The University of Southampton
University of Southampton Institutional Repository

Explaining normative behavior in information technology use

Explaining normative behavior in information technology use
Explaining normative behavior in information technology use
Purpose: the purpose of this paper is to identify a model that provides explanations for normative behavior in information technology (IT) use, and to test the model across two different types of normative behavior (i.e. green information technology (GIT), and digital piracy (DP)).

Design/methodology/approach: the proposed model is based on the norm activation model (NAM) and the unified theory of acceptance and use of technology model (UTAUT). A total of 374 and 360 usable responses were obtained for GIT and DP, respectively. The authors use the SEM technique in order to test the proposed model on the two sub-samples.

Findings: findings from the proposed model show that DP users’ personal norm (PN) negatively impacts behavioral intention and actual behavior. These findings indicate that users of IT who indulge in DP understand that use of pirated software may not be a socially approved behavior but they still indulge in it because their PNs are not aligned with social expectations. GIT users’ PN positively impacts behavioral intention and actual behavior, and the relationship is stronger for behavioral intention than for actual behavior.

Research limitations/implications: the sample consists of college students and working professionals based in India who may be savvy with respect to internet use. Future work may evaluate whether the pattern of results that the authors report for normative behavior does hold across other types of normative behavior.

Practical implications: these findings hint at a gap between the moral compass and the final “action” taken by DP users. What managers need to do is to create awareness among their customers about the implementation of DP/GIT and help users engage in normative behavior.

Originality/value: this research contributes to the literature by integrating the UTAUT and the NAM to explain normative behavior of IT use. The authors propose and test a model that identifies cognitive as well as social-psychological motivations to explain normative behavior in IT use, which have been sparingly studied in extant literature, and provides a holistic understanding of the phenomenon. As such, this research contributes to the existing knowledge of understanding of normative IT behavior.
1758-5813
94-117
Maity, Moutusy
5f3d5d42-c5ba-4168-83c7-35b2888654a0
Bagchi, Kallol
bcf3868b-5fa2-4d59-b8cc-a685a4690007
Shah, Arunima
6f2af0f6-da3d-4f1d-857f-232810838bea
Misra, Ankita
4a3b1c68-1e50-4023-af9c-3e25551967eb
Maity, Moutusy
5f3d5d42-c5ba-4168-83c7-35b2888654a0
Bagchi, Kallol
bcf3868b-5fa2-4d59-b8cc-a685a4690007
Shah, Arunima
6f2af0f6-da3d-4f1d-857f-232810838bea
Misra, Ankita
4a3b1c68-1e50-4023-af9c-3e25551967eb

Maity, Moutusy, Bagchi, Kallol, Shah, Arunima and Misra, Ankita (2019) Explaining normative behavior in information technology use. Information Technology & People, 32 (1), 94-117. (doi:10.1108/ITP-11-2017-0384).

Record type: Article

Abstract

Purpose: the purpose of this paper is to identify a model that provides explanations for normative behavior in information technology (IT) use, and to test the model across two different types of normative behavior (i.e. green information technology (GIT), and digital piracy (DP)).

Design/methodology/approach: the proposed model is based on the norm activation model (NAM) and the unified theory of acceptance and use of technology model (UTAUT). A total of 374 and 360 usable responses were obtained for GIT and DP, respectively. The authors use the SEM technique in order to test the proposed model on the two sub-samples.

Findings: findings from the proposed model show that DP users’ personal norm (PN) negatively impacts behavioral intention and actual behavior. These findings indicate that users of IT who indulge in DP understand that use of pirated software may not be a socially approved behavior but they still indulge in it because their PNs are not aligned with social expectations. GIT users’ PN positively impacts behavioral intention and actual behavior, and the relationship is stronger for behavioral intention than for actual behavior.

Research limitations/implications: the sample consists of college students and working professionals based in India who may be savvy with respect to internet use. Future work may evaluate whether the pattern of results that the authors report for normative behavior does hold across other types of normative behavior.

Practical implications: these findings hint at a gap between the moral compass and the final “action” taken by DP users. What managers need to do is to create awareness among their customers about the implementation of DP/GIT and help users engage in normative behavior.

Originality/value: this research contributes to the literature by integrating the UTAUT and the NAM to explain normative behavior of IT use. The authors propose and test a model that identifies cognitive as well as social-psychological motivations to explain normative behavior in IT use, which have been sparingly studied in extant literature, and provides a holistic understanding of the phenomenon. As such, this research contributes to the existing knowledge of understanding of normative IT behavior.

This record has no associated files available for download.

More information

Published date: 8 January 2019

Identifiers

Local EPrints ID: 474580
URI: http://eprints.soton.ac.uk/id/eprint/474580
ISSN: 1758-5813
PURE UUID: db2a0021-822e-4ab3-a06a-dde6420c2b05
ORCID for Moutusy Maity: ORCID iD orcid.org/0000-0002-8900-1311

Catalogue record

Date deposited: 27 Feb 2023 17:43
Last modified: 17 Mar 2024 04:18

Export record

Altmetrics

Contributors

Author: Moutusy Maity ORCID iD
Author: Kallol Bagchi
Author: Arunima Shah
Author: Ankita Misra

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×