UTAUT and UTAUT 2: A Review and Agenda for Future Research
Keywords:behavioral intention, technology acceptance, technology use, UTAUT and UTAUT 2
This study reviews the most recent literature on UTAUT (Unified Theory of Acceptance, and Use of Technology) and UTAUT 2(Unified Theory of Acceptance, and Use of Technology) 2 by focusing on the findings and recommended future research. The papers, proceedings and dissertations included in the analysis were identified technology acceptance as the focus of their studies. This search was supplemented various websites which host scientific journals such as Emerald, Science Direct and Google Scholar. The initial search produced 65 papers. The studies examined works which employed UTAUT and UTAUT 2 by focusing on findings on the core constructs of UTAUT to predict Behavioral Intentions. The results confirmed previous studies that the four constructs of UTAUT contributed to Behavioral Intention even though PE seemed to be the most significant contributors. Findings also suggest UTAUT 2 has been more explanatory and list the suggestions for future works. The immediate implications are for researchers who wish to examine behavioral intentions, and managers who wish to ensure the acceptance and use of a new system or technology. This study bears a number of limitations. Number of papers examined is one of them. It would be more accurate to increase the number of paper examined. The other limitation is the ability to draw a statistical conclusion each research examined. This is due to a great variety of research topics, methods, constructs and contexts.
Ajzen, Icek. (1991). Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50 (2), 179-211.
Bae, Y., & Chang, H. (2012). Adoption of smart TVs: a Bayesian network approach. Industrial Management & Data Systems, 112(6), 891 - 910. doi: 10.1108/02635571211238509
Yen-Ting Helena Chiu, Shih-Chieh Fang, Chuan-Chuan Tseng. (2010). Early versus potential adopters: Exploring the antecedents of use intention in the context of retail service innovations. International Journal of Retail & Distribution Management, 38(6), 443-459. doi: 10.1108/09590551011045357
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: development of a measure and initial test. MIS Quarterly, 19 (2), 189-211.
Compeau, D. R., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Quarterly, 23(2), 145-158.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use and users acceptance of information technology. MIS Quarterly, 13(3), 319-340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111 - 1132.
Deng, S., Liu, Y., & Qi, Y. (2011). An empirical study on determinants of web based question-answer services adoption. Online Information Review, 35(5), 789-798. doi: 10.1108/14684521111176507
Diaz, M. C., & Loraas, T. (2010). Learning new uses of technology while on an audit engagement: Contextualizing general models to advance pragmatic understanding. International Journal of Accounting Information Systems, 11, 61–77. doi: 10.1016/j.accinf.2009.05.001
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. MA: Addison-Wesley.
Gonzalez, G. C., Sharma, P. N., & Galletta, D. F. (2012). The antecedents of the use of continuous auditing in the internal auditing context. International Journal of Accounting Information Systems in Press. doi: 10.1016/j.accinf.2012.06.009
Gruzd, A., Staves, K., & Wilk, A. (2012). Connected scholars: Examining the role of social media in research practices of faculty using the UTAUT model. Computers in Human Behavior Article in Press. doi: 10.1016/j.chb.2012.07.004
Gupta, B., Dasgupta, S., & Gupta, A. (2008). Adoption of ICT in a government organization in a Developing Country: an empirical study. Journal of Strategic Information Systems, 17, 140–154. doi: 10.1016/j.jsis.2007.12.004
Im, I., Hong, S., & Kang, M. S. (2011). An international comparison of technology adoption: Testing the UTAUT model. Information & Management, 48(1), 1–8. doi: 10.1016/j.im.2010.09.001
Keong, M. L., Ramayah, T., Kurnia, S., & Chiun, L. M. (2012). Explaining intention to use an enterprise resource planning (ERP) system: an extension of the UTAUT model. Business Strategy Series, 13(4), 173-180. doi: 10.1108/17515631211246249
Kijsanayotin, B., Pannarunothai, S., & Speedie, S. M. (2009). Factors influencing health information technology adoption in Thailand‘s community health centers: Applying the UTAUT model. International Journal of Medical Informatics, 7(8), 404–416. doi: 10.1016/j.ijmedinf.2008.12.005
Maldonado, U. P. T., Khan, G. F., Moon, J., & Rho, J. J. (2011). E-learning motivation and educational portal acceptance in developing countries. Online Information Review, 35(1), 66-85. doi: 10.1108/14684521111113597
Martín, H. S., & Herrero, Á. (2012). Influence of the user‘s psychological factors on the online purchase intention in rural tourism: Integrating innovativeness to the UTAUT framework. Tourism Management, 33, 341-350. doi: 10.1016/j.tourman.2011.04.003
Moore, G. C., & Benbasat, I. (2001). Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research, 2(3).
Pillai, A., & Mukherjee, J. (2011). User acceptance of hedonic versus utilitarian social networking web sites. Journal of Indian Business Research, 3(3), 180-191. doi: 10.1108/17554191111157047
Schaupp, L. C., Carter, L., & McBride, M. E. (2010). E-file adoption: A study of US taxpayers‘ intentions. zomputers in Human Behavior 26, 636–644. doi: 10.1016/j.chb.2009.12.017
Schepers, J., & Wetzels, M. (2007). A meta-analysis of the technology acceptance model: Investigating subjective norm and moderation effects. Information & Management, 44(1), 90-103. doi: 10.1016/j.im.2006.10.007
Shin, D. H. (2009). Towards an understanding of the consumer acceptance of mobile wallet Original Research Article. Computers in Human Behavior, 25, 1343-1354. doi: 10.1016/j.chb.2009.06.001
Taylor, S., & Todd, P. A. (1995). Understanding the information technology usage: A test of competing models.pdf>. Information Systems Research, 6(2), 144–176.
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: toward a conceptual model of utilization. MIS Quarterly, 15(1), 124-143.
Venkatesh, V., & Davis, F. D. (2000). A Theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27(3), 425-478.
Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information: extending the unified theory of acceptance and use of technology. MIS Quarterly 36(1), 157-178.
Wang, Y.S., Hung, Y.H., & Chou, S.C. T. (2006). Acceptance of E-Government Service: A Validation of the UTAUT. Paper presented at the Proceedings of the 5th WSEAS International Conference on E- ACTIVITIES Venice, Italy.
Williams, M., Rana, N., Dwivedi, Y., & Lal, B. (2011). Is UTAUT Really Used or Just Cited for The Sake of It? A Systematic Review of Citations of UTAUT’s Originating Article. Paper presentedat the ECIS 2011 Proceedings, Paper 231.
Yang, K. (2010). Determinants of US consumer mobile shopping services adoption: implications for designing mobile shopping services. Journal of Consumer Marketing, 27(3), 262-270. doi: 10.1108/07363761011038338
Zhou, T., Lu, Y., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior, 26, 760–767. doi: 10.1016/j.chb.2010.01.013
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share Alike (CC BY-SA)