Venkatesh 2016
Venkatesh 2016
A ssociation for
I nformation
S ystems
Viswanath Venkatesh
Department of Information Systems, Walton College of Business,
University of Arkansas
vvenkatesh@vvenkatesh.us
Abstract:
The unified theory of acceptance and use of technology (UTAUT) is a little over a decade old and has been used
extensively in information systems (IS) and other fields, as the large number of citations to the original paper that
introduced the theory evidences. In this paper, we review and synthesize the IS literature on UTAUT from September
2003 until December 2014, perform a theoretical analysis of UTAUT and its extensions, and chart an agenda for
research going forward. Based on Weber’s (2012) framework of theory evaluation, we examined UTAUT and its
extensions along two sets of quality dimensions; namely, the parts of a theory and the theory as a whole. While our
review identifies many merits to UTAUT, we also found that the progress related to this theory has hampered further
theoretical development in research into technology acceptance and use. To chart an agenda for research that will
enable significant future work, we analyze the theoretical contributions of UTAUT using Whetten’s (2009) notion of
cross-context theorizing. Our analysis reveals several limitations that lead us to propose a multi-level framework that
can serve as the theoretical foundation for future research. Specifically, this framework integrates the notion of research
context and cross-context theorizing with the theory evaluation framework to: 1) synthesize the existing UTAUT
extensions across both the dimensions and the levels of the research context and 2) highlight promising research
directions. We conclude with recommendations for future UTAUT-related research using the proposed framework.
Keywords: Theory Evaluation, Technology Acceptance and Use, Unified Theory of Acceptance and Use of Technology
(UTAUT), Research Context, Literature Review, Multi-level Framework.
Choon-Ling Sia was the accepting senior editor. This paper was submitted on October 3, 2013 and went through two revisions.
1 Introduction
Research on individual acceptance and use of information technology (IT) is one of the most established
and mature streams of information systems (IS) research (Venkatesh, Davis, & Morris, 2007). There is also
research on technology adoption by groups and organizations (e.g., Sarker & Valacich, 2010; Sarker,
Valacich, & Sarker, 2005; Sia, Lee, Teo, & Wei, 2001; Sia, Teo, Tan, & Wei, 2004) that holds the premise
that one must first use a technology before one can achieve desired outcomes, such as improvement in
employee productivity and task/job performance in organizations. Researchers have proposed and tested
several competing models (e.g., the technology acceptance model or TAM) and models based on the theory
of planned behavior (TPB) to explain and predict user acceptance and use of IT. About a decade ago,
Venkatesh, Morris, Davis, and Davis (2003) synthesized these models into the unified theory of acceptance
and use of technology (UTAUT). UTAUT identifies four key factors (i.e., performance expectancy, effort
expectancy, social influence, and facilitating conditions) and four moderators (i.e., age, gender, experience,
and voluntariness) related to predicting behavioral intention to use a technology and actual technology use
primarily in organizational contexts. According to UTAUT, performance expectancy, effort expectancy, and
social influence were theorized and found to influence behavioral intention to use a technology, while
behavioral intention and facilitating conditions determine technology use. Moreover, various combinations
of the four moderators were theorized and found to moderate various UTAUT relationships. In longitudinal
field studies of employees’ acceptance of technology, UTAUT explained 77 percent of the variance in
behavioral intention to use a technology and 52 percent of the variance in technology use. Recently,
Venkatesh, Thong, and Xu (2012) proposed and tested UTAUT2, which incorporates new constructs (i.e.,
hedonic motivation, price value, and habit) that focus on new theoretical mechanisms (see Bagozzi, 2007;
Benbasat & Barki, 2007; Venkatesh et al., 2007) in a consumer context. UTAUT2 explained 74 percent of
the variance in consumers’ behavioral intention to use a technology and 52 percent of the variance in
consumers’ technology use.
Although research considers UTAUT to have reached its practical limit of explaining individual technology
acceptance and use decisions in organizations (Venkatesh et al., 2003), UTAUT-based research has thrived
(Venkatesh et al., 2012). Specifically, research has applied UTAUT as is, applied it with other theories, or
extended it to study a variety of technologies in both organizational and non-organizational settings. The
continued growth of UTAUT-based research has partly arisen due to the proliferation and diffusion of new
ITs—such as enterprise systems (Sykes, 2015; Sykes, Venkatesh, & Johnson, 2014), collaboration
technology in knowledge-intensive firms (e.g., Brown, Dennis, & Venkatesh, 2010), mobile Internet for
consumers (e.g., Thong, Venkatesh, Xu, Hong, & Tam, 2011; Venkatesh et al., 2012), agile IS (Hong,
Thong, Chasalow, & Dhillon, 2011), e-government for citizens (Chan, Thong, Venkatesh, Brown, Hu, & Tam,
2010), and health IS in the healthcare industry (e.g., Venkatesh, Sykes, & Zhang, 2011)— in organizations
and society. IT has penetrated almost every aspect of the society, and various individuals in various contexts
now use it. While the past decade has generated a large number of new ITs and associated studies based
on UTAUT, in analyzing the literature, we found that the IS discipline is at a crossroads regarding what the
future holds for UTAUT and, in particular, the possible theoretical contributions from further research into
technology acceptance and use. We believe that systematically evaluating the contributions of the existing
UTAUT-based studies can reveal the utility of UTAUT and the limitations of existing UTAUT-based research
from which one can then develop a new framework of technology acceptance and use with a view toward
charting promising future research directions. In this paper, we:
1. Comprehensively review the UTAUT literature from September 2003 to December 2014,
2. Evaluate UTAUT and its extensions based on a systematic framework of theory evaluation 1, and
3. Propose a multi-level framework of technology acceptance and use based on the notion of cross-
context theorizing to both synthesize existing research and identify future research directions.
This paper proceeds as follows. In Section 2, we describe how we conducted the literature review and, in
Section 3, we summarize the UTAUT studies in the IS literature. In Section 4, we employ Weber’s (2012)
framework of theory evaluation to analyze UTAUT and its extensions, and as a result, we identify three
major limitations of this literature. In Section 5, we integrate Weber’s (2012) framework, Whetten’s (2009)
notion of cross-context theorizing, and Johns’ (2006) conceptualization of various dimensions of research
1
We focus on the theoretical contributions rather than method issues in the literature review. Nevertheless, we do agree that method
issues can influence findings and conclusions. The current research can serve as a foundation for future research into the interplay
between theoretical development and research methodology.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 330
context at two different levels to propose a multi-level framework that synthesizes UTAUT extensions and
highlights gaps and opportunities in this research domain. In Section 6, we discuss the implications of our
framework and provide recommendations for future research. Finally, in Section 7, we conclude the paper.
2 Literature Review
We used the “cited reference search” method in Web of Science and searched for papers that have cited
the original UTAUT paper (i.e., Venkatesh et al., 2003) from September 2003 until December 2014. We also
searched the proceedings of two major Association for Information Systems (AIS) conferences: International
Conference on Information Systems (ICIS) and Americas Conference on Information Systems (AMCIS) in
the AIS online library. To ensure we did not miss any important studies, we further searched each source
with the search criterion containing the full name of the theory (i.e., “unified theory of acceptance and use
of technology”, its abbreviation (i.e., “UTAUT”), and other variants, such as “user acceptance of information
technology: toward a unified view” in “all field”. We examined the papers and conference proceedings that
Web of Science generated in the following sequence: 1) we started with papers published in the AIS Senior
Scholars’ basket of eight IS journals; 2 2) we expanded our set of papers to include those published in the
journals listed in the MIS journal rankings on the AIS website; 3 and 3) finally, we expanded our literature
review to include the two AIS conferences (ICIS and AMCIS). In total, we found 1,267 papers.
We first examine the distribution of journal papers (i.e., excluding the two AIS conferences) found from
September 2003 to December 2014 (see Appendix A). In total, 858 journal papers in our review timeframe
cited the original paper about UTAUT (Venkatesh et al., 2003): 245 came from the AIS Senior Scholars’
basket of eight journals and 613 came from other IS journals. For the eight journals in the AIS Senior
Scholars’ basket, the breakdown of citations to the UTAUT paper showed that MIS Quarterly had the largest
number of citations (72), followed by the European Journal of Information Systems (51) and the Journal of
the Association for Information Systems (32). The top-three journals with the most citations to the original
UTAUT paper were Computers in Human Behavior (125), Information & Management (55), and Behavior &
Information Technology (48). In the two AIS conferences, AMCIS had 272 UTAUT citations and ICIS had
137. Appendix A summarizes the number of UTAUT citations in each IS journal and conference by year.
The total number of UTAUT citations in each year has steadily increased from 24 in 2004 to 160 in 2011,
with a slight drop in 2012 and 2013 (132 citations and 137 citations, respectively) but back to an increase
in 2014 (167 citations). In the AIS Senior Scholars’ basket of journals, the number of UTAUT citations has
been over 20 in most years (i.e., in 2006, 2007, 2009, 2010, 2011, 2012, and 2014). Similarly, for the
remaining IS journals, the number of citations was over 60 from 2009 to 2014. Overall, we found an
increasing number of citations to the UTAUT paper over the years.
We analyzed the papers to arrive at a classification scheme for the different themes present in the UTAUT
citations, which resulted in a consensus on four broad themes of the UTAUT citations: 1) a general citation to
the original UTAUT paper, 2) an application of UTAUT, 3) an integration of UTAUT with other theories, and 4)
an extension to UTAUT. Next, we independently examined all 1,267 papers to classify them into the four
themes. After performing our independent classifications, we compared the results. We discussed any
differences before finalizing the classification of the paper (Appendix B summarizes our classification scheme).
2
http://ais.site-ym.com/?SeniorScholarBasket
3
http://ais.site-ym.com/?JournalRankings
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
331 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
examined UTAUT in the context of e-government adoption in a developing country. Their model comprised
all the main effects and one moderator—gender. Note that we did not count studies that applied TAM (Davis,
1989) and its updates (e.g., TAM3: Venkatesh & Bala, 2008) in this category but as general citations.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 332
the robustness of UTAUT and its main effects. However, research has scarcely examined the moderating
effects of age, gender, experience, and voluntariness. Most studies have tested only the main effects (e.g.,
Chang et al., 2007), whereas others examined a subset of the moderation effects (e.g., Gupta et al., 2008).
Overall, many studies support the generalizability of UTAUT, albeit only in terms of its main effects. In
Sections 3.1 to 3.3, we discuss UTAUT applications, integrations, and extensions.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
333 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 334
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
335 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
As Table 3 shows, we found 37 UTAUT extensions. Most UTAUT extensions employed new endogenous
mechanisms or new moderation mechanisms followed by new exogenous mechanisms and new outcome
mechanisms. Many of the extension studies incorporated new variables predicting behavioral intention
and/or technology use (i.e., new endogenous mechanisms). For instance, when studying consumers’ use
of mobile Internet services, Venkatesh et al. (2012) incorporated hedonic motivation and price value as new
predictors of behavioral intention and habit as a new predictor of both intention and technology use. Note
that we included refinements of the original UTAUT constructs in the new endogenous mechanisms
category. For example, Bourdon and Sandrine (2009) conceptualized both social influences and facilitating
conditions as multi-dimensional constructs. Venkatesh et al. (2012) measured technology use as both
breadth of use and depth of use. Specifically, they measured technology use by a formative index of six
questions on consumers’ usage frequencies of six popular mobile Internet applications.
We also found UTAUT extensions with new moderation mechanisms. These new moderation mechanisms
include individual differences (e.g., income, education, migration background: Niehaves & Plattfaut, 2010),
technology characteristics (e.g., ICT service type: Thong et al., 2011; type of recommender system: Wang,
Townsend, Luse, & Mennecke, 2012), organizational-level factors (e.g., organizational facilitating
conditions: Park, Lee, & Yi, 2011), and cultural differences (e.g., Korea vs. USA: Im et al., 2011). Note that
we included the moderation of new relationships by the original moderating variables in UTAUT in this
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 336
category as long as they were proposed/tested in conjunction with new independent variables. For example,
Venkatesh et al. (2012) specified age, gender, and experience as moderators of the impacts of hedonic
motivation, price value, and habit on behavioral intention and technology use. We found seven studies that
extended UTAUT with exogenous mechanisms. For example, Brown et al. (2010) identified a
comprehensive set of technology characteristics, individual and group characteristics, task characteristics,
and situational characteristics relevant to collaboration as predictors of the four UTAUT predictors. Finally,
Table 3 shows that research has examined outcome mechanisms less than the other types of extensions.
Only two studies—Sun et al. (2009) and Xiong et al. (2013)—examined new performance-based outcomes.
Table 3. Summary of UTAUT Extensions
New New
New New
Source endogenous outcome
exogenous mechanisms moderation mechanisms
mechanisms mechanisms
Alaiad & Zhou (2013) Trust
Al-Gahtani, Hubona, Culture (Saudi Arabia vs.
& Wang (2007) USA)
Alshare & Mousa
Espoused culture values
(2014)
Borrero, Yousafzai,
Javed, & Page Technology readiness
(2014)
Enriching social
Bourdon & Sandrine
influences;
(2009)
enriching facilitations
Collaboration-related
constructs: technology
characteristics, individual
Brown et al. (2010) characteristics, group
characteristics, task
characteristics, and
situational characteristics
Carter & Schaupp Trust, self-efficacy, and
(2008) experience
Casey & Wilson-
Trust and innovativeness
Evered (2012)
Task value, task cost, and
Chiu & Wang (2008) Computer self-efficacy
computer self-efficacy
Dasgupta & Gupta
Organizational culture
(2011)
Eckhardt et al.
Enriching social influences Adopter vs. non-adopter
(2009)
Im et al. (2011) Culture (Korea vs. USA)
Lallmahomed, Ab Hedonic performance
Rahim, Ibrahim, & expectancy;
Rahman (2013) enriching system use
Liang et al. (2010) Team climate for innovation
Adoption, perceived
economic benefit, and
Ethnicity, religion, language,
Liew, Vaithilingam, & perceived social benefit;
employment, income,
Nair (2014) enriching use behavior
education, and marital status
(economic use and social
use)
Loose, Weeger, &
Perceived threats
Gewald (2014)
Lu, Yu, & Liu (2009) Income and location
Martins, Oliveira, &
Perceived risk Perceived risk
Popovic (2014)
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
337 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 338
4
Following Weber (2012), we do not count studies of attributes of technology and/or task as perceived by individual users into the
category of incorporating new classes in UTAUT because all individual user perceptions are essentially still user attributes (see
Table 1 in Weber (2012) and the last paragraph on page nine in Weber (2012)).
5
Following the previous footnote’s logic, we still counted individual user’s perceptions of organization attributes as user attributes.
Thus, we counted Liang et al. (2010) as adding a new attribute to UTAUT. In contrast, because Park et al. (2011) conceptualized
and measured facilitating conditions at the organization level (i.e., invariant at the individual user level), we counted their work as
incorporating a new class and its attribute.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
339 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
constructs and associations, and the original UTAUT has bound these extensions with only incremental
expansions of the classes, attributes, and associations.
As Table E2 in Appendix E shows, we classified UTAUT extensions’ importance to research as researchers
have advocated into three categories. The first category emphasized the importance of some “new”
technology, such as knowledge-sharing systems (Bourdon & Sandrine, 2009), collaboration technology
(Brown et al., 2010), e-government services (e.g., McLeod et al., 2009), and IT for consumers (e.g.,
Venkatesh et al., 2012). The second category included studies that were motivated by the importance of
some higher-level contextual factors, such as culture (e.g., Al-Gahtani et al., 2007; Dasgupta & Gupta, 2011;
Im et al., 2011), organizational facilitations (Park et al., 2011), leadership (Neufeld et al., 2007), and team
climate (Liang et al., 2010). 6 Finally, only a handful of studies were more theory driven. For example, two
studies focused on the importance of theoretical advancement in re-conceptualizing technology use in
UTAUT (Venkatesh et al., 2008; Lallmahomed et al. 2013). Following the motivations above, most UTAUT
extensions mainly established their novelty by making changes to UTAUT (e.g., Sun et al., 2009; Venkatesh
& Zhang, 2010). In terms of parsimony, most studies reduced or omitted the complexity of the higher-order
moderations in UTAUT (e.g., Al-Gahtani et al., 2007; Sun et al., 2009). However, some studies further
increased the number of associations (e.g., Brown et al., 2010; Liew et al. 2014; Venkatesh et al., 2012).
Finally, most UTAUT extensions still followed the micro formulation with only one exception—Park et al.
(2011), who modeled organizational facilitating conditions at the group level (i.e., a meso formulation). In
summary, motivated by the importance of new technologies, higher-level contextual factors, and theoretical
advancement, UTAUT extensions again mainly made incremental changes to UTAUT as a whole with mixed
progress toward parsimony and only one meso-level formulation.
The above analysis indicates that the UTAUT literature basically followed the “UTAUT paradigm” and took
the relatively easier approach to novelty by adding new mechanisms (i.e., constructs and associations) to
UTAUT (e.g., Venkatesh et al., 2012) or enriching established mechanisms (e.g., Bourdon & Sandrine,
2009). This approach limits the theoretical contributions’ significance. Thus, we propose the need for a
paradigm shift of UTAUT extensions in particular and of research on technology acceptance and use in
general. To this end, we borrow the theoretical notion of contextualization (e.g., Hong, Chan, Thong,
Chasalow, & Dhillon, 2014; Johns, 2006; Whetten, 2009) to further analyze contributions of the existing
UTAUT literature. We adopt the contextualization approach not only because context has become one of
the important theoretical lens in the IS field (e.g., Hong et al., 2014) but also based on our observation that
existing UTAUT research has explicitly or implicitly referred to “new contexts” as one of the major research
motivations/contributions (see the “importance” column in Table E2 in Appendix E and Appendix F). We
adopt Whetten’s (2009) framework of cross-context theorizing to evaluate the UTAUT literature’s
contributions—in particular, the distinction between contextualizing theory (theory in context) and theorizing
about context (theory of context) and the distinction between contribution of theory and contribution to theory
(Whetten, 2009: Table 1, p. 37). We show from our analysis that the existing UTAUT literature has mainly
focused on “UTAUT in context” with a few theory applications that have focused on “UTAUT of context” (see
Table 5). Based on the findings, we derive specific recommendations for future UTAUT-based research that
can make more meaningful and significant contributions.
6
Most of these studies were formulated at the individual level with one exception (i.e., Park et al., 2011).
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 340
Table 4. Weber’s (2012) Framework and Theory Evaluation of the Parts of UTAUT*
Dimensions of
Evaluation criteria Evaluation of UTAUT *
parts of a theory
• Underlying inside-boundary class of things identified clearly. • Information system users in
• Inside-boundary attributes in general defined precisely. organizations identified clearly as the
Explanatory note: inside-boundary class of things.
A construct in a theory represents an attribute in general of some • Ten inside-boundary attributes in
class of things in its domain. For example, performance general defined precisely (i.e.,
Constructs expectancy is one attribute in general of information systems users performance expectancy, effort
as the class of things. Note that all user’s “perceptions” (e.g., expectancy, social influence,
user’s perception of technologies) are essentially attributes of the facilitating conditions, behavioral
“user” class. For instance, “perceived system responsiveness” is a intention, use behavior, age, gender,
user attribute, while “system response time” is an online system experience, and voluntariness of use).
attribute (Weber, 2012).
• Inside-boundary associations defined precisely. • Inside-boundary higher-order
• Compelling justification provided for associations. moderation effects (i.e., contingent
Explanatory note: associations) defined precisely (i.e.,
In a static setting, an association shows that the values of one H1, H2, H3, H4b, and H6 7).
construct somehow relate to the values of another construct. For • Compelling justifications provided for
instance, high values of performance expectancy will tend to be the associations.
Associations
associated with high values of behavioral intention.
In a dynamic setting, an association shows a history of values for
instances of one construct is conditional on a history of values for
instances of another construct. For example, the rate of change of
behavioral intention is conditional on the rate of change of
performance expectancy.
• Inside-boundary states specified clearly. • Although UTAUT does not explicitly
• Outside-boundary states specified clearly. specify the inside-boundary and
Explanatory note: outside-boundary states, it
A state of a thing is a vector of attributes in particular (i.e., a vector incorporates voluntariness of use,
of attributes in general with their associated values). For instance, social influence, and facilitating
a state of one IS user at T1 in the empirical test of UTAUT is conditions to explain a general state
depicted as: space that includes most instances in
use = 2 hours per day the organizational setting (e.g., while a
States intention = 6 user may have low performance
performance expectancy = 5 efficacy, low effort efficacy, and, thus,
effort expectancy = 3 low intention, the user’s use can be
social influence= 4 high due to high social influence
facilitating conditions = 7 and/or high facilitating conditions
age = 36 and/or mandatory conditions).
gender = male
experience = post-training
voluntariness of use = mandatory.
• Inside-boundary events specified clearly. • As UTAUT is essentially a static
• Outside-boundary events specified clearly. theory, it does not specify the inside-
Explanatory note: and outside-boundary events.
An event of a thing is a change from one of its states to another of
its states. For instance, at T2 in the empirical test of UTAUT, the
state of the user (from the row above) changes to:
use = 3 hours per day
intention = 7
Events
performance expectancy = 6
effort expectancy = 5
social influence = 4
facilitating conditions = 7
age = 36
gender = male
experience = 1 month
voluntariness of use = mandatory.
* We adopted the evaluation criteria from Weber (2012) to systematically assess UTAUT. We each independently evaluated
UTAUT following Weber (2012) and reached a consensus with each evaluation criterion. Table 4 summarizes our evaluation of
the parts of UTAUT.
7
Please refer to Appendix D for all the hypotheses of UTAUT.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
341 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Dimensions of
the theory as a Evaluation criteria Evaluation of UTAUT
whole
• Importance to practice. • UTAUT is important to practice because individual technology
• Importance to research acceptance and use in organizations is important to IT
Importance (citation evidence). business value.
• UTAUT is important to research as evidenced by the 1,267
citations to the original paper.
• New focal phenomena. • UTAUT synthesizes eight representative and influential
• New ways to conceive research models of individual technology acceptance and use.
existing focal phenomena. The novelty of UTAUT mainly lies in the new and important
• New and important changes changes it makes to existing theories:
made to an existing theory: 1) It omits three constructs related to technology acceptance
1) Adding/deleting and use (computer anxiety, computer self-efficacy, and
constructs attitude) from the final model
Novelty 2) Adding/deleting 2) It adds the higher-order moderation effects in the model
associations 3) It precisely defines the moderation effects, and
3) Defining constructs and 4) It precisely specifies the boundary of the theory (i.e.,
associations more technology acceptance and use by individuals inside
precisely, and organizations) as the focal phenomenon.
4) Specifying the boundary
of the theory more
precisely.
• Achieving a good level of • Although UTAUT has achieved a high level of explanatory
explanatory power in power, its level of parsimony is relatively low with the large
relation to focal phenomena number of associations implied by the higher-order
Parsimony
using a relatively small moderation effects.
number of constructs and
associations.
• One should formulate the • UTAUT is at the micro/individual level. However, given that the
theory at an appropriate focal phenomenon is individual technology acceptance and
Level
level (micro/meso/macro). use inside organizations, a meso-level formulation is also
necessary.
• One should articulate the • UTAUT’s parts and level are clear and precise; UTAUT is
theory clearly so that it is subject to robust empirical tests.
Falsifiability
subject to robust empirical
tests.
* We adopted the evaluation criteria from Weber (2012) to systematically assess UTAUT. We each independently evaluated
UTAUT following Weber (2012) and reached a consensus with each evaluation criterion. Table 5 summarizes our evaluation of
UTAUT as a whole.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 342
context). Contextualizing theory refers to the extent to which a theory explicitly accounts for relevant contextual
conditions. In contrast, theorizing about context uses context effects as explanations and develops new and
improved context-effects explanations (Whetten, 2009). In Whetten’s (2009) view, context effects refer broadly
to the set of factors surrounding a phenomenon that exert direct or indirect influence on it (see also Johns,
2006). Each type of cross-context theorizing has two types of theoretical contributions (i.e., contribution of the
theory and contribution to the theory), which results in a two-by-two categorization of theoretical contributions
of cross-context theorizing. Whetten (2009, p. 37) discusses the research question, purpose, method, and
outcome of these four types of contributions. We employ this two-by-two categorization to analyze the
contributions of UTAUT literature in the current study. Table 6 summarizes the results.
Table 6. Cross-context Theorizing of UTAUT Extensions
Type of
UTAUT in context UTAUT of context
theorizing
Contribution of Contribution to Contribution to
Type of Contribution of
contextualized contextualized context-effects
contribution context-effects UTAUT
UTAUT UTAUT UTAUT
Understand differences
Use UTAUT research
Understand a new Improve UTAUT by in context-specific
results to identify new
context via context- showing how it works technology acceptance
Purpose context-effects theories
sensitive application of differently in a new and use via UTAUT and
or to refine current
UTAUT. context. relevant context-effects
context effects.
theories.
To ensure the To account for
consistency of UTAUT observed differences
relationships across in UTAUT Use context-
Add to the library of
contexts, control for relationships across distinguishing effects as
Method context effects suitable
context-distinguishing contexts, incorporate explanations added to
for UTAUT.
effects related to context-distinguishing UTAUT.
technology acceptance effects as
and use. interactions.
UTAUT integrations &
UTAUT extensions—
Contributions of UTAUT extensions— Opportunities for future
UTAUT applications. new moderation
UTAUT literature new endogenous research.
mechanisms.
mechanisms.
Pynoo et al. (2011)
Venkatesh et al. (2012)
followed the original
added the impacts of
UTAUT specification
Thong et al. (2011) hedonic motivation,
and examined
examined ICT service price value, and habit
technology use in three Opportunities for future
Example type as a new on behavioral intention
periods (i.e., user research.
moderator added to and technology use as
adoption, initial use,
UTAUT. moderated by specified
and post-adoptive use)
age, gender, and
in the digital-learning
experience.
context.
As Table 6 shows, the existing UTAUT literature has mainly made the first three types of cross-context
theorizing contributions; namely, contribution of contextualized UTAUT, contribution to contextualized
UTAUT, and contribution of context-effects UTAUT. Contextualized UTAUT research mainly comprises
UTAUT applications and UTAUT extensions with new moderation mechanisms identified in our literature
review. For example, Pynoo et al. (2011) followed the original UTAUT specification and examined
technology use in three periods (i.e., user adoption, initial use, and post-adoptive use) in the digital-learning
context. Thong et al. (2011) examined ICT service type as a new moderator added to UTAUT. Moreover,
existing UTAUT literature also covered one type of context-effects UTAUT research (i.e., contribution of
context-effects UTAUT). For example, Venkatesh et al. (2012) added the impacts of hedonic motivation,
price value, and habit on behavioral intention and technology use as moderated by age, gender, and
experience. From analyzing these studies, we note the lack of paradigm-shifting research that identifies new
context-effects theories or significantly refines the current context effects and in which UTAUT is not
necessarily the major component of a new theory but rather a stepping stone to identify a new theory. We
believe a paradigm shift is the most promising direction for future research to make significant contributions
to the UTAUT literature in particular and to research on technology acceptance and use in general.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
343 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Whetten (2009) provides two specific suggestions for the paradigm-shifting cross-context theorizing: 1) to
identify multiple new context effects in a combinational configuration and 2) to add a contextual moderation
(i.e., adding interactions among context effects). Accordingly, we propose two enablers. First, to help
researchers identify a combination of multiple new context effects, we provide a topology of research context
of technology acceptance and use based on Johns (2006) and identify some potentially new
libraries/dimensions of context effects. Second, to help researchers theorize about contextual moderators,
we layer different libraries/dimensions of context effects in a multi-level framework. Finally, we illustrate the
application of our framework to the formulation of a research model of the impacts of transformational
leadership on ERP feature use.
8
We found that none of the UTAUT extensions explicitly addressed the roles of the environment class and rationale class and, thus,
omit these two in Appendix F.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 344
Social context: social We conceptualize the organization class as the social context of
Organization
density, social structure, technology acceptance and use that not only includes formal
class
social influence, etc. organization forms, such as project teams, functional unit, business
division, and the entire organization but also informal social entities,
such as user communities and other informal social networks. Examples
of organization attributes include team climate, organizational culture,
unit leadership, and centrality of the informal social network.
The location where the target technology is implemented or introduced,
Where: the location of the adopted, and used.
Location class research site (region,
culture, industry). Location attributes include various factors, such as national culture,
regional economic status, and industry competition.
The physical environment and conditions in which the target technology
Physical context: is used.
Environment
temperature, light, built
class
environment, decor, etc. Environment attributes include temperature, light, conditions of the
building, etc.
The rationale for conducting the research or collecting research data.
Why: the rationale for
conducting the research Rationale attributes are typically research purposes. For example,
Rationale class
or collecting research Jawahar and Williams (1997) found that performance appraisals made
data. for administrative purposes were one-third of a standard deviation more
favorable than those made for developmental or research purposes.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
345 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Second, we add a new class (i.e., technology) to the context of technology acceptance and use to represent
the IT artifact (Hong et al., 2014). Technology attributes mainly include the overall function and the features
of the target technology (Burton-Jones & Straub, 2006) and other characteristics, such as usability. The
target technologies served as the stimuli for UTAUT extensions in several studies. For instance, enterprise
information systems (EIS) provided the context for Neufeld et al. (2007) to study the influences of
charismatic leadership on UTAUT beliefs. E-government technologies involving sensitive information served
as several studies’ context for extensions, such as trust, risk, and privacy (Carter & Schaupp, 2008; McLeod
et al., 2009; Schaupp et al., 2010). As another example, Brown et al. (2010) examined the impacts of social
presence, immediacy, and concurrency of online collaboration technology on performance expectancy and
effort expectancy.
Third, task attributes include task type, such as decision making versus idea generation, stages of the
process/sequence of tasks (e.g., software design, coding, testing), and other characteristics (e.g.,
autonomy, uncertainty, accountability). Users perform a variety of tasks that new technologies support
(Burton-Jones & Straub, 2006; Jasperson et al., 2005). Thus, research has associated tasks with the target
technology as the context for UTAUT extensions. For instance, Web-based learning (Web as the technology
and learning as the task) both provide values (e.g., goal attainment, utility, playfulness) and incur costs (e.g.,
social isolation, delay in responses, risk of arbitrary learning), which, in turn, influence the use of the
technology (Chiu & Wang, 2008). Similarly, electronic tax filing, electronic tax preparation, and Internet
banking provide the context in which research has hypothesized trust, risk, and credibility as UTAUT
extensions because users are now using the new Internet technology to perform tasks that involve sensitive
information (Carter & Schaupp, 2008; Schaupp et al., 2010; Yuen et al., 2010). Most UTAUT extensions
have conceptualized tasks in a general manner (e.g., learning (Chiu & Wang, 2008), organizational tasks
(Sun et al., 2009), knowledge contribution (Bourdon & Sandrine, 2009)). Research has not explicitly
examined task types, stages, and other characteristics. An exception is Brown et al. (2010), who included
task type—idea generation and decision making—as an exogenous mechanism.
Fourth, following Weber (2012), we extend the time dimension to include events that can change attribute
states over time, such as interventions that can change user perceptions about the technology (Venkatesh
& Bala, 2008). UTAUT extensions typically take a relative view of time (Johns, 2006) and specify three
different stages of technology acceptance and use relative to the implementation/introduction of the target
technology: adoption, initial use, and post-adoptive use (Jasperson et al., 2005). Adoption refers to the
stage before and right after a target technology implementation/introduction when users make the
acceptance decision based on information from training, trial usage, and other second-hand resources.
Initial use refers to the stage when users begin to apply the technology to accomplish their work/life tasks.
Post-adoptive use refers to the stage when users mainly engage in the feature-level use of the technology,
such as using existing features, adopting new features, and initiating the extension of features. Although
Jasperson et al. (2005) focused on the post-adoptive behavior in work systems, we follow the
conceptualization of system usage of Burton-Jones and Straub (2006) and extend Jasperson et al. (2005)
to other settings, such as consumers’ or citizens’ technology use. As Table F1 in Appendix F shows, most
UTAUT extensions focused on the adoption stage (e.g., Carter & Schaupp, 2008; Eckhardt et al., 2009; Lu
et al., 2009) and several studies have examined both adoption and initial use (e.g., Brown et al., 2010;
Venkatesh & Zhang, 2010). A handful of studies have extended the time frame into the post-adoptive stage
(e.g., Neufeld et al., 2007; Sun et al., 2009; Venkatesh et al., 2008; Venkatesh et al., 2012).
Fifth, we define the organization class as the social context of technology acceptance and use that not only
includes formal organization forms, such as project teams, functional unit, business division, and the entire
organization but also informal social entities, such as user communities and other informal social networks.
Examples of organization attributes include team climate, organizational culture, unit leadership, and
centrality of the informal social network. Several UTAUT extensions examined the impacts of some of these
attributes on technology acceptance and use, such as charismatic leadership (Neufeld et al., 2007), team
climate for innovation (Liang et al., 2010), and organizational culture (Bourdon & Sandrine, 2009; Dasgupta
& Gupta, 2011). Although, conceptually, organization attributes function at higher levels, which influences
the mechanisms at the individual level, most of the existing UTAUT extensions modeled the impacts of
these factors without leveraging the levels perspective (Kozlowski & Klein, 2000). An exception is Park et
al. (2011), who hypothesized organization-level facilitating conditions to affect technology adoption and
moderate relationships at the individual level.
Sixth, we adapt the location class (i.e., the where dimension (industry, region, culture) in Johns (2006)) to
the context of technology acceptance and use. Location attributes include various factors, such as national
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 346
culture, regional economic status, and industry competition. The existing UTAUT extensions have mainly
focused on the moderating effects of national culture on the UTAUT relationships. For instance, Al-Gahtani
et al. (2007) compared the results from testing UTAUT in Saudi Arabia with those in the original UTAUT
study conducted in the USA (Venkatesh et al., 2003). Venkatesh and Zhang (2010) compared the UTAUT
relationships between China and the USA. Im et al. (2011) examined the differences in the empirical results
between a Korean sample and an American sample. Yuen et al. (2010) provided a cross-cultural
comparison of UTAUT relationships between developed countries (USA and Australia) and developing
countries (Malaysia). Work has not examined other location attributes (e.g., regional and industrial
characteristics) in existing UTAUT extensions.
Finally, both the environment class and the rationale class have the potential to influence the theorizing and
empirical findings related to technology acceptance and use. The environment class corresponds to the
physical context dimension in Johns (2006), with the attributes related to physical environment and
conditions (e.g., temperature, light, building) in which the target technology is used. The rationale class
corresponds to the why heuristics in Johns (2006) and refers to the rationale for conducting the research or
collecting data (e.g., if one surveys users to evaluate a system or conduct research). As Table F1 in
Appendix F shows, we found no UTAUT extensions that explicitly addressed the roles of the environment
class and the rationale class in shaping their research models.
In summary, our analysis of UTAUT extensions suggests that one can synthesize existing research along
the eight classes of research context of technology acceptance and use (Hong et al., 2014; Johns, 2006).
Moreover, the notions of the research context and cross-context theorizing complement our theoretical
analysis of UTAUT and its extensions based on Weber (2012) and reveals that, as a first direction, future
research should focus on adding libraries of new context effects from the environment, organization,
location, and event dimensions (Whetten, 2009). Whetten (2009) also suggests adding contextual
moderation as the second approach to contribute to context-effects theory. Thus, we present a multi-level
framework to specify different libraries of context effects at different levels to facilitate the theorizing of the
contextual moderation (Figure 2).
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
347 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
& Gallivan, 2007; Park et al., 2011). Other organization attributes can include climate, organizational culture,
leadership, collective technology use, and outcomes that have cross-level effects (i.e., main effects and/or
moderating effects) at the individual level. Finally, location attributes (e.g., national culture, economic
development, industry competition) can also serve as higher-level contextual factors that have cross-level
impacts on the baseline model at the individual level. Although viewing location/organization attributes as
higher-level factors is implicit in how we conduct analysis/studies across contexts (e.g., testing UTAUT in
fresh contexts), we need multi-sample, multi-study research to theorize the influences of
location/organization attributes in the model.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 348
level use, which includes both exploitation (i.e., extent to which a user exploits features of the system to
perform his/her task) and exploration (i.e., search for novel or innovative ways of doing things with the
technology), as a driver of individual outcomes, particularly individual task performance (Burton-Jones &
Gallivan, 2007; Burton-Jones & Straub, 2006). Similarly, Jasperson et al. (2005) also conceptualized post-
adoptive use as users’ feature adoption decisions, feature use behaviors, and feature extension behaviors
after an IT application was installed, made accessible to the user, and applied by the user in accomplishing
the user’s work activities. They further proposed that users’ post-adoptive technology use produces the
cumulative impacts on the higher-level work system performance. Thus, users’ performance improves as
they use features more, apply more features in their work, and find new or innovative ways of using the
features. In addition to work performance, the impacts of feature-level use on other job-related outcomes
(e.g., job satisfaction, organizational commitment) and consumer outcomes (e.g., brand loyalty (Xu, Thong,
& Venkatesh, 2014) or users’ quality of life) are worth investigating.
Although researchers consider it as an important research area, our literature review indicated that UTAUT
extensions and IS research in other areas have not adequately examined the link between feature-level use
and individual outcomes (see Sykes & Venkatesh, forthcoming). We found only one UTAUT extension that
examined the impact of technology use on individual performance: in this study, the authors measured
technology use by self-reported usage frequency (Sun et al., 2009). Other UTAUT-based studies have
mainly measured technology use by usage duration, frequency, and intensity or a subset of these three
measures on a self-report basis (e.g., Brown et al., 2010, Liang et al., 2010; Venkatesh et al., 2008). Several
UTAUT extensions have measured technology use with one or two items on the breadth of application use.
For instance, as we note elsewhere, Venkatesh et al. (2012) measured consumers’ frequency of use of six
different mobile applications. Al-Gahtani et al. (2007) measured use by the variety of application usage and
the variety of tasks supported by IT. Similarly, IS research that linked technology use to individual impacts
measured technology use mainly using duration, frequency, and intensity or a subset of the three measures.
Also, research has mainly operationalized individual impact as performance. For instance, Yuthas and
Young (1998) measured use as duration and volume and examined the impact of technology use on cost
control performance. Goodhue and Thompson (1995) operationalized system use with perceived
dependence and examined its influence on perceived performance. An exception is Burton-Jones and
Straub (2006), who examined the impact of feature-level use (i.e., deep structure use) on objective task
performance; similarly, Sykes and Venkatesh (forthcoming) examined the impact of deep structure use on
supervisor-rated performance.
A handful of studies have measured technology use at the feature level, and we lack research on the impacts
of feature-level use on the various individual outcomes. Our framework suggests that UTAUT/UTAUT2 can
serve as a baseline model for future research to examine the determinants of feature-level use and the link
between feature-level use and different individual outcomes. For instance, we can still refine current UTAUT
beliefs and contextual factors to still serve as the determinants of feature-level use (e.g., one can refine
usage experience to reflect user expertise that affects user learning about different systems features).
Moreover, one can combine/organize new context effects along the different dimensions of contextual
factors less explored in previous research—i.e., environment factors, location factors, organization factors,
and events. For instance, organizational-level factors, such as work system interventions, can stimulate
feature-level use (Jasperson et al., 2005). Furthermore, one can also identify new context-effects theories
by integrating the baseline model in our framework with other theories to examine the impact of feature-
level use on different individual outcomes. For example, one can integrate research on person-job fit
(Edwards, 1991) with UTAUT to examine the impact of feature use on person-job fit. Thus, we note the
following two recommendations for future research:
Recommendation 1: Conceptualize individual technology use at the feature level and use
UTAUT/UTAUT2 as the baseline model to refine the conceptualization and
measurement of the current context factors that have impacts on feature-level use.
Recommendation 2: Link feature use to different individual outcomes and use UTAUT/UTAUT2 as
the baseline model to identify new context effects along the following four
dimensions: environment, location, organization, and event.
In addition to refining current context effects and identifying new context effects, Whetten (2009) also
suggests theorizing contextual moderations (i.e., higher-order interactions among context factors) for the
contribution to context-effects theory. To facilitate this cross-context theorizing, we propose significantly
enriching the specification of contextual factors at higher levels of a hierarchy—from the immediate physical
environment to the intermediate social/organizational context and to the relatively remote
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
349 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
segment/industry/country context. Such an enrichment is also consistent with our evaluation of UTAUT and
its extensions based on Weber (2012)—we lack meso-level formulations of research models. In addition to
examining the impacts of different user attributes, technology attributes, and task attributes, existing UTAUT
extensions have mainly theorized and tested the impacts of organizational factors such as climate, culture,
and leadership at the individual level.
As Figure 2 indicates, we identified eight dimensions of the context of technology acceptance and use from
existing literature and aligned them at different levels in our framework. Among them, we specified the
attributes of users, technology, tasks, research rationale, and events at the individual level and environment
attributes, organization attributes, and location attributes at higher levels. Note that one can break down
organizations into other structures that warrant a multi-level examination (e.g., team, business unit). For
instance, one can incorporate factors related to team processes and outcomes supported by technology—
such as trust in teams (e.g., Sarker, Ahuja, Sarker, & Kirkeby, 2011), agility in teams (Sarker & Sarker,
2009), group polarization (e.g., Sia, Tan, & Wei, 2002), and group system interface (e.g., Sia, Tan, & Wei,
1997)—into the baseline model to study how team-level factors influence individual acceptance and use. A
multi-level approach to study the impacts of contextual factors on technology acceptance and use can
address several limitations of an individual-level study and delineate the impacts of the organizational
factors at different levels (Burton-Jones & Gallivan, 2007; Kozlowski & Klein, 2000) and, thus, provide
support for the falsifiability of the extensions (Weber, 2012).
Recommendation 3: Theorize the cross-level influences of the environment factors, the
organization factors, and the location factors on feature use and individual
outcomes and conduct multi-level research to empirically examine the impacts
of these contextual factors.
Finally, one can also theorize a higher-order contextual moderation by incorporating the event dimension.
This type of extension is also consistent with our evaluation of the “parts” of UTAUT and its extensions
based on Weber (2012), which suggests a focus on time/events that change the states of the attributes of
different classes of things, especially user perceptions, technology use, and outcomes over time. This type
of extension will provide richer theoretical and managerial implications by transforming UTAUT from a static
theory to a dynamic one. UTAUT and its extensions typically take a relative view of time (Johns, 2006) and
consider the implementation/introduction of the target technology as the major event. Existing research
specifies three different stages of technology acceptance and use in general: adoption, initial use and post-
adoptive use (Jasperson et al., 2005). As we discuss in Section 2, most UTAUT extensions have focused
on one or two of the three stages with a few exceptions. We propose focusing on examining the dynamics
of user perceptions, technology use, and individual outcomes over time in future UTAUT extensions. For
instance, researchers can examine the change of usage frequency and job performance across the three
phases of adoption, initial use, and post-adoptive use, and theorize what contextual factors may help users
learn and explore different system features more quickly. Alternatively, researchers may introduce other
events, such as managerial interventions (e.g., change management strategies), as new contextual factors
and investigate the effectiveness of these interventions by examining the change of user perceptions of the
target technology, their use pattern, and the outcomes in both the short and long run. In this regard, one
can employ latent growth modeling to empirically assess the new theoretical models (see Bala & Venkatesh,
2013 for an LGM illustration).
Recommendation 4: Incorporating time/events in the contextual moderation to examine the impacts
of time/events on the change of the states of user perceptions, use patterns,
and outcomes.
To illustrate our recommendations in a holistic manner, we provide a simple multi-level model below that
reflects some of the key directions we identify and discuss (see Figure 3).
As Figure 3 shows, the illustrative model first focuses on a new focal phenomenon (i.e., individual job
performance) as determined by feature-level technology use. This new focus augments the importance of
the work to both research (the positive link between technology use and an individual outcome) and practice
(individual job performance). The model also offers two new conceptions of the focal phenomenon: it
conceptualizes technology use at the feature level and habit as user habit with the legacy system.
Presumably, the old habit will have negative impact on the use of the new system and further inhibit the
improvement of individual job performance. We introduce transformational leadership as an organization
attribute at a higher level in the model. Through intellectual stimulation and inspirational motivation,
transformational leadership acts will both increase users’ feature-level use and reduce the negative impact
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 350
of legacy system habit. One can test this meso-level model using HLM. One can also modify the illustrative
model to incorporate the time/event class. For instance, researchers may study the change of feature-level
use and job performance over time and examine the impacts of legacy system habit and transformational
leadership on this process. Presumably, legacy system habit may hinder user learning and use of the
features of the new system and, thus, negatively affect the slope of the learning curve, while transformational
leadership may have the opposite effect. One can employ latent growth modeling to test such a model.
The theoretical contributions the above model makes from the perspective of cross-context theorizing
comprise: 1) refining current context effects—legacy system habit to feature-level use, 2) adding a new
library of context effects with a new focal outcome—job performance (i.e., effects from legacy system habit
to feature level use to job performance and the moderation effects of transformational leadership), and 3)
incorporating time/events in the contextual moderation.
Transformational
Leadership
- +
Facilitating
Conditions
Legacy -
System Habit
7 Conclusion
We comprehensively review the UTAUT literature from September 2003 until December 2014 to understand
the latest developments in research on technology acceptance and use. We organize the existing UTAUT
extensions into four types: new exogenous mechanisms, new endogenous mechanisms, new moderation
mechanisms, and new outcome mechanisms. Moreover, we theoretically analyze the literature following
Weber’s (2012) framework of theory evaluation. To assess and facilitate the theoretical contributions from
the UTAUT literature, we further analyze the literature based on the concept of cross-context theorizing
(Whetten, 2009). We integrate the results of our theoretical analysis with eight dimensions of the context for
technology acceptance and use to present a multi-level framework. This framework not only synthesizes
existing UTAUT extensions but also (more importantly) highlights promising future research directions
(identifying new libraries of context effects and specifying contextual moderation) to make significant
theoretical contributions to the technology acceptance and use domain.
Acknowledgements
We thank the Senior Editor, Choon-Ling Sia, and the anonymous review panel for their many helpful
suggestions. This project was partially funded by a grant from the Research Grants Council of Hong Kong
(SBI11.BM04).
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
351 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
References
Alaiad, A., & Zhou, L. (2013). Patients’ behavioral intention toward using healthcare robots. In Proceedings
of the19th Americas Conference on Information Systems (pp. 1-11).
Alapetite, A., Andersen, H. B., & Hertzum, M. (2009). Acceptance of speech recognition by physicians: A
survey of expectations, experiences, and social influence. International Journal of Human-Computer
Studies, 67(1), 36-49.
Al-Gahtani, S. S., Hubona, G. S., & Wang, J. (2007). Information technology (IT) in Saudi Arabia: Culture
and the acceptance and use of IT. Information & Management, 44(4), 681-691.
Al-Shafi, S., Weerakkody, V., & Janssen, M. (2009). Investigating the adoption of eGovernment services in
Qatar using the UTAUT model. In Proceedings of the 15th Americas Conference on Information
Systems (pp. 1-10).
Alshare, K., & Mousa, A. (2014). The moderating effect of espoused cultural dimensions on consumer’s
intention to use mobile payment devices. In Proceedings of the 35th International Conference on
Information Systems (pp.1-15).
Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift.
Journal of the Association for Information Systems, 8(4), 244-254.
Benbasat, I., & Barki, H. (2007). Quo vadis, TAM? Journal of the Association for Information Systems,
8(4), 212-218.
Bhattacherjee, A., & Premkumar, G. (2004). Understanding changes in belief and attitude toward information
technology usage: A theoretical model and longitudinal test. MIS Quarterly, 28(2), 229-254.
Borrero, J. D., Yousafzai, S. Y., Javed, U., & Page, K. L. (2014). Expressive participation in internet social
movements: Testing the moderating effect of technology readiness and sex on student SNS use.
Computers in Human Behavior, 30, 39-49.
Bourdon, I., & Sandrine, O. (2009). Towards an understanding of knowledge management systems: UTAUT
revisited. In Proceedings of the 15th Americas Conference on Information Systems (pp. 1-13). San
Francisco, CA.
Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use:
Integrating technology adoption and collaboration research. Journal of Management Information
Systems, 27(2), 9-53.
Bühler, J., & Bick, M. (2013). The impact of social media appearances during election campaigns. In
Proceedings of the 19th Americas Conference on Information Systems (pp. 1-11).
Burton-Jones, A., & Gallivan, M. J. (2007). Toward a deeper understanding of system usage in
organizations: A multilevel perspective. MIS Quarterly, 31(4), 657-679.
Burton-Jones, A., & Hubona. G. (2006). The mediation of external variables in the technology acceptance
model. Information & Management, 43(6), 706-718.
Burton-Jones, A., & Straub, D. W. (2006). Reconceptualizing system usage: An approach and empirical
test. Information Systems Research, 17(3), 228-246.
Calder, B. J., & Staw, B. M. (1975). Self-perception of intrinsic and extrinsic motivation. Journal of
Personality and Social Psychology, 31(4), 599-605.
Cappelli, P., & Sherer, P. D. (1991). The missing role of context in OB: The need for a meso-level approach.
In L. L. Cummings & B. M. Staw (Eds.), Research in organizational behavior (pp. 55-110). Greenwich,
CT: JAI Press.
Carter, L., & Schaupp, L. C. (2008). Efficacy and acceptance in e-file adoption. In Proceedings of the 14th
Americas Conference on Information Systems (pp. 1-11).
Casey, T., & Wilson-Evered, E. (2012). Predicting uptake of technology innovations in online family dispute
resolution services: An application and extension of the UTAUT. Computers in Human Behavior,
28(6), 2034-2045.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 352
Chan, F. K. Y., Thong, J. Y. L., Venkatesh, V., Brown, S. A., Hu, P. J. H., and Tam, K. Y. (2010) Modeling
citizen satisfaction with mandatory adoption of an e-government technology. Journal of the
Association for Information Systems, 11(10), 519-549.
Chang, I. C., Hwang, H. G., Hung, W. F., & Li, Y. C. (2007). Physicians' acceptance of pharmacokinetics-
based clinical decision support systems. Expert Systems with Applications, 33(2), 296-303.
Chiu, C. M., & Wang, E. T. G. (2008). Understanding web-based learning continuance intention: The role
of subjective task value. Information & Management, 45(3), 194-201.
Dasgupta, S., & Gupta, B. (2011). Impact of organizational culture on technology use in a developing country. In
Proceedings of the 17th Americas Conference on Information Systems (pp. 1-10). Detroit, Michigan.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information
technology. MIS Quarterly, 13(3), 319-339.
DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent
variable. Information Systems Research, 3(1), 60-95.
Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Fort Worth, TX: Harcourt Brace Jovanovich.
Eckhardt, A., Laumer, S., & Weitzel, T. (2009). Who influences whom? Analyzing workplace referents' social
influence on IT adoption and non-adoption. Journal of Information Technology, 24(1), 11-24.
Edwards, J. (1991). Person-job fit: A conceptual integration, literature review, and methodological critique.
In C. L. Cooper & I. T. Robertson (Eds.), International review of industrial and organizational
psychology (pp. 283-357). New York, NY: John Wiley and Sons.
El-Gayar, O., & Moran, M. (2007). Evaluating students’ acceptance and use of tablet PCs in collegiate
classrooms. In Proceedings of the 13th Americas Conference on Information Systems (pp. 1-10).
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and
research. MA: Addison-Wesley.
Garfield, M. J. (2005). Acceptance of ubiquitous computing. Information Systems Management, 22(4), 24-31.
Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS Quarterly,
19(2), 213-236.
Gruzd, A., Staves, K., & Wilk, A. (2012). Connected scholars: Examining the role of social media in research
practices of faculty using the UTAUT model. Computers in Human Behavior, 28(6), 2340-2350.
Guo, Y., & Barnes, S. (2011). Purchase behavior in virtual worlds: An empirical investigation in second life.
Information & Management, 48(7), 303-312.
Guo, Y., & Barnes, S. J. (2012). Explaining purchasing behavior within World of Warcraft. Journal of
Computer Information Systems, 52(3), 18-30.
Gupta, B., Dasgupta S., & Gupta, A. (2008). Adoption of ICT in a government organization in a developing
country: An empirical study. Journal of Strategic Information Systems, 17(2), 140-154.
Hess, T. J., Joshi, K., & McNab, A. L. (2010). An alternative lens for understanding technology acceptance:
An equity comparison perspective. Journal of Organizational Computing and Electronic Commerce,
20(2), 123-154.
Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon G. (2014). A framework and
guidelines for context-specific theorizing in information systems research. Information Systems
Research, 25(1), 111-136.
Hong, W., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2011). User acceptance of agile information
systems: A model and empirical test. Journal of Management Information Systems, 28(1), 235-272.
Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption: Testing the
UTAUT model. Information & Management, 48(1), 1-8.
Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive
behaviors associated with information technology enabled work systems. MIS Quarterly, 29(3), 525-557.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
353 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Jawahar, I. M., & Williams, C. R. (1997). Where all the children are above average: The performance
appraisal purpose effect. Personnel Psychology, 50(4), 905-925.
Johns, G. (2006). The essential impact of context on organizational behavior. Academy of Management
Review, 31(2), 386-408.
Joshi, K. (1991). A model of users’ perspective on change: The case of information systems technology
implementation. MIS Quarterly, 15(2), 229-242.
Kim, C., Jahng, J., & Lee, J. (2007). An empirical investigation into the utilization-based information
technology success model: Integrating task-performance and social influence perspective. Journal of
Information Technology, 22(2), 152-160.
Kim, S. S. (2009). The integrative framework of technology use: An extension and test. MIS Quarterly,
33(3), 513-537.
Kozlowski, S. W. J., & Klein, K. J. (2000). A multilevel approach to theory and research in organizations. In
K. J. Klein & S. W. J. Kozlowski (Eds.), Multilevel theory, research, and methods in organizations (pp.
3-90). San Francisco, CA: Jossey-Bass.
Lallmahomed, M. Z. I., Ab Rahim, N. Z., Ibrahim, R., & Rahman, A. A. (2013). Predicting different
conceptualizations of system use: Acceptance in hedonic volitional context (Facebook). Computers
in Human Behavior, 29(6), 2776-2787.
Lian, J. W., & Yen, D. C. (2014). Online shopping drivers and barriers for older adults: Age and gender
differences. Computers in Human Behavior, 37, 133-143.
Liang, H. G., Xue, Y. J., Ke, W. L., & Wei, K. K. (2010). Understanding the influence of team climate on IT
use. Journal of the Association for Information Systems, 11(8), 414-432.
Liao, Q., Shim, J. P., & Luo, X. (2004). Student acceptance of web-based learning environment: An empirical
investigation of an undergraduate IS course. In Proceedings of the 10th Americas Conference on
Information Systems (pp. 3092-3098).
Liew, E. J. Y., Vaithilingam, S., & Nair, M. (2014). Facebook and socio-economic benefits in the developing
world. Behavior & Information Technology, 33(4), 345-360.
Loose, M., Weeger, A., & Gewald, H. (2013). BYOD–the next big thing in recruiting? Examining the
determinants of BYOD service adoption behavior from the perspective of future employees. In
Proceedings of the 19th Americas Conference on Information Systems (pp. 1-12).
Lu, J., Yu, C. S., & Liu, C. (2009). Mobile data service demographics in urban China. Journal of Computer
Information Systems, 50(2), 117-126.
Martins, C., Oliveira, T., & Popovic, A. (2014). Understanding the internet banking adoption: A unified theory
of acceptance and use of technology and perceived risk application. International Journal of
Information Management, 34(1), 1-13.
McKenna, B., Tuunanen, T., & Gardner, L. (2013). Consumers' adoption of information services. Information
& Management, 50(5), 248-257.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-
commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
McLeod, A., Pippin, S., & Catania, V. (2009). Using technology acceptance theory to model individual
differences in tax software use. In Proceedings of the 15th Americas Conference on Information
Systems (pp. 1-11).
Miltgen, C. L., Popovic, A., & Oliveira, T. (2013). Determinants of end-user acceptance of biometrics:
Integrating the “big 3” of technology acceptance with privacy context. Decision Support
Systems, 56, 103-114.
Mowday, R. T., & Sutton, R. I. (1993). Organizational behavior: Linking individuals and groups to
organizational contexts. Annual Review of Psychology, 44(1), 195-229.
Neufeld, D. J., Dong, L., & Higgins, C. (2007). Charismatic leadership and user acceptance of information
technology. European Journal of Information Systems, 16(4), 494-510.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 354
Niehaves, B., & Plattfaut, R. (2010). The age-divide in private Internet usage: A quantitative study of
technology acceptance. In Proceedings of the 16th Americas Conference on Information Systems
(pp. 1-14).
Oh, J. C., & Yoon, S. J. (2014). Predicting the use of online information services based on a modified UTAUT
model. Behavior & Information Technology, 33(7), 716-729.
Oliveira, T., Faria, M., Thomas, M. A., & Popovic, A. (2014). Extending the understanding of mobile
banking adoption: When UTAUT meets TTF and ITM. International Journal of Information
Management, 34(5), 689-703.
Park, S. H., Lee, L., & Yi, M. Y. (2011). Group-level effects of facilitating conditions on individual acceptance
of information systems. Information Technology and Management, 12(4), 315-334.
Pramatari, K., & Theotokis, A. (2009). Consumer acceptance of RFID-enabled services: A model of multiple
attitudes, perceived system characteristics and individual traits. European Journal of Information
Systems, 18(6), 541-552.
Pynoo, B., Devolder, P., Tondeur, J., van Braak, J., Duyck, W., & Duyck, P. (2011). Predicting secondary
school teachers' acceptance and use of a digital learning environment: A cross-sectional study.
Computers in Human Behavior, 27(1), 568-575.
Saeed, K. A. (2013). Perceived financial control and acceptance of mobile banking services: An empirical
assessment. In Proceedings of the 19th Americas Conference on Information Systems (pp. 1-9).
Sarker, S., Ahuja, M. Sarker, S., & Kirkeby, S. (2011). The role of communication and trust in global virtual
teams: A social network perspective. Journal of Management Information Systems, 28(1), 273-309.
Sarker, S., & Sarker, S. (2009). Exploring agility in distributed information systems development teams: An
interpretive study in an offshoring context. Information Systems Research, 20(3), 440-461.
Sarker, S., & Valacich, J. S. (2010). An alternative to methodological individualism: A non-reductionist
approach to studying technology adoption by groups. MIS Quarterly, 34(4), 779-808.
Sarker, S., Valacich, J. S., & Sarker, S. (2005). Technology adoption by groups: A valence perspective.
Journal of the Association for Information Systems, 6(2), 37-71.
Schaupp, L. C., Carter, L., & McBride, M. E. (2010). E-file adoption: A study of US taxpayers' intentions.
Computers in Human Behavior, 26(4), 636-644.
Seid, A., & Lessa, L. (2012). Adoption of telecenters in south Wollo zone of Amhara regional state in
Ethiopia: Special emphasis on internet services. In Proceedings of the 18th Americas Conference on
Information Systems (pp. 1-9).
Shibl, R., Lawley, M., & Debuse, J. (2013). Factors influencing decision support system acceptance.
Decision Support Systems, 54(2), 953-961.
Sia, C. L., Lee, M. K. O., Teo, H. H., & Wei, K. K. (2001). Information channels for creating awareness in IT
innovations: An exploratory study of organizational adoption intentions of ValuNet. Electronic
Markets, 11(3), 206-215.
Sia, C. L., Tan, B. C. Y., & Wei, K. K. (1997). Effects of GSS interface and task type on group interaction:
An empirical study. Decision Support Systems, 19(4), 289-300.
Sia, C. L., Tan, B. C. Y., & Wei, K. K. (2002). Group polarization and computer-mediated communication:
Effects of communication cues, social presence, and anonymity. Information Systems Research,
13(1), 70-90.
Sia, C. L., Teo, H. H., Tan, B. C. Y., & Wei, K. K. (2004). Effects of environmental uncertainty on
organizational intention to adopt distributed work arrangements. IEEE Transactions on Engineering
Management, 51(3), 253-267.
Sun, Y., Liu, L., Peng, X. M., Dong, Y., & Barnes, S. J. (2014). Understanding Chinese users'
continuance intention toward online social networks: An integrative theoretical model. Electronic
Markets, 24(1), 57-66.
Sun Y., Bhattacherjee, A., & Ma, Q. (2009). Extending technology usage to work settings: The role of
perceived work compatibility in ERP implementation. Information & Management, 46(4), 351-356.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
355 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Sykes, T. A. (2015). Support structures and their impacts: A longitudinal field study of an enterprise system
implementation. MIS Quarterly, 39(2), 437-495.
Sykes, T. A. & Venkatesh, V. forthcoming. Explaining post-implementation employee system use and
friendship, advice and impeding social ties,” MIS Quarterly.
Sykes, T. A., Venkatesh, V., & Johnson, J. L. (2014). Enterprise system implementation and employee job
performance: Understanding the role of advice networks. MIS Quarterly, 38(1), 51-72.
Thong, J. Y. L., Venkatesh, V., Xu, X., Hong, S. J., & Tam, K. Y. (2011). Consumer acceptance of personal
information and communication technology service. IEEE Transactions on Engineering Management,
58(4), 613-625.
Venkatesh, V. 2000. Determinants of perceived ease of use: Integrating control, intrinsic motivation, and
emotion into the technology acceptance model. Information Systems Research, 11(4), 342-365.
Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions.
Decision Sciences, 39(2), 273-315.
Venkatesh, V., Brown, S. A., Maruping, L. M., & Bala, H. (2008). Predicting different conceptualizations of
system use: The competing roles of behavioral intention, facilitating conditions, and behavioral
expectation. MIS Quarterly, 32(3), 483-502.
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four
longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V., Davis, F. D., & Morris, M. G. (2007). Dead or alive? The development, trajectory and future
of technology adoption research. Journal of the Association for Information Systems, 8(4), 268-286.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology:
Toward a unified view. MIS Quarterly, 27(3), 425-478.
Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., Hu, P. J. H., & Brown, S. A. (2011). Extending the two-stage
information systems continuance model: Incorporating UTAUT predictors and the role of context.
Information Systems Journal, 21(6), 527-555.
Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology:
Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157-178.
Venkatesh, V., & Zhang, X. (2010). Unified theory of acceptance and use of technology: US vs. China.
Journal of Global Information Technology Management, 13(1), 5-27.
Venkatesh, V., Zhang, X., & Sykes, T. A. (2011). Doctors do too little technology: A longitudinal field study
of an electronic healthcare system implementation. Information Systems Research, 22(3), 523-546.
Wang, Y., Townsend, A., Luse, A., & Mennecke, B. (2012). The determinants of acceptance of
recommender systems: Applying the UTAUT model. In Proceedings of the 18th Americas Conference
on Information Systems (pp. 1-9).
Wang, T., Jung, C. H., Kang, M. H., & Chung, Y. S. (2014). Exploring determinants of adoption
intentions towards enterprise 2.0 applications: An empirical study. Behaviour & Information
Technology, 33(10), 1048-1064.
Weber, R. (2012). Evaluating and developing theories in the information systems discipline. Journal of the
Association for Information Systems, 13(1), 2-30.
Weerakkody, V., Molnar, A., & El-Haddadeh, R. (2014). Indicators for measuring the success of video usage
in public services: The case of education. In Proceedings of the 20th Americas Conference on
Information System (pp. 1-8).
Whetten, D. A. (2009). An examination of the interface between context and theory applied to the study of
Chinese organizations. Management and Organization Review, 5(1), 29-55.
Workman, M. (2014). New media and the changing face of information technology use: The importance of
task pursuit, social influence, and experience. Computers in Human Behavior, 31, 111-117.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 356
Xiong, J., Qureshi, S., & Najjar, L. (2013). Factors that affect information and communication technology
adoption by small businesses in China. In Proceedings of the 19th Americas Conference on
Information Systems (pp. 1-12).
Xu, X., Thong, J. Y. L., & Venkatesh, V. (2014). Effects of ICT service innovation and complementary
strategies on brand equity and customer loyalty in a consumer technology market. Information
Systems Research, 25(4), 710-729.
Yoo, S. J., Han, S. H., & Huang, W. H. (2012). The roles of intrinsic motivators and extrinsic motivators in
promoting e-Learning in the workplace: A case from South Korea. Computers in Human Behavior,
28(3), 942-950.
Yuen, Y. Y., Yeow, P. H. P., Lim, N., & Saylani, N. (2010). Internet banking adoption: Comparing developed
and developing countries. Journal of Computer Information Systems, 51(1), 52-61.
Yun, H., Han, H., & Lee, C. (2011). Extending UTAUT to predict the use of location-based services. In
Proceedings of the 32nd International Conference on Information Systems (pp. 1-9).
Yuthas, K., & Young, S. T. (1998). Material matters: Assessing the effectiveness of materials management
IS. Information & Management, 33(3), 115-126.
Zhou, T., Lu, Y. B., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption.
Computers in Human Behavior, 26(4), 760-767.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
357 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Source 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Sum
MIS Quarterly 1 4 6 8 3 12 7 7 5 9 10 72
Information Systems
2 6 1 3 1 2 4 6 25
Research
Journal of Management
3 1 1 1 5 4 7 1 2 25
Information Systems
Journal of the Association
2 8 3 4 3 7 2 3 32
for Information Systems
European Journal of
4 4 10 4 3 3 7 5 3 8 51
Information Systems
Information Systems
1 1 2 1 4 2 2 2 15
Journal
Journal of Information
2 1 1 4 2 1 11
Technology
Journal of Strategic
3 4 1 1 5 14
Information Systems
AIS Senior Scholars’
1 17 22 28 18 25 27 28 30 18 31 245
journals: subtotal
ACM Transactions on
Computer-Human 1 1 1 1 2 6
Interaction
Behavior & Information
1 1 1 4 5 7 5 9 15 48
Technology
Business Horizons 1 1 2
Communications of the
1 1 1 3
ACM
Computers in Human
2 4 10 16 17 15 16 45 125
Behavior
Decision Sciences 1 3 1 3 1 1 1 12
Decision Support Systems 1 2 4 2 4 5 5 11 5 39
Electronic Commerce
2 3 5 2 1 13
Research and Applications
Electronic Markets 3 3 2 4 3 15
European Journal of
1 1
Operational Research
Expert Systems with
1 3 1 5 3 13
Applications
Human-Computer
1 1
Interaction
IEEE Transactions on
1 2 3 3 2 2 3 1 1 18
Engineering Management
IEEE Transactions on
Professional 1 1 1 3
Communication
IEEE Transactions on
Systems, Man, and 1 1
Cybernetics
Information &
1 9 8 7 4 1 6 4 7 8 55
Management
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 358
Source 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Sum
Information and
3 1 3 2 9
Organization
Information and Software
1 2 1 4
Technology
Information Research 1 1 2
Information Systems
4 1 4 1 2 1 13
Frontiers
Information Systems
1 2 2 3 8
Management
Information Technology &
1 2 2 5
Management
Information Technology &
1 1 3 1 6
People
International Journal of
1 1 2 2 1 1 1 1 10
Electronic Commerce
International Journal of
4 4 4 5 1 2 3 1 24
Human-Computer Studies
International Journal of
1 2 4 3 4 4 8 9 35
Information Management
Journal of Collaborative
1 1
Computing
Journal of Computer
3 2 2 9 6 4 3 4 4 7 44
Information Systems
Journal of Database
1 1 2 4
Management
Journal of Engineering and
1 1 1 3
Technology Management
Journal of Global
1 1 1 3 2 2 2 12
Information Management
Journal of Global
Information Technology 3 3 1 1 8
Management
Journal of Information
1 1 2
Science
Journal of Organizational
5 4 6 15
and End User Computing
Journal of Organizational
Computing and Electronic 1 2 1 3 7
Commerce
Journal of Systems and
1 1 2 2 2 8
Software
Journal of the American
Society for Information 2 6 8 3 1 2 3 25
Science & Technology
Management Science 2 3 2 7
Omega 1 1 2
Organization Science 1 1
Organizational Behavior
and Human Decision 1 1 2
Processes
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
359 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Source 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Sum
Wirtschaftsinformatik 1 1
Other IS journals:
1 12 29 33 57 62 82 73 66 86 112 613
subtotal
Proceedings of the
International Conference 2 2 11 7 12 17 21 24 15 17 9 137
on Information Systems
Proceedings of the
Americas Conference on 20 15 27 31 25 41 26 35 21 16 15 272
Information Systems
AIS conferences:
22 17 38 38 37 58 47 59 36 33 24 409
subtotal
Grand total 24 46 89 99 112 145 156 160 132 137 167 1267
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 360
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
361 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 362
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
363 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
The influence of performance expectancy on behavioral intention is moderated by gender and age, such
H1
that the effect is stronger for men, particularly younger men.
The influence of effort expectancy on behavioral intention is moderated by gender, age, and experience,
H2 such that the effect is stronger for women, particularly younger women and those younger women in the
early stages of experience with the new technology.
The influence of social influence on behavioral intention is moderated by gender, age, voluntariness, and
H3 experience, such that the effect is stronger for women, particularly older women and particularly in
mandatory settings in the early stages of experience with the new technology.
H4a Facilitating conditions will not have a significant influence on behavioral intention.
The influence of facilitating conditions on usage is moderated by age and experience, such that the effect is
H4b
stronger for older workers particularly with more experience with the new technology.
H5a Computer self-efficacy does not have a significant influence on behavioral intention.
H5b Computer anxiety does not have a significant influence on behavioral intention.
H5c Attitude toward using technology does not have a significant influence on behavioral intention.
H6 Behavioral intention does have a significant positive influence on usage.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 364
States &
Source Constructs Associations Category
events
Different types of social
Bourdon & I: same user class with
Enriched attributes: social influences and facilitations
Sandrine N/A enriched and/or new
influences and facilitations. as enriched endogenous
(2009) attributes
antecedents to intention.
New attributes: technology
characteristics, individual Different characteristics as
I: same user class with
Brown et al. characteristics, group new exogenous
N/A enriched and/or new
(2010) characteristics, task antecedents to UTAUT
attributes
characteristics, and situational independent variables.
characteristics.
Trust and innovativeness as
Casey & I: same user class with
New attributes: trust and new exogenous
Wilson-Evered N/A enriched and/or new
innovativeness. antecedents to UTAUT
(2012) attributes
independent variables.
Computer self-efficacy, task
value, and task cost as new
New attributes: computer self- endogenous antecedents to
I: same user class with
Chiu & Wang efficacy, task value, and task intention.
N/A enriched and/or new
(2008) cost as perceived by individual Computer self-efficacy as a
attributes
users. new exogenous antecedent
to UTAUT independent
variables.
Organizational culture as a
New attribute: organizational I: same user class with
Dasgupta & new exogenous antecedent
culture as perceived by N/A enriched and/or new
Gupta (2011) to UTAUT independent
individual users. attributes
variables.
Different types of social
Enriched attribute: social influences as enriched
I: same user class with
Eckhardt et al. influences. endogenous antecedents to
N/A enriched and/or new
(2009) New attribute: user status intention.
attributes
(adopter vs. non-adopter). User status as a new
moderator of main effects.
Team climate for innovation
New attribute: team climate I: same user class with
Liang et al. as a new exogenous
for innovation as perceived by N/A enriched and/or new
(2010) antecedent to UTAUT
individual users. attributes
independent variables.
Perceived threats as a new
New attributes: perceived endogenous antecedent to
I: same user class with
Loose et al. threats (business and privacy intention.
N/A enriched and/or new
(2013) threats) and employer Employer attractiveness as
attributes
attractiveness. a new consequence of
intention.
Charismatic leadership as a
New attribute: charismatic I: same user class with
Neufeld et al. new exogenous antecedent
leadership as perceived by N/A enriched and/or new
(2007) to UTAUT independent
individual users. attributes
variables.
Perceived work
compatibility as a new
New attributes: perceived exogenous antecedent to I: same user class with
Sun et al.
work compatibility and UTAUT independent N/A enriched and/or new
(2009)
individual performance. variables. attributes
Individual performance as a
new outcome of use.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
365 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Table E1. Evaluation of UTAUT Extensions: Theoretical Advancements in the Parts of the Theory
States &
Source Constructs Associations Category
events
Age, gender, and
experience moderating the
impacts of facilitating
New attribute: behavioral
conditions on behavioral I: same user class with
Venkatesh et expectation.
expectation. N/A enriched and/or new
al. (2008) Enriched attribute: duration,
Experience moderating the attributes
frequency, and intensity of use.
impacts of behavioral
intention and behavioral
expectation on use.
User class expanded: Information security as a
Alaiad & Zhou II: expanded user class with
patients. new endogenous N/A
(2013) new attributes
New attributes: trust. antecedent to intention.
Information security as a
User class expanded: new endogenous
Alshare & consumers. antecedent to intention. II: expanded user class with
N/A
Mousa (2014) New attributes: information Espoused culture values as new attributes
security and espoused culture. new moderators of main
effects.
User class expanded:
Technology readiness as a
Borrero et al. students. II: expanded user class with
new moderator of main N/A
(2014) New attributes: technology new attributes
effects.
readiness.
User class expanded: Trust, self-efficacy, and
Carter & citizens. experience as new II: expanded user class with
Schaupp N/A
New attributes: trust, self- endogenous antecedents to new attributes
(2008)
efficacy, and experience. intention.
User class expanded: Hedonic performance
Lallmahomed consumers. expectancy as a new II: expanded user class with
N/A
et al. (2013) New attributes: hedonic endogenous antecedent to new attributes
performance expectancy. use.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 366
Table E1. Evaluation of UTAUT Extensions: Theoretical Advancements in the Parts of the Theory
States &
Source Constructs Associations Category
events
Self-efficacy and anxiety as
User class expanded: new endogenous
consumers. antecedents to intention.
New attributes: adaptive Adaptive service
service components, components, computational
McKenna et computational service service components, II: expanded user class with
N/A
al. (2013) components, collaborative collaborative service new attributes
service components, components, and
networking service networking service
components, self-efficacy, and components as new
anxiety. exogenous antecedents to
independent variables.
User class expanded: Privacy and risk as new
citizens. endogenous antecedents to
McLeod et al. II: expanded user class with
New attributes: privacy, risk, intention. N/A
(2009) new attributes
and expertise (professionals Expertise as a new
vs. novices). moderator of main effects.
User class expanded: citizens Income, education, and
Niehaves &
New attributes: income, migration background as II: expanded user class with
Plattfaut N/A
education, and migration new moderators of main new attributes
(2010)
background. effects.
Financial control, ease of
User class expanded: navigation, and online
consumers. banking usage as new
endogenous antecedents to II: expanded user class with
Saeed (2013) New attributes: financial N/A
control, ease of navigation, intention. new attributes
online banking usage, and Channel preference as a
channel preference. new consequence in
parallel to intention.
User class expanded: Optimism bias and
Schaupp et al. citizens. perceived risk as new II: expanded user class with
N/A
(2010) New attributes: optimism bias endogenous antecedents to new attributes
and perceived risk. intention.
User class expanded: general
Trust in the knowledge base
practitioners.
Shibl et al. and involvement as new II: expanded user class with
New attributes: trust in the N/A
(2013) endogenous antecedents to new attributes
knowledge base and intention.
involvement.
Age, gender, and
User class expanded:
experience moderating the
consumers.
Venkatesh et impacts of hedonic II: expanded user class with
New attributes: hedonic N/A
al. (2012) motivation, habit, and price new attributes
motivation, habit, and price
value on intention and use,
value.
respectively.
User class expanded: user Security, realization of one’s
group (silent users vs. social value, and extrinsic benefit
expectations as new
users). endogenous antecedents to
Wang et al. New attributes: PIIT, II: expanded user class with
intention. N/A
(2014) computer self-efficacy, new attributes
PIIT and computer self-
security, realization of one’s efficacy as new exogenous
value, and extrinsic benefit antecedents to independent
expectations. variables.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
367 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Table E1. Evaluation of UTAUT Extensions: Theoretical Advancements in the Parts of the Theory
States &
Source Constructs Associations Category
events
User class expanded:
Trust of Internet and trust of
citizens.
Weerakkody intermediaries as new II: expanded user class with
N/A
et al. (2013) New attributes: trust of endogenous antecedents to new attributes
internet and trust of intention.
intermediaries.
Job fit, attitude, self-
User class expanded: small
efficacy, and anxiety as new
business owners.
endogenous antecedents to
Xiong et al. New attributes: job fit, attitude, II: expanded user class with
intention. N/A
(2013) self-efficacy, anxiety, and the new attributes
The development of small
development of small
business as a new
business.
consequence of intention.
New class: location (Saudi
Al-Gahtani et Arabia vs. USA). Culture as a new moderator III: new classes with new
N/A
al. (2007) New attribute: culture of the of main effects. attributes
location.
User class expanded:
consumers.
Im et al. New class: location (Korea vs. Culture as a new moderator III: new classes with new
N/A
(2011) USA). of main effects. attributes
New attribute: culture of the
location.
User class expanded: Trust and flow as new
consumers. endogenous antecedents to
Oh & Yoon III: new classes with new
New class: online information intention; information N/A
(2014) attributes
services. service type as a new
New attributes: trust and flow. moderator of main effects.
OFC as both a new
New class: organizations.
Park et al. endogenous antecedent to III: new classes with new
New attribute: organizational N/A
(2011) use and a new moderator of attributes
facilitating conditions (OFC).
main effects.
User class expanded:
consumers.
New class: IT services. IT service type and user
Thong et al. New attributes: status as new moderators III: new classes with new
N/A
(2011) IT service type (communication of existing interaction attributes
vs. infotainment) and user effects.
status (adoption vs. continued
use).
New class:
Culture as a new moderator
Venkatesh & Location (China vs. USA). III: new classes with new
of existing interaction N/A
Zhang (2010) New attribute: culture of the attributes
effects.
location.
User class expanded:
consumers.
New classes: recommender Trust as a new endogenous
systems and tasks. antecedent to intention.
Wang et al. New attributes: trust, type of Type of recommender III: new classes with new
N/A
(2012) recommender system system and task type as attributes
(collaborative filtering vs. new moderators of main
content-based), and task type effects.
(buying hedonic vs. utilitarian
products).
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 368
Table E1. Evaluation of UTAUT Extensions: Theoretical Advancements in the Parts of the Theory
States &
Source Constructs Associations Category
events
User class expanded:
consumers.
Attitude, anxiety, perceived
A new class: location credibility, and self-efficacy
Yuen et al. (developed vs. developing as new endogenous III: new classes with new
countries). N/A
(2010) antecedents to intention. attributes
New attributes: culture of the Culture as a new moderator
location; attitude, anxiety, of main effects.
perceived credibility, and self-
efficacy of consumers.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
369 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Omitting UTAUT
The importance of culture New changes made to UTAUT:
associations of higher-order
Im et al. (2011) difference in consumer 1) Adding/deleting constructs Micro
moderations.
adoption of IT. 2) Adding/deleting associations.
10 new associations added.
The importance of
Omitting UTAUT
predicting different New changes made to UTAUT:
Lallmahomed et associations of higher-order
conceptualizations of use 1) Adding/deleting constructs Micro
al. (2013) moderations.
in a hedonic volitional 2) Adding/deleting associations.
5 new associations added.
setting.
Omitting UTAUT
The importance of team associations of higher-order
climate for innovation in New changes made to UTAUT: moderations.
Liang et al.
affecting IT use for the 1) Adding/deleting constructs Omitting UTAUT Micro
(2010)
highly autonomous tasks 2) Adding/deleting associations. associations related to
performed by physicians. intention.
4 new associations added.
Omitting UTAUT
associations of higher-order
The importance of social
New changes made to UTAUT: moderations.
Liew et al. networking sites (SNS) to
1) Adding/deleting constructs Omitting UTAUT Micro
(2014) socio-economic benefits
2) Adding/deleting associations. associations related to use.
in developing countries.
110 new associations
added.
Omitting UTAUT
associations of higher-order
The importance of bring New changes made to UTAUT:
moderations.
Loose (2013) your own device (BYOD) 1) Adding/deleting constructs Micro
Omitting UTAUT
to business. 2) Adding/deleting associations.
associations related to use.
2 new associations added.
The importance of New changes made to UTAUT: Omitting UTAUT
Lu et al. (2009) location difference in 1) Adding/deleting constructs associations related to use. Micro
consumer adoption of IT. 2) Adding/deleting associations. 6 new associations added.
Omitting UTAUT
The importance of New changes made to UTAUT:
Martins et al. associations of higher-order
Internet banking to banks 1) Adding/deleting constructs Micro
(2014) moderations.
and users. 2) Adding/deleting associations.
4 new associations added.
Omitting UTAUT
The importance of New changes made to UTAUT:
McKenna et al. associations of higher-order
information service 1) Adding/deleting constructs Micro
(2013) moderations.
components 2) Adding/deleting associations.
13 new associations added.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 370
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
371 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 372
9
We focus on Study 2 in Brown et al. (2010) as it provided results for the complete research model.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
373 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 374
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
375 Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121
Journal of the Association for Information Systems 376
Copyright © 2016 by the Association for Information Systems. Permission to make digital or hard copies of
all or part of this work for personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear this notice and full citation on
the first page. Copyright for components of this work owned by others than the Association for Information
Systems must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on
servers, or to redistribute to lists requires prior specific permission and/or fee. Request permission to publish
from: AIS Administrative Office, P.O. Box 2712 Atlanta, GA, 30301-2712 Attn: Reprints or via e-mail from
publications@aisnet.org.
Volume 17 Issue 5
Electronic copy available at: https://ssrn.com/abstract=2800121