "onlya few experts really
understand how computers work."Responses measurement
to these statements may or may not reflectcom- In developing a new measure of computer
puterself-efficacy.Stillanothermeasure studied self-efficacy, reference was made to the exist-
the influence of computer self-efficacyon train- ing measures, in particularthe works of Gist,
ing performance (Webster and Martocchio, et al. (1989), Webster and Martocchio(1992;
1992; 1993). A five-itemscale was developed to 1993), and Burkhardtand Brass (1990). While
measure software efficacy, based on work by each of these measures has some limitations,
Hollenbeck and Brief (1987). This measure, they offer insights that were incorporatedinto
while it does seem to capture elements of self- our measure.
efficacy, also incorporatedother concepts, in
additionto self-efficacy. For example, one item, Based on these existing scales and the defini-
used to measure self-efficacy before training, tion of computer self-efficacy as an individual's
asked the respondents the extent to whichthey perceptionof his or her abilityto use a computer
agreed with the statement "Iexpect to become in the accomplishmentof a job task, a 10-item
very proficientat using WordPerfectmerging." measure of computer self-efficacy was devel-
Responses to this item would also reflect ex- oped (see Appendix).The measure is task fo-
pectations of the quality or content of the cused. That is, it does not reflect simple com-
training programand might reflect elements of ponent skills likestartingsoftwarepackages and
interest (in becoming proficient at WordPer- saving files. The measure also incorporatesele-
fect merging). ments of task difficulty(in the differentlevels of
supportpresented in each item)that capturedif-
The last two measures studied the relationship ferences in self-efficacy magnitude. This ap-
between computer self-efficacy,computertrain- proach is similarto one taken by Frayne and
ing methods, and training performance, and Latham(1987) in measuringattendance self-ef-
both were developed by Gist, et al. (1989). The ficacy, and by Condiotteand Lichenstein(1981)
first concerned the general construct,computer and Diclemente (1981) in measuring self-effi-
self-efficacy. The second focused on a measure cacy concerning smoking cessation. Self-effi-
specific to using a spreadsheet package. Nei- cacy strength is captured in the response scale
ther of the measures could be considered task (whichmeasures level of confidence in the judg-
focused. Manyof the items reflectedcomponent ments of ability).In our study, self-efficacy gen-
skills, such as the abilityto boot up a computer eralizabilityis not directlystudied. The focus for
from diskette or the abilityto enter formulasin a this workis on self-efficacywithrespect to using

MISQuarterly/June1995 193
Computer Self-Efficacy-Measurement

Figure 2. Research Model

computers in general. Future research is needed Elements of all three forces (cognitive, environ-
to assess generalizability. mental, and behavioral) were incorporated into
the research model. The choice of which spe-
Scoring the self-efficacy measure can be ac- cific elements to include for each factor was
complished in two ways. First, the number of based on existing IS research. Thus, the model
"YES" answers can be counted, which provides
helps to integrate the findings from previous IS
an indication of self-efficacy magnitude. Second,
research by considering several key constructs
the responses on the confidence scale can be
within the context of Social Cognitive Theory. As
summarized, counting 0 for a "NO" response.
This approach encompasses both self-efficacy Figure 2 indicates, the encouragement of use by
others in the individuals' reference group, the
magnitude and strength and is thus most useful actual use of computers by others in that refer-
for data analysis.
ence group, and the organizational support for
computer use, are each held to influence self-ef-
ficacy and outcome expectations. Self-efficacy
influences usage directly, as well as indirectly,
Research Model and through outcome expectations, affect,1 and
anxiety. Outcome expectations influence usage
Hypotheses directly, as well as indirectly, through affect.
The research model tested in this study (Figure Finally, affect and anxiety are each held to in-
2) was developed with reference to the Social fluence usage. Thus, the research model encom-
Cognitive Theory literature, and the existing passes 14 hypotheses regarding individual
base of research in the information systems lit- reactions to computing technologies. The fol-
erature. As noted earlier, Social Cognitive The- lowing paragraphs state the theoretical ration-
ory posits an ongoing reciprocal interaction ale for each of these hypotheses. Empirical
between cognitive factors, environment and be- evidence from both the Social Cognitive Theory
havior. While the richness of this conceptualiza-
tion cannot be completely conveyed in a linear,
recursive model, important insights into the rela-
tionships among such variables can be The term affect is used throughoutthis study to refer to
achieved nonetheless. positiveaffect.Negativeaffectwas not investigated.

194 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

and information systems literature is used to re- dura, et al., 1977) and also through its influence
inforcethesearguments. on outcome expectations by demonstrating the
likely consequences of the behavior (Bandura,
1971). Thus, Hypotheses 3 and 4 reflect the in-
fluence of the modeling behavior of others in the
Encouragement by others individual's reference group:
The encouragement of others within the individ- H3: The higher the use of the technology by
ual's reference group-the people to whom an others in the individual's reference
individual looks to obtain guidance on behav- group, the higher the individual's com-
ioral expectations-can be expected to influ- puter self-efficacy.
ence both self-efficacy and outcome expectat-
H4: The higher the use of the technology by
ions. Encouragement of use represents "verbal
others in the individual's reference
persuasion," one of the four major sources of ef-
group, the higher the individual's out-
ficacy information (Bandura, 1986). Individuals come expectations.
rely, in part, on the opinions of others in forming
judgments about their own abilities. Thus, en-
couragement from others influences self-effi-
cacy, if the source of encouragement is Support
perceived as credible (Bandura, 1986). Encour-
agement of use may also exert an influence on The support of the organization for computer us-
outcome expectations. If others in the reference ers can also be expected to influence individu-
group, particularly those in the individual's work als' judgments of self-efficacy. The availability of
organization, encourage the use of computing assistance to individuals who require it should
technology, the individual's judgments about the increase their ability and thus, their perceptions
likely consequences of the behavior will be af- of their ability. Support can also be expected to
fected. At the very least, the individual will ex- influence outcome expectations because this
pect that his or her coworkers will be pleased by support reflects the formal stance of the organi-
the behavior. Thus, the first two hypotheses are zation toward the behavior, and may therefore
as follows: provide clues about the likely consequences of
H1: The higher the encouragement of use by using the computer. Thus, Hypotheses 5 and 6
are as follows:
members of the individual's reference
group, the higher the individual's H5: The higher the support for computer
computer self-efficacy. users in the organization, the higher the
individual's computer self-efficacy.
H2: The higher the encouragement of use by
members of the individual's reference H6: The higher the support for computer
group, the higher the individual's out- users in the organization, the higher the
come expectations. individual's outcome expectations.

Others' use
Computerself-efficacy
Encouragement of use is one source of influ-
ence on self-efficacy and outcome expectations. Social Cognitive Theory affords a prominent role
The actual behavior of others with respect to the to self-efficacy perceptions. Self-efficacy judg-
technology is a further source of information ments are purported to influence outcome ex-
used in forming self-efficacy and outcome ex- pectations since "the outcomes one expects
pectations. Learning by observation, or behavior derive largely from judgments as to how well
modeling, has been shown to be a powerful one can execute the requisite behavior" (Ban-
means of behavior acquisition (Latham and dura, 1978, p. 241). The hypothesis is:
Saari, 1979; Manz and Sims, 1986; Schunk, H7: The higher the individual's computer
1981). Behavior modeling influences behavior in self-efficacy, the higher his/her out-
part through its influence on self-efficacy (Ban- come expectations.

MISQuarterly/June1995 195
Computer Self-Efficacy-Measurement

Self-efficacyjudgments are held to have a sub- behavior may be construed as an influence on


stantial influenceon the emotionalresponses of affect (or liking)forthe behavior,througha proc-
the individual.Individualswilltend to preferand ess of association. The satisfactionderivedfrom
enjoy behaviors they feel they are capable of the favorable consequences of the behavior
performingand to dislikethose they do not feel becomes linked to the behavior itself, causing
they can successfully master. Several studies in an increased affect for the behavior (Bandura,
psychology provide supportfor this contention. 1986).This gives rise to the followinghypothesis:
One found that self-efficacy perceptions were
H11: The higher the individual's outcome
significantlyrelatedto affect (or interest)for par-
ticular occupations (Betz and Hackett, 1981). expectations, the higher his/her affect
Others found that individualsexperience anxiety (or liking) for the behavior.
in attemptingto performbehaviors they do not Outcome expectations are also an important
feel competent to perform (Bandura, et al., precursorto usage behavior.Accordingto So-
1977); Stumpf,et al., 1987). These relationships cial CognitiveTheory,individualsare more likely
are predictedby Hypotheses 8 and 9 as follows: to engage in behavior they expect will be re-
H8: The higher the individual's computer warded (or will result in favorable conse-
self-efficacy, the higher his/her affect quences). Support for this contention can be
found in a study of aggressive behavior in chil-
(or liking) of computer use.
dren (Bandura, 1971). The hypothesis is also
H9: The higher the individual's computer supported by IS research (Davis, et al., 1989;
self-efficacy, the lower his/her computer Hill,et al., 1987; Pavri, 1988; Thompson, et al.,
anxiety. 1991). Thus, the hypothesis is:
Self-efficacy perceptions are predictedto be a H12: The higher the individual's outcome
significant precursorto computer use. This hy- expectations, the higher his/her use of
pothesis is supported by research regarding computers.
computer use (Burkhardtand Brass, 1990; Hill,
et al., 1987) and research in a varietyof other
domains (Bandura,et al., 1977; Betz and Hack- Affect
ett, 1981; Frayneand Latham,1987). Whileself-
efficacy has not been explicitly measured in Individuals'affect (or liking)for particularbehav-
other IS research, there is some evidence to iors can, under some circumstances, exert a
support the influence of self-efficacy. Maish strong influence on their actions. Television
(1979) included a variable that measured the preferences, for example, are almost solely
extent to which the user felt "preparedto use" based on affect (Bandura, 1986). Consumer
the new system. This variable is conceptually choices are also often made on the basis of af-
fective reactions (Engle, et al., 1986). With re-
quite similarto self-efficacyand was foundto be
related to the degree of use. Similarly,the "will- spect to computers, the evidence is not clear.
ingness to change" construct measured by Thompson,et al. (1991), for example, found no
Barkiand Huff(1990), which in partreflectsself- relationshipbetween affect for PC use and the
use of personal computers among managers.
efficacy, was found to be relatedto use of a de-
cision supportsystem. However, as the authors acknowledge, the
measure of affect was somewhat weak, and
H10: The higher the individual's computer thus, the finding may simply be a reflectionof
self-efficacy, the higher his/her use of the measurement.
computers.
Given the theoretical support for such a link,
withinSocial CognitiveTheoryand other behav-
ior theories (ie., Fishbein and Ajzen, 1975; Tri-
Outcome expectations andis, 1980), the relationship between an
Outcome expectations also exert a significant individual'slikingfor computer use and his or
influence on individuals'reactions to computing her actual behavior is worthy of furtherstudy.
technology. The expected consequences of a Thus, the next hypothesisis:

196 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

H13: The higher the individual's affect for the other constructs in the model. A review of
computer use, the higher his/her use of the literature was undertaken to identify con-
computers. struct definitions and any existing measures.
Based on this review, scales were formed for
Anxiety each of the constructs in the model. Previously
developed and validated instruments were
Feelings of anxiety surrounding computers are
adopted directly. A few constructs required ad-
expected to negatively influence computer use.
aptations of existing measures. Each of the
Not surprisingly, people are expected to avoid
measures used in the study is described below.
behaviors that invoke anxious feelings. A num-
ber of studies have demonstrated a relationship Encouragement by Others. The extent to
between computer anxiety and the use of com- which use of computers was encouraged by
puters (Igbaria, et al., 1989; Webster, et al., others in the individual's reference group was
1990). measured by seven items. Respondents were
asked to assess, on a five-point scale, the ex-
H14: The higher the individual's computer
tent to which their use of computers was en-
anxiety, the lower his/her use of
couraged by: (1) their peers in their work
computers.
organization, (2) their peers in other organiza-
tions, (3) their family, (4) their friends, (5) their
manager, (6) other management, and (7) their
Research Design subordinates.
Others' Use. The extent to which computers
Subjects were actually used by others in the individual's
reference group was also assessed using seven
The target population for the validation study
items. Respondents were asked to indicate, on
was knowledge workers-individuals whose
a five-point scale, the extent to which (1) their
work requires them to process large amounts of
information. This category includes most man- peers in their work organization, (2) their peers
in other organizations, (3) their family, (4) their
agers, as well as professionals such as insur-
ance adjusters, financial analysts, researchers, friends, (5) their manager, (6) other manage-
ment, and (7) their subordinates actually used
consultants, and accountants. The subscriber
list of a Canadian business periodical was ob- computers.
tained as a sampling frame to reach this popula- Support. The organizational support for com-
tion. A recent readership survey of this puter users was measured by six items, drawn
periodical indicated that the subscribers were from Thompson, et al. (1991). The respondents
primarily employed in managerial positions, at were asked to indicate, on a five-point scale, the
all levels of the organization. Over 88 percent extent to which assistance was available in
have college or university degrees. Forty per- terms of equipment selection, hardware difficul-
cent have graduate degrees (mostly MBAs). ties, software difficulties, and specialized in-
They represented all functional areas of busi- struction. They also rated (on the same scale)
ness and a broad range of industries, including the extent to which their coworkers were a
manufacturing, services, finance, communica- source of assistance in overcoming difficulties
tions, advertising, government, oil and gas, and and their perception of the organization's overall
retailing. Eighty percent use a personal com- support for computer users.
puter in their work. One hundred of these sub- Outcome Expectations. An 11-item measure
scribers were randomly selected for the pilot
of outcome expectations was developed based
study, and 2000 were randomly selected for the on a review of existing measures in the IS litera-
main study.
ture. For example, Davis' (1989) measure of
usefulness deals primarilywith outcome expec-
Measures tations. Similarly, Pavri's (1988) beliefs con-
In addition to the self-efficacy measure de- struct, and three of Thompson, et al.'s (1991)
scribed earlier, scales were required for each of constructs reflect the expected consequences of

MISQuarterly/June
1995 197
Computer Self-Efficacy-Measurement

using a computer. The measure presented a va- first objective, respondents were asked to pro-
riety of outcomes that might be associated with vide any comments on the questionnaire con-
computer use, including increased productivity, tent or structOre. Moreover, they were asked to
decreased reliance on clerical support, enhanced indicate whether they would be willing to partici-
quality of work output, feelings of accom- plish- pate in an interview with the authors. Five of the
ment, and enhanced status. Respondents were respondents were interviewed. During the inter-
asked to indicate, on a five-point scale, how views, the respondents were probed about their
likely they thought it was that each of these out- responses to the different questionnaire items,
comes would result from their use of computers. in order to ensure that questionnaire responses
were consistent with other statements regarding
Affect. Affect was measured in this study by five
items, drawn from the Computer Attitude Scale computer attitudes and beliefs. With respect to
the second objective, determining sample size
(Loyd and Gressard, 1984). Respondents indi- for the main study, the response rate was esti-
cated, on a five-point scale, the extent to which
mated and compared with the data require-
they agreed or disagreed with items such as "I ments for analyzing structural equations
like working with computers," and "Once I get
models. For maximum flexibility in analyzing the
working on the computer, I find it hard to stop."
data, a minimum of 400 responses was consid-
Anxiety. Anxiety was measured by the 19-item ered necessary (five times the number of vari-
Computer Anxiety Rating Scale (Heinssen, et ables in the questionnaire). However, in order to
al., 1987). This scale was found to be valid for provide enough data for a holdback sample (so
measuring computer anxiety (Webster, et al., that measurement revisions could be made with
1990). Respondents indicated, on a five-point one set of data and then confirmed with the
scale, the extent to which they agreed or dis- other), this figure was doubled. The response
agreed with statements such as "I feel appre- rate for the pilot study was 60 percent. Assum-
hensive about using computers." ing a more conservative 50 percent response
Use. Computer use was measured by four rate, at least 1600 surveys were required.
items, reflecting the duration and frequency of For the main study, 2,000 people were randomly
use of computers at work and the duration of selected from the subscriber list. The survey
use of computers at home on weekdays and was mailed to the selected individuals with a
weekends. cover letter indicating the purpose and impor-
tance of the study. In order to maximize the re-
sponse rate, a stamped return envelope was
Procedures provided with the survey, and a reminder letter
was sent to those individuals who had not re-
A pretest of the questionnaire (including all con-
sponded after three weeks. These procedures
struct measures) was conducted with 40 people, have been found to aid in maximizing responses
including both academics and practitioners. to mail surveys (Dillman, 1978).
Each of the respondents completed the question-
naire and provided feedback about the process
and the measures. Overall, the respondents in-
dicated that the questionnaire was relatively Responses
clear and easy to complete. A number of sug- Of the 2,000 surveys mailed, 1,020 were com-
gestions were made concerning the wording of pleted and returned, and 91 were returned as
particular items and the overall structure of the undeliverable. Thus, the response rate was 53.4
questionnaire, and these suggestions were in- percent. While this response rate is acceptable
corporated into the revised instrument. for research of this nature, non-response bias
A pilot study involving 100 individuals from the was a concern. Normally, non-response bias
sampling frame was also conducted. The pur- would be assessed by contacting a sample of
pose of the pilot study was (a) to gain additional non-respondents and obtaining information from
feedback about the questionnaire instrument them about the survey measures, in order to as-
and (b) to assist in determining the size of the sess whether they differed from respondents.
mailing for the main study. With respect to the Armstrong and Overton (1977), however, argue

198 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

that comparing early respondents to late re- the MIS literature by Rivard and Huff (1988) in
spondents also provides information that can be an examination of the factors of success for
used to predict non-response bias. Essentially, end-user computing. It has subsequently been
they claim that late respondents are likely to be used by Grant and Higgins (1991) and
similar to non-respondents, since they required Thompson, et al. (1991) in studies of computer-
prompting to respond and were therefore pre- ized performance monitoring and personal com-
sumably less eager. Thus, if late respondents puter utilization, respectively. Barclay, et al. (in
and early respondents do not differ in their press) provide a comprehensive description of
scores, it is less likely that non-respondents will PLS analysis.
differ significantly from respondents. While this
PLS analysis involves two stages: (a) assess-
is a less strong approach to assessing non-re-
ment of the measurement model, including the
sponse bias, it does provide some indication.
reliability and discriminant validity of the meas-
Using the early (first week) and late (after 6 ures, and (b) assessment of the structural
weeks) responses to the questionnaire, a multi- model. For the assessment of the measurement
variate analysis of variance was undertaken to
model, individual item loadings and internal con-
determine whether differences in response time
sistency reliabilities are examined as a test of
(early versus late) were associated with different
reliability. Individual item loadings and internal
responses. The test indicated no significant dif- consistencies greater than 0.7 are considered
ferences in any of the variables of interest
adequate (Fornell and Larcker, 1981). For dis-
(Wilks' A = 0.97; p = 0.735). criminant validity, items should load higher on
The 1,020 respondents were mostly male (83 their own construct than on other constructs in
percent) and had an average age of 41 years. the model, and the average variance shared be-
They represented all levels of management and tween the constructs and their measures should
were evenly split between line and staff posi- be greater than the variances shared between
tions. They worked in a variety of functional ar- the constructs themselves.
eas, including accounting and finance (18 The structural model and hypotheses are tested
percent), general management (30 percent), by examining the path coefficients (which are
and marketing (16 percent). Forty-three percent standardized betas). In addition to the individual
had completed one college or university degree;
path tests, the explained variance in the de-
a further 40 percent had completed post-gradu-
pendent constructs is assessed as an indication
ate degrees.The respondents' educational back- of model fit. Finally, it is often useful to assess
grounds were primarilyin business (61 percent), the indirect effects and common cause effects,
arts (10 percent), science (14 percent), and so- as in path analysis.
cial science (5 percent).

Initialmeasurement model
The measures of four constructs (support, self-
efficacy, affect, and use) satisfied the criteria for
Data Analysis reliability and discriminant validity in the initial
Assessment of the research model was con- model. Thus, no changes to these constructs
ducted using Partial Least Squares (PLS). PLS were indicated. The remaining constructs evi-
is a regression-based technique that can ana- denced some measurement problems. These
lyze structural models with multiple-item con- problems, and the associated revisions, are dis-
structs and direct and indirect paths. PLS cussed below.
produces loadings between items and con- Encouragement by Others. Three items in the
structs (similar to principal components analy- encouragement-of-use construct did not corre-
sis) and standardized regression coefficients late highly with the other measures. Encourage-
between constructs. R2 values for dependent ment of use from family (X = 0.40), friends (X =
constructs are also produced. The technique 0.51), and subordinates (X = 0.63) did not ap-
has gained acceptance in marketing and organ- pear to correlate highly with encouragement of
izational behavior research and was first used in use from peers and managers.

MISQuarterly/June
1995 199
Computer Self-Efficacy-Measurement

Encouragement of use represents the influence come expectations (H2b, H4b, H6b, H7b, H11b
of social persuasion on self-efficacy and out- and H12b) specifically.
come expectations. The impact of this social
Anxiety. The individual item loadings for this
persuasion depends on the perceived similarity construct were poor, indicating a problem in the
of the individual as well as his or her credibility
measurement of anxiety. Re-examination of the
(Bandura, 1986). Thus, the influence of encour- measure and exploratory factor analysis re-
agement is, in effect, moderated by the charac- vealed a number of underlying dimensions. Ray
teristics of the individuals doing the
and Minch (1990) also found this instrument to
encouraging. In this case, the low loadings for be multi-dimensional and explained the results
encouragement of use from family, friends, and in terms of the construct of computer alienation.
subordinates may be viewed as reflecting a
In our study, the sub-dimensions of the scale re-
relative lack of attention to these sources of per-
flected, in addition to anxiety, a desire to learn
suasion. It would appear that, in forming judg-
more about computers, beliefs about learning to
ments about their ability to use computers and use computers, and beliefs about the appropri-
about the likely outcomes of using computers, ateness of computers in business and educa-
these managers looked to their peers and their
tion. The latter three dimensions, while possibly
superiors, but not to their subordinates or to influencing the formation of anxiety, do not rep-
family and friends. Thus, the latter three items resent anxiety itself. Thus, only the first dimen-
were dropped from the model in subsequent sion was of interest in this study. Four items
tests. formed the core of this dimension in the factor
Others' Use. A similar problem was encoun- analysis. These items seemed to best capture
tered in the measures of actual use by others. the feelings of anxiety associated with computer
Actual use by family (X = 0.16), friends (X = use, and not the beliefs that might produce anxi-
0.35), and subordinates (X = 0.20) did not load ety or other attitudes about computers. Thus,
highly on the construct. Moreover, actual use by these four items were selected to represent the
subordinates loaded more highly on the encour- anxiety construct.
agement-by-others construct (cross-loading =
0.27) than on the others'-use construct. Thus, as
with the encouragement construct, these items Revised model
were dropped from the subsequent analyses.
The revisions to the measurement model were
Outcome Expectations. Examination of the made as indicated by the data, and the resulting
loadings for the outcome expectations construct model (Figure 3, shown with results) was tested
indicated the possibility of multiple underlying di- using the data from the holdback sample (n =
mensions for this construct. Loadings ranged 481). The measurement statistics were substan-
from 0.42 to 0.83. Reconsideration of the items tially improved from the first model. The Factor
confirmed this hypothesis. Two distinct dimen- Structure Matrix (Table 1) presents the individ-
sions appeared to be represented in the scale, ual item loadings and cross loadings, and
corresponding to the job-related and other, more shows that the individual item loadings meet or
personal, outcomes of computer use. Job-re- exceed the 0.7 criteria except in 8 cases.2 It
lated outcomes included items such as "IfI use also shows that none of the individual items load
a computer, I will increase the quality of output more highly on another construct than they do
of my job," while the personal outcomes in- on the construct they were designed to meas-
cluded "If I use a computer, I will increase my ure. The reliabilityand discriminant validity coef-
sense of accomplishment." ficients are reported in Table 2. All of the
For the revised model, then, the outcome ex-
pectations construct was split into these two di-
mensions. This necessitated a splitting of 2
Eight items do not meet the 0.7 criteria.However, given
hypotheses 2, 4, 6, 7, 11, and 12. In each case, that one set of revisions had alreadybeen done, and given
the hypotheses were restated to include per- that the overall statistics (Table 2) were adequate, it was
formance-related outcome expecations (H2a, felt that another set of measurementrevisions would be
H4a, H6a, H7a, H11a, H12a) and personal out- inappropriate.

200 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

measures exceed 0.80 for internal consistency cients. The suggested lower limit of substantive
reliability. In terms of discriminant validity, the significance for regression coefficients is 0.05
variance shared between each construct and its (Pedhazur,- 1982). As a more conservative posi-
measures (the diagonal elements in Table 2) tion, path coefficients of 0.10 and above are
exceeds the variance shared between each of preferable. Thus, the path from Personal Out-
the constructs (the off-diagonal elements). Thus, come Expectations to Usage (P = 0.03), while
the measurement model tests were adequate, statistically significant (p < 0.01), is not consid-
indicating that the revisions to the measures ered substantively significant.
achieved the desired effects.
The path coefficients represent the direct effects
Once the measurement model was considered of each of the antecedent constructs. It is also
acceptable, the path coefficients were as- important, however, to consider the total effects,
sessed. All but four of the paths provided sup-
including those that are mediated by other vari-
port for the study's hypotheses. The relationship ables. Performance-related outcome expecta-
between others' use of computers and personal tions and self-efficacy have roughly equal direct
outcome expectations, while in the direction pre- effects on use. However, when the total effects
dicted by the model, was not significant. More- are considered, self-efficacy emerges as a more
over, contrary to the hypotheses, support was powerful predictor (total effect = 0.423 versus
negatively related to self-efficacy (H5) and to 0.269 for outcome expectations), since it also in-
both performance-related (H6a) and personal fluences use indirectly through outcome expec-
outcome expectations (H6b).
tations, affect, and anxiety. Table 3 presents the
While all but one of the paths were statistically direct effects, indirect effects, and spurious or
significant (p < 0.01), the substantive signifi- unexplained correlations between each of the
cance (or effect magnitudes) of the relationships variables in the model.
must also be considered in the assessment of In total, the model explained 37 percent of the
the model. The path coefficients in the PLS variance in affect, 25 percent of the variance in
model represent standardized regression coeffi- anxiety, and 32 percent of the variance in use.

0.12*** 0.225***

p< 0.01

Figure 3. Revised Model and Path coefficients

MISQuarterly/June
1995 201
Computer Self-Efficacy-Measurement

Table 1. Factor Structure Matrix-Revised Model


1 2 3 4 5 6 7 8 9
1 0.491 0.239 0.156 0.225 0.133 0.135 -0.089 0.114
2 0.340 0.054 0.142 0.221 0.147 0.188 -0.112 0.065
3 0.435 0.220 0.190 0.258 0.180 0.182 -0.087 0.219
4 0.397 0.273 0.143 0.144 0.153 0.119 -0.048 0.115
5 U./ o 0i.Ol890: 0.216 0.178 0.198 0.119 0.154 -0.070 0.233
6 0.371 0.046 0.152 0.208 0.087 0.133 -0.094 0.176
7 0.438 0.223 0.033 0.091 0.027 0.019 0.068 0.156
8 0.415 ^iftllA^iQ2ili n -A n-0.022 0.025 0.013 -0.050 0.064 0.097
9 0.165 -0.046 -0.095 -0.100 -0.089 0.003 -0.075
10 0.170 -0.013 -0.039 -0.028 -0.051 -0.031 0.016
11 0.185 -0.004 -0.041 -0.064 -0.023 -0.038 0.044
12 0.189 0.125 i -0.063 -0.066 -0.113 -0.102 0.007 -0.006
13 0.166 0.1682 0.75 -0.147 -0.088 -0.108 -0.166 0.024 -0.105
14 0.271 0.206 A A7A -0.073 -0.102 -0.084 -0.012 -0.007
15 0.128 0.083 -0.156 0.263 0.110 0.400 -0.402 0.338
16 0.133 0.092 -0.077 0.232 0.125 0.393 -0.378 0.323
17 0.163 199 -0.1-0.09 0.262 0.123 0.451 -0.497 0.411
18 0.178 0.154 -0.086 0.269 0.171 0.440 -0.405 0.380
19 0.145 0.127 -0.054 0.246 0.098 0.419 -0.452 0.375
20 0.222 0.166 -0.037 0.237 0.179 0.395 -0.344 0.325
21 0.145 0.135 -0.078 0.273 0.119 0.400 -0.399 0.408
22 0.124 0.150 -0.037 0.243 0.141 0.279 -0.323 0.331
23 0.174 0.160 -0.062 0.228 0.156 0.352 -0.356 0.286
24 0.207 0.154 -0.071 n )Oo 0.199 0.423 -0.435 0.411
25 0.168 0.055 -0.073 0.112 0.339 0.335 -0.108 0.227
26 0.233 0.172 -0.037 0.297 0.428 0.456 -0.252 0.406
27 0.242 0.168 -0.054 0.167 0.338 0.275 -0.137 0.224
28 0.210 0.246 -0.124 0.292 0.419 0.405 -0.168 0.340
29 0.204 0.207 -0.123 0.293 0.328 0.365 -0.168 0.311
30 0.112 0.078 0.042 0.140 0.234 0.201 -0.153 0.245
31 0.118 0.058 -0.089 0.108 0.339 O:I0.7128' 0.232 -0.083 0.184
32 0.073 0.022 -0.064 0.067 0.409 .62.iI1:14 0.273 -0.048 0.139
33 0.191 0.153 -0.035 0.170 0.413 .2 0.286 -0.089 0.245
34 0.081 0.018 -0.177 0.123 0.296 0.763 0.184 0.045 0.104
35 0.228 0.128 -0.124 0.173 0.376 07 0.232 0.015 0.196
36 0.180 0.155 -0.121 0.461 0.455 0.280 8
i:0:08 -0.454 0.437
37 0.141 0.086 -0.124 0.375 0.431 .:il0822iIII i:
0.342 -0.284 0.349
38 0.114 0.062 -0.151 0.218 0.292 0.251 620 -0.191 0.208
39 0.142 0.105 -0.060 0.441 0.290 0.113 0:697 -0.602 0.392
40 0.166 0.145 -0.045 0.303 0.326 0.227 ii-ii
i073 -0.334 0.339
41 -0.104 -0.072 -0.003 -0.430 -0.235 -0.075 -0.486 '0i81:4 -0.344
42 -0.056 -0.013 0.015 -0.304 -0.088 0.052 -0.264 07...3>36 -0.244
43 -0.085 -0.075 -0.001 -0.347 -0.159 -0.014 -0.364 0.71; -0.254
44 -0.091 -0.057 -0.004 -0.467 -0.225 -0.078 -0.463 085
45 0.202 0.261 -0.065 0.381 0.374 0.236 0.415 -0.292
46 0.184 0.244 0.046 0.361 0.377 0.219 0.386 -0.334
47 0.018 0.049 -0.083 0.279 0.187 0.123 0.266 -0.227
48 0.013 0.074 -0.076 0.254 0.207 0.066 0.266 -0.202
Constructs: 1. Encouragementof Use 6. PersonalOutcomeExpectations
2. Others'Use 7. Effect
3. Support 8. Anxiety
4. ComputerSelf-Efficacy 9. Use
5. PerformanceOutcomeExpectations

202 MISQuarterly/June1995
Computer Self-Efficacy-Measurement

Table 2. Reliability and Discriminant Validity Co-Efficients-Revised Model


Construct ICR? 1 2 3 4 5 6 7 8 9
1. Encouragement 0.87 0.80
2. Others' Use 0.80 0.52* 0.72
3. Support 0.91 0.24* 0.18* 0.79
4. Self-Efficacy 0.95 0.20* 0.18* -0.10** 0.81
5. Outcome Exp.-Performance 0.87 0.27* 0.22* -0.09** 0.32* 0.72
6. Outcome Exp.-Other 0.87 0.19* 0.11** -0.12* 0.17* 0.49* 0.76
7. Affect 0.87 0.20* 0.15* -0.13* 0.49* 0.48* 0.32* 0.75
8. Anxiety 0.87 -0.11** -0.07 -0.00 -0.50* -0.23* -0.05 -0.51* 0.79
9. Use 0.82 0.17* 0.24* -0.05 0.45* 0.41* 0.24* 0.47* -0.37* 0.73
Note: Diagonalelements are the squarerootof the variancesharedbetweenthe constructsandtheirmeasures. Off-diagonal elements
are the correlationsamongconstructs.Fordiscriminantvallidity,diagonalelementsshouldbe largerthanoff-diagonalelements.
*p< 0.01; * p < 0.05.
? InternalConsistencyReliabilty.

In addition, 7 percent of the variance in self-effi- ates. Previous research posited a direct rela-
cacy, 17 percent of the variance in performance- tionship between encouragement and use. This
related outcome expectations, and 8 percent research suggests that encouragement influ-
of the variance in personal outcome expec- ences behavior indirectly, through its influence
tations was explained. Since the objective of on self-efficacy and outcome expectations.
this study was primarily the understanding Similarly, others' actual use of computers influ-
of behavioral outcomes (rather than predic- ences behavior through its influence on self-effi-
tion of self-efficacy), the model was accept- cacy and outcome expectations.
able in terms of explanatory power.
A surprising, and somewhat puzzling, finding
was the negative influence of support on self-ef-
ficacy and outcome expectations. From a theo-
retical perspective, it seemed logical to hypothe-
size that higher organizational support would re-
Discussion sult in higher judgments of self-efficacy on the
The findings of this study provide support for the part of individuals because they would have
research model and the Social Cognitive Theory more resources to help them become more pro-
perspective on computing behavior. Self-effi- ficient. Moreover, support was believed to be an
cacy was found to play an important role in indication of organizational norms regarding
shaping individuals' feelings and behaviors. Indi- use, and would thus positively influence out-
viduals in this study with high self-efficacy used come expectations in addition to self-efficacy.
computers more, derived more enjoyment from However, the data analysis suggests a negative
their use, and experienced less computer anxi- relationship.
ety. In addition, outcome expectations, in par- The reasons for these findings are not entirely
ticular those relating to job performance, were
found to have a significant impact on affect and clear, but several possibilities exist. With respect
to self-efficacy in particular, it may be that indi-
computer use. Affect and anxiety also had a sig- viduals with lower self-efficacy are more aware
nificant impact on computer use.
of the existence of support within their organiza-
The analysis also sheds light on the mediating tions than those with high self-efficacy because
role of self-efficacy and outcome expectations in they make more use of those systems. This ex-
the processing of environmental information. planation would indicate that the causal arrows
Several studies have demonstrated the influ- between self-efficacy and support should be re-
ence of encouragement of use on computing versed. Alternatively, the presence of high sup-
behavior (e.g., Higgins, et al., 1990; Pavri, port may in some ways actually hinder the
1988). This study is consistent with those find- formation of high self-efficacy judgments. If indi-
ings, but it also suggests the mechanisms viduals can always call someone to help them
through which encouragement by others oper- when they encounter difficulties, they may never

MISQuarterly/June
1995 203
Computer Self-Efficacy-Measurement

be forced to sort things out for themselves and based on this evidence, it appears to be useful
thus may continue to believe themselves inca- as a measure of computer self-efficacy.
pable of doing so. These alternative explana- The development and validation of a measure of
tions have very different implications for
computer self-efficacy represents an important
organizations, and the data provide no indica-
tion as to which might be correct. Thus, addi- step in the development of theories about self-
tional research is needed to investigate this efficacy and computer use. Zmud and Boynton
(1989) argue that too little attention has been
finding.
paid to measure development in information
From a measurement standpoint, the data systems research and that theoretical advance-
analysis provides evidence of the construct va- ment has been constrained by the absence of
lidity of the computer self-efficacy measure. The validated measures. This research answers
scale demonstrated high internal consistency their call for careful development of measures
(reliability), empirical distinctness (discriminant and provides a valid measure of computer self-
validity), and was related as predicted to the efficacy that can be used in a variety of research
other constructs (nomological validity). Thus, settings.

Table 3. Indirect and Spurious Effects


Spurious and
Direct Indirect Unexplained
Relationship Effect Effect Correlation
Encouragementby Others-Others' Use n.a. n.a. 0.52
Encouragementby Others-Support n.a. n.a. 0.24
Encouragementby Others-Self-Efficacy 0.18 n.a. 0.02
Encouragementby Others-Performance OutcomeExp. 0.20 0.05 0.02
Encouragementby Others-Personal OutcomeExp. 0.20 0.02 -0.03
Encouragementby Others-Affect n.a. 0.17 0.03
Encouragementby Others-Anxiety n.a. -0.09 -0.02
Encouragementby Others-Use n.a. 0.14 0.03
Others'Use-Support n.a. n.a. 0.18
Others'Use-Self-Efficacy 0.11 n.a. 0.07
Others'Use-Performance OutcomeExpectations 0.10 0.03 0.09
Others'Use-Personal OutcomeExpectations 0.015 0.015 0.08
Others'Use-Affect n.a. 0.08 0.07
Others'Use-Anxiety n.a. -0.05 -0.02
Others'Use-Use n.a. 0.07 0.17
Support-Self-Efficacy -0.16 n.a. 0.06
Support-Performance OutcomeExpectations -0.14 -0.04 0.09
Support-Personal OutcomeExpectations -0.16 -0.02 0.06
Support-Affect n.a. -0.13 0
Support-Anxiety n.a. 0.08 -0.08
Support-Use n.a. -0.11 0.06
Self-Efficacy-PerformanceOutcomeExpectations 0.24 n.a. 0.07
Self-Efficacy-Personal OutcomeExpectations 0.12 n.a. 0.06
Self-Efficacy-Affect 0.37 0.09 0.03
Self-Efficacy-Anxiety -0.50 n.a. 0
Self-Efficacy-Use 0.225 0.20 n.a.
PerformanceOutcomeExpectations-Personal OutcomeExp n.a. n.a. 0.49
PerformanceOutcomeExpectations-Affect 0.32 n.a. 0.17
PerformanceOutcomeExpectations-Anxiety n.a. n.a. -0.23
PerformanceOutcomeExpectations-Use 0.21 0.06 0.14
PersonalOutcomeExpectations-Affect 0.10 n.a. 0.21
PersonalOutcomeExpectations-Anxiety n.a. n.a. -0.05
Personal OutcomeExpectations-Use 0.03 0.02 0.19
Affect-Anxiety n.a. n.a. -0.51
Affect-Use 0.19 n.a. 0.28
Anxiety-Use -0.11 n.a. -0.26

204 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

Of course, the validity of a measure cannot be age is not specified and is indicated as unimpor-
truly established on the basis of a single study. tant. The purpose of this approach was to force
Validation of measures is an ongoing process, respondents to think about future behavior
which requires the assessment of measurement rather than past capability, and to think about
properties over a variety of studies in similar and generating novel responses rather than fixed
different contexts. Moreover, a comparison of patterns (Bandura, 1986). However, this ap-
this measure of computer self-efficacy with other proach raises two problems. First, does the hy-
methods of capturing the same construct was pothetical scenario represent actual situations?
not conducted in this study. The absence of a That is, are respondents capable of imagining
test of convergent validity detracts to a degree all that is required of them to answer the items?
from the conclusions drawn on the basis of This question was posed to respondents in the
these data. However, questionnaire measures pretest and pilot studies. None of the respon-
are the standard format for measuring self-effi- dents indicated any difficulty in answering the
cacy, and other methods upon which to draw questions, and when probed with respect to
were not available. Thus, this study represents their confidence in being able to use computers
the most comprehensive assessment of validity generally, the responses were consistent with
that could be made based on existing knowl- the questionnaire responses. The second con-
edge. The development of other means of as- cern relates to self-efficacy with respect to learn-
sessing computer self-efficacy may be consid- ing versus using computers. By focusing on an
ered as an opportunity for future research. unfamiliar software package, the notion of self-
efficacy with respect to learning to use comput-
ers is introduced as an additional dimension of
the construct. While the ability to adapt to new
Limitations technology is a fundamental part of being a
These findings must be considered in light of the competent computer user, it is possible that self-
efficacy with respect to learning is different than
study's limitations, in particularthe use of cross-
self-efficacy with respect to using computers.
sectional survey data. Social Cognitive Theory
predicts causal relationships between the con-
structs studied. PLS analysis, like other struc-
tural equations modeling, provides strong Implicationsfor research and
support for this interpretation relative to other practice
techniques such as correlation and regression In spite of the above noted limitations, these
since all of the relationships (including those in
findings demonstrate the value of Social Cogni-
the measurement model as well as in the struc- tive Theory. IS research to date has generally
tural model) are tested simultaneously. How- not considered how individuals' expectations of
ever, conclusive statements about causality their capabilities influence their behavior and
cannot be made since alternative explanations thus paints an incomplete picture. It suggests
cannot be ruled out. Moreover, Social Cognitive that individuals will use computing technology if
Theory is based on a continuous reciprocal in- they believe it will have positive outcomes. So-
teraction among the factors studied. Feedback cial Cognitive Theory, on the other hand, ac-
mechanisms could not be modeled with the
knowledges that beliefs about outcomes may
present data, and thus the model tested is in- not be sufficient to influence behavior if individu-
complete. Further research, in particular experi- als doubt their capabilities to successfully use
mental and longitudinal studies, are clearly the technologies. Thus, the Social Cognitive
needed to address these issues.
Theory perspective suggests that an under-
One limitation with respect to the self-efficacy standing of both self-efficacy and outcome ex-
measure is the use of a hypothetical scenario pectations is necessary to understand comput-
for responses. In answering the self-efficacy ing behavior. This research, in developing and
scale the respondent is asked to imagine he or testing a measure of computer self-efficacy, lays
she has been given a new software package for the foundation for future research concerning
use in his or her job. The type of software pack- the Social Cognitive Theory perspective on

MISQuarterly/June
1995 205
Computer Self-Efficacy-Measurement

computing behavior and the unique influence the keyboard for a few minutes and then pro-
of individuals' perceptions of their computing claims that the problem is fixed, it would not be
abilities. surprising that the user would begin to doubt his
or her capabilities. While this explanation would
Future research is necessary to address the
account for the negative relationship between
limitations of this research. First, longitudinal
evidence is required. This research relied on support and self-efficacy, it is not the only one
cross-sectional data, making interpretation of possible. If it is true, however, it represents a
problem for providing support. It suggests that
causality problematic. Second, additional de-
support personnel must also attend to self-effi-
pendent variables need to be studied. This
cacy concerns, perhaps by explaining to the
study focused on self-reports of computer use. user what they are doing, suggesting reasons
Self-efficacy, however, is also argued to influ- for why the problem arose, and giving informa-
ence the development of ability. Thus, future
tion about what to do if the problem ever occurs
research should focus on how computer self-
again.
efficacy influences the development of comput-
ing skill. The generalizability of computer self-ef- In a broader sense, organizations need to be
ficacy also warrants research attention. This aware of the concept of self-efficacy and the
study focuses on self-efficacy with respect to means for encouraging it. Bandura (1986) de-
computers in general. Bandura (1986) argues fines four sources of self-efficacy information:
the need to tailor self-efficacy measures to the guided mastery, behavior modeling, social per-
domain of interest in order to maximize predic- suasion, and physiological states. The strongest
tion. It is not clear, however, what constitutes source of information is guided mastery-actual
the domain of interest with respect to comput- experiences of success in dealing with the be-
ers. To what extent are computer self-efficacy havior. The more successful interactions indi-
perceptions with respect to specific software or viduals have with computers, the more likely
hardware domains correlated? Is it reasonable they are to develop high self-efficacy. This has
to use general self-efficacy measures, or is it strong implications with respect to training. First,
necessary to tailor the items to these specific it suggests that hands-on practice is a key com-
hardware and/or software domains? Further- ponent of training, so that people can build their
more, the relationship between learning and us- confidence along with their skill. More impor-
ing computers needs to be addressed. This tantly, however, the need for successful experi-
measure of self-efficacy, using a hypothetical ence in order to foster self-efficacy is a strong
software package, incorporates an individual's argument for why software training is so impor-
confidence in his or her ability to learn to use tant to new users. If users are working with a
computer software packages, in addition to the new software package without adequate train-
ability to use the package. Future research ing, they are likely to experience problems. Be-
should investigate the extent to which these cause they are struggling, they may actually
constructs are related. lower their sense of self-efficacy and become
reluctant to use the technology, thus defeating
From a managerial standpoint, these findings
the purpose of introducing new technology.
suggest the importance of understanding indi-
viduals' self-perceptions and finding ways in The second source of self-efficacy information is
which to address them. For example, one of the behavior modeling, which involves observing
interpretations of the negative relationship be- someone else performing the behavior as a
tween organizational support and self-efficacy is means of learning. Compeau and Higgins (in
that the way in which technical support is pro- press) demonstrate that a behavior modeling
vided actually hinders the development of self- approach to computer training can enhance
efficacy. When faced with a computer problem self-efficacy perceptions and performance in the
that he or she cannot resolve, a user will often training context. Social persuasion also exerts
call a technical support person for assistance. If an influence on self-efficacy. Reassurance to
the support person, as the authors' experience users that they are capable of mastering the
suggests they sometimes do, dashes into the of- technology and using it successfully can help
fice, sits down at the users' chair, bangs away at them to build confidence.

206 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

Finally, physiological states, specifically feelings on Information Systems (Dec. 16-19, New York,
of anxiety, can have a lowering effect on self-ef- NY).
ficacy. Bandura (1986) argues that individuals Please direct all correspondence concerning
sometimes interpret their feelings of anxiety to a
this article to Debbie Compeau, School of Busi-
lack of ability. Thus, if an individual feels anx-
ness, Room 1204 Dunton Tower, Carleton Univer-
ious when using a computer, he or she may de-
sity, Ottawa, Ontario, K1S 5B6 (613-788-3993).
cide that the reason for the feelings of anxiety is
a lack of ability, thus lowering his or her self-effi-
cacy. Webster, et al. (1990) found that computer References
anxiety in the training process can be reduced
Armstrong, J.S. and Overton, T.S. "Estimating
by encouraging playful behavior. Thus, there
Non-Response Bias in Mail Surveys," Jour-
may be indirect ways of influencing physiologi- nal of Marketing Research (14:8), August
cal states, which can lessen their negative im-
1977, pp. 396-402.
pact on self-efficacy.
Bandura, A. "Influence of Models' Reinforce-
ment Contingencies on the Acquisition of Imi-
tative Responses," in Psychological
Modeling: Conflicting Theories, A. Bandura
Concluding Comments (ed.), Aldine/Atherton, Chicago, IL, 1971, pp.
This research has attempted to demonstrate the 112-127.
utility of the self-efficacy construct, borrowed Bandura, A. "Self-efficacy: Toward a Unifying
from social psychology, to understand individual Theory of Behavioral Change," Psychological
computing behavior. The results indicate that Review (84:2), February 1977, pp. 191-215.
self-efficacy adds to our understanding of why Bandura, A. "Reflections on Self-efficacy," in
people use computers, over and above con- Advances in Behavioral Research and Ther-
cepts like outcome expectations, anxiety, and apy (1), S. Rachman (ed.), Pergamon Press,
affect. In addition, the research has provided a Oxford, England, 1978, pp. 237-269.
reliable measure that satisfies the major condi- Bandura, A. "Self-efficacy Mechanism in Human
tions for construct validity (discriminant and no- Agency," American Psychologist (37:2), Feb-
mological validity). Future research should focus ruary 1982, pp. 122-147.
on examining the impact of self-efficacy on de- Bandura, A. "Recycling Misconceptions of Per-
velopment of computer skills and on under- ceived Self-efficacy," Cognitive Therapy and
standing the generalizability of computer Research (8:3), 1984, pp. 231-255.
self-efficacy. Bandura, A. Social Foundations of Thought and
Action, Prentice Hall, Englewood Cliffs, NJ,
1986.
Bandura, A., Adams, N.E., and Beyer, J. "Cog-
Acknowledgements nitive Processes Mediating Behavioral
This research was supported by grants from Change," Journal of Personality and Social
the Social Science and Humanities Research Psychology (35:3), March 1977, pp. 125-139.
Council of Canada and a doctoral fellowship from Barclay, D., Higgins, C., and Thompson, R.
the National Centre for Management Research "The Partial Least Squares Approach to
and Development, The University of Western Causal Modeling: Personal Computer Adop-
Ontario. tion and Use as an Illustration,"Technology
We are deeply indebted to Colette Frayne for Studies, in press.
her assistance in developing the research, and Barki, H. and Huff, S.L. "Implementing Decision
to the anonymous reviewers for their insightful Support Systems: Correlates of User Satis-
faction and System Usage," INFOR (28:2),
comments.
1990, pp. 89-101.
Earlier versions of this paper were presented at Barling, J. and Beattie, R. "Self-efficacy Beliefs
the Administrative Sciences Association of Can- and Sales Performance," Journal of Organ-
ada 1991 conference (May 30 - June 2; Niagara izational Behavior Management (5), 1983,
Falls) and at the 1991 International Conference pp. 41-51.

MISQuarterly/June
1995 207
ComputerSelf-Efficacy-Measurement

Betz, N.E. and Hackett, G. "The Relationships Engle, J.F., Blackwell,R.D., and Miniard,P.W.
of Career-relatedSelf-efficacy Expectations ConsumerBehavior(5th ed.), Holt, Rinehart
to Perceived Career Options in College and Winston,New York,NY, 1986.
Women and Men," Joural of Counseling Fishbein,M. and Ajzen, I. Belief, Attitude,Inten-
Psychology (28:5), 1981, pp. 399-410. tion and Behavior:An Introductionto Theory
Brief, A.P. and Aldag, R.J. "The'Self' in Work and Research, Addison-Wesley, Reading,
Organization:A Conceptual Review,"Acad- MA,1975.
emy of ManagementReview (6:1), 1981, pp. Fornell, C. and Larcker,D. "EvaluatingStruc-
75-88. tural Equation Models with Unobservable
Brown, I., Jr., and Inouye, D.K. "LearnedHelp- Variables and MeasurementError,"Journal
lessness Through Modeling: The Role of of Marketing Research (18), February
Perceived Similarityin Competence,"Joumal 1981, pp. 39-50.
of Personality and Social Psychology (36:8), Frayne,C.A. and Latham,G.P. "TheApplication
1978, pp. 900-908. of Social LearningTheoryto Employee Self-
Burkhardt,M.E.and Brass, D.J. "ChangingPat- management of Attendance,"Joural of Ap-
terns or Patternsof Change:The Effectsof a plied Psychology(72:3), 1987, pp. 387-392.
Change in Technology on Social Network Gist, M.E."Self-efficacy:Implicationsfor Organ-
Structure and Power," AdministrativeSci- izational Behavior and Human Resource
ence Quarterly(35:1), March 1990, pp.104- Management,"Academy of ManagementRe-
127. view (12:3), 1987, pp. 472-485.
Cheney, P.H. and Nelson, R.R. "A Tool for Gist, M.E.,Schwoerer,C.E., and Rosen, B. "Ef-
Measuringand AnalyzingEnd-userComput- fects of AlternativeTrainingMethodson Self-
ing Abilities," InformationProcessing and efficacy and Performance in Computer
Management(24:2), 1988, pp. 199-203. Software Training,"Joumal of Applied Psy-
Collins, J.L. Self-efficacyand Abilityin Achieve- chology (74:6), 1989, pp. 884-891.
ment Behavior,unpublisheddoctoraldisser- Grant, R.A. and Higgins, C.A. "The Impact of
tation, Stanford University, Stanford, CA, Computerized Performance Monitoringon
1985. Service Work:Testing a Causal Model,"In-
Compeau, D.R. and Higgins, C.A. "Application formationSystems Research (2:2), 1991, pp.
of Social Cognitive Theory to Trainingfor 116-142.
Computer Skills," InformationSystems Re- Heinssen, R.K., Glass, C.R., and Knight,L.A.
search, in press. "Assessing ComputerAnxiety:Development
Condiotte, M. and Lichenstein,E. "Self-efficacy and Validationof the ComputerAnxietyRat-
and Relapse in Smoking Cessation Pro- ing Scale," Computersand HumanBehavior
grams," Journal of Consulting and Clinical (3:1), 1987, pp. 49-59.
Psychology (49:5), 1981, pp. 648-658. Higgins, C.A., Howell, J.M., and Compeau, D.
Davis, F.D. "Perceived Usefulness, Perceived R. "AnEmpiricalTest of Bandura'sModelof
Ease of Use, and User Acceptance of Infor- InnovationAdoption,"paper presented at a
mation Technology," MIS Quarterly(13:3), workshopof the DiffusionInterestGroupon
September 1989, pp. 319-340. InformationTechnology, Copenhagen, Den-
Davis, F.D., Bagozzi, R.P., and Warshaw,P.R. mark,December 16, 1990.
"User Acceptance of ComputerTechnology: Hill,T., Smith,N.D., and Mann,M.F."Communi-
A Comparison of Two Theoretical Models," cating Innovations: Convincing Computer
Management Science (35:8), August 1989, Phobics to Adopt InnovativeTechnologies,"
pp. 982-1003. in Advances in ConsumerResearch, Volume
DiClemente, C.C. "Self-efficacyand Smoking 13, R.J. Lutz(ed.), Associationfor Consumer
Cessation Maintenance:A PreliminaryRe- Research;Provo, UT, 1986, pp. 419-422.
port,"CognitiveTherapyand Research (5:2), Hill,T., Smith,N.D., and Mann,M.F."Roleof Ef-
1981, pp. 175-187. ficacy Expectations in Predictingthe Deci-
Dillman,D. A. Mailand TelephoneSurveys: The sion to Use Advanced Technologies: The
TotalDesign Method,John Wiley and Sons, Case of Computers,"Journalof AppliedPsy-
New York,NY, 1978. chology (72:2), 1987, pp. 307-313.

208 MISQuarterly/June1995
ComputerSelf-Efficacy-Measurement

Hollenbeck. J.R. and Brief, A.P. "The Effects of Pedhazur, E.J. Multiple Regression in Behav-
Individual Differences and Goal Origins on ioral Research, Holt, Rinehart and Winston
Goal Setting and Performance," Organiza- Inc., New York, 1982.
tional Behavior and Human Decision Per- Porter, L.W. and Lawler, E.E. Managerial Atti-
formance (40:3), 1987, pp. 392-414. tudes and Performance, Richard D. Irwin,
Igbaria, M., Pavri, F.N., and Huff, S.L. "Micro- Homewood, IL, 1968.
computer Applications: An Empirical Look at Ray, N.M. and Minch, R.P. "Computer Anxiety
Usage," Information & Management (16:4), and Alienation: Toward a Definitive and Par-
1989, pp. 187-196. simonious Measure," Human Factors (32:4),
Jones, G.R. "Socialization Tactics, Self-efficacy, 1990, pp. 477-491.
and Newcomers' Adjustments to Organiza- Rivard, S. and Huff, S.L. "Factors of Success for
tions," Academy of Management Journal End User Computing," Communications of
(29:2), 1986, pp. 262-279. the ACM (29:5), 1988, pp. 486-501.
Latham, G.P. and Frayne, C.A. "Self-manage- Robey, D. "User Attitudes and Management In-
ment Training for Increasing Job Attendance: formation System Use," Academy of Man-
A Follow-up and a Replication," Journal of agement Journal (22:3), 1979, pp. 527-538.
Applied Psychology (74:3), 1989, pp. 411- Schunk, D.H. "Modeling and AttributionalEffects
416. on Children's Achievement: A Self-efficacy
Latham, G.P. and Saari, L.M. "Applicationof So- Analysis," Journal of Educational Psychology
cial Learning Theory to Training Supervisors (73), 1981, pp. 93-105.
Through Behavioral Modeling," Journal of Stumpf, S.A., Brief, A.P., and Hartman, K. "Self-
Applied Psychology (64:3), 1979, pp. 239- efficacy Expectations and Coping with Ca-
246. reer-related Events," Journal of Vocational
Locke, E.A., Frederick, E., Lee, C., and Bobko, Behavior (31:2), 1987, pp. 91-108.
P. "Effect of Self-efficacy, Goals, and Task Taylor, M.S., Locke, E.A., Lee, C., and Gist,
Strategies on Task Performance," Journal of M.E. "Type A Behavior and Faculty Re-
Applied Psychology (69:2), 1984, pp. 241- search Productivity: What are the Mecha-
251. nisms," Organizational Behavior and Human
Loyd, B.H. and Gressard, C. "Reliability and Performance (34:3), 1984, pp. 402-418.
Factorial Validity of Computer Attitude Thompson, R.L., Higgins, C.A., and Howell, J.M.
Scales," Educational and Psychological "Personal Computing: Toward a Conceptual
Measurement (44:2), 1984, pp. 501-505. Model of Utilization," MIS Quarterly (15:1),
Lucas H.C., Jr. "Behavioral Factors in System March 1991, pp. 125-143.
Implementation, in "Implementing Operations Triandis, H.C. "Values, Attitudes, and Interper-
Research/Management Science, R.L. sonal Behavior," in Nebraska Symposium on
Schultz and D.P. Slevin (eds.), American El- Motivation 1979-Beliefs, Attitudes and Val-
sevier, New York, 1975. ues, M.M. Page (ed.), University of Nebraska
Lucas, H.C., Jr. "Empirical Evidence for a De- Press, Lincoln, NE, 1980, pp. 195-260.
scriptive Model of Implementation," MIS Webster, J. and Martocchio, J.J. "Microcom-
Quarterly (2:2), June 1978, pp. 27-41. puter Playfulness: Development of a Meas-
Maish, A.M. "A User's Behavior Toward His ure With Workplace Implications," MIS
MIS," MIS Quarterly (3:1), March 1979, pp. Quarterly (16:2), June 1992, pp. 201-226.
39-52. Webster, J. and Martocchio, J.J. "TurningWork
Manz, C.C. and Sims, H.P. "Beyond Imitation: into Play: Implications for Microcomputer
Complex Behavioral and Affective Linkages Software Training," Journal of Management,
Resulting from Exposure to Leadership March 1993.
Training Models," Journal of Applied Psy- Webster, J., Heian, J.B., and Michelman, J.E.
chology (71:4), 1986, pp. 571-578. "Mitigatingthe Effects of Computer Anxiety
Pavri, F.N. A Study of the Factors Contributing Through Training," Proceedings of the Elev-
to Microcomputer Usage, unpublished doc- enth International Conference on Information
toral dissertation. The University of Western Systems, J.I. DeGross, M. Alavi, and H. Op-
Ontario, London, Ontario,1988. pelland (eds.), 1990, pp. 171-182.

MISQuarterly/June
1995 209
ComputerSelf-Efficacy-Measurement

Wood, R. and Bandura, A. "Social Cognitive izational adoption of information systems. Her
Theory of Organizational Management," work has been presented at the International
Academy of Management Review (14:3), Conference on InformationSystems.
1989, pp. 361-384.
Christopher A. Higgins is an associate profes-
Zmud, R.W. and Boynton, A.C. "Survey Meas- sor in the Information Systems group at the
ures and Instruments in MIS: Inventory and
Western Business School, The University of
Appraisal," paper presented at The Work- Western Ontario. Professor Higgins has published
shop on Survey Research in MIS, Irvine, CA, over 40 articles in journals including: Communi-
1989.
cations of the ACM, Administrative Science
Quarterly, Information Systems Research, MIS
Quarterly, Journal of Applied Psychology, Sloan
About the Authors Management Review, and ACM Transactions
Deborah R. Compeau is an assistant professor on Office Information Systems. He has also co-
of information systems at the School of Busi- authored two books. Specific research interests
ness, Carleton University. She received her include computerized monitoring, organizational
Ph.D. from the University of Western Ontario in champions, and telework. Two of Dr. Higgins'
1992. Her research interests include the design Ph.D. students have won international thesis
and delivery of effective end-user training, indi- competitions for their research. Professor Hig-
vidual factors that influence end-user learning gins is currently the co-holder of the Imperial
and adoption of information systems, and organ- Life Professor Chair.

Appendix
Computer Self-Efficacy Measure
Often in our jobs we are told about software packages that are available to make work easier. For the
following questions, imagine that you were given a new software package for some aspect of your work.
It doesn't matter specifically what this software package does, only that it is intended to make your job
easier and that you have never used it before.
The following questions ask you to indicate whether you could use this unfamiliar software package un-
der a variety of conditions. For each of the conditions, please indicate whether you think you would be
able to complete the job using the software package. Then, for each condition that you answered "yes,"
please rate your confidence about your first judgment, by circling a number from 1 to 10, where 1 indi-
cates "Not at all confident," 5 indicates "Moderately confident," and 10 indicates "Totallyconfident."
For example, consider the following sample item:

I COULD COMPLETETHE JOB USING THE SOFTWARE PACKAGE...

NOT AT
ALL MODERATELY TOTALLY
CONFIDENT CONFIDENT CONFIDENT

F-- I --I I--

...ifthere was someone givingme step by step


instructions. Y.. ... 1 2 3 4 ( 6 7 8 9 10
NO

210 MISQuarterly/June1995
Computer Self-Efficacy-Measurement

The sample response shows that the individual felt he or she could complete the job using the software
with step by step instructions (YES is circled), and was moderately confident that he or she could do so
(5 is circled).
I COULD COMPLETE THE JOB USING THE SOFTWARE PACKAGE...
NOT AT
ALL MODERATELY TOTALLY
CONFIDENT CONFIDENT CONFIDENT

I-I l-I I-I


Q-1. ...if there was no one around to tell me what to do YES........1 2 3 4 5 6 7 8 9 10
as I go. NO

Q-2. ...if I had never used a package like it before. YES........1 2 3 4 5 6 7 8 9 10


NO
Q-3. ... if I had only the software manuals for reference. YES........1 2 3 4 5 6 7 8 9 10
NO
Q-4. ...if I had seen someone else using it before trying YES........1 2 3 4 5 6 7 8 9 10
it myself. NO

Q-5. ...if I could call someone for help if I got stuck. YES........1 2 3 4 5 6 7 8 9 10
NO

Q-6. ...if someone else had helped me get started. YES........1 2 3 4 5 6 7 8 9 10


NO
Q-7. ...if I had a lot of time to complete the job for which the YES........1 2 3 4 5 6 7 8 9 10
software was provided. NO

Q-8. ...if I had just the built-inhelp facility for assistance. YES........1 2 3 4 5 6 7 8 9 10
NO
Q-9. ...if someone showed me how to do it first. YES........1 2 3 4 5 6 7 8 9 10
NO
Q-10. if I had used similar packages before this one to do YES........1 2 3 4 5 6 7 8 9 10
the same job.
NO

MIS Quarterly/June 1995 211

You might also like