Explaining normative behavior in information technology use

Author:

Maity Moutusy,Bagchi Kallol,Shah Arunima,Misra Ankita

Abstract

PurposeThe purpose of this paper is to identify a model that provides explanations for normative behavior in information technology (IT) use, and to test the model across two different types of normative behavior (i.e. green information technology (GIT), and digital piracy (DP)).Design/methodology/approachThe proposed model is based on the norm activation model (NAM) and the unified theory of acceptance and use of technology model (UTAUT). A total of 374 and 360 usable responses were obtained for GIT and DP, respectively. The authors use the SEM technique in order to test the proposed model on the two sub-samples.FindingsFindings from the proposed model show that DP users’ personal norm (PN) negatively impacts behavioral intention and actual behavior. These findings indicate that users of IT who indulge in DP understand that use of pirated software may not be a socially approved behavior but they still indulge in it because their PNs are not aligned with social expectations. GIT users’ PN positively impacts behavioral intention and actual behavior, and the relationship is stronger for behavioral intention than for actual behavior.Research limitations/implicationsThe sample consists of college students and working professionals based in India who may be savvy with respect to internet use. Future work may evaluate whether the pattern of results that the authors report for normative behavior does hold across other types of normative behavior.Practical implicationsThese findings hint at a gap between the moral compass and the final “action” taken by DP users. What managers need to do is to create awareness among their customers about the implementation of DP/GIT and help users engage in normative behavior.Originality/valueThis research contributes to the literature by integrating the UTAUT and the NAM to explain normative behavior of IT use. The authors propose and test a model that identifies cognitive as well as social-psychological motivations to explain normative behavior in IT use, which have been sparingly studied in extant literature, and provides a holistic understanding of the phenomenon. As such, this research contributes to the existing knowledge of understanding of normative IT behavior.

Publisher

Emerald

Subject

Library and Information Sciences,Computer Science Applications,Information Systems

Reference82 articles.

1. The theory of planned behavior;Organizational Behavior and Human Decision Processes,1991

2. Digital piracy: factors that influence attitude toward behavior;Journal of Business Ethics,2006

3. Enacting ecological sustainability in the MNC: a test of an adapted value-belief-norm framework;Journal of Business Ethics,2005

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3