Abstract
Voluntariness is recognized as an important influence on individual and collective technology acceptance. We conducted a comprehensive review of this literature and identified a rich set of voluntariness concepts and methods of operationalization. However, while considerable empirical evidence is reported in the literature, our review also revealed inconsistent results concerning the relationship between voluntariness and other concepts. Against that backdrop, we synthesized the literature into three types of voluntariness – perceived, intended and realizable voluntariness (RVOL), and showed how prior literature had not adequately accounted for RVOL. Moreover, we examined the multiple mechanisms that influence voluntariness and created a model to describe how to advance new knowledge about the important relationships among the three types of voluntariness and between voluntariness and user behavior. We argue that these concepts and relationships may help advance our knowledge of how a new technology is used individually and collectively in organizations.
Similar content being viewed by others
Notes
Our study sample differs from that of Wu and Lederer (who identified 71 studies) because we only included those studies that explicitly measured voluntariness. Wu and Lederer’s procedure allowed them to include any study where they could construct an assessment of voluntariness, regardless of whether the study authors included it as a formal construct. Thus, for example, Wu and Lederer’s sample includes the paper by Agarwal and Karahanna (2000) on cognitive absorption even though voluntariness does not appear in the model. We excluded this study as we were interested in how the original authors conceptualized voluntariness.
Moore and Benbasat (1991) is based on the dissertation of Gary Moore in 1989.
At the extremes of volitional control are behaviors such as sneezing, where control is almost entirely absent, and voting choice, where control is very high (Ajzen, 2005). But most behaviors, according to Ajzen (ibid), fall between these extremes, limited by internal factors such as skills, or external factors, such as resources, opportunity or dependence on others.
This motive would not encompass the 3rd of Kelman’s mechanisms, internalization (i.e., accepting influence because of the merits of the content of the induced behavior), as this mechanism would then be consistent with the autonomy motive.
References
* References marked with an asterisk are the 61 studies in our final literature review pool.
Aarts, J., Ash, J.S. and Berg, M. (2007). Extending the Understanding of Computerized Physician Order Entry: Implications for professional collaboration, workflow and quality of care, International Journal of Medical Informatics 76(Supplement 1): S4–S13.
Abbasi, M.S., Chandio, F.H., Soomro, A.F. and Shah, F. (2011). Social Influence, Voluntariness, Experience and the Internet Acceptance: An extension of technology acceptance model within a South-Asian country context, Journal of Enterprise Information Management 24(1): 30–52*.
Adams, D.A., Nelson, R.R. and Todd, P.A. (1992). Perceived Usefulness, Ease of Use, and Usage of Information Technology: A replication, MIS Quarterly 16(2): 227–247*.
Agarwal, R. and Karahanna, E. (2000). Time Flies When You’re Having Fun: Cognitive absorption and beliefs about information technology usage, MIS Quarterly 24(4): 665–694.
Agarwal, R. and Prasad, J. (1997). The Role of Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technologies, Decision Sciences 28(3): 557–582*.
Agarwal, R., Prasad, J. and Zanino, M.C. (1996). Training Experiences and Usage Intentions: A field study of a graphical user interface, International Journal of Human-Computer Studies 45(2): 215–241*.
Aguirre-Urreta, M. and Marakas, G. (2012). Exploring Choice as an Antecedent to Behavior: Incorporating alternatives into the technology acceptance process, Journal of Organizational & End User Computing 24(1): 82–107*.
Ahuja, M.K. and Thatcher, J.B. (2005). Moving Beyond Intentions and toward the Theory of Trying: Effects of work environment and gender on post-adoption information technology use, MIS Quarterly 29(3): 427–459.
Ajzen, I. (1985). From Intentions to Action: A theory of planned behavior, in J. Kuhl and J. Beckmann (eds.) Action Control: From Cognition to Behavior, New York: Springer-Verlag.
Ajzen, I. (2005). Attitudes, Personality and Behavior, 2nd edn, Milton-Keynes, UK: Open University Press/McGraw-Hill.
Alter, S. (2014). Theory of Workarounds, Communication of the Association for Information Systems 34(55): 1041–1066.
Amoako-Gyampah, K. and Salam, A.F. (2004). An Extension of the Technology Acceptance Model in an ERP Implementation Environment, Information & Management 41(6): 731–745*.
Anderson, J.E., Schwager, P.H. and Kerns, R.L. (2006). The Drivers for Acceptance of Tablet PCs by Faculty in a College of Business, Journal of Information Systems Education 17(4): 429–440*.
Azad, B. and King, N. (2008). Enacting Computer Workaround Practices Within a Medication Dispensing System, European Journal of Information Systems 17(3): 264–278*.
Bagozzi, R.P. (1984). A Prospectus for Theory Construction in Marketing, The Journal of Marketing 48(1): 11–29.
Benham, H.C. and Raymond, B.C. (1996). Information Technology Adoption: Evidence from a voice mail introduction, Computer Personnel 17(1): 3–25*.
Bhattacherjee, A. and Hikmet, N. (2007). Physicians’ Resistance Toward Healthcare Information Technology: A theoretical model and empirical test, European Journal of Information Systems 16(6): 725–737.
Boudreau, M.-C. and Robey, D. (2005). Enacting Integrated Information Technology: A human agency perspective, Organization Science 16(1): 3–18*.
Brehm, S.S. and Brehm, J.W. (1981). Psychological Reactance: A theory of freedom and control, New York: Academic Press.
Brown, S.A., Massey, A.P., Montoya-Weiss, M.M. and Burkman, J.R. (2002). Do I Really Have to? User Acceptance of Mandated Technology, European Journal of Information Systems 11(4): 283–295*.
Burton-Jones, A. and Grange, C. (2012). From Use to Effective Use: A representation theory perspective, Information Systems Research 24(3): 632–658.
Chae, B. and Poole, M.S. (2005). Mandates and Technology Acceptance: A tale of two enterprise technologies, The Journal of Strategic Information Systems 14(2): 147–166*.
Chan, F.K.Y., Thong, J.Y.L., Venkatesh, V., Brown, S.A., Hu, P.J.H. and Tam, K.Y. (2010). Modeling Citizen Satisfaction with Mandatory Adoption of An e-Government Technology, Journal of the Association for Information 11(10): 519–549*.
Chen, C., Lai, H. and Ho, C. (2015). Why Do Teachers Continue to Use Teaching Blogs? The Roles of Perceived Voluntariness and Habit, Computers & Education 82(1): 236–249*.
Chengalur-Smith, I. and Duchessi, P. (1999). The Initiation and Adoption of Client – Server Technology in Organizations, Information & Management 35(2): 77–88.
Classen, D., Bates, D.W. and Denham, C.R. (2010). Meaningful Use of Computerized Prescriber Order Entry, Journal of Patient Safety 6(1): 15–23.
Clay, P.F., Dennis, A.R. and Ko, D. (2005). Factors Affecting the Loyal Use of Knowledge Management Systems, in R.H. Sprague Jr (ed.) The 38th Hawaii International Conference on System Sciences, Big Island, Hawaii: IEEE, p. 251*.
Compeau, D.R., Meister, D.B. and Higgins, C.A. (2007). From Prediction to Explanation: Reconceptualizing and extending the perceived characteristics of innovating, Journal of the Association for Information Systems 8(8): 409–439*.
Croteau, A.-M. and Vieru, D. (2002). Telemedicine Adoption by Different Groups of Physicians, in The 35th Hawaii International Conference on System Sciences, Big Island, Hawaii: IEEE, pp. 1–9*.
Debono, D.S., Greenfield, D., Travaglia, J.F., Long, J.C. and Black, D. (2013). Nurses’ Workarounds in Acute Healthcare Settings: A scoping review, BMC Health Services Research 13(55): 175.
DeLone, W.H. and McLean, E.R. (2003). The DeLone and McLean Model of Information Systems Success: A ten-year update, Journal of Management Information Systems 19(4): 9–30.
Elie-Dit-Cosaque, C., Pallud, J. and Kalika, M. (2011). The Influence of Individual, Contextual, and Social Factors on Perceived Behavioral Control of Information Technology: A field theory approach, Journal of Management Information Systems 28(3): 201–234.
Ferneley, E.H. and Sobreperez, P. (2006). Resist, Comply or Workaround? An Examination of Different Facets of User Engagement with Information Systems, European Journal of Information Systems 15(4): 345–356*.
Fishbein, M. and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An introduction to theory and research, Reading, MA: Addison-Wesley Publications.
Geiger, G. and Derman, Y.D. (2003). Methodology for Evaluating Physician Order Entry (POE) Implementations, Journal of Evaluation in Clinical Practice 9(4): 401–408.
Green, G.C., Collins, R.W. and Hevner, A.R. (2004). Perceived Control and the Diffusion of Software Process Innovations, Journal of High Technology Management Research 15(1): 123–144*.
Grudin, J. and Palen, L. (1995). Why Groupware Succeeds: Discretion or mandate?, in H. Marmolin, Y. Sundblad and K. Schmidt (eds.) The 4th European Conference on Computer-Supported Cooperative Work, Stockholm, Sweden, pp. 263–278.
Hardgrave, B.C., Davis, F.D. and Riemenschneider, C.K. (2003). Investigating Determinants of Software Developers’ Intentions to Follow Methodologies, Journal of Management Information Systems 20(1): 123–151*.
Hartwick, J. and Barki, H. (1994). Explaining in the Role of User Participation in Information System Use, Management Science 40(4): 440–465*.
Hebert, M. and Benbasat, I. (1994). Adopting Information Technology in Hospitals: The relationship between attitudes/expectations and behavior, Hospital & Health Services Administration 39(3): 369–383*.
Hester, A.J. (2010). A Comparative Analysis of the Usage and Infusion of Wiki and Non-Wiki-based Knowledge Management Systems, Information Technology and Management 12(4): 335–355*.
Hsieh, J.J.P., Rai, A., Petter, S. and Zhang, T. (2012). Impact of User Satisfaction with Mandated CRM Use on Employee Service Quality, MIS Quarterly 36(4): 1065–1080.
Hsieh, J.J.P. and Wang, W. (2007). Explaining Employees’ Extended Use of Complex Information Systems, European Journal of Information Systems 16(3): 216–227*.
Hsu, C., Lu, H. and Hsu, H. (2007). Adoption of the Mobile Internet: An empirical study of multimedia message service (MMS), Omega 35(6): 715–726*.
Igbaria, M., Zinatelli, N., Cragg, P. and Cavaye, A.L.M. (1997). Personal Computing Acceptance Factors in Small Firms: A structural equation, MIS Quarterly 21(3): 279–305*.
Ignatiadis, I. and Nandhakumar, J. (2009). The Effect of ERP System Workarounds on Organizational Control: An interpretivist case study, Scandinavian Journal of Information Systems 21(3): 59–90.
Iivari, J. (1996). Why are CASE Tools not Used?, Communications of the ACM 39(10): 94–103*.
Jasperson, J.S., Carter, P.E. and Zmud, R.W. (2005). A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems, MIS Quarterly 29(3): 525–557.
Kane, G.C. and Labianca, G.J. (2011). IS avoidance in Healthcare Groups: A multilevel investigation, Information Systems Research 22(3): 504–522.
Karahanna, E., Straub, D.W. and Chervany, N.L. (1999). Information Technology Adoption Across Time: A cross-sectional comparison of pre-adoption and post-adoption beliefs, MIS Quarterly 23(2): 183–213*.
Kelman, H. (1958). Compliance, Identification, and Internalization: Three processes of attitude change, The Journal of Conflict Resolution 2(1): 51–60.
Kijsanayotin, B., Pannarunothai, S. and Speedie, S.M. (2009). Factors Influencing Health Information Technology Adoption in Thailand’s Community Health Centers: Applying the UTAUT model, International Journal of Medical Informatics 78(6): 404–416*.
Klein, K.J. and Kozlowski, S.W.J. (eds.) (2000). A Multilevel Approach to Theory and Research in Organizations’ Contextual, Temporal, and Emergent Processes, in Multilevel Theory Research, and Methods in Organizations: Foundations, Extensions, and New Directions, San Francisco, CA: Jossey-Bass, pp. 3–90.
Klein, K.J. and Sorra, J.S. (1996). The Challenge of Innovation Implementation, The Academy of Management Review 21(4): 1055–1080.
Kuan, K.K.Y., Zhong, Y. and Chau, P.Y.K. (2014). Informational and Normative Social Influence in Group-Buying: Evidence from self-reported and EEG data, Journal of Management Information Systems 30(4): 151–178.
Lapointe, L. and Beaudry, A. (2014). Identifying IT User Mindsets: Acceptance, resistance and ambivalence, in R.H. Sprague Jr (ed.) The 47th Hawaii International Conference on System Sciences, Waikoloa, Hawaii: IEEE, pp. 4619–4628.
Lapointe, L. and Rivard, S. (2005). A multilevel Model of Resistance to Information Technology Implementation, MIS Quarterly 29(3): 461–491.
Lapointe, L. and Rivard, S. (2007). A Triple Take on Information System Implementation, Organization Science 18(1): 89–107.
Lee, Y., Lee, J. and Lee, Z. (2006). Social Influence on Technology Acceptance Behavior: Self-identity theory perspective, Database for Advances in Information Systems 37(2–3): 60–75*.
Leonardi, P.M. (2009). Why Do People Reject New Technologies and Stymie Organizational Changes of Which They are in Favor? Exploring Misalignments Between Social Interactions and Materiality, Human Communication Research 35(3): 407–441.
Leonardi, P.M. (2011). When Flexible Routines Meet Flexible Technolologies: Affordances, constraint, and the imbrication of human and material agencies, MIS Quarterly 35(1): 147–167.
Liang, H., Xue, Y., Ke, W. and Wei, K.K. (2010). Understanding the Influence of Team Climate on IT Use, Journal of the Association for Information 11(8): 414–432*.
Lowry, G. (2002). Modelling User Acceptance of Building Management Systems, Automation in Construction 11(6): 695–705*.
Lucas, H.C. and Spitler, V.K. (1999). Technology Use and Performance: A field study of broker workstations, Decision Sciences 30(2): 291–311*.
Malhotra, Y., Galletta, D.F. and Kirsch, L.J. (2008). How Endogenous Motivations Influence User Intentions: Beyond the dichotomy of extrinsic and intrinsic user motivations, Journal of Management Information Systems 25(1): 267–300.
Marakas, G.M. and Hornik, S. (1996). Passive Resistance Misuse: Overt support and covert recalcitrance in IS implementation, European Journal of Information Systems 5(3): 208–219.
Moore, G.C. (1989). An Examination of the Implementation of Information Technology for End Users: A diffusion of innovations perspective, in Unpublished Doctoral Dissertation, Vancouver: University of British Columbia*.
Moore, G.C. and Benbasat, I. (1991). Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research 2(3): 192–222*.
Nah, F. F.-H., Tan, X. and Teh, S.H. (2004). An Empirical Investigation on End-Users’ Acceptance of Enterprise Systems, Information Resources Management Journal 17(3): 32–53*.
Plouffe, C.R., Hulland, J.S. and Vandenbosch, M. (2001). Richness Versus Parsimony in Modeling Technology Adoption Decisions: Understanding merchant adoption of a smart card-based payment system, Information Systems Research 12(2): 208–222*.
Rai, A., Lang, S.S. and Welker, R.B. (2002). Assessing the Validity of IS Success Models: An empirical test and theoretical analysis, Information Systems Research 13(1): 50–69*.
Ramayah, T. (2010). The Role of Voluntariness in Distance Education Students’ Usage of a Course Website, The Turkish Online Journal of Educational Technology 9(3): 96–105*.
Rivard, S. and Lapointe, L. (2012). Information Technology Implementers’ Responses to User Resistance: Nature and effect, MIS Quarterly 36(3): 897–920.
Salancik, G.R. and Pfeffer, J. (1978). A Social Information Processing Approach to Job Attitudes and Task Design, Administrative Science Quarterly 23(2): 224–253.
Scheepers, R., Scheepers, H. and Ngwenyama, O.K. (2006). Contextual Influences on User Satisfaction with Mobile Computing: Findings from two healthcare organizations, European Journal of Information Systems 15(3): 261–268*.
Sørebø, Ø. and Eikebrokk, T.R. (2008). Explaining IS Continuance in Environments Where Usage is Mandatory, Computers in Human Behavior 24(5): 2357–2371*.
Speier, C. and Venkatesh, V. (2002). The Hidden Minefileds in the Adoption of Sales Force Automation Technologies, The Journal of Marketing 66(3): 98–111*.
Staples, D.S. and Seddon, P. (2004). Testing the Technology-to-Performance Chain Model, Journal of Organizational and End User Computing 16(4): 17–36*.
Stein, M.-K., Newell, S., Wagner, E.L. and Galliers, R.D. (2015). Coping with Information Technology: Mixed emotions, vacillation, and nonconforming use patterns, MIS Quarterly 39(2): 367–392.
Templeton, G.F. and Byrd, T.A. (2003). Determinants of the Relative Advantage of a Structured SDM During the Adoption Stage of Implementation, Journal Information Technology and Management 4(4): 409–428*.
van Harreveld, F., van der Pligt, J. and de Liver, Y.N. (2009). The Agony of Ambivalence and Ways to Resolve It: Introducing the MAID model, Personality and Social Psychology Review 13(1): 45–61.
van Slyke, C., Dick, G., Case, T. and Ilie, V. (2010). The Importance of Compatibility and Pressure on Intentions to Engage in Distance Learning, Communications of the Association for Information Systems 27(1): 395–414*.
van Slyke, C., Lou, H. and Day, J. (2002). The Impact of Perceived Innovation Characteristics on Intention to Use Groupware, Information Resources Management Journal 15(1): 5–12*.
Vehring, N., Riemer, K. and Klein, S. (2011). ‘Don’t Pressure Me!’ Exploring the Anatomy of Voluntariness in the Organizational Adoption of Network Technologies, in C. Beath, M. Myers and K.-K. Wei (eds.) The Thirty Second International Conference on Information Systems, Shanghai, China, pp. 1–18*.
Venkatesh, V. and Bala, H. (2008). Technology Acceptance Model 3 and a Research Agenda on Interventions, Decision Sciences 39(2): 273–315*.
Venkatesh, V. and Davis, F.D. (2000). The Theoretical Extension of the Technology Acceptance Model: Four longitudinal field studies, Information Systems Research 46(2): 186–204*.
Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003). User Acceptance of Information Technology: Toward a unified view, MIS Quarterly 27(3): 425–478*.
Wang, W. and Butler, J.E. (2007). Effects of Adoption Determinants in Voluntary Contexts on IS Mandated Usage, Journal of Information Science and Technology 3(3): 5–24.
Webster, J. and Watson, R.T. (2002). Analyzing the Past to Prepare for the Future: Writing a literature review, MIS Quarterly 26(2): xiii–xxiii.
Worchel, S. and Brehm, J.W. (1971). Direct and Implied Social Restoration of Freedom, Journal of Personality and Social Psychology 18(3): 294–304.
Wu, J. and Du, H. (2012). Toward a Better Understanding of Behavioral Intention and System Usage Constructs, European Journal of Information Systems 21(6): 680–698.
Wu, J. and Lederer, A. (2009). A Meta-Analysis of the Role of Environment-Based Voluntariness in Information Technology Acceptance, MIS Quarterly 33(2): 419–432*.
Author information
Authors and Affiliations
Additional information
Supplementary information accompanies this article on the Journal of Information Technology website (www.palgrave-journals.com/jit)
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Tsai, H., Compeau, D. & Meister, D. Voluntary use of information technology: an analysis and synthesis of the literature. J Inf Technol 32, 147–162 (2017). https://doi.org/10.1057/jit.2016.6
Published:
Issue Date:
DOI: https://doi.org/10.1057/jit.2016.6