Uploaded by kczeuch

International.Enterprises.and.Global.Information.Technologies.Felix.B.Tan.1609606051

advertisement
International Enterprises
and Global Information
Technologies:
Advancing Management
Practices
Felix B. Tan
Auckland University of Technology, New Zealand
Senior Editorial Director:
Director of Book Publications: Editorial Director:
Acquisitions Editor:
Development Editor:
Production Editor:
Typesetters: Print Coordinator:
Cover Design:
Kristin Klinger
Julia Mosemann
Lindsay Johnston
Erika Carter
Hannah Abelbeck
Sean Woznicki
Mike Brehm, Keith Glazewski, Natalie Pronio, Jen Romanchak, Milan Vracarich, Jr.
Jamie Snavely
Nick Newcomer
Published in the United States of America by
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com
Copyright © 2011 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or
companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
International Enterprises and Global Information Technologies: Advancing Management Practices / Felix B. Tan, editor.
p. cm.
Includes bibliographical references and index.
Summary: “This book offers solutions, best practices, and case studies on information management on a global scale
among developed, developing, and emerging nations, including discussions of organizational and managerial implications”-Provided by publisher.
ISBN 978-1-60960-605-3 (hbk.) -- ISBN 978-1-60960-606-0 (ebook) 1. Information technology--Management. 2.
International business enterprises. 3. Management information systems. I. Tan, Felix B., 1959HD30.2.I556675 2011
658.4’038011--dc22
2011014967
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
Table of Contents
Preface.................................................................................................................................................. xiv
Section 1
Technology Impact and Use
Chapter 1
Economic Freedom and the Impact of Technology on Productivity....................................................... 1
Ashok Robin, Rochester Institute of Technology, USA
Thomas Tribunella, State University of New York at Oswego, USA
Chapter 2
The Influence of National and Organizational Cultures on Technology Use:
An Exploratory Study Within a Multinational Organizational Setting.................................................. 19
Zixiu Guo, University of New South Wales, Australia
John D’Ambra, University of New South Wales, Australia
Chapter 3
Understanding IT Governance: A Case of Two Financial Mutuals....................................................... 41
Alastair Robb, University of Queensland, Australia
Michael Parent, Simon Fraser University, Canada
Section 2
Cases and International Perspectives
Chapter 4
User Evaluation of E-Government Systems: A Chinese Cultural Perspective...................................... 63
Nan Zhang, Tsinghua University, China
Xunhua Guo, Tsinghua University, China
Guoqing Chen, Tsinghua University, China
Patrick Y. K. Chau, University of Hong Kong, China
Chapter 5
Factors Influencing SME Compliance with Government Regulation on Use of IT:
The Case of South Africa....................................................................................................................... 85
Michael Kyobe, University of Cape Town, South Africa
Chapter 6
Knowledge Management Systems Diffusion in Chinese Enterprises:
A Multistage Approach Using the Technology-Organization-Environment Framework.................... 117
One-Ki (Daniel) Lee, University of Massachusetts Boston, USA
Mo (Winnie) Wang, City University of Hong Kong, Hong Kong
Kai H. Lim, City University of Hong Kong, Hong Kong
Zeyu (Jerry) Peng, University of Science and Technology of China, China
Chapter 7
Factors Affecting Information Communication Technologies Usage and Satisfaction:
Perspective from Instant Messaging in Kuwait................................................................................... 133
Kamel Rouibah, Kuwait University, Kuwait
Hosni Hamdy, Kuwait University, Kuwait
Chapter 8
The Information Overload Paradox: A Cross-Cultural Research Study.............................................. 162
Ned Kock, Texas A&M International University, USA
Ana Rosa Del Aguila-Obra, University of Malaga, Spain
Antonio Padilla-Meléndez, University of Malaga, Spain
Chapter 9
The Influence of Organizational Communication Openness on the Post-Adoption of Computers:
An Empirical Study in Saudi Arabia.................................................................................................... 179
Said S. Al-Gahtani, King Khalid University, Saudi Arabia
Hung-Pin Shih, Hsuan Chuang University, Taiwan
Chapter 10
Chronism Theory, Culture, and System Delay:
A Longitudinal Study of Post-Apartheid South Africa........................................................................ 203
Gregory M. Rose, Washington State University, USA
Carina DeVilliers, University of Pretoria, South Africa
Detmar W. Straub, Georgia State University, USA
Chapter 11
A Cross-National Study of Mobile Internet Services:
A Comparison of U.S. and Korean Mobile Internet Users.................................................................. 228
Dong Hee Shin, Sung Kyung Kwan University, South Korea
Section 3
Trends and Techniques
Chapter 12
Flexibility in Offshoring: Paradoxical Concepts of Control, Communication
and Facilitation..................................................................................................................................... 254
Vanita Yadav, Institute of Rural Management Anand (IRMA), India
Monica Adya, Marquette University, USA
Varadharajan Sridhar, Sasken Communication Technologies, India
Dhruv Nath, Management Development Institute, India
Chapter 13
Taking Information Systems Business Process Outsourcing Offshore:
The Conflict of Competition and Risk................................................................................................. 284
Georgia Beverakis, University of New South Wales, Australia
Geoffrey N. Dick, University of New South Wales, Australia
Dubravka Cecez-Kecmanovi, University of New South Wales, Australia
Chapter 14
Managing Knowledge Transfer in Offshore Software Development:
The Role of Copresent and ICT-Based Interaction.............................................................................. 302
Aini Aman, University Kebangsaan Malaysia, Malaysia
Brian Nicholson, Manchester Business School, UK
Chapter 15
IT Maturity and Strategic Alignment: Moderating Effect of Strategic
Organizational Contexts....................................................................................................................... 321
Leelien Ken Huang, Feng Chia University, Taiwan
Compilation of References................................................................................................................ 347
About the Contributors..................................................................................................................... 378
Index.................................................................................................................................................... 386
Detailed Table of Contents
Preface.................................................................................................................................................. xiv
Section 1
Technology Impact and Use
Chapter 1
Economic Freedom and the Impact of Technology on Productivity....................................................... 1
Ashok Robin, Rochester Institute of Technology, USA
Thomas Tribunella, State University of New York at Oswego, USA
A well-developed body of literature has detected positive effects of technology investments on economic growth. We contribute to this literature by studying the joint effects of technology and economic
freedom on economic growth. Using two different time points, 1990 and 2000, and a sample of over
100 countries, we find that economic freedom enhances the effect of technology on economic growth.
In fact, we find that the standalone effect of freedom is not as large as its interactive effect with technology.
Chapter 2
The Influence of National and Organizational Cultures on Technology Use:
An Exploratory Study Within a Multinational Organizational Setting.................................................. 19
Zixiu Guo, University of New South Wales, Australia
John D’Ambra, University of New South Wales, Australia
This article presents the results of an exploratory study examining the influence of national and organizational cultures on technology use in a multinational organizational (MNO) context. Data were
collected from 121 respondents of a multinational organization in the Asia Pacific with headquarters in
Australia and three subsidiaries in Asia: Korea, Malaysia, and Thailand. Even though significant differences were found between respondents from headquarters and subsidiaries in terms of perceived media
richness and preference for telephone and written documents, very similar media preference patterns
for face-to-face and e-mail between the headquarters and subsidiaries were identified. Furthermore,
face-to-face and e-mail were two primary media used for most communication activities in this MNO.
Follow-up interviews revealed that the universal organizational culture of this MNO may explain media
use consistency between the headquarters and subsidiaries. Implications of the findings are discussed
and future research considered.
Chapter 3
Understanding IT Governance: A Case of Two Financial Mutuals....................................................... 41
Alastair Robb, University of Queensland, Australia
Michael Parent, Simon Fraser University, Canada
Legislators, regulators, and shareholders increasingly demand good governance over all aspects of
their business. While much is made of financial governance, most legislation and regulation implicitly
recognizes the need for prudent governance of information technology (IT) functions. In this study we
conduct an exploratory collective case study of IT governance (ITG) in two financial mutuals - one in
Australia and one in Canada, using a contextual lens. In one case, the mutual governs its IT through
Board participation in a subsidiary. In the second, governance is delegated to management and a Lead
Director. Both of these mechanisms appear to minimize ITG risk, and are the result of their respective
regulatory environments. This research begins to lend some clarity regarding IT governance choices by
firms, and denotes important contextual differences between countries’ regulatory environments. This
will allow researchers, managers, and directors to better understand and discriminate between ITG
processes and structures.
Section 2
Cases and International Perspectives
Chapter 4
User Evaluation of E-Government Systems: A Chinese Cultural Perspective...................................... 63
Nan Zhang, Tsinghua University, China
Xunhua Guo, Tsinghua University, China
Guoqing Chen, Tsinghua University, China
Patrick Y. K. Chau, University of Hong Kong, China
Based on Information Technology adoption theories and considering Chinese cultural characteristics,
this chapter proposes a user centric IT/IS evaluation model composed of three determinants, namely
perceived usefulness, perceived ease of use, and perceived fit, for investigating the e-government systems application and management in China. By empirically validating the model with survey data, it is
demonstrated the perceived fit has significant impacts on the end users’ evaluation towards e-government systems, due to the special element of Hexie in the Chinese culture. The results also indicate that
the reasons for failures in e-government systems application in China largely lie in the lack of fit, which
may root in the long power distance characteristic of the Far Eastern culture.
Chapter 5
Factors Influencing SME Compliance with Government Regulation on Use of IT:
The Case of South Africa....................................................................................................................... 85
Michael Kyobe, University of Cape Town, South Africa
This study investigated the factors influencing SME compliance with regulation on use of IT in South
Africa. The researcher argues that these consist of a combination of business, industry, economic, technological, sociological, and psychological factors. The results show that cost of compliance was the
main influencing factor and that both rural and urban SMEs make limited effort to develop policies and
demonstrate compliance. Furthermore, a discriminant function analysis revealed that rural SMEs can
be distinguished from their urban counterparts in terms of their disposition towards IT regulation by
five factors. Perception of high compliance costs was the key distinguishing factor followed by lack of
awareness, lack of training on compliance and security, perception of unfair regulation and possession
of inadequate security controls. The author hopes that this research-based evidence will provide better
understanding of SME compliance behaviors and guide the development of appropriate solutions to
compliance challenges in these organizations.
Chapter 6
Knowledge Management Systems Diffusion in Chinese Enterprises:
A Multistage Approach Using the Technology-Organization-Environment Framework.................... 117
One-Ki (Daniel) Lee, University of Massachusetts Boston, USA
Mo (Winnie) Wang, City University of Hong Kong, Hong Kong
Kai H. Lim, City University of Hong Kong, Hong Kong
Zeyu (Jerry) Peng, University of Science and Technology of China, China
With the recognition of the importance of organizational knowledge management (KM), researchers
have paid increasing attention to knowledge management systems (KMS). However, since most prior
studies were conducted in the context of Western societies, we know little about KMS diffusion in other
regional contexts. Moreover, even with the increasing recognition of the influence of social factors in
KM practices, there is a dearth of studies that examine how unique social cultural factors affect KMS
diffusion in specific countries. To fill in this gap, this study develops an integrated framework, with
special consideration on the influence of social cultures, to understand KMS diffusion in Chinese enterprises. In our framework, we examine how specific technological, organizational, and social cultural
factors can influence the three-stage KMS diffusion process, that is, initiation, adoption, and routinization. This study provides a holistic view of the KMS diffusion in Chinese enterprises with practical
guidance for successful KMS implementation.
Chapter 7
Factors Affecting Information Communication Technologies Usage and Satisfaction:
Perspective from Instant Messaging in Kuwait................................................................................... 133
Kamel Rouibah, Kuwait University, Kuwait
Hosni Hamdy, Kuwait University, Kuwait
Instant messaging (IM) technology has received extensive focus in the West while there is lack of
knowledge of it in the Arab world. This study aims to shed light on factors affecting IM usage and user
satisfaction in an Arab country (Kuwait). To achieve this objective, this study develops a theoretical
model that is based on three well-known models. This model includes curiosity (from the theory of
flow), compatibility (from the innovation diffusion theory), perceived usefulness and perceived ease of
use (from the technology acceptance model), and individual characteristics in the form of prior similar
experience. The proposed model was tested using survey data from 609 students, with the results lending support for the proposed model. Importantly, results highlight the impact of social effect on curiosity as a new mediator of technology adoption and satisfaction. This study contributes to the literature
on technology adoption in the Arab word and aids educational institutions and companies to understand
the social and technical nature of users’ attitudes with regard to ICT adoption and satisfaction.
Chapter 8
The Information Overload Paradox: A Cross-Cultural Research Study.............................................. 162
Ned Kock, Texas A&M International University, USA
Ana Rosa Del Aguila-Obra, University of Malaga, Spain
Antonio Padilla-Meléndez, University of Malaga, Spain
Information overload is one of the major problems for individuals and organizations in modern urban
environments. This phenomenon has been studied for many years, and has proven to be more complex
than researchers believed it to be. It is important to better understand this “pathology of information”
for two reasons. First, it has a deleterious impact on work productivity and quality. Second, it has
traditionally been a driver of Information Technology developments aimed at helping individuals to
better cope with it. The study presented here aims at shedding light on the complexity of information
overload, by examining the relationship between perceived information overload intensity and three
traditional information overload predictors as well as one nontraditional predictor. The nontraditional
predictor is power distance, or the extent to which less powerful members of a national culture accept
that power is distributed unequally. Power distance was manipulated through the collection of data
from 184 local managers and professionals (in New Zealand, Spain and the U.S.A.). The data analyses
led to one surprising conclusion: perceived information overload intensity seems to be more strongly
related to power distance than to the volume of written information or number of information transactions processed by an individual.
Chapter 9
The Influence of Organizational Communication Openness on the Post-Adoption of Computers:
An Empirical Study in Saudi Arabia.................................................................................................... 179
Said S. Al-Gahtani, King Khalid University, Saudi Arabia
Hung-Pin Shih, Hsuan Chuang University, Taiwan
This study adopts social identity theory (SIT) to examine the post-adoption of computers using a research model that extends the theory of planned behavior (TPB) with two organizational cultural factors. Individual attitudes toward using computers and perceived behavioral control are TPB personal
factors, while subjective norms can be viewed as the social factor. Empirical findings from 400 Arab
end-users show that openness to superior-subordinate relationships (reducing organizational boundaries) significantly influences current computer usage only through personal factors. In contrast, openness
to superior-subordinate relationships significantly influences continued use of computers through personal and social factors. However, openness to work communication (reducing communicative boundaries) does not significantly influence either current computer usage or continued use of computers
through TPB beliefs. The implications for research and practice, and the limitations of this study, are
discussed accordingly.
Chapter 10
Chronism Theory, Culture, and System Delay:
A Longitudinal Study of Post-Apartheid South Africa........................................................................ 203
Gregory M. Rose, Washington State University, USA
Carina DeVilliers, University of Pretoria, South Africa
Detmar W. Straub, Georgia State University, USA
System response delay has been cited as the single most frustrating aspect of using the Internet and
the most worrisome aspect of Web application design. System response time (SRT) research generally
concludes that delay should be eliminated where possible to as little as a few seconds, even though
delay reduction is costly. Unfortunately, it is not clear if these conclusions are appropriate outside of
the developed world where nearly all of the SRT research has taken place. Cultural effects have been,
hence, generally missing from SRT research. The one SRT study to date outside of the developed world
did report differences using the theoretical construct of cultural chronism, and this finding could limit
the generalizability of SRT research findings from developed countries to many economically developing nations. However, limitations and potential confounds in this single study render those findings
tentative. The end of Apartheid in South Africa allowed an opportunity to conduct a longitudinal free
simulation experiment that overcomes the critical limitations of this previous research. Subjects were
members of historically polychronic and monochronic groups who had been segregated by Apartheid
and now live in an integrated society with shared infrastructure and computer access. Results find
that members of the historically polychronic group are more accepting of longer delays and are more
willing to trade longer delays for improved functionality than are their historically monochronic counterparts. Furthermore, tests find that members of the historically monochronic population that came of
age in a desegregated, majority-polychronic culture appear to be polychronic themselves and to differ
significantly from the older monochronic generation. Results from this study can be applied to design
culturally-sensitive applications for users in the developing economies of the world.
Chapter 11
A Cross-National Study of Mobile Internet Services:
A Comparison of U.S. and Korean Mobile Internet Users.................................................................. 228
Dong Hee Shin, Sung Kyung Kwan University, South Korea
This study surveyed mobile users in the United States and Korea to determine the key differences between the two countries. Survey questions, developed in two languages, were presented in each country
to explore the influences of informativeness, entertainment, interactivity, and availability on mobile
user dimensions. The study design methods were based on the revision of a uses and gratifications approach, and a relational model of antecedents and consequences was tested with a structural equation
modeling approach. Mobile Internet service uses and gratifications were analyzed cross-nationally in
a comparative fashion focusing on the differences in the composition of motives in the two countries.
Based on the results of this study, practical implications for marketing strategies in mobile service markets and theoretical implications for cross-country studies are recommended accordingly.
Section 3
Trends and Techniques
Chapter 12
Flexibility in Offshoring: Paradoxical Concepts of Control, Communication
and Facilitation..................................................................................................................................... 254
Vanita Yadav, Institute of Rural Management Anand (IRMA), India
Monica Adya, Marquette University, USA
Varadharajan Sridhar, Sasken Communication Technologies, India
Dhruv Nath, Management Development Institute, India
Globalization of software development has resulted in a rapid shift away from the traditional collocated, on-site development model, to the offshoring model. Emerging trends indicate an increasing interest
in offshoring, even in early phases like requirements analysis. Additionally, the flexibility offered by the
agile development approach makes it attractive for adaptation in globally distributed software work. A
question of significance then is what impacts the success of offshoring earlier phases, like requirements
analysis, in a flexible and globally distributed environment? This chapter incorporates the stance of
control theory to posit a research model that examines antecedent factors such as requirements change,
facilitation by vendor and client site-coordinators, control, and computer-mediated communication.
The impact of these factors on success of requirements analysis projects in a “flexible” global setting is
tested using two quasi-experiments involving students from Management Development Institute, India
and Marquette University, U.S.A. Results indicate that formal modes of control significantly influence
project success during requirements analysis. Further, facilitation by both client and vendor site coordinators positively impacts requirements analysis success.
Chapter 13
Taking Information Systems Business Process Outsourcing Offshore:
The Conflict of Competition and Risk................................................................................................. 284
Georgia Beverakis, University of New South Wales, Australia
Geoffrey N. Dick, University of New South Wales, Australia
Dubravka Cecez-Kecmanovi, University of New South Wales, Australia
As Business Process Outsourcing (BPO) moves offshore and now includes Information Systems (IS)
Processes, there is a need to consider a combination of the two. This article explores the factors that a
multinational organisation considered when it “offshored” its IS business processes to lower-cost destinations. It focuses on determining the driving factors and challenges faced during the offshore sourcing
project. A single, in-depth interpretive case study approach was used to explore this research topic. The
results of this study show that the organisation under investigation was primarily driven to offshore its
IS business processes in order to become more competitive in the marketplace. This was assisted by
the organisation reducing its operational costs, and establishing a global presence in many lower-cost
locations offshore. A model was developed, which illustrates the interrelationships that exist between
these concepts.
Chapter 14
Managing Knowledge Transfer in Offshore Software Development:
The Role of Copresent and ICT-Based Interaction.............................................................................. 302
Aini Aman, University Kebangsaan Malaysia, Malaysia
Brian Nicholson, Manchester Business School, UK
The aim of this article is to examine the role of copresent interaction and the extent to which this can be
supplanted by information and communication technology-based interaction for managing knowledge
transfer in distributed settings. This study draws on two case studies of small UK firms sourcing software development from India and Bangladesh. Using Nonaka and Konno’s knowledge creation theory,
the role of copresent and ICT-based interactions in managing knowledge transfer is explained. The
article contributes an extension of the concepts of knowledge creation theory by providing evidence
of the role of copresent and ICT-based interaction for knowledge transfer in the context of offshore
software development.
Chapter 15
IT Maturity and Strategic Alignment: Moderating Effect of Strategic
Organizational Contexts....................................................................................................................... 321
Leelien Ken Huang, Feng Chia University, Taiwan
Strategic alignment of IT/business remains one of the top IT management issues. We proposed, using
contingency theory, that the extent to which IT maturity can be evolved to support overall business
goals is moderated by strategic organizational contexts. Results suggested that companies could succeed when IT maturity is appropriate for a certain strategic organizational context. Our research model
was generic for foreign companies’ strategic behaviour because, based on contingency theory, these
companies make dynamic adaptations toward their particular external environment for a competitive
strategy. Implications of results are discussed.
Compilation of References................................................................................................................ 347
About the Contributors..................................................................................................................... 378
Index.................................................................................................................................................... 386
xiv
Preface
To keep pace with the rapidly expanding world of global business, it is vital to stay abreast of the latest
advances in management and technological strategies for a globalized market. This book of advances
in management practices offers just those set of tools to a manager, IT professional, business student,
or any member of the global business chain.
Narrowing the field of global business to give the most relevant and helpful practices exposure, “International Enterprises and Global Information Technologies: Advancing Management Practices” offers
fifteen chapters in three sections. The authors of these chapters hail from a dozen countries around the
world, offering insight in case studies and comparisons of international enterprises.
The first section, “Technology Impact and Use” introduces some of the latest in the information
technology, its governance, and the trends in terminology and semantics surrounding these advances.
Section one includes three chapters that introduce the book and lay a framework for implementing
practices discussed in further chapters.
Chapter one, “Economic Freedom and the Impact of Technology on Productivity,” by Ashok Robin
and Thomas Tribunella, introduces the book and gives the foundation for describing how productivity can
be affected by newly implemented technology. The authors contribute to this literature by studying the
joint effects of technology and economic freedom on economic growth. Using two different time points,
1990 and 2000, and a sample of over 100 countries, the chapter finds that economic freedom enhances
the effect of technology on economic growth. In fact, the chapter will explain that the standalone effect
of freedom is not as large as its interactive effect with technology.
Chapter two, “The Influence of National and Organizational Cultures on Technology Use: An Exploratory Study Within a Multinational Organizational Setting,” by Zixiu Guo and John D’Ambra, shows
how difference in culture and background is affected by technology use in in the international workplace. This chapter presents the results of an exploratory study examining the influence of national and
organizational cultures on technology use in a multinational organizational (MNO) context. Data were
collected from 121 respondents of a multinational organization in the Asia Pacific with headquarters in
Australia and three subsidiaries in Asia: Korea, Malaysia, and Thailand. Even though significant differences were found between respondents from headquarters and subsidiaries in terms of perceived media
richness and preference for telephone and written documents, very similar media preference patterns
for face-to-face and e-mail between the headquarters and subsidiaries were identified.
Chapter three, “Understanding IT Governance: A Case of Two Financial Mutuals,” by Alastair Robb
and Michael Parent, gives insight into IT governance by showing the link between effective management
of technology within two connected businesses at different sides of the globe. In this chapter, the authors
conduct an exploratory collective case study of IT governance (ITG) in two financial mutuals - one in
xv
Australia and one in Canada, using a contextual lens. In one case, the mutual governs its IT through
Board participation in a subsidiary. In the second, governance is delegated to management and a Lead
Director. Both of these mechanisms appear to minimize ITG risk, and are the result of their respective
regulatory environments. This research begins to lend some clarity regarding IT governance choices
by firms, and denotes important contextual differences between countries’ regulatory environments.
This will allow researchers, managers, and directors to better understand and discriminate between ITG
processes and structures.
The second section, “Cases and International Perspectives,” comprises the bulk of the book,
containing eight chapters that draw experiences from different sectors of global industry and enterprise.
Chapter four, “User Evaluation of E-Government Systems: A Chinese Cultural Perspective,” by Nan
Zhang, Xunhua Guo, Guoqing Chen, and Patrick Y. K. Chau, begins the second section of the book
with its first foray into e-government systems and their applications in China, specifically focusing on
the impact of cultural practices and how these considerations must be handled. Based on Information
Technology adoption theories and considering Chinese cultural characteristics, this chapter proposes
a user centric IT/IS evaluation model composed of three determinants, namely: perceived usefulness,
perceived ease of use, and perceived fit, for investigating the e-government systems application and
management in China. By empirically validating the model with survey data, it is demonstrated the
perceived fit has significant impacts on the end users’ evaluation towards e-government systems, due to
the special element of Hexie in the Chinese culture. The results also indicate that the reasons for failures
in e-government systems application in China largely lie in the lack of fit, which may take root in the
long power distance characteristic of the Far Eastern culture.
Chapter five, “Factors Influencing SME Compliance with Government Regulation on Use of IT: The
Case of South Africa,” by Michael Kyobe, continues the discussion of government role in international
e-business, specifically focusing on the impact of compliance within small and medium sized enterprises
(SMEs). The study within this chapter investigates the factors influencing SME compliance with regulation on use of IT in South Africa. The researcher argues that these consist of a combination of business,
industry, economic, technological, sociological, and psychological factors. The results show that cost of
compliance was the main influencing factor and that both rural and urban SMEs make limited effort to
develop policies and demonstrate compliance. Furthermore, a discriminant function analysis revealed
that rural SMEs can be distinguished from their urban counterparts in terms of their disposition towards
IT regulation by five factors. Perception of high compliance costs was the key distinguishing factor followed by lack of awareness, lack of training on compliance and security, perception of unfair regulation,
and possession of inadequate security controls.
Chapter six, “Knowledge Management Systems Diffusion in Chinese Enterprises: A Multistage Approach Using the Technology-Organization-Environment Framework,” by One-Ki (Daniel) Lee, Mo
(Winnie) Wang, Kai H. Lim, and Zeyu (Jerry) Peng, offers an architecture implemented across several
Chinese enterprises and the approaches behind its effects on knowledge management. With the recognition of the importance of organizational knowledge management (KM), researchers have paid increasing
attention to knowledge management systems (KMS). However, since most prior studies were conducted
in the context of Western societies, we know little about KMS diffusion in other regional contexts.
Moreover, even with the increasing recognition of the influence of social factors in KM practices, there
is a dearth of studies that examine how unique social cultural factors affect KMS diffusion in specific
countries. To fill in this gap, this study develops an integrated framework, with special consideration
on the influence of social cultures, to understand KMS diffusion in Chinese enterprises. In this frame-
xvi
work, the authors examine how specific technological, organizational, and social cultural factors can
influence the three-stage KMS diffusion process, that is, initiation, adoption, and routinization. This
study provides a holistic view of the KMS diffusion in Chinese enterprises with practical guidance for
successful KMS implementation.
Chapter seven, “Factors Affecting Information Communication Technologies Usage and Satisfaction: Perspective from Instant Messaging in Kuwait,” by Kamel Rouibah and Hosni Hamdy, goes to
the Middle East, and studies the effects of instant messaging software on communication within global
enterprise and the impact on overall ICT effectiveness. Instant messaging (IM) technology has received
extensive focus in the West while there is lack of knowledge of it in the Arab world. This study aims to
shed light on factors affecting IM usage and user satisfaction in an Arab country (Kuwait). To achieve
this objective, this study develops a theoretical model that is based on three well-known models. This
model includes curiosity (from the theory of flow), compatibility (from the innovation diffusion theory),
perceived usefulness and perceived ease of use (from the technology acceptance model), and individual
characteristics in the form of prior similar experience. The proposed model was tested using survey data
from 609 students, with the results lending support for the proposed model. Importantly, results highlight the impact of social effect on curiosity as a new mediator of technology adoption and satisfaction.
Chapter eight, “The Information Overload Paradox: A Cross-Cultural Research Study,” by Ned
Kock, Ana Rosa Del Aguila-Obra, and Antonio Padilla-Meléndez, details research done between two
universities in the United States and Spain on the topic of the information overload paradox, giving lessons learned from the study and offering best practices among globally relevant scenarios. Information
overload is one of the major problems for individuals and organizations in modern urban environments.
This phenomenon has been studied for many years, and has proven to be more complex than researchers
believed it to be. It is important to better understand this “pathology of information” for two reasons.
First, it has a deleterious impact on work productivity and quality. Second, it has traditionally been a
driver of Information Technology developments aimed at helping individuals to better cope with it. The
study presented here aims at shedding light on the complexity of information overload, by examining the
relationship between perceived information overload intensity and three traditional information overload
predictors, as well as one nontraditional predictor. The nontraditional predictor is power distance, or the
extent to which less powerful members of a national culture accept that power is distributed unequally.
Power distance was manipulated through the collection of data from 184 local managers and professionals
(in New Zealand, Spain and the U.S.A.). The data analyses led to one surprising conclusion: perceived
information overload intensity seems to be more strongly related to power distance than to the volume
of written information or number of information transactions processed by an individual.
Chapter nine, “The Influence of Organizational Communication Openness on the Post-Adoption of
Computers: An Empirical Study in Saudi Arabia,” by Said S. Al-Gahtani and Hung-Pin Shih, gives an
evidential account of the effective organization of communication technologies when granted openness
and acceptance within Saudi enterprise. The study in this chapter adopts social identity theory (SIT)
to examine the post-adoption of computers using a research model that extends the theory of planned
behavior (TPB) with two organizational cultural factors. Individual attitudes toward using computers
and perceived behavioral control are TPB personal factors, while subjective norms can be viewed as the
social factor. Empirical findings from 400 Arab end-users show that openness to superior-subordinate
relationships (reducing organizational boundaries) significantly influences current computer usage
only through personal factors. In contrast, openness to superior-subordinate relationships significantly
influences continued use of computers through personal and social factors. However, openness to work
xvii
communication (reducing communicative boundaries) does not significantly influence either current
computer usage or continued use of computers through TPB beliefs. The implications for research and
practice, and the limitations of this study, are discussed accordingly.
Chapter ten, “Chronism Theory, Culture, and System Delay: A Longitudinal Study of Post-Apartheid
South Africa,” by Gregory M. Rose, Carina DeVilliers, and Detmar W. Straub, returns to the question
of culture, this time within the specific setting of South Africa in a postmodern, post-Apartheid society,
giving critical commentary and a theory of chronism and system delay. The end of Apartheid in South
Africa allowed an opportunity to conduct a longitudinal free simulation experiment that overcomes the
critical limitations of this previous research. Subjects were members of historically polychronic and
monochronic groups who had been segregated by Apartheid and now live in an integrated society with
shared infrastructure and computer access. Results find that members of the historically polychronic
group are more accepting of longer delays and are more willing to trade longer delays for improved
functionality than are their historically monochronic counterparts. Furthermore, tests find that members
of the historically monochronic population that came of age in a desegregated, majority-polychronic
culture appear to be polychronic themselves and to differ significantly from the older monochronic
generation. Results from this study can be applied to design culturally-sensitive applications for users
in the developing economies of the world.
Chapter eleven, “A Cross-National Study of Mobile Internet Services: A Comparison of U.S. and
Korean Mobile Internet Users,” by Dong Hee Shin, elucidates a specific comparison between the mobile
infrastructures of two of the world’s leading technological countries and their m-Internet users. This
study surveyed mobile users in the United States and Korea to determine the key differences between
the two countries. Survey questions, developed in two languages, were presented in each country to
explore the influences of informativeness, entertainment, interactivity, and availability on mobile user
dimensions. The study design methods were based on the revision of a uses and gratifications approach,
and a relational model of antecedents and consequences was tested with a structural equation modeling
approach. Mobile Internet service uses and gratifications were analyzed cross-nationally in a comparative fashion focusing on the differences in the composition of motives in the two countries. Based on
the results of this study, practical implications for marketing strategies in mobile service markets and
theoretical implications for cross-country studies are recommended accordingly.
The third section, “Trends and Techniques,” concludes the book with four final chapters on topics
such as offshoring, knowledge transfer, IT maturity, and more from research and case studies across
the globe.
Chapter twelve, “Flexibility in Offshoring: Paradoxical Concepts of Control, Communication and
Facilitation,” by Vanita Yadav, Monica Adya, Varadharajan Sridhar, and Dhruv Nath, introduces the
concept of offshoring and the importance of its implementation and management therein. This chapter
incorporates the stance of control theory to posit a research model that examines antecedent factors
such as requirements change, facilitation by vendor and client site-coordinators, control, and computermediated communication. The impact of these factors on success of requirements analysis projects in
a ‘flexible’ global setting is tested using two quasi-experiments involving students from Management
Development Institute, India and Marquette University, U.S.A. Results indicate that formal modes of
control significantly influence project success during requirements analysis. Further, the chapter posits that
facilitation by both client and vendor site coordinators positively impacts requirements analysis success.
Chapter thirteen, “Taking Information Systems Business Process Outsourcing Offshore: The Conflict
of Competition and Risk,” by Georgia Beverakis, Geoffrey N. Dick, and Dubravka Cecez-Kecmanovic,
xviii
continues the discussion of offshore practices and focuses on honing economic theories towards the
best practices within information systems businesses. As Business Process Outsourcing (BPO) moves
offshore and now includes Information Systems (IS) processes, there is a need to consider a combination of the two. This chapter explores the factors that a multinational organisation considered when it
“offshored” its IS business processes to lower-cost destinations. It focuses on determining the driving
factors and challenges faced during the offshore sourcing project. A single, in-depth interpretive case
study approach was used to explore this research topic. The results of this study show that the organisation
under investigation was primarily driven to offshore its IS business processes in order to become more
competitive in the marketplace. This was assisted by the organisation reducing its operational costs and
establishing a global presence in many lower-cost locations offshore. A model was developed, which
illustrates the interrelationships that exist between these concepts.
Chapter fourteen, “Managing Knowledge Transfer in Offshore Software Development: The Role of
Copresent and ICT-Based Interaction,” by Aini Aman and Brian Nicholson, summarily bookends the
chapters on offshoring practices with a final, narrowed focus on knowledge transfer within software
development industries. The aim of this chapter is to examine the role of copresent interaction and the
extent to which this can be supplanted by information and communication technology-based interaction
for managing knowledge transfer in distributed settings. The study undertaken in the chapter draws on
two case studies of small UK firms sourcing software development from India and Bangladesh. Using Nonaka and Konno’s knowledge creation theory, the role of copresent and ICT-based interactions
in managing knowledge transfer is explained. The chapter contributes an extension of the concepts of
knowledge creation theory by providing evidence of the role of copresent and ICT-based interaction for
knowledge transfer in the context of offshore software development.
Chapter fifteen, “IT Maturity and Strategic Alignment: Moderating Effect of Strategic Organizational Contexts,” by Leelien Ken Huang, concludes the book with a general focus on the development
of Information Technology within a global enterprise, discussing the importance of strategic alignment
on the successful maturity therein. Strategic alignment of IT/business remains one of the top IT management issues. The authors propose, using contingency theory, that the extent to which IT maturity can
be evolved to support overall business goals is moderated by strategic organizational contexts. Results
suggested that companies could succeed when IT maturity is appropriate for a certain strategic organizational context. This research model was generic for foreign companies’ strategic behaviour, because,
based on contingency theory, these companies make dynamic adaptations toward their particular external
environment for a competitive strategy. Implications of results are discussed.
It is the sincere hope of the editors of this collection of case studies, research, and best practices that
it will serve as an essential reference tool for practitioners of global business. The international perspectives offered here give pointed insight into the latest word on Information Systems and Technology
within burgeoning global business.
Felix B. Tan
Auckland University of Technology, New Zealand
Section 1
Technology Impact and Use
1
Chapter 1
Economic Freedom and
the Impact of Technology
on Productivity
Ashok Robin
Rochester Institute of Technology, USA
Thomas Tribunella
State University of New York at Oswego, USA
ABSTRACT
A well-developed body of literature has detected positive effects of technology investments on economic
growth. We contribute to this literature by studying the joint effects of technology and economic freedom
on economic growth. Using two different time points, 1990 and 2000, and a sample of over 100 countries,
we find that economic freedom enhances the effect of technology on economic growth. In fact, we find
that the standalone effect of freedom is not as large as its interactive effect with technology.
INTRODUCTION
Economic growth is considered a key indicator
of national success. A country’s performance and
status is often determined by its level and growth
in economic income. Alternative measures such as
Gross National Product (GNP) or Gross Domestic
Product (GDP) (levels or percent changes) are used
as proxies to measure economic growth. Because
of its importance, considerable research has been
directed toward determining factors influencing
economic growth. This literature, inspired by
Solow (1956), spans half a century and hundreds
of publications. A recent offshoot, appearing in
DOI: 10.4018/978-1-60960-605-3.ch001
the Information Systems (IS) literature, seeks
to assess the effect of technology on growth.
No doubt, this research has been spurred by the
advent of the Internet and the digital economy.
Therefore, it is no surprise that a fairly narrow
definition of technology is used in most studies.
The independent variable (technology) typically
reflects the following three elements: computer
hardware, computer software, and communications equipment. The conclusion from these studies
is that technology has a positive impact on growth.
We study the impact of economic freedom
on the relationship between technology and economic growth. We use a sample of more than 100
countries and use two cross-sectional snapshots
during 1990 and 2000. We argue that a climate
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Economic Freedom and the Impact of Technology on Productivity
of economic freedom allows various entities
(individuals, teams, corporations, societies) the
flexibility to harness the positive effects of technology. Not only would greater investments be
made in technology but these investments would
also have a greater possibility of bearing fruit.
Thus, we expect technology to have a greater effect on economic growth when coupled with an
environment of economic freedom. We test this
proposition and find results consistent with our
hypothesis. We report robust results indicating a
significantly positive interaction between freedom
and technology. We note that it is not economic
freedom per-se that affects growth but technology
accompanied by economic freedom.
In the next section of the paper, we describe the
two streams of literature we draw on. We present
our research models along with a description of
our sample in the Data and Methodology section.
We report the outcomes of our statistical tests in
the Results section. Then we discuss the data and
results of our research findings. In the following section, we outline the contributions of our
study. Finally, the limitations of the research are
highlighted and we conclude in the last section.
BACKGROUND AND
LITERATURE REVIEW
Technology and Economic Growth
There is a large stream of literature relating technology and economic growth (for a comprehensive
review of this literature, see: Dedrick, Gurbaxani
and Kraemer, 2003; Indjikian and Siegel, 2005; and
Merville, Kraemer and Gurbaxani, 2004). The vast
majority of this literature focuses on a particular
aspect of technology, namely IT. This is a logical
focus in the last two decades because of the rapid
computerization of various business processes and
the advent of the Internet. Due to the focus on IT,
key independent variables have reflected investments in computer hardware, software, Internet
2
and communication technologies. The empirical
relationship between technology and growth is
studied using various specifications. Dedrick,
Gurbaxani and Kraemer (2003) categorize these
studies based on the aggregation level of data:
firm-level, industry-level, and country-level.
The main debate in the literature centered on
whether or not technology enhanced productivity (or economic growth). The evidence from the
1980s using data from the United States of America
(USA) was predominantly negative (e.g. Roach
1987; Strassman 1985). This is in contrast to the
evidence from the 1990s indicating a significant
and positive relationship between technology
and growth (e.g., Brynjolfsson and Hitt, 1996;
Jorgenson and Stiroh, 2000; Lichtenberg, 1995).
The so-called ‘productivity paradox’ (Solow,
1987) of the earlier time period has been attributed
to various reasons. Perhaps technology investments were too small to create a positive effect
(Oliner and Sichel, 1994), and these investments
needed to go beyond some minimum value before
they could affect growth (Osei-Bryson and Ko,
2004). Perhaps there was also a learning curve
associated with technology (Dedrick, Gurbaxani
and Kraemer, 2003). Additionally, the literature
has suggested that other factors contributing to
organizational performance may have been omitted in evaluating IT impacts (Devaraj and Kohli,
2000). For example, studies have suggested that
organizational factors (e.g. type of IT, management
and workplace practices, changes initiatives, the
organizational structure and culture, and financial
conditions), the competitive environment (e.g.
industry competitiveness and regulation), and
macro environment (e.g. level of development,
public policies, cultural factors, education, IT
infrastructure) are important factors influencing
the extent of IT business value (Merville, Kraemer
and Gurbaxani, 2004). Finally, the benefits of IT
may expand beyond the frontiers of the company
initiating the IT investments. Thus, part of these
benefits may be captured by business partners
Economic Freedom and the Impact of Technology on Productivity
or the end customers (Bresnahan, 1986; Hitt and
Brynjolfsson, 1996).
Since country level studies are especially
pertinent to our research, we list some of the key
studies using country level data in the table in
Appendix A. This table is obtained from Dedrick,
Gurbaxani, and Kraemer (2003) and has been
modified to include some more recent studies.
This literature can be characterized as follows:
Most studies are of recent vintage (mid-1990s
onward); most use univariate tests associating
technology investments with economic growth and
focus on developed countries. The link between
technology and economic growth is significant
and positive in developed countries and newly
developed economies (e.g., Daveri, 2000; Lee,
Gholami, and Tong, 2005; Oliner and Sichel,
2000; Pook and Pence, 2004). However, this link
is not significant in developing countries as shown
by most prior studies (e.g., Dewan and Kraemer,
2000; Lee, Gholami, and Tong, 2005).
The latter finding ties-in with the results from
the 1980s: it appears that a certain threshold of
investments is required or perhaps a certain level
of infrastructure is needed before a clear link
between technology and growth can be detected
in developing countries. Complementary factors
can modify the impact of technology on growth.
This is the main issue considered in our paper. At
the firm-level such crucial factors may include
complementary investments such as workforce
training (Dedrick, Gurbaxani and Kraemer, 2003).
At the country level, environmental factors may
play a big role. For instance, Shih, Kraemer and
Dedrick (2007) show that environmental factors (openness to trade) can affect the level of
technological investments. Other authors such as
Mbarika, Byrd, and Raymond (2002) have suggested that macro-level factors including policy,
economical, financial, technological, political,
and geographical factors are key determinants of
the level of IT/telecommunications infrastructure
growth, thus economic growth, in Least Developed
Countries (LDC). The current study builds on
this recent work. However, our focus is on how
economic freedom, as an environmental factor,
affects the impact of technology on growth.
Our study is related to Meso, Datta, and
Mbarika (2006) and Meso, Musa, Straub and
Mbarika (2009). These studies examined the link
between IT, governance and economic growth.
The Meso, Datta and Mbarika (2006) study
is especially relevant because it examines the
modifying effects of governance variables on
the relationship between economic growth and
IT and reports an interaction effect for certain
governance-related variables such as ‘Voice/Accountability’ and ‘Rule of Law’. The more recent
Meso, Musa, Straub and Mbarika (2009) study
uses structural equations modeling techniques to
examine similar issues and reports statistically
significant links between IT and governance and
between IT and socio-economic development.
However, there are important differences between
our research and these two studies. Our study uses
different dependent and independent variables as
well as data from different time periods. More
significantly, our focus is on economic freedom,
not governance. Thus, our approach is different
and complementary.
Finally, the literature on foreign direct investment (FDI) and its effects on economic growth
offers an interesting parallel to the literature on
technology and growth. The connection is evident when one realizes that FDI often involves
the transfer of technology and knowledge capital
by MNCs. Azman-Saini, Baharumshah and Law
(2010) study the nexus between FDI, freedom and
growth and find that the effect of FDI on growth
is contingent on the level of economic freedom in
host countries. The explanations they offer—that
an environment of freedom allows entrepreneurs/
firms to take risks and to try new ideas and to
deploy labor flexibly and generate positive spillovers—are easily adaptable to a discussion on
technology and growth.
3
Economic Freedom and the Impact of Technology on Productivity
Economic Freedom and
Economic Growth
While our study contributes to the literature linking
technology to growth, it is influenced by a long
literature stream linking freedom and growth.
This literature stream dates back to the ‘growth’
literature in mainstream economics (e.g., Solow,
1956). There are multiple approaches to explaining national economic growth. Perhaps the most
intuitive approach is the production function approach that relates output to inputs such as labor
and capital. Technology may be considered a
modifier of this relationship. Economic freedom
could be another modifying factor.
Economic freedom refers to the degree to
which a market economy exists. Components of
economic freedom are: an environment favoring
a voluntary exchange, free competition, protection of persons and property, and a limited degree
of interventionism in the form of government
ownership, regulations, and taxes (Gwartney
and Lawson, 2002; Berggren, 2003). One should
distinguish economic freedom from both civil and
political freedoms. Civil freedom includes such
elements as the freedom of the press, the freedom
of association, the freedom of religion, and the
freedom of speech whereas political freedom
involves the free and open participation in the
political process, and elections that are free, fair,
competitive and corruption-free (Gwartney and
Lawson, 2002). While civil and political freedoms
may allow societies to express themselves fully,
economic freedom has the potential to directly
affect economic activity. Historic events such
as the breakup of the former Soviet Union have
focused attention on this important issue. We
focus on economic freedom rather than political
freedom because we are more interested in the
policies that directly affect economic productivity.
Various studies have examined the crosssection of country level data to determine whether
economic growth is correlated with indicators of
economic freedom. Overall, studies have found
4
that the level of economic freedom exerts a positive
and significant effect on economic growth (Goldsmith, 1997; Ali and Crain, 2002; Vega-Gordillo
and Alvarez-Arce, 2003). A number of studies
that have used changes in economic freedom (as
opposed to the level of economic freedom) as
an independent variable have concluded that the
change in economic freedom is also positively and
significantly correlated to growth rate (Dawson,
1998; Gwartney, Holcombe, and Lawson, 2004).
It is conceivable that not all dimensions of
economic freedom impact economic growth.
The index of economic freedom used in most
studies (e.g., Gwartney and Lawson, 2002) covers various aspects of freedom such as size of
government, legal structure and property rights,
access to sound money, freedom of exchange and
regulation of business. Carlsson and Lundstrom
(2002) decompose the various aspects of economic
freedom and find that the most significant effects
are associated with legal structure and freedom of
exchange. These results, especially those pertaining to legal structure, are an excellent complement
to the well-known ‘law and finance’ literature
where a key result is that country level investor
protection enhances corporate value (La porta,
Lopez-De-Silanes, Shleifer, and Vishny, 2002).
More recently, studies have focused on the effect of government size (usually measured using
government expenditures or revenues) on growth
and carried out robustness tests: an example is
Bergh and Karlsson (2010) that reports a negative
relationship between government expenditure and
growth even after controlling for the overall level
of economic freedom and globalization.
While most of the studies on economic freedom
focus on its effects on economic growth (typically
measured using GDP), a small stream examines
the effects on freedom on entrepreneurial activity.
Studies in this genre report a negative relationship
between government size and entrepreneurial
activity (e.g., self-employment). Bjornskov and
Foss (2008) and Nystrom (2008) are examples of
studies reporting this negative relationship. The
Economic Freedom and the Impact of Technology on Productivity
Table 1. The ArCo Indicator
Creation of Technology
• Patents
• Scientific Articles
Technology Infrastructure
• Internet Penetration
• Telephone Penetration
• Electricity Consumption
first named study offers a systematic discussion
of why economic freedom can be expected to
affect entrepreneurial activity. If a government’s
size is particularly large, say it has nationalized
a certain industry, a consequence is that there is
no scope for entrepreneurial activity. More generally, the heavy hand of the government (high
taxes, regulations, incentive-distorting pricing/
subsidies) can deter entrepreneurial activity. Although we do not study entrepreneurship in our
paper, the preceding ideas have relevance: just as
the benefits of entrepreneurial activity are better
reaped in an environment of economic freedom,
the benefits of technology are better harvested in
an environment of economic freedom.
DATA AND METHODOLOGY
The dependent variable in our study is GDP per
worker adjusted for purchasing power parity and
expressed in the US currency (Prod2000 and
Prod1990). We use this as a proxy for economic
growth and refer to it as ‘productivity.’ We collected values for this variable for the years 1990
and 2000 from the Global Market Information
Database issued by Euromonitor International.
The database covers 205 nations from 1977 to
2006. We use GDP per worker while other similar
studies used GDP per capita. We believe that GDP
per capita can potentially be affected by factors
such as demographic shifts and employment levels.
For example, if a country has a large percent of
retired individuals, its GDP per capita will be low
because fewer people are working.
Our independent variables are technology and
economic freedom. Our measure of technology
Development of Human Skills
• Tertiary Science and Engineering Enrolment
• Mean Years of Schooling
• Literacy Rate
is the Indicator of Technological Capabilities for
Developed and Developing Countries (Tech2000
and Tech1990). The indicator was compiled by
Archibugi and Coco (2004). Values range from 0
(lowest capability) to 1 (highest capability). We
use this index because it comprehensively covers
most of the countries in the world with a ranking
of 162 countries in 1990 and 2000. It is one of the
most widely used and detailed indexes. Furthermore, the authors use publicly available data and
explain their methodology very clearly. The scale
has three major dimensions and eight sub-Indexes
of the Indicator of Technological Capabilities for
Developed and Developing Countries which are
listed in Table 1.
Our economic freedom variable is the Economic Freedom of the World (EFW) indicator by
Gwartney and Lawson (2002) from the Cato Institute (Free2000 and Free1990). The EFW index
has been compiled since 1970 and the data is
publicly available at www.freetheworld.com. The
EFW for a country is measured on a ten point
scale with 10 denoting the highest level of economic freedom. EFW contains five major areas:
Size of government, legal structure and property
rights, sound money policies, freedom to exchange, and business regulations. Each major area
has several components explained in Appendix
B. We use this index because it comprehensively
covers most of the countries in the world with
information on 123 countries in 2000 and 113 in
1990. It is also one of the most widely recognized
and detailed indexes of economic freedom. The
index has been stable over time and has been used
in several published papers (Cole, 2003; Heitger,
2004; Mbaku, 2003; Vega-Gordillo and AlvarezArce, 2003).
5
Economic Freedom and the Impact of Technology on Productivity
Table 2. Descriptive Statistics. This table reports descriptive statistics for the technology, freedom and
productivity variables. These variables are obtained from two different time points: 2000 and 1990
Variable
N
Min
Tech2000
162
.028
.867
.313
.329
.190
Free2000
123
3.500
8.700
6.500
6.399
1.066
Median
Mean
Sigma
Prod2000
166
183
105,064
3,978
13,273
19,377
Tech1990
162
.017
.735
.277
.278
.164
Free1990
114
1.300
9.300
5.350
5.632
1.743
Prod1990
156
193
67,100
3,138
10,902
15,664
Our main analysis uses data from the year
2000 and hence uses Tech2000 (Technology
2000), Free2000 (Economic Freedom 2000),
and Prod2000 (Productivity 2000) respectively.
Similarly, our robustness tests use data from 1990:
Tech1990, Free1990, and Prod1990.
We performed linear regression analyses on
the above data. Four models (A-D) are used as
follows.
Model A: Prod
Model B: Prod
Model C: Prod
+ β2Free2000
Model D: Prod
+ β2Free2000+
2000 = β0 + β1Tech2000
2000 = β0 + β1Free2000
2000 = β0 + β1Tech2000
2000 = β0 + β1Tech2000
β3Tech*Free
Model A is the basic model relating productivity to technology that has been extensively studied
in the literature. Model B is the basic model relating
productivity to freedom; this model is once again
fairly well researched. The focus of our paper is
on models C and D. Model C assesses the separate
effects of both technology and freedom on productivity. Model D adds further complexity by also
considering the interaction between technology
and freedom in their impact on productivity. Here,
the variable Tech*Free is defined as the product of
Tech2000 (or Tech1990) and a 0/1 dummy variable assuming the value of 1 when Free2000 (or
Free1990) is median or higher, and 0 otherwise.
6
Max
Models C and D, to the best of our knowledge,
are not found in the literature.
Similar models were applied to data from
1990. The interaction variable, although using the
same label as with data from 2000 in the interest
of shortening the label, is defined using data from
1990. The purpose of using data from 1990 is twofold: (a) to provide a test of robustness and (b)
to search for shifts in productivity relationships.
RESULTS
Descriptive Statistics
and Correlations
Table 2 reports descriptive statistics on the three
key variables: technology, freedom and productivity. We focus first on the most recent values,
from 2000. Tech2000 ranges from 0.028 to 0.867,
and has a mean and median of 0.329 and 0.313
respectively. Free2000 ranges from 3.5 to 8.7
with mean and median values of 6.399 and 6.5
respectively. Prod2000 ranges in value from 183
to 105,064 and has a mean and median of 13,273
and 3,978 respectively. We note the presence of
skewness in Prod2000: this is caused by a few
countries having extremely high values thereby
increasing the mean. Finally, we note that values
of all three variables are higher in the latter time
period (2000).
Economic Freedom and the Impact of Technology on Productivity
Table 3. Correlations. This table reports correlations and p-values
Tech2000
Free2000
Prod2000
Tech1990
Free2000
.691
<.0001
Prod2000
.772
<.0001
.694
<.0001
Tech1990
.982
<.0001
.650
<.0001
.727
<.0001
Free1990
.703
<.0001
.794
<.0001
.758
<.0001
.664
<.0001
Prod1990
.816
<.0001
.665
<.0001
.961
<.0001
.775
<.0001
Table 3 reports correlations between model
variables. We note significant correlations between
each of the independent variables (technology
and freedom) and the dependent variable (productivity). We note that the correlation between
Tech2000 and Prod2000 is 0.772, and that the
correlation between Free2000 and Prod2000 is
0.694. These values are significant at the 1%
level. We note a similar pattern with 1990 values
with analogous values of 0.775 and 0.740 respectively.
Table 3 also indicates a strong relationship
between technology and freedom. Higher technology investments appear to be associated with
higher levels of freedom. For instance, the correlation between Tech2000 and Free2000 is 0.691
and significant at the 1% level. A practical concern
is that the high correlation creates problems of
multi-collinearity in the regression tests noted
below.
Finally, in Table 3, we note that productivity in
the year 2000 is significantly related to technology
and freedom values in 1990.
Regression Analysis and
Models of Productivity
Table 4 reports the main results of the study. All
models are statistically significant: the F-statistics
for all models have p-values (not reported) of less
Free1990
.740
<.0001
than 1%. Model A is a regression of Prod2000 on
Tech2000. Consistent with results reported in the
literature, we find high R-squares (0.6416) as well
as a significant coefficient for Tech2000 (t-statistic
of 14.45). We also find strong results with Model
B that uses Free2000 as the independent variable:
the coefficient has a t-statistic of 10.44. However,
the R-square of Model B is lower. Model C uses
Tech2000 as well as Free2000 as independent
variables. Here both coefficients are significant
(t-statistics of 8.36 and 3.64 respectively) but the
R-square for model C is only slightly higher than
the R-square for model A.
Table 4 Model D indicates another interesting
result. Here we test for the explanatory value of
an interacting variable. Tech*Free is the product
of Tech2000 and dummy variable indicating
whether Free2000 is above its median value. The
coefficient of Tech*Free is significantly positive
with a t-statistic of 2.71. In contrast, the coefficient
for Free2000 is insignificant with a t-statistic of
1.12.
Tests of Robustness
We repeat tests using data from 1990. In addition to providing another set of data for verifying robustness of results, data from 1990, when
compared to 2000, have the potential to reveal
trends in how productivity is determined. Table 5
7
Economic Freedom and the Impact of Technology on Productivity
Table 4. Regression Analysis Using Data from 2000, All Countries.
Dependent Variable: Prod2000
(A)
(B)
Intercept
-15898
-6.37
<.0001
Tech2000
87530
14.45
<.0001
Free2000
(C)
-74165
-8.48
<.0001
14030
10.44
<.0001
(D)
-43146
-5.50
<.0001
-21675
-1.97
0.0512
67147
8.36
<.0001
48624
4.69
<.0001
5397
3.64
.0004
2113
1.12
0.2642
Tech*Free
26254
2.71
0.0077
N
117
117
117
117
F
208.66
108.97
122.10
88.39
Adj. R2
.6416
.4821
.6762
.6933
For each regressor identified in the first column, we report the coefficient, t-statistic and p-value.
is analogous to Table 4 but uses data from 1990.
The results for the overall sample found in Table
5 confirm the results of Table 4. Overall, we find
a great deal of consistency between the results
using 1990 and 2000.
DISCUSSION OF DATA AND
RESULTS
Before turning to our main results, we note a few
patterns in the key independent variables. First,
values of technology as well as economic freedom
are higher in 2000 compared to 1990. The rapid
evolution of electronic commerce in the second
half of the 90’s resulted in its adoption by organizations and the general population worldwide. As
a consequence, various investments were made in
IT infrastructure in general and Internet technologies in particular, mainly in developed countries
but also in LDC. These investments may explain
why the technology variable has a higher score
in 2000. Other explanations for the high value
of technology in 2000 include Y2K related IT
8
investments and deregulation. As with technology, economic freedom is also higher in 2000. A
plausible explanation may be the sweeping political changes across the world (e.g., dismantling of
the Soviet Union); the resulting political freedom
may have led to economic freedom. An alternative explanation for higher values of economic
freedom is the success of global institutions such
as the WTO in instilling values of economic freedom and prosperity. Second, we find a significant
correlation between the technology and freedom
variables. Although possible, we do not assume
or infer a causal relationship between these two
variables. It is possible that the high correlation
between technology and freedom is caused by the
effect of other variables (e.g., education levels)
not studied in this research. Third, consistent
with expectations conditional on higher values of
technology and freedom, the value for productivity
is higher in 2000 compared to 1990. The higher
value of productivity supports suggestions in the
literature (Dedrick, Gurbaxani and Kraemer, 2003)
concerning (a) lagged effects of IT and (b) the IT
learning curve. Our data suggest that the gain in
Economic Freedom and the Impact of Technology on Productivity
Table 5. Regression Analysis Using Data from 1990
Dependent Variable: Prod1990
(A)
(B)
Intercept
-12088
-6.37
<.0001
Tech1990
85604
15.49
<.0001
Free1990
(C)
-29126
-7.42
<.0001
7547
11.33
<.0001
(D)
-24387
-8.27
<.0001
-11918
-2.41
.0179
62804
9.41
<.0001
47992
5.98
<.0001
3386
5.11
<.0001
943
0.93
.3566
Tech*Free
29520
3.07
.0027
N
108
108
108
108
F
239.97
128.46
161.55
119.50
Adj. R2
.6907
.5436
.7501
.7687
For each regressor identified in the first column, we report the coefficient, t-statistic and p-value.
productivity observed in 2000 may be attributable
in part to IT investments made by corporations
as well as governments in the 90s to embrace ecommerce and to face the Y2K issue.
In this part of the paper, we discuss the results
of our research models. We replicate and confirm
fundamental results relating productivity to technology and economic freedom. We find significant
relationships between technology and productivity as well as between freedom and productivity.
These results arise from long literature streams
in the IS and economics fields respectively. We
report correlations as well as regression coefficients consistent with these prior results in Tables
3 and 4 respectively. What is perhaps novel about
our results is the use of a more comprehensive
variable for technology, the ArCo variable. Also,
we are able to compare the relative importance of
technology and economic freedom as influencers
of productivity. We find that technology is a more
important variable. In Table 4, model A (using
technology as the independent variable) has a
higher R-squares than model B (using economic
freedom). We confirm this result with 1990 as
well as 2000 data. The relative importance of
technology is also confirmed with model C where
both technology and economic freedom are used
as independent variables: we note a marginally
higher R-squares compared to model A. Thus, the
addition of freedom in model C as an explanatory
variable does not appear to add much beyond the
use of technology.
A key result of our study is that freedom
modifies the effect of technology on productivity.
Model D adds the interaction variable indicating
how freedom modifies the effect of technology
on productivity. We note that this variable has a
significantly positive coefficient of 26,254 with
a t-statistic of 2.71; this indicates that countries
with higher levels of freedom have a greater link
between technology and productivity. Since the
coefficient of Tech2000 is 48,624 (Table 4), we
note that the response coefficient (productivity
related to technology) for high freedom countries
is 54% (54% = 26,254/48,624) greater than the
figure for low freedom countries. Our robust-
9
Economic Freedom and the Impact of Technology on Productivity
ness test using data from 1990 displays an even
greater response coefficient for high freedom
countries. This is consistent with Gompert (1998)
who argues that there is synergy between IT and
economic freedom. Arguably, the marginal effect
of IT investments is greater when companies in
a country have the freedom to creatively obtain
value from it. Freedom appears to influence
productivity through technology. Interestingly,
when the interactive variable is added in model
D, economic freedom as a stand-alone variable is
no longer significant. We know of no other study
indicating these results.
CONTRIBUTIONS OF THE STUDY
Our study contributes to the IS literature in two
ways. First, we build on recent efforts by Archibugi and Coco (2004; 2005) to measure the
technological capability of a country. We use the
ArCo index compiled by these authors to more
comprehensively measure the technological prowess of a country. Although the ArCo index and the
more traditional IT measurements are highly correlated, we feel that our study allows us to make
broader inferences about technology. Second, and
perhaps more importantly, we assess the impact
of economic freedom, particularly as a variable
that modifies the effect of technology on growth.
We draw on and complement the research stream
(predominantly in economics) that uses country
level data to examine the link between economic
freedom and economic growth.
Our results can be understood at two levels:
country level and firm level. Our tests use country
level data, so the main inferences are at the country
level. However, with appropriate assumptions,
we can also obtain inferences at the firm level.
Below, we explore these two issues. At the country
level, the main implication is that policy makers
should pay attention to the economic freedom
infrastructure. As our empirical variable indicates,
the extent of economic freedom in a country
10
depends on: (a) size of government (b) property
rights (c) sound money (d) trade barriers and (e)
regulatory barriers. By taking the proper steps to
create and shore up the institutions supporting
these variables (e.g., an independent central bank
is necessary for sound money), the conditions can
be created not only for technology investments but
also for bearing the fruits of such investment. We
realize that politics, tradition and culture have a
large role to play in this regard. It might be argued
that historical factors concerning its societal and
political landscape may predestine a country.
Nevertheless, most governments, especially in
democratic countries, are held accountable for
economic growth. Therefore, government officials
should know that it is in their own best interests
to build up the economic freedom infrastructure.
Our results do not just speak to government officials. Concerned and influential citizens of a
country can use our results to lobby for greater
economic freedom by articulating why it is useful. For instance, entities such as Chambers of
Commerce could be interested in our results.
Such activism may be especially valuable in
developing countries where it may not just be an
issue of shoring up institutions: the relevant task
is the much more difficult one of actually creating these institutions. Our results have also some
implications for international organizations such
as the United Nations agencies that are promoting IT investments in developing countries. In
order to make their actions more effective, these
organizations should collaborate with governments in developing countries to put into place
and strengthen institutions supporting economic
freedom. Such an environment will create favorable conditions to attract more IT investments as
well to maximize economic growth resulting from
these investments.
We now turn to firm level implications. This
is the age of global corporations. A typical large
corporation headquartered in the USA or in an
OECD country has operations in many foreign
countries. Our results suggest that a firm’s
Economic Freedom and the Impact of Technology on Productivity
technology investment strategy should take into
consideration the location of the investment.
Specifically, technological investments should
flow toward locations (countries) with greater
economic freedom. It is possible that this strategy
would produce better financial results (profits)
for the corporation. We realize that our data are
not firm-level and that our independent variable
is growth and not profit. This calls for caution in
making firm-level inferences.
RESEARCH LIMITATIONS
The current research has the following limitations.
Because we rely on cross-sectional associations,
we cannot make strong statements about causality.
Furthermore, our research design could be subject
to the problem of correlated omitted variables.
Nevertheless, our results are reasonable and
consistent with expectations. Another limitation
of this study concerns the data analysis technique.
Instead of using regression analysis, we could have
adopted different data analysis techniques such as
structural equations modeling. Additionally, this
study relies on data collected in 1990 and 2000.
Using data from different periods may have yielded
different results. Finally, our focus in the current
study is economic freedom only. We realize that
political freedom and economic freedom may be
synergistic, especially in developing countries.
Nobel laureate Becker (2007) notes that “private
property and open markets help economies grow,
which gives the political process a strong shove
toward democracy.” Other potential explanatory
variables are geography and culture.
CONCLUSION
Computerization and the Internet have changed the
world dramatically during the last few decades.
This has spurred interest in determining whether
IT in particular and technology in general has a
positive economic impact. A major concern has
been whether nations experience economic growth
as a consequence of investments in technology. A
well-developed stream of research has addressed
this issue. We contribute to this stream by exploring the role played by economic freedom in the
relationship between technology and growth.
Our principal finding is that technology creates
economic growth to a greater extent in countries
with higher levels of economic freedom.
We also validate the important role played by
technology in creating economic growth. While
both technology and economic freedom produce
economic growth, we find that technology is the
more dominant factor. Economic freedom does
affect growth, but this effect is primarily through
its interaction with technology.
ACKNOWLEDGMENT
An earlier version of this paper was presented at
the 18th Annual IRMA International Conference
(2007, at Vancouver, Canada) and later published
in the Journal of Global Information Management
(volume 17.3, 2009). In addition to the two authors
listed above, Koffi N’Da was also an author in
this earlier version. Ashok Robin is grateful for
the financial support of the Madelon and Richard
Rosett Chair for Research at the Saunders College
of Business, RIT.
REFERENCES
Ali, A. M., & Crain, W. M. (2002). Institutional
distortions, economic freedom, and growth. The
Cato Journal, 21(3), 415–426.
Archibugi, D., & Coco, A. (2004). A new indicator of technological capabilities for developed
and developing countries (ArCo). World Development, 32(4), 629–654. doi:10.1016/j.worlddev.2003.10.008
11
Economic Freedom and the Impact of Technology on Productivity
Archibugi, D., & Coco, A. (2005). Measuring
technological capabilities at the country level: A
survey and a menu for choice. Research Policy,
34, 175–194. doi:10.1016/j.respol.2004.12.002
Azman-Saini, W. N. W., Baharumshah, A. Z.,
& Law, S. H. (2010). Foreign direct investment,
economic freedom and economic growth: International evidence. Economic Modelling, 27,
1079–1089. doi:10.1016/j.econmod.2010.04.001
Becker, G. (2007, March 6). Economic and political freedom: Does one lead to the other? The
Becker-Posner Blog. Retrieved August 12, 2007,
from www.becker-posner-blog.com
Berggren, N. (2003). The benefits of freedom.
The Independent Review, 8(2), 193–211.
Bergh, A., & Karlsson, M. (2010). Government
size and growth: Accounting for economic
freedom and globalization. Public Choice, 142,
195–213. doi:10.1007/s11127-009-9484-1
Bjornskov, C., & Foss, N. J. (2008). Economic
freedom and entrepreneurial activity: Some crosscountry evidence. Public Choice, 134, 307–328.
doi:10.1007/s11127-007-9229-y
Bresnahan, T. F. (1986). Measuring the spillovers
from technical advance: Mainframe computers
in financial services. The American Economic
Review, 76(34), 742–755.
Brynjolfsson, E., & Hitt, L. M. (1996). Paradox
lost? Firm-level Evidence on the Returns to Information Systems Spending. Management Science,
42(4), 541–559. doi:10.1287/mnsc.42.4.541
Carlson, F., & Lundstrom, S. (2002). Economic freedom and growth: Decomposing the
effects. Public Choice, 112(3-4), 335–344.
doi:10.1023/A:1019968525415
Cole, J. H. (2003). The contribution of economic
freedom to world economic growth, 1980-99. The
Cato Journal, 23(2), 189–198.
12
Daveri, F. (2000). Is growth an Information
Technology story in Europe too? Working paper,
University di Parma, Parma, Italy.
Dawson, J. W. (1998). Institutions, investments,
and growth: New cross-country and panel data
evidence. Economic Inquiry, 36(4), 603–619.
doi:10.1111/j.1465-7295.1998.tb01739.x
Dedrick, J., Gurbaxani, V., & Kraemer, K. L.
(2003). Information Technology and economic
performance: A critical review of the empirical
evidence. ACM Computing Surveys, 35(1), 1–28.
doi:10.1145/641865.641866
Devaraj, S., & Kohli, R. (2000). Information
Technology payoff in the health-care industry:
A longitudinal study. Journal of Management
Information Systems, 16(4), 41–68.
Dewan, S., & Kraemer, K. L. (2000). Information Technology and productivity: Preliminary
evidence from country-level data. Management Science, 46(4), 548–562. doi:10.1287/
mnsc.46.4.548.12057
Goldsmith, A. A. (1997). Economic rights and government in developing countries: Cross-national
evidence on growth and development. Studies in
Contemporary International Development, 32(2),
29–44. doi:10.1007/BF02687323
Gompert, D. C. (1998). Right makes might: Freedom and power in the Information age. McNair
Paper 59. Defense Dept., National Defense University, Institute for National Strategic Studies.
Gwartney, J. D., Holcombe, R. G., & Lawson,
R. A. (2004). Economic freedom, institutional
quality, and cross-country differences in income
and growth. The Cato Journal, 24(3), 205–233.
Gwartney, J. D., & Lawson, R. A. (2002). Economic freedom of the world - 2002 annual report.
Washington, DC: Cato Institute.
Economic Freedom and the Impact of Technology on Productivity
Heitger, B. (2004). Property rights and the wealth
of nations: A cross country study. The Cato Journal, 23(3), 381–402.
Hitt, L. M., & Brynjolfsson, E. (1996). Productivity, business profitability, and consumer surplus:
Three different measures of information technology value. Management Information Systems
Quarterly, 20(2), 121–142. doi:10.2307/249475
Indjikian, R., & Siegel, D. S. (2005). The impact
of investment in IT on economic performance:
Implications for developing countries. World
Development, 33(5), 681–700. doi:10.1016/j.
worlddev.2005.01.004
Jorgenson, D. W. (2001). Information Technology
and the U.S. economy. The American Economic
Review, 91(1), 1–32. doi:10.1257/aer.91.1.1
Jorgenson, D. W., & Stiroh, K. J. (2000). Raising the speed limit: U.S. economic growth in the
information age. Brookings Papers on Economic
Activity, 1, 125–211. doi:10.1353/eca.2000.0008
La Porta, R., Lopez-De-Silanes, F., Shleifer, A.,
& Vishny, R. (2002). Investor protection and corporate valuation. The Journal of Finance, 57(3),
1147–1170. doi:10.1111/1540-6261.00457
Lee, S. T., Gholami, R., & Tong, T. Y. (2005). Time
series analysis in the assessment of ICT impact at
the aggregate level – Lessons and implications for
the new economy. Information & Management,
42(7), 1009–1022. doi:10.1016/j.im.2004.11.005
Lichtenberg, F. R. (1995). The output contributions of computer equipment and personnel:
A firm level analysis. Economics of Innovation and New Technology, 3(4), 201–217.
doi:10.1080/10438599500000003
Mbaku, J. M. (2003). Entrenching economic freedom in Africa. The Cato Journal, 23(2), 217–225.
Mbarika, V. W., Byrd, T. A., & Raymond, J.
(2002). Growth of teledensity in least developed
countries: Need for a mitigated euphoria. Journal
of Global Information Management, 10(2), 14–27.
doi:10.4018/jgim.2002040102
Melville, N., Kraemer, K., & Gurbaxani, V.
(2004). Information Technology and organizational performance: An integrative model of IT
business value. Management Information Systems
Quarterly, 28(2), 283–322.
Meso, P., Datta, P., & Mbarika, V. W. (2006).
Moderating Information and Communication
Technologies’ influences on socio-economic development with good governance: A study of the
developing countries. Journal of the American
Society for Information Science and Technology,
57(2), 186–197. doi:10.1002/asi.20263
Meso, P., Musa, P., Straub, D., & Mbarika, V.
(2009). Information infrastructure, governance
and socio-economic development in developing
countries. European Journal of Information Systems, 18, 52–65. doi:10.1057/ejis.2008.56
Nystrom, K. (2008). The institutions of economic freedom and entrepreneurship: Evidence
from panel data. Public Choice, 136, 269–282.
doi:10.1007/s11127-008-9295-9
Oliner, S. D., & Sichel, D. E. (1994). Computers and output growth revisited: How big is the
puzzle? Brookings Papers on Economic Activity,
2(2), 273–317. doi:10.2307/2534658
Oliner, S. D., & Sichel, D. E. (2000). The resurgence of growth in the late 1990s: Is Information
Technology the story? The Journal of Economic
Perspectives, 14(4), 3–22. doi:10.1257/jep.14.4.3
Osei-Bryson, K. M., & Ko, M. (2004). Exploring
the relationship between information technology
investments and firm performance using regression splines analysis. Information & Management,
42(1), 1–13.
13
Economic Freedom and the Impact of Technology on Productivity
Pook, L. A., & Pence, N. E. (2004). Evaluation of information infrastructures and social
development among the Visegrad-four countries
of Central Europe. Journal of Global Information Management, 12(2), 63–83. doi:10.4018/
jgim.2004040104
Roach, S. S. (1987). America’s technology dilemma: A profile of the information economy.
Morgan Stanley Special Economic Study.
Shih, E., Kraemer, K. L., & Dedrick, J. (2007).
Determinants of country-level investment in
Information Technology. Management Science,
53(3), 521–528. doi:10.1287/mnsc.1060.0670
Solow, R. (1987). We’d better watch out. New
York Times Book Review, (July 12).
Solow, R. M. (1956). A contribution to the theory
of economic growth. The Quarterly Journal of
Economics, 70(1), 65–94. doi:10.2307/1884513
14
Strassman, P. A. (1985). Information payoff: The
transformation of work in the electronic age. New
York, NY: Free Press.
Vega-Gordillo, M., & Alvarez-Arce, J. L. (2003).
Economic growth and freedom: A causality study.
The Cato Journal, 23(2), 199–215.
Yoo, S. H. (2003). Does Information Technology contribute to economic growth in developing countries? A cross-country analysis.
Applied Economics Letters, 10(11), 679–682.
doi:10.1080/1350485032000138971
ENDNOTE
GCR = Global Competitiveness Report;
ICRG = International Country Risk Guide
Economic Freedom and the Impact of Technology on Productivity
APPENDIX A
Table 5. Studies on IT Investment Implications at the Country Level
Study
Daveri (2000)
Dewan & Kraemer (2000)
Data sample
Independent Variables &
Operationalization
18 OECD and
European Union
(EU) countries
•
36 Countries
1985-1993
•
•
•
•
•
•
Jorgenson
(2001)
USA
Jorgenson and
Stiroh (2000)
USA
•
•
•
•
•
•
•
•
•
Lee, Gholami, and Tong
(2005)
20 developed
and developing
countries 19802000
•
•
•
Dependent variables &
Operationalization
IT Investment and Economic
Growth
IT: Hardware, Software, Communications equipment
Other Capital
Labor hours
Multifactor productivity
GDP growth
IT added to GDP growth in the
1990s for all countries studied, but
the contribution in EU countries
was smaller in 1992–1997 than
in other industrialized countries.
Within the European Union,
differences in IT contribution to
growth were also due to lower IT
investment.
IT capital stock including
Computer Hardware asset, data
communication asset, software
asset, and services asset
Non-IT capital stock
Annual labor hours employed
GDP Growth
A positive and significant relationship between IT capital investments and labor productivity was
found in developed countries but
not in developing countries.
IT: Hardware, Software, Communication equipment
Non-IT capital
Labor hours
Labor quality
GDP Growth
IT investment contributed more
than one half of the 1 percent
increase in economic growth
since 1995. About one half the
productivity growth since 1995
has occurred in the IT-producing
sector but growth has occurred in
IT-using industries as well.
IT Investments: Computer
hardware, Computer software,
Communication equipment
Other Capital
Labor hours
Labor quality
Multifactor productivity
Productivity growth
IT investment contributed one
half of GDP and labor productivity growth between 1995–
1999 and contributed moderately during earlier periods.
IT contributes to productivity in
the IT-using and -producing sector.
Labor: As measured by the
World Development Indicators (WDI)
Capital: As measured by the
World Development Indicators (WDI)
ICT investments: The International Telecomunication
Union’s (ITU) annual telecommunications investments
were used as a proxy for ICT
investment.
Economic growth as measured
by the GDP.
ICT contributes to economic
growth in developed countries and
newly industrialized economies,
but not in developing countries.
Developed countries are able to
gain positive and significant returns from ICT because they have
invested in these technologies over
a long period, and they have accumulated a substantial installed base
and complementary investments in
telecommunications. This is not
the case in developing countries.
continued on following page
15
Economic Freedom and the Impact of Technology on Productivity
Table 5. continued
Study
Meso, Datta,
and Mbarika
(2005)
Data sample
104 Countries
Independent Variables &
Operationalization
•
•
Dependent variables &
Operationalization
ICT: Operationalized as a
combination of broadcasting ICT and interactive ICT:
Broadcasting ICT measured
as the summated effects of the
average newspaper circulation density, radio ownership
density, and television ownership density (per 1000 people)
between 1997 and 2001;
Interactive ICT infrastructure
measured as the summation of
average computer ownership,
telephone density, and Internet
acesss (per 1000 people) between 1997 and 2001.
Governance: Measured with
six aggregated indices: Voice
ad accountability; Political
stability and absence of violence; Government effectiveness; Regulatory quality; Rule
of law; Control of corruption.
•
•
Social Development: Operationalized using a
summation of two indices:
Average rate of change in
life expectancy Literacy
between 1997 and 2001;
Literacy between 1997
and 2001.
Economic Development:
Measured as the average
change in GDP between
1997 and 2001
IT Investment and Economic
Growth
Contributions of ICTs to social
and economic development in developing countries are influenced
by socio-political governance.
Governance is perceived as exerting a contingent (moderating) role
on ICTs and national development
in developing countries.
Oliner and Sichel (1994)
USA
•
•
•
•
IT: Computer equipment
Other Capital
Labor hours
Multifactor productivity
Productivity growth
IT investment too small to have
substantial economic growth.
IT associated with 0.16–0.28 percent additional effects.
Oliner and Sichel (2000)
USA
•
IT capital: Computer hardware, Computer software,
Communication equipment
Other Capital
Labor hours
Labor quality
Multifactor productivity
Productivity growth
The contribution to productivity
growth from the use of information
technology — including computer
hardware, software, and communication equipment — surged in the
second half of the 1990s. In addition, technological advance in the
production of computers appears
to have contributed importantly to
the speed-up in productivity growth
between the first and second halves
of the 90’s.
Physical capital: Average of
annual ratios of real domestic
investment to real GDP as
measured by the World Bank
Human capital: Average of
percentage of the working-age
population that is in secondary school as measured by
UNESCO
IT capital: Average of annual
ratios of gross domestic IT
investment to nominal GDP as
measured by the International
Telecommunications Union
GDP per person of working age as measured by the
World Bank
IT investment has a significant
impact on the level of GDP per
capita in developing countries.
•
•
•
•
Yoo (2003)
56 developing countries
1970-1998
•
•
•
This table is obtained from Dedrick, Gurbaxani, and Kraemer (2003) and has been modified toinclude some more recent studies.
16
Economic Freedom and the Impact of Technology on Productivity
APPENDIX B
Areas and Components of the Economic Freedom of the World Index
1. Size of Government: Expenditures, Taxes, and Enterprises
A.
B.
C.
D.
General government consumption spending as a percentage of total consumption
Transfers and subsidies as a percentage of GDP
Government enterprises and investment as a percentage of GDP
Top marginal tax rate (and income threshold to which it applies)
2. Legal Structure and Security of Property Rights
A.
B.
C.
D.
E.
Judicial independence: The judiciary is independent and not subject to interference by the government or parties in disputes (GCR)
Impartial courts: A trusted legal framework exists for private businesses to challenge the legality
of government actions or regulation (GCR)
Protection of intellectual property (GCR)
Military interference in rule of law and the political process (ICRG)
Integrity of the legal system (ICRG)
3. Access to Sound Money
A.
B.
C.
D.
Average annual growth of the money supply in the last five years minus average annual growth of
real GDP in the last ten years
Standard inflation variability in the last five years
Recent inflation rate
Freedom to own foreign currency bank accounts domestically and abroad
4. Freedom to Exchange with Foreigners
A.
B.
C.
D.
Taxes on international trade
◦⊦
Revenue from taxes on international trade as a percentage of exports plus imports
◦⊦
Mean tariff rate
◦⊦
Standard deviation of tariff rates
Regulatory trade barriers.
◦⊦
Hidden import barriers: No barriers other than published tariffs and quotas (GCR)
◦⊦
Costs of importing: The combined effect of import tariffs, license fees, bank fees, and the
time required for administrative red-tape raises costs of importing equipment by (10 = 10%
or less; 0 = more than 50%) (GCR)
Actual size of trade sector compared to expected size.
Difference between official exchange rate and black market rate
17
Economic Freedom and the Impact of Technology on Productivity
E.
International capital market controls
◦⊦
i Access of citizens to foreign capital markets and foreign access to domestic capital markets
(GCR)
◦⊦
ii Restrictions on the freedom of citizens to engage in capital market exchange with foreigners - index of capital controls among 13 IMF categories.
5. Regulation of Credit, Labor, and Business
A.
B.
C.
18
Credit Market Regulations
◦⊦
Ownership of banks: Percentage of deposits held in privately owned banks
◦⊦
Competition: Domestic banks face competition from foreign banks (GCR)
◦⊦
Extension of credit: Percentage of credit extended to private sector
◦⊦
Avoidance of interest rate controls and regulations that lead to negative real interest rates
◦⊦
Interest rate controls: Interest rate controls on bank deposits and/or loans are freely determined by the market (GCR)
Labor Market Regulations
◦⊦
Impact of minimum wage: The minimum wage, set by law, has little impact on wages because it is too low or not obeyed (GCR)
◦⊦
Hiring and firing practices: Hiring and firing practices of companies are determined by private contract (GCR)
◦⊦
Share of labor force whose wages are set by centralized collective bargaining (GCR)
◦⊦
Unemployment Benefits: The unemployment benefits system preserves the incentive to
work (GCR)
◦⊦
Use of conscripts to obtain military personnel
Business Regulations
◦⊦
Price controls: Extent to which businesses are free to set their own prices
◦⊦
Administrative conditions and new businesses: Administrative procedures are an important
obstacle to starting a new business (GCR)
◦⊦
Time with government bureaucracy: Senior management spends a substantial amount of
time dealing with government bureaucracy (GCR)
◦⊦
Starting a new business: Starting a new business is generally easy (GCR)
◦⊦
Irregular payments: Irregular, additional payments connected with import and export permits, business licenses, exchange controls, tax assessments, police protection, or loan applications are very rare (GCR)
19
Chapter 2
The Influence of National
and Organizational Cultures
on Technology Use:
An Exploratory Study Within a
Multinational Organizational Setting
Zixiu Guo
University of New South Wales, Australia
John D’Ambra
University of New South Wales, Australia
ABSTRACT
This article presents the results of an exploratory study examining the influence of national and organizational cultures on technology use in a multinational organizational (MNO) context. Data were
collected from 121 respondents of a multinational organization in the Asia Pacific with headquarters in
Australia and three subsidiaries in Asia: Korea, Malaysia, and Thailand. Even though significant differences were found between respondents from headquarters and subsidiaries in terms of perceived media
richness and preference for telephone and written documents, very similar media preference patterns
for face-to-face and e-mail between the headquarters and subsidiaries were identified. Furthermore,
face-to-face and e-mail were two primary media used for most communication activities in this MNO.
Follow-up interviews revealed that the universal organizational culture of this MNO may explain media
use consistency between the headquarters and subsidiaries. Implications of the findings are discussed
and future research considered.
DOI: 10.4018/978-1-60960-605-3.ch002
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Influence of National and Organizational Cultures on Technology Use
INTRODUCTION
Multinational organizations (MNOs) are characterized by their engagement in global markets
(Umanath & Campbell, 1994). In order to remain
competitive in today’s global marketplace, MNOs
have adopted advanced information and communication technologies (ICTs) as part of their
global communication networks to facilitate the
coordination of far-flung subsidiaries, suppliers,
and customers (Kogut, 2003; Sambharya, Kumaraswamy, & Banerjee, 2005). ICTs facilitate
the ability of the individual or the organization to
communicate easily and inexpensively across time
and geographic locations, rapidly and with greater
precision to targeted groups, and to selectively
control access and participation in communication
networks (Huber, 1990).
In spite of the enabling and facilitation of
globalization (Ford, Connelly, & Meister, 2003),
ICTs have also presented challenges to MNOs in
their implementation and use in subsidiaries due
to technical issues and social contexts (Robey &
Rodriguez-Diaz, 1989). There is accumulating
evidence that people of different national origins
have different perceptions of, and preferences
for, communication technologies (see Leidner &
Kayworth, 2006, for a recent review of cultural
impact on information systems (IS) research).
Scholars who study cross-cultural factors in ICT
use agree that understanding national culture (NC)
is critical (Gallivan & Srite, 2005). IS literature
focused on national cultural influence on the
adoption of IS has grown substantially over the
past decade (Niederman, 2005). However, little
research has been conducted into the effect of
culture on ICT use within MNOs, and its implications for individuals as well as organizational
performance (Gallivan & Srite, 2005). An MNO
is composed of a set of subsidiaries that operate
in distinct national contexts. Due to potential tension between employees’ host cultural values of
communication and the values of the MNO home
culture, national cultural influence on employees’
20
communication behavior will become an issue
when a subsidiary’s host culture differs from the
MNO’s home culture (Naisbitt, 1994). To understand why such a tension exists and how managers
of MNOs face this challenge, we must learn more
about the role that culture plays in our theories
of work behavior (Karahanna, Evaristo, & Srite,
2005). A better understanding of how employees
working for MNOs perceive and prefer communication technology for communication can
mean the difference between success and failure
in implementing new IT within MNOs (Ford et
al., 2003; Straub, 1994), as well as strengthening
the opportunity of improving organizational communication performance.
Understanding the relationship between ICT
and organizational culture (OC) has challenged
IS researchers for nearly three decades (Gallivan
& Srite, 2005). In their recent comprehensive
review of culture and IS research, both Gallivan
and Srite (2005) and Leidner and Kayworth (2006)
highlighted the key issues in the relationship between ICT and culture in order to lend insights
into our understanding of the linkage between ICT
and OC. However, as Gallivan and Srite (2005)
indicate, studies examining issues related to ICT/
NC fit and ICT/OC fit are separated into distinct
“stovepipes.” Based on social identity theory
(SIT), Straub, Loch, Karahanna, Evaristo, and
Srite (2002) proposed that NC and OC interact.
Similarly, Robey and Rodriguex-Diaz (1989)
identified that the social context of implementation of information systems, which is important
for a successful implementation process, included
both organizational and national cultural contexts.
They further noted that: “in the case of MNOs,
both of these contexts may become influential”
(Robey & Rodriguez-Diaz, 1989, p. 230) Given the
increasing dominance of MNOs and globalization
of world markets, where cultural fit is critical to
achieving the benefits of ICT (Gallivan & Srite,
2005), studying the interaction between NC and
OC in terms of technology use within MNO
contexts is a timely pursuit.
The Influence of National and Organizational Cultures on Technology Use
Furthermore, most cultural-related IS studies
usually focus on a selection of one communication medium, primarily e-mail, or on comparisons
between two media, often face-to-face vs. some
electronic medium (Watson-Manheim & Belanger,
2007), with one exception (Rice, D’Ambra, &
More, 1998). As O’Sullivan (2000) noted, use
of any one technology should be considered in
light of the repertoire of other media available to
fully understand when, why, and how any single
medium is used. Communication technology is
often used in conjunction with other media, and
this unusual relationship with other media is certainly deserving of further investigation (Hung,
Kong, Chua, & Hull, 2006).
This study was designed to explore cultural
effects on one of the core precepts of IS research―
communication media choice―examining how
employees from different subsidiaries of one MNO
perceived and preferred e-mail, along with other
available media, such as face-to-face, telephone,
and written documents for their daily communication, and to address two understudied areas in
global information systems: the lack of focus on
MNO contexts and the lack of focus on the interaction between NC and OC within the MNO contexts.
The lack of attention paid to the MNO context is
significant. On the theoretical side, examining
cultural impact on technology use within MNOs
can bridge the gap between the literature on global
information systems and international business, a
very important, but neglected research area (Ives
& Jarvenpaa, 1991; Lehmann & Gallupe, 2005).
On the practical side, the results of this study
can help managers of MNOs understand cultural
impact on their employees’ communication media use. Thus, MNOs can make better decisions
regarding adapting communication media to the
local environment or implementing a similar communication management strategy globally. The
lack of attention paid to the interaction between
NC and OC on ICT use within MNO contexts is
also significant because globalization and ICT
adoption and use have gone hand in hand with
the growing market power and geographic reach
of MNOs (Sambharya et al., 2005). Managers of
MNOs who are aware of the cultural implication of
ICT within a specific context can better use those
technologies to their firm’s advantage (Gallivan
& Srite, 2005). Such awareness is important to
shape the manager’s approach to planning, design,
and implementation of new forms of ICT globally
(Gallivan & Srite, 2005).
Our exploration was guided at a general level
by the current literature on media selection theories
and cultural differences. Given the limited research
examining the interaction between NC and OC in
media use, we conducted our exploratory research
by collecting data through a mailed survey, plus
a small-size field research design built around
mostly open-ended, in-depth interviews. This
method would give an opportunity to follow up
on unexpected findings, thus enhancing opportunities for refining and developing new theories.
The sample consisted of four subsidiaries of one
American-based MNO located in Australia, Korea,
Malaysia, and Thailand, in which the Australian
office is the company’s Asian-Pacific headquarters
and the other three offices are under the management of the Australian office.
The remainder of this article is organized
as follows. In the next section, we first briefly
explore media selection theories since they may
help us understand how and why people choose
different communication media. Then the concept
of culture, the cultural components and characteristics which distinguish the four countries, and
the literature suggesting links between aspects of
culture and media use are considered. Following
this section, we discuss the differences between
NC and OC, as well as their potential impact
on employees’ behavior. The research method
employed and the results are then presented.
The article concludes with a discussion of the
implications of the findings in terms of using
communication technologies in MNO contexts.
21
The Influence of National and Organizational Cultures on Technology Use
MEDIA SELECTION THEORIES
According to media richness theory (MRT) (Daft
& Lengel, 1986), media vary in their capacity to
transmit rich information, which refers to the ability of information to change understanding within
a time interval. Communication media are ranked
along a richness hierarchy based on criteria such as
speed of feedback, the form of language employed
(body, natural, and/or numeric), language variety,
and personal focus (Daft & Lengel, 1986; Daft,
Lengel, & Trevino, 1987). Face-to-face is considered the richest medium, followed in decreasing
order of richness by telephone, e-mail, written
personal, written formal, and the numeric formal
media. MRT proposes that efficient communication takes place when the match is perfect: the
medium has neither more nor less communication
capability than the task requires.
However, research shows that media attributes
(in this case, media richness) is not the only concern
in making sense of communication media selection (Fulk, Schmitz, & Steinfield, 1990; Yates &
Orlikowski, 1990). MRT, claimed as a rational
model of media choice, has led to inadequate
attention to the individual differences and social
contexts in which media choice and usage decisions are made. Decisions about media choice do
not occur in a vacuum; both decision makers and
media are socially embedded within organizational
settings, thus media perceptions and choices are
subjective and socially constructed (Fulk et al.,
1990). Studies suggest that examination of media
attributes independent of the broader communication contexts in which they are used may not be
enough (Flanagin & Metzger, 2001). As suggested
by some researchers, individual differences, participants’ media experience, and social context
surrounding them are also important in the assessment and selection of media, especially for new
media (e.g., Carlson & Zmud, 1999; Fulk, 1993;
Johnson & Kaye, 2003; King & Xia, 1997; Schmitz
& Fulk, 1991; Straub, 1994; Watson-Manheim
& Belanger, 2007). This study will focus on the
22
social context by firstly examining the national
cultural impact on media selection after controlling
for demographic variables, media use experience,
and media richness attribute.
NATIONAL CULTURE
AND COMPONENTS
Hofstede’s (1980, 1991) original taxonomy
describing culture along the dimensions of individualism/collectivism (I/C), uncertainty avoidance, power distance, masculinity/femininity, and
long-/short-term orientation has been recognized
as the most popular conceptualization of national
culture (Leidner & Kayworth, 2006). Some researchers criticize Hofstede’s work on the basis of
methodologies used and the validity of the data.
The central critique of his work is that it relies
on interviews with IBM employees conducted
between 1968 and 1973, thus raising serious questions about extending any of Hofstede’s findings
to national cultures (e.g., McCoy, Galletta, &
King, 2005). Yet, Hofstede’s framework has been
adopted and widely validated by more than 140
studies (Usunier, 1998) and forms the basis for a
significant proportion of the cross-cultural studies undertaken in various disciplines (Callahan,
2004; Yeniyurt & Townsend, 2003). In a recent
cross-cultural study of information systems which
examined how national culture, social presence,
and group diversity may affect majority influence
in group decision making, Zhang, Lowry, Zhou,
and Fu (2007) show that Hofstede’s construct of
the I/C appears to still hold. By adopting Hofstede’s original scales, authors found that Chinese
participants were significantly lower on the index
of individualism than U.S. participants. Zhang et
al.’s (2007) study supports Hofstede’s claim in his
updated work (Hofstede, 2001) that his cultural
model is still valid in the digital age. Hofstede’s
model thus is adopted as a theoretical framework
for this current study.
The Influence of National and Organizational Cultures on Technology Use
Table 1. Cultural dimension scores for four countries (based on Hofstede, 2001; Hofstede, Bond, &
Luk, 1993)
Dimensions/
Countries
ID
UA
PD
MA
LT
Korea
18L
85H
60M
39L
75H
Malaysia
26L
36L
104H
50M
Not available
Thailand
20L
64M
64M
34L
56H
Australia
90H
51L
36L
60H
31L
ID: individualism; UA: uncertainty avoidance; PD: power distance; MA: masculinity; LT: long-term orientation
H: top third, M: medium third, L: bottom third (among 53 countries and regions for the first four dimensions, among 23 countries for the fifth)
Hofstede (1980) defines culture as: “collective
programming of the mind which distinguishes the
members of one human group from another.” Numerous cross-cultural social psychology studies
have demonstrated that culture and communication technology are closely related (e.g., Earley,
1993; Hofstede, 1980).
Among cultural dimensions identified by
Hofstede, the cultural I/C dimension may explain
best how individuals might perceive and choose
different media for communication (Leidner &
Kayworth, 2006; Rice et al., 1998). Rice et al.
(1998) argued that the I/C dimension should be
most related to individuals’ different media choice
behavior. The I/C dimension, a basic distinction
among cultures (Singelis & Brown, 1995), has
been researched extensively in communication
studies (e.g., Gudykunst, 1997; Rice et al., 1998;
Singelis & Brown, 1995) and is the one dimension that reflects the fundamental contrast in
cultural orientations between Australian and the
three Asian countries (Ho, 1979). (See Table 1 for
Hofstede’s dimensions for the four countries of
interest in this study.) While there are differences
in the other four dimensions between Australia
and the other three countries, the contrast is most
striking on I/C. This study groups the three Asian
countries as a single Asian group. If cultural groups
do not have significantly different ranks on the
dimension, there will be no cultural variance in
the independent variables, and therefore it would
not be possible to test whether culture is a causal
explanation for differences in media choice behavior (Tinsley, 1994). In addition, although the
power distance dimension is included in several
cross-cultural media use studies (e.g., Mejias,
Shepherd, Vogel, & Lazaneo, 1996-1997; Tan,
Wei, Watson, Clapper, & McKean, 1998a; Tan,
Wei, Watson, & Walczuch, 1998b; Watson, Ho, &
Raman, 1994), power distance was mainly found
to play a significant moderating role to influence
individuals’ behavior in group decision making
through CMC, not in media choice. Hofstede’s
other cultural dimension, uncertainty avoidance,
was also found to play a significant role in communication technology diffusion and adoption
stages (Ford et al., 2003; Leidner & Kayworth,
2006; Thatcher, Srite, Stepina, & Liu, 2003;
Yeniyurt & Townsend, 2003). Since the main
focus of this study was to examine the technology use pattern after the technology was adopted,
uncertainty avoidance is not being considered as
part of this study. This article treats the cultural
dimension of I/C as an explanatory mechanism
for particular media choice behavior within
organizations. Hence, as a starting point, it will
be useful to explore the impact of this important
empirically established cultural dimension on the
differential media perception and choice behavior
between Australia and the three Asian countries.
The cultural I/C dimension is described by
Hofstede (1980) as a conglomeration of values
concerning the relation of an individual to his or
her collectivity in society. An individualistic so-
23
The Influence of National and Organizational Cultures on Technology Use
ciety is one in which self-concept is defined in
individual or trait terms, whereas a collectivistic
society is one in which an individual is defined
with reference to a societal and cultural context.
Collectivistic societies strive to maintain harmony and avoid confrontation or disagreement
among group members (Watson et al., 1994).
The need to preserve group harmony in a collectivistic society can be seen in the communication style. People in a collectivistic society favor
a high-context communication style (Gudykunst,
Matsumoto, & Ting-Toomey, 1996; Singelis
& Brown, 1995), in which most of the content
of messages is either in the physical context or
internalized in the person; very little is in the
coded, explicit part of the message (Hall, 1976).
In contrast, a low-context communication style is
predominant in an individualistic society (Singelis & Brown, 1995). It occurs when the greatest
amount of information is vested in the explicit
communication code (Hall, 1976).
The differences between individualism and
collectivism assist in anticipating different communication media choice behaviors between
Australian and Asian respondents. Australian
culture, a typical western culture, is characterized with individualistic values and low-context
communication orientation. Australians can be
said to prefer an explicit communication style,
be more rational than emotional, emphasize individual decision making, prefer fewer meetings,
and be less reliant on social cues in ambiguous
situations. They are expected to communicate in
ways that are consistent with their feelings (Hall,
1976) and prefer to be precise in communication
(Grice, 1975). They see e-mail as an opportunity
to share opinions frankly (Tan et al., 1998a) and
seek technology as a means for self-betterment
(Umanath & Campbell, 1994).
In contrast, Korea, Malaysia, and Thailand,
belonging to Asian cultures, are characterized by
high collectivism and high-context communication style. Such cultural characteristics promote
an implicit and ambiguous communication style,
24
more emotional than rational, with an emphasis
on group decision making, frequent meetings, and
relying on more social cues in ambiguous situations. Asian cultural communicators might prefer
synchronous media more, such as face-to-face,
because of their greater emphasis on traditional
use of time, and the increased value they place
on accessing and evaluating the contexts underlying communication (Rice et al., 1998). They are
expected to communicate in ways that camouflage and conceal the speakers’ true intentions
(Gudykunst & Ting-Toomey, 1988) to maintain
harmony in their in-groups. They may try to avoid
conflict through increased vagueness, rather than
by increased explicit communication (Rice et al.,
1998). They may see e-mail as a threat to group
harmony because e-mail allows loyalty and obligation to be challenged (Tan et al., 1998a).
INTERACTION BETWEEN NATIONAL
AND ORGANIZATIONAL CULTURES
The concept of culture could be studied at different
levels of analysis. In addition to conceptualizing
culture as a societal level (national level) phenomenon, as discussed above, the field of organizational behavior has addressed the construct
of culture at the organizational level, namely OC.
Hofstede (2001) defines OC as the manifestation of practices/behaviors evolving from the
shared values in the organization. In other words,
OC differs from NC with great emphasis placed
on the role of practices across organizations
such as rituals, heroes, and symbols. This view
is consistent with much of the popular literature
on OC that suggests OC is the pattern of basic assumptions that underlie the values and determine
not only behavior patterns, but also such visible
artifacts as architecture, office layout, dress codes,
and so forth (Schein, 1983). Similarly, Pratt and
Beaultieu (1992, p. 667) define OC in terms of
values shared by members of an organization unit
The Influence of National and Organizational Cultures on Technology Use
Figure 1. The balance of values vs. practices at the national, occupational, and organizational levels
(adapted from Hofstede, 2001)
or subunits, which manifests themselves in the
practices of that organization.
Recently, Karahanna et al. (2005) suggested
that values and practices are important elements
of culture, with values being closer to the core of
how individuals think, and shared practices being
more peripheral. Values are acquired early on in
life through childhood socialization and education,
whereas practices develop later in the life through
socialization at the workplace. A significant difference between values and practices is that values
are more stable and fairly hard to change, whereas
practices can be altered (Karahanna et al., 2005).
Similarly, researchers in cross-cultural studies argue that in any given culture values can
be categorized as either “core” or “periphery”
according to the characteristics of whether they
are more important, more enduring and resistant
to change, are highly accepted and agreed upon,
and hence more involved in social control or not
(Lachman, Nedd, & Hinings, 1994; Triandis,
1995). Core values are important in regulating
social behavior and tend to be enduring. In contrast, periphery values are relatively susceptible
to change. Early socialization affects core values,
and late socialization affects only periphery values
(Lachman et al., 1994).
These views are consistent with Hofstede’s
writings on values and practices of culture. Values
are invisible until they become evident in behavior,
whereas practices, which include symbols, heroes,
and rituals, are visible to an outside observer
(Hofstede, 2001). Figure 1, adapted from Hofstede
(2001), illustrates the relative importance of values
and practices at various levels of cultures. Values
are more important than practices at the national
level and practices for the organizational level.
Figure 1 also illustrates that values are acquired
mainly in the family and in the neighborhood, and
later at schools. On the other hand, organizational
practices are learned through socialization at the
workplace. In his IBM cross-cultural project,
Hofstede (2001) found considerable differences in
values, in spite of similarities in practices among
IBM employees in similar jobs but in different
national subsidiaries. While comparing organizational cultures across 10 organizations within one
country, Hofstede, Neuijen, Ohayv, and Sanders
(1990) found considerable differences in practices
but much smaller differences in values.
Collectively, literature suggests that values
and practices (or core values and peripheral values) are intertwined (Karahanna et al., 2005). The
relative balance of values and practices across
different levels of culture is different. And most
importantly, an individual’s practices would be
influenced primarily by OC (Karahanna et al.,
2005; Hofstede, 2001).
NC influences organizations through societal
structures such as laws and political systems
25
The Influence of National and Organizational Cultures on Technology Use
and also through the values, attitudes, behavior,
goals, and preferences of participants (clients,
employees, and managers) (Adler 1986). Because organizations interact continuously with
their environment, they cannot avoid taking on
aspects of the culture. Hence, organizations have
characteristics in common with their NC. In other
words, the values of founders and key leaders of
the organization appear to be reflected in the values
of their organization, even if the organizations
spread globally (Hofstede, 2001).
Under the assumption that OC is highly related
to NC, and given the fact that MNOs are trying to
develop a common set of management practices
across all subsidiaries in line with those of the
headquarters, the issues of conflicting cultures is
most relevant (O’Connor, 1995). Thus, it would
be useful if we can examine the relative strength
of each NC at the organizational level in terms
of their influences on management practice in
general (O’Connor, 1995; Pratt & Beaulieu, 1992)
and communication technology use practice in
particular. We might expect that the MNO’s OC in
terms of communication technology use practice
might reflect the norms and values associated
with the NC of the mother organization. Thus,
employees from different subsidiaries would
have similar communication and technology use
practice. Unfortunately, limited attention has been
paid to this issue. As a consequence, the following
research questions guided our study:
Research Question 1: Which media do employees
at both headquarters and subsidiaries prefer for
communication within an MNO context?
Research Question 2: How do national and
organizational cultures impact on employees’
media choice behavior within an MNO context?
METHODS
We chose to explore our research questions with
a mailed survey plus a field study built around a
series of interviews. Data collected from the survey
were used to examine how employees adopted
different media for communication and whether
national culture had any impact on media preferences. The interview results allowed for detailed
exploration of the important question of how NC
and OC interact on technology use.
The Investigation Site
This study was conducted in an American-based
multinational company, CEC (a pseudonym).
CEC operates in the food industry with offices
distributed around the world. The Australian office, the headquarters of CEC in the Asia Pacific
area, and its three Asian subsidiaries in Korea,
Malaysia, and Thailand were selected as the study
sites to ensure the comparability and homogeneity
of the sample. These four countries provided two
different types of cultural background in terms of
the cultural dimension considered in the present
study: namely Australia as a Western cultural
country characterized by individualism, and the
other three countries as belonging to the Eastern,
in particular, Asian traditional value system with
a collectivistic orientation.
The CEC Australian office has 150 staff, the
Korean, Malaysian, and Thai offices have 40, 40,
and 18 respectively. Most of the employees are
white-collar workers ranging from senior management to administrative workers. Computers and email are essential work and communication tools.
Data Collection
Survey
Quantitative data were collected by means of a
questionnaire sent by internal mail to all employees in all the Asia Pacific regional offices. Since
26
The Influence of National and Organizational Cultures on Technology Use
Table 2. Descriptive statistics of demographic variables and e-mail usage
Variables
Korea
Malaysia
39.00
34.06
Thailand
30.28
Asia*
34.56
Australia
33.47
Overall
Age (years)
Mean
34.12
S.D.
4.81
6.18
5.18
6.38
7.94
7.04
Work Tenure (years)
Mean
4.68
1.60
2.29
2.67
4.27
3.32
S.D.
4.94
1.74
1.17
3.21
4.28
3.75
Computer Experience
(years)
Mean
5.48
4.91
4.50
4.97
5.04
5.00
S.D.
1.21
.88
.786
1.02
.91
0.98
E-Mail Use (years)
Mean
5.12
5.14
3.97
4.84
5.69
5.19
S.D.
2.57
3.09
2.48
2.81
3.08
2.94
E-Mail Received (per week)
Mean
23.67
48.27
39.56
45.86
66.53
50.10
S.D.
13.40
29.39
49.31
84.58
51.57
43.80
E-Mail Sent (per week)
Mean
52.38
73.79
48.94
68.28
103.90
78.57
S.D.
35.31
41.57
55.34
90.15
18.99
64.17
N 18 33 21 72 49 121
Note: Asia includes Korea, Malaysia, and Thailand. Here is the mean of the three countries.
English is the work language throughout the organization, an English version of the questionnaire
was used throughout, thus minimizing translation
problems related to this cross-cultural survey. The
questionnaire was pre-tested on a small sample of
Australian subjects to determine the clarity and
relevance of the instrument. After two follow-up
letters, a total of 121 usable questionnaires (73%
response rate) were returned: 49 from Australia
(33%), 21 from Korea (52.5% response rate),
33 from Malaysia (82.5% response rate), and 18
from Thailand (100% response rate). Tables 2 and
3 show descriptive statistics and frequencies of
the samples, as well as the media usage variables.
Face-to-Face Interviews
In order to answer how and why questions, a series
of follow-up face-to-face interviews was conducted with eight employees from the Malaysian office
and five employees from the Australian office. The
interviewees were chosen to maximize variation in
hierarchical level, job type, and attitudes toward
communication media. Each of the interviews
was of 30 minutes duration. Using a structured
protocol, interviewees were asked about: (a) their
perceptions of different communication media,
such as e-mail, face-to-face, and telephone; (b)
their internal criteria used to judge which medium
should be used for an effective communication;
(c) written or unwritten rules about how people
should communicate within the organization;
(d) whether the individual’s supervisor or peers
influence the use of media for communication;
(e) whether the individual’s national culture influences the use of media for communication; and
(f) which culture, national or organizational, is
the dominant factor influencing the individual’s
communication behavior. The interviews were
conducted in English and recorded.
Measures
The previously used multi-item richness scale
(D’Ambra & Rice, 1994) was used to rate each
of the selected media’s perceived richness: faceto-face communication, the telephone, e-mail, and
written document. As a guide, Nunnally (1967)
advises that a modest reliability in the range of
0.5 to 0.6 will suffice. The alpha reliability for
27
The Influence of National and Organizational Cultures on Technology Use
Table 3. Frequencies of demographic variables and media accessibility
Korea
Malaysia
Thailand
Asian
Australia
Overall
Freq
Freq
Freq
Freq
Freq
Freq
Male
19
13
5
37
24
61
Female
2
20
13
35
25
60
3
1
4
4
8
Variable
Gender
Education
Organization
Level
Ethnicity
Category
High school or less
College Certificate/
diploma
2
11
1
14
11
25
University degree
13
17
15
45
26
71
Master’s degree
6
2
1
9
8
17
Senior executive
4
3
7
5
12
Manager
12
18
9
39
15
54
Professional
3
4
1
8
19
27
Admin
2
8
8
18
10
18
18
18
12
Thai
Malaysian
12
12
Chinese
16
16
4
20
Indian
5
5
1
6
Korean
21
21
Australian or Western Countries*
Telephone
Accessibility
E-Mail
Accessibility
28
21
44
44
1
4
Available with much
inconvenience
1
1
1
3
Available with some
inconvenience
1
2
7
10
Available with slight
inconvenience
2
2
8
12
2
14
Readily available
17
28
2
47
46
93
3
3
Available with much
inconvenience
10
3
Available with some
inconvenience
1
1
7
9
2
11
Available with slight
inconvenience
2
2
4
8
2
10
Readily available
18
30
4
52
45
97
*Note: Western countries include New Zealand, the UK, and the United States; Freq: Frequency
the four-item media richness scale was generally
satisfactory, ranging from .67 to .80.
Nine communication tasks developed by
D’Ambra and Rice (1994) were used to measure
media preference. Media preference was measured
by directly asking the respondents to specify their
first three preferences of media when they per-
28
form an intracultural communication with their
colleagues for each of these nine communication
tasks. For each task, for each medium, these rankings were scaled as 0=not chosen, 1=chosen 3rd,
2=chosen 2nd, and 3=chosen 1st (Rice et al., 1998;
Straub, 1994).
The Influence of National and Organizational Cultures on Technology Use
A three-item task equivocality scale, developed
by Goodhue (1995), was adopted to measure the
corresponding communication task equivocality.
The Cronbach’s alpha reliability for the three-item
equivocality mean scale was generally satisfactory,
ranging from .71 to .86.
The cultural I/C variable was measured at the
individual level using a nine-item scale derived
from Earley’s (1993) work. Two items were eliminated from subsequent analysis since they loaded
highly on two factors. The reliability (Cronbach’s
alpha) of the resulting scale was 0.71.
dimension of interest, rather than assuming that
our subjects were representative of their own
society based on Hofstede’s dimensions. The
results of such examination will be introduced
in the next section. Furthermore, in order to rule
out plausible rival hypotheses that may account
for the observed differences, all factors that may
have potential impact on technology use were
included in our statistical analysis.
Homogeneity of Each Cultural Group
Manipulation Checking of Group
Differences on Cultural Dimension
To make a valid comparison between two cultural
groups, it is necessary to establish the homogeneity
of each cultural group of respondents in terms of
their perceptions of and preferences for the technologies. At the same time, it is also necessary to
ensure that samples from two different cultures
are matched so that the samples are similar in all
respects except culture (Adler, 1984).
Majority participants from the Australian
sample were ethnic Australians, New Zealanders, English, and American, with only four of
them being of Chinese origin and one from India.
However these five of non-Western ethnicity have
resided in Australia for more than 20 years. Thus
it is reasonable to treat them as a homogonous
group. The Korean and Thai samples were all
ethnic Korean and Thai. Although two-thirds of the
Malaysian respondents were not ethically Malaysians, they have resided in Malaysia for more than
20 years. Thus, it is reasonable to treat them as a
homogonous group of Malays. Although Korea,
Malaysia, and Thailand are different in terms of
other factors, the explainable variable considered
in this study, cultural I/C dimension, was similar,
at least from Hofstede’s perspective. However,
in line with Myers and Tan (2002) and Gallivan
and Srite (2005), we explicitly determined the
culture values of our samples by measuring the
RESULTS AND DISCUSSION
A t-test analysis revealed a significant difference
in cultural I/C dimension between respondents
in the headquarters and those in the subsidiaries,
t (119) =-5.36, ρ<0.001. The Asian respondents
were more collectivistic (M=4.92) than those in
the Australian headquarters (M=4.31). An ANOVA
test also indicated that Australian respondents
were significantly different from all three Asian
countries (F (3,117) =11.65, p<0.001). Follow-up
analysis has shown that there were no differences
among the three Asian countries. Therefore, the
planned comparison could be made.
Media Preference Patterns Between
Headquarters and Subsidiaries
In order to answer research question one, we
first compared perceived media richness in each
culture and across cultures. The results are provided in Table 4. Four media were found to be
significantly different from each other, except in
Australia where face-to-face and telephone were
perceived to be similar in terms of media richness.
As found in prior studies, face-to-face was rated
as having the highest media richness, followed by
telephone, e-mail, and written document. The t-test
results demonstrated that there were significant
29
The Influence of National and Organizational Cultures on Technology Use
Table 4. Comparison of media richness across media and across cultures
Cultural Group
E-Mail_R Mean
Face_R Mean
Tel_R Mean
WD_R Mean
F-Value
Overall
4.04
6.17
5.33
3.36
170.07***
Asian
4.33
6.28
5.14
3.62
82.25***
Australian
3.61
6.02a
5.62a
2.97
111.23***
t value#
3.27**
3.26**
-2.41*
2.46*
E-Mail_R: e-mail richness; Face_R: face-to-face richness; Tel_R: telephone richness; WD_R: written document richness; N=72 for Asian
group and N=49 for Australian group
:
Indicates number is not significantly different from other numbers with the same subscript letter in the same row.
a
* p<.05, ** p<.01, *** p<.001
#
: t value shows the significance test after controlling demographics, media experience, and media accessibility variables.
differences between these two cultural groups in
terms of perceived media richness. Although the
ranking of media richness was in the same decreasing order of face-to-face, telephone, e-mail, and
written document for each cultural group, Asian
respondents rated face-to-face, e-mail, and written document as significantly richer, compared
to their Australian counterparts, while Australian
respondents rated telephone as significantly richer,
compared to their Asian respondents.
Table 5 shows the mean rating of media-task
preference in two different cultures. In general,
e-mail and face-to-face were the two most popular media and were rated highest for fulfilling
most communication activities, whereas telephone
was less popular than face-to-face and e-mail. In
any situation, written document was always the
least preferred medium for communication. In
other words, employees in this particular MNO
would always have a preference for face-to-face
or e-mail regardless of the nature of the communication task.
Influence of National Culture on
Media Preferences
In order to examine whether NC has any impact
on employees’ media preferences after controlling
for demographic variables, media use experience,
and media richness attribute, a hierarchical regression analysis technique was adopted. In using
30
hierarchical regression analysis, the demographic
variables, media use experience, and media richness perception were added as the first block, and
cultural group―dummy coded by choosing the
Australian sample as a reference group (Asian
group=1, Australian group=0)―was added as
the second block, thus statistically controlling for
the effects of control variables on the dependent
variable to determine the proportion of variance
attributable to culture (Pallant, 2001). For demographics and media-related variables, we included
age, gender, education background, work tenure,
organizational level, computer experience, media
availability, and media experience in our analysis
since they were significant factors identified in the
literature to influence media use. To save space,
only the final regression runs for each medium are
reported in Table 6, which presents standardized
coefficients that are significant.
For e-mail, accessibility was significantly
related with its preference. People’s perception
of e-mail also had significant impact on its preference: the higher the perceived richness, the more
it is used. Trevino, Webster, and Stein (2000) also
found a positive relationship between e-mail richness and its use. For face-to-face communication
and telephone, two traditional media, we did not
find any demographic and media-related factors
having significant impacts on their preferences.
Educational level was found to have significant
impact on written document preference: the
The Influence of National and Organizational Cultures on Technology Use
Table 5. Mean media preference rating for nine communication activities across cultures
Cultural
Group
T-E
E-Mail
FtF
Tel
WD
Request funding for sundry
expenses
Asian
4.34
1.82
1.51
.99
1.42
Aus
4.23
1.64
2.00
1.21
.95
Need approval for allocation of
funding
Asian
4.30
1.74
1.49
.87
1.51
Aus
3.98
1.86
1.84
1.05
.93
Discuss a departmental performance issue with your colleague
Asian
4.18
1.27
2.69
.96
.54
Aus
3.71
1.22
2.89
1.41
.30
Clarify with your manager on a
critical issue
Asian
4.03
1.49
2.61
1.11
.52
Aus
3.51
1.35
2.59
1.78
.16
Clarify a procedural matter with
your colleagues
Asian
4.02
1.50
2.18
1.47
.54
Aus
3.23
1.98
1.94
1.59
.29
Respond to a colleague’s urgent
request
Asian
3.85
1.44
2.26
1.89
.22
Aus
2.9
1.17
2.27
2.42
.04
Discuss a problem with your
manager
Asian
3.82
1.15
2.99
1.06
.44
Aus
3.01
1.08
2.92
1.71
.12
Respond to an urgent request by
your manager
Asian
3.81
1.58
2.14
1.42
.58
Aus
3.03
1.49
2.16
2.08
.12
Need some important figures from
another department
Asian
3.76
2.07
1.41
1.42
.76
Aus
3.12
1.89
1.50
2.26
.20
Communication Task
Aus: Australian; T-E: task equivocality; FtF: face-to-face; Tel: telephone; WD: written document
Table 6. Hierarchical regression results of four media on demographics, media experience, media richness perception, and national culture
Predictor
E-Mail
FtF
Telephone
WD
Age
--
--
--
--
Gender
Education
Work Tenure
Organizational Level
Computer Experience
------
------
------
-.18*
----
E-Mail Experience
E-Mail Accessibility
-.18*
n/a
n/a
n/a
n/a
n/a
n/a
Medium Richness
.23**
--
--
--
Block 1: Control Variables
Block 2: Culture
Culture
--
--
-.41***
.34***
Incremental R2
.08
.05
.24***
.18***
Change in R
.01
.001
.13***
.10***
2
Gender: 1=male, 2=female; Culture: Australian=0, Asian=1; N=121; *ρ< .1, **ρ< .05, ***ρ< .01
31
The Influence of National and Organizational Cultures on Technology Use
higher the degree, the more use of this medium
for communication.
After controlling for demographics, media
experience, and media richness perception, we
found significant cultural-level differences in
terms of telephone and written document preferences. Asian respondents preferred the use of
written documents, while Australian participants
favored the telephone. However, there were no
cultural-level differences between face-to-face
and e-mail preferences.
In summary, we did find significant culturallevel differences in terms of perceived media
richness. We also found cultural-level differences
for telephone and written document preferences.
However, we did not find any significant differences between these two cultural groups in terms
of face-to-face and e-mail preferences. In particular, we found that these two media were the two
primary media being preferred in most situations.
Face-to-face communication is a traditional
and quite stable element in organizational infrastructure, and a cultural effect, if it ever existed,
may have ceased to be meaningful over time
(Rice et al., 1998; Straub, 1994). The result here
provides empirical evidence to support this argument. Straub (1994) also found no significant difference in face-to-face communication preference
between Japanese and U.S. knowledge workers. In
addition, Chidambaram, Moe, and Olsen (1998)
found that face-to-face communication was used
to a greater extent than other modern media (such
as e-mail and fax) across various tasks. D’Ambra
(1995) found that face-to-face communication
was the most preferred medium over the range
of equivocality within an organization. Thus, it
is reasonable to say that face-to-face communication may be one of the most important media for
organizational communication, especially for this
particular MNO.
With regard to the first preference of e-mail
across various tasks, one explanation may be that
e-mail is of value to all respondents regardless
of the level of task equivocality. An additional
32
explanation may be found in social influence
theory (Fulk et al., 1990), which suggests that
highly educated and technically oriented people
perceive channel attributes (such as richness of
the media) based on social norms as opposed
to rational construction. Fulk and Boyd (1991)
reasoned that if social influences on media use
were more important than task influences, one
should observe similar patterns of individual
media use within work groups regardless of the
communication task’s characteristics. Critical
mass theory can also provide another possible
explanation for extensive e-mail use across an
organization. The critical mass perspective claims
that individuals who have access to multiple communication media will generally use the medium
most widely available within their communication
community, even when it is not the medium they
prefer. This practice enables them to communicate
with the largest number with the least amount of
effort or personal cost (Markus, 1987; Rogers,
1983; Zmud, Lind, & Young, 1990). E-mail is
the essential communication tool for the MNO
examined; virtually all company sites worldwide
can be reached through the e-mail system.
The above analyses, while helping to explain
the particular results obtained here, do not provide
clues in answering the overarching question: Why
was either face-to-face or e-mail always chosen
as the first preference for communication within
both headquarters and subsidiaries?
Influence of Organizational
Culture on Media Preferences
As we discussed earlier, the conflict between OC
and the individual’s own NC may become an issue
when the subsidiaries with an OC are influenced
by the headquarters located in a country with
a different NC (O’Connor, 1995). As literature
suggests, OC has predominant influence on
individuals’ practice development through socialization at the workplace. Such socialization
in Asian subsidiary workplaces may internalize
The Influence of National and Organizational Cultures on Technology Use
some Western influences, which in turn alter their
attitudes toward work and ICT to be assimilated
with their Western headquarters (Gallivan & Srite,
2005). People learn to accept some organizational
shared values which may not be congruent with
their own value systems. Even though people may
not change themselves internally (especially for
core values), there is some adaptation through
interaction between the individuals’ OC and their
NC. Ultimately, organizational socialization can
effectively override the influence of members’
previously internalized values, and change them
to conform to those required by the organization
(Lachman et al., 1994). For survival, employees
adjust themselves to suit the OC.
A comment made during the interviews by one
human resources manager (of Chinese cultural
origin) supports the role of socialization:
Basically, to me, it is very fine to accept American
culture…when I came here, I already expected
that sorts of attitudes, you know, being perceived
by the American. You know, I may work here in
my whole life, I am getting used to American
culture…being a person working here, you have
to, sometimes, compromise on something which
this broad party wants, you know, going to be
understanding each other. Organizational work
is teamwork. It is very important to put emphasis
on the team, not on yourself.
In their study of organizational and cultural
context of systems implementation, Robey and
Rodriguez-Diaz (1989) suggest that OC is most
relevant to management issues that focus on organizational tasks and technologies. Karahanna et al.
(2005) also argue that a strong OC might impact
the adoption, acceptance, and use of a mandated
new technology, such as e-mail systems.
Regarding the relationship between national
and organizational culture, another young Chinese
supply chain administrator said:
It is more organizational culture than national
culture. Everyone, I think, will follow organizational culture because when you get here, you
have to accept everything it has, and if you want
to work here, you have to adapt.
One sales administration manager complained,
saying that although there were too many e-mail
messages to reply to, he still used e-mail because,
overall, others used it to respond to him no matter
what medium he used to contact them. So, even
though employees have negative attitudes toward
e-mail, they may feel compelled to use it because
others do, or because it is expected in the organization. This sales administration manager said:
I know e-mail is good. But it can be abused. You
may not believe every morning I will see at least
100 new mails in my inbox. You know, some
people send a message to everyone no matter if
it is related to you or not. If you check and reply
all mails, it will take you whole morning to finish.
Not save time, it wastes my time. But if you don’t
do it, you may miss some important messages.
Because I know this is our policy to use e-mail as
basic communication tool, I use it. But, most of the
time, I will also use face-to-face or telephone to
contact people for double confirmation if possible.
In this MNO, e-mail is predominantly used.
However, for critical tasks (e.g. clarifying issues,
discussing issues, or equivocal tasks), face-to-face
communication is preferred. The organization
has an e-mail policy to minimize e-mail abuse.
When asked whether the organization has any
procedures or policy concerning media use, the
IT director said:
We actually, to be frank, did get what not to do
over e-mail, what to do over e-mail. We had this
policy established…most of time, we use e-mail
because you know, when you look at organizational
situation, it obviously has less critical situations,
compared with normal communication tasks.
33
The Influence of National and Organizational Cultures on Technology Use
Things should be done in that way, smoothly. It
happens to the critical situations, you know, it is
not effective to do by e-mail. Group meetings, or
face-to-face discussion can be used.
With regard to cultural influence on communication behavior, only one interviewee indicated
that NC did not influence his behavior. While the
quantitative data did not fully suggest the presence
of cultural effects as anticipated, the interview
data revealed that cultural influences were indeed
operating, but in ways not anticipated and overridden by the OC. One information technology
manager’s comment supports this finding:
Yes, national culture does play a role in guiding
your behavior. You know, certain culture may
have certain ways of communication, shy, not
question your boss, and so on…if you work in a
company, however, you have to accept that company’s culture because you have to be under that
roof. If you go to another company, you have to
adapt that environment concrete culture…to me,
the way I look at is, we are one person, okay, but
you have to behave ‘when’. You have to behave
differently when you are at home or when you are
at work...no matter what happens, if you want to
stay under this roof, you have to accept all cultures
in this environment…of course, you don’t throw
away your culture. You are not supposed to do
so, that is your identity. What you do is to adapt
it, not change yourself inside. But once again, if
you want to work under that roof, you have to do
so. Otherwise, you can’t stay.
In short, the data from the face-to-face interviews lent support to organizational cultural
influencing organizational communication within
this MNO. This influence is reflected in the similarities of preference for face-to-face and e-mail
media between headquarters and its subsidiaries
in countries with different cultures. These findings
are consistent with much of the popular literature
on OC that suggests that behaviors that involve
34
practices will more likely be influenced by organizational cultures (Hofstede, 2001; Karahanna et
al., 2005; Robey & Rodriguez-Diaz, 1989). The
interaction between national and organizational
culture is possible when the actual interaction
structures (OC) show effects of the NC on the home
organization (Soeters & Schreuder, 1988, p. 76).
LIMITATIONS AND FUTURE
RESEARCH DIRECTION
Several limitations and opportunities for future
research are noteworthy. The sample size of the
study is an issue. Indeed, a small sample size
reduces the external validity of this study and
provides less statistical power. Thus, one fruitful
direction for future research would be to replicate
this study with a larger sample. The sampling
design of this study restricts generalizability inasmuch as one cannot be sure that samples obtained
were representative of the culture. However, this
sample is deemed to be representative of the
cultural population of interest: English-speaking,
educated individuals from specific national cultures who have experienced more contact within
a multinational environment. It is to this group
that the findings of the study can be addressed.
It should be noted that the emphasis of this
research was on central tendencies. Cultural groups
are of course heterogeneous; there is within-culture
variation on any measure of culture or behavior,
even when sampling from just one stratum of
society. This research, however, did not focus on
the variations within one culture. Rather, the goal
was to test certain causal influences of cultural
membership, and with this goal it was necessary
to focus on central tendencies rather than on the
variation surrounding these tendencies.
This study examined media preference behavior by only considering intracultural, rather
than intercultural communication within MNO
settings (Adler & Doktor, 1986). Intercultural
communication might be especially difficult for
The Influence of National and Organizational Cultures on Technology Use
employees from cultures that have different media
richness perceptions or media preferences, such
as organizational employees from Australia and
Korea interacting through telephone or e-mail
(Rice et al., 1998). However, Ryan’s (1993) online
survey of 1,000 frequent e-mail users from 24
countries found that, although 40% of respondents
noticed some differences in how they interacted
online with people from other cultures, 75%
indicated that the cultural identity of the other
participants was of minimal or no importance.
The primary distinction was due to the medium,
as 95% reported differences in ICT compared to
face-to-face interaction.
Finally, the research has been limited to one
Western-cultural-based multinational organization
together with its Asian-cultural subsidiaries. There
is no evidence that an Asian-cultural-based multinational organization with Western-cultural subsidiaries would have identical behaviors. Hence,
the generalizability of this study’s findings beyond
Western-cultural-based multinational organizations must be viewed with caution. However, as
more and more Western-based MNOs shift their
business to Asia (Adler & Doktor, 1986), this
study’s results would help those MNOs’ managers
by providing a preliminary guideline for effective
communication within organizations.
Based on the experience with this study, some
directions for future research are proposed. Although organizational cultural influence was a
possible explanation for similar media preference
within this MNO, this evidence was obtained
within only one MNO through the interview
results. Further research is required in at least
two MNO settings to empirically examine the
interaction between NC and OC. Do organizations
need to modify their management strategy and
practice to suit the national cultural dictates of
their overseas host countries, where the national
culture of the host country differs from that of the
home country? The answer to this question could
be further achieved through examining the interaction between NC and OC within MNO settings.
In addition, this study provides a knowledge
base for a future research domain, which has yet
to be explored: how intercultural communication
differs from intracultural communication within
MNO settings. The cross-cultural communication
and psychology literature suggests that people behave differently with members of their own culture
than they do with members of foreign cultures
(Adler & Doktor, 1986). In addition, intercultural
communication, not merely intracultural, is the
essence of most international business managerial activity (Adler & Doktor, 1986). By knowing
how a particular cultural group communicates
with its own cultural members, an organization
is ready to confront the next step: to explore the
generalizability of these intracultural behaviors
and outcomes to the intercultural context.
IMPLICATIONS AND CONCLUSION
Drawing largely on media selection, NC and OC
literature in this article demonstrates the important potential influence of OC over NC in media
preferences, as well as illustrates empirically the
role of culture in individuals’ views of communication media. Thus, this article has pragmatic
importance for managers in organizations that
operate their businesses across Western and Asian
cultural contexts. There is a practical relevance
to managers in Western cultural multinational
organizations interested in understanding the differences they see in approaches to communication
media perceptions and choice behavior in Asian
countries. Although NC has been recognized
to influence individuals’ norms and behavior,
the development of a common set of norms and
values across all subsidiaries in line with those
of the headquarters is possible. Employees’ work
value can be influenced by the OC of the MNO
headquarters. In other words, engaging a universal
culture within one MNO can be achieved when
MNO managers can minimize the incongruence
between the national culture of subsidiaries and
35
The Influence of National and Organizational Cultures on Technology Use
the national culture of the “parent” organization,
which can be achieved through employing socialization (Soeters et al., 1988). Although these
findings have been obtained in one MNO, they
provide a clearer insight into the possibility of a
global form of organization where a seamless/borderless corporate culture can be achieved. These
research findings provide encouragement for the
practice of integrating multi-location operations,
whose employees may hold diametrically opposed
values, into a single corporate culture. As a result,
a similar information technology strategy could be
implemented throughout the organization.
D’Ambra, J. (1995). A field study of information
technology, task equivocality, media richness and
media preference. Unpublished doctoral dissertation, University of New South Wales, Australia.
REFERENCES
Daft, R. L., Lengel, R. H., & Trevino, L. K. (1987).
Message equivocality, media selection, and
manager performance: Implications for information systems. Management Information Systems
Quarterly, 11(3), 355–366. doi:10.2307/248682
Adler, N. J. (1984). Understanding the ways
of understanding: Cross-cultural management
methodology reviewed. In Farmer, R. N. (Ed.),
Advances in comparative management (pp.
31–67). Greenwich, CT: JAI.
Adler, N. J., & Doktor, R. (1986). From the Atlantic
to the Pacific century: Cross-cultural management reviewed. Journal of Management, 12(2),
295–318. doi:10.1177/014920638601200210
Callahan, E. (2004). Interface design and culture.
Annual Review of Information Science & Technology, 39, 257–310.
Carlson, J. R., & Zmud, R. W. (1999). Channel
expansion theory and the experiential nature of media richness perceptions. Academy of Management
Journal, 42(2), 153–170. doi:10.2307/257090
Chidambaram, L., Moe, C. E., & Olsen, D. H.
(1998). A study of factors influencing media
choice in Norwegian organizations. Proceedings
of the 31st Hawaii International Conference on
System Science.
36
D’Ambra, J., & Rice, R. E. (1994). Multimethod
approaches for the study of computer-mediated
communication equivocality, and media selection.
IEEE Transactions on Professional Communication, 37(4), 231–239. doi:10.1109/47.365170
Daft, R. L., & Lengel, R. H. (1986). Organizational
information requirements, media richness and
structural design. Management Science, 32(5),
554–571. doi:10.1287/mnsc.32.5.554
Earley, P. C. (1993). East meets west meets Mideast: Further explorations of collectivistic and individualistic work groups. Academy of Management
Journal, 36(2), 319–348. doi:10.2307/256525
Flanagin, A. J., & Metzger, M. J. (2001). Internet
use in the contemporary media environment. Human Communication Research, 27(1), 153–181.
doi:10.1093/hcr/27.1.153
Ford, D. P., Connelly, C. E., & Meister, D. B.
(2003). Information systems research and Hofstede’s culture’s consequences: An uneasy and
incomplete partnership. IEEE Transactions on Engineering Management, 50(1), 8–25. doi:10.1109/
TEM.2002.808265
Fulk, J. (1993). Social construction of communication technology. Academy of Management
Journal, 36(5), 921–950. doi:10.2307/256641
Fulk, J., & Boyd, B. (1991). Emerging theories of communication in organizations.
Journal of Management, 17(2), 407–446.
doi:10.1177/014920639101700207
The Influence of National and Organizational Cultures on Technology Use
Fulk, J., Schmitz, J., & Steinfield, C. W. (1990).
A social influence model of technology use. In
Fulk, J., & Steinfield, C. (Eds.), Organizational
and communication technology (pp. 117–142).
Newbury Park, CA: Sage.
Gallivan, M., & Srite, M. (2005). Information
technology and culture: Identifying fragmentary
and holistic perspectives of culture. Information
and Organization, 15(4), 295–338. doi:10.1016/j.
infoandorg.2005.02.005
Goodhue, D. L. (1995). Understanding user
evaluations of information systems. Management Science, 41(12), 1827–1844. doi:10.1287/
mnsc.41.12.1827
Grice, H. (1975). Logic and conversation. In Cole,
P., & Morgan, J. (Eds.), Syntax and semantics
(Vol. 3, pp. 107–142). New York: Academic Press.
Gudykunst, W. B. (1997). Cultural variability in
communication. Communication Research, 24(4),
327–348. doi:10.1177/009365097024004001
Gudykunst, W. B., Matsumoto, Y., & TingToomey, S. (1996). The influence of cultural
individualism-collectivism, self construals, and
individual values on communication styles across
cultures. Human Communication Research,
22(4), 510–543. doi:10.1111/j.1468-2958.1996.
tb00377.x
Gudykunst, W. B., & Ting-Toomey, S. (1988).
Culture and interpersonal communication. Newbury Park, CA: Sage.
Hall, E. T. (1976). Beyond culture. New York:
Doubleday.
Ho, D. (1979). Psychological implications of collectivism: With special reference to the Chinese
case and Maoist dialectics. In Eckensberger, L.,
Lonner, W., & Poortinga, Y. (Eds.), Cross-cultural
contributions to psychology. Amsterdam: Swets
& Zeitlinger.
Hofstede, G. (1980). Culture’s consequence:
International differences in work-related values.
Beverly Hill, CA: Sage.
Hofstede, G. (1991). Culture and organizations:
Software of the mind. London: McGraw-Hill.
Hofstede, G. (2001). Culture’s consequences:
Comparing values, behaviors, institutions, and
organizations across nations (2nd ed.). Thousand
Oaks, CA: Sage.
Hofstede, G., Bond, M. H., & Luk, C. L. (1993).
Individual perceptions of organizational cultures: A methodological treatise on levels of
analysis. Organization Studies, 14(4), 483–503.
doi:10.1177/017084069301400402
Hofstede, G., Neuijen, B., Ohayv, D. F., & Sanders,
G. (1990). Measuring organizational cultures: A
qualitative and quantitative study across twenty
cases. Administrative Science Quarterly, 35,
286–316. doi:10.2307/2393392
Huber, G. P. (1990). A theory of the effects of
advanced information technologies on organizational design, intelligence, and decision making.
Academy of Management Review, 15(1), 47–71.
doi:.doi:10.2307/258105
Hung, Y. T. C., Kong, W. C., Chua, A. L., & Hull,
C. E. (2006). Reexamining media capacity theories
using workplace instant messaging. Proceedings
of the 39th Hawaii International Conference on
System Sciences, Kauai, Hawaii.
Ives, B., & Jarvenpaa, S. L. (1991). Applications
of global information technology: Key issues for
management. Management Information Systems
Quarterly, 15(1), 33–49. doi:10.2307/249433
Johnson, T. J., & Kaye, B. K. (2003). Around
the World Wide Web in 80 ways. Social Science Computer Review, 21(3), 304–325.
doi:10.1177/0894439303253976
37
The Influence of National and Organizational Cultures on Technology Use
Karahanna, E., Evaristo, J. R., & Srite, M. (2005).
Levels of culture and individual behavior: An
integrative perspective. Journal of Global Information Management, 13(2), 1–20. doi:10.4018/
jgim.2005040101
King, R. C., & Xia, W. D. (1997). Media appropriateness—effects of experience on communication
media choice. Decision Sciences, 28(4), 877–910.
doi:10.1111/j.1540-5915.1997.tb01335.x
Kogut, B. (2003). The global Internet economy.
Cambridge, MA: MIT Press.
Lachman, R., Nedd, A., & Hinings, B. (1994).
Analyzing cross-national management and organizations—a theoretical framework. Management
Science, 40(1), 40–55. doi:10.1287/mnsc.40.1.40
Mejias, R. J., Shepherd, M. M., Vogel, D. R., &
Lazaneo, L. (1996-97). Consensus and perceived
satisfaction levels: A cross-cultural comparison of
GSS and non-GSS outcomes within and between
the United States and Mexico. Journal of Management Information Systems, 13(3), 137–161.
Myers, M., & Tan, F. B. (2002). Beyond models of
national culture in information systems research.
Journal of Global Information Management,
10(1), 24–32. doi:10.4018/jgim.2002010103
Naisbitt, J. (1994). Global paradox. New York:
Avon.
Niederman, F. (2005). International business and
MIS approaches to multinational organizational
research: The cases of knowledge transfer and IT
workforce outsourcing. Journal of International
Management, 11(2), 187–200. doi:10.1016/j.intman.2005.03.004
Lehmann, H., & Gallupe, B. (2005). Information
systems for multinational enterprises—some factors at work in their design and implementation.
Journal of International Management, 11(2),
163–186. doi:10.1016/j.intman.2005.03.003
Nunnally, J. C. (1967). Psychometric theory. New
York: McGraw-Hill.
Leidner, D. E., & Kayworth, T. (2006). Review: A
review of culture in information systems research:
Toward a theory of information technology culture conflict. Management Information Systems
Quarterly, 30(2), 357–399.
O’Connor, N. G. (1995). The influence of organizational culture on the usefulness of budget
participation by Singaporean-Chinese managers.
Accounting, Organizations and Society, 20(5),
383–403. doi:10.1016/0361-3682(94)00034-S
Markus, M. L. (1987). Toward a “critical
mass” theory of interactive media: Universal access, interdependence, and diffusion.
Communication Research, 14(5), 491–511.
doi:10.1177/009365087014005003
O’Sullivan, P. B. (2000). What you don’t know
won’t hurt me: Impression management functions
of communication channels in relationships. Human Communication Research, 26(3), 403–431.
doi:10.1093/hcr/26.3.403
McCoy, S., Galletta, D.F., & King, W.R. (2005).
Integrating national culture into IS research: The
need for current individual-level measures. Communications of the AIS, (15), 211-224.
Pallant, J. F. (2001). SPSS survival manual: A
step-by-step guide to data analysis using SPSS
for Windows (Version 10). St. Leonards, N.S.W.
Allen & Unwin.
Pratt, J., & Beaulieu, P. (1992). Organizational culture in public accounting: Size, technology, rank,
and functional area. Accounting, Organizations
and Society, 17(7), 667–684. doi:10.1016/03613682(92)90018-N
38
The Influence of National and Organizational Cultures on Technology Use
Rice, R. E., D’Ambra, J., & More, E. (1998).
Cross-cultural comparison of organizational media
evaluation and choice. The Journal of Communication, 48(3), 3–26. doi:10.1111/j.1460-2466.1998.
tb02757.x
Straub, D., Loch, K., Karahanna, E., Evaristo, J.
R., & Srite, M. (2002). Toward a theory based
measurement of culture. Journal of Global Information Management, 10(1), 13–23. doi:10.4018/
jgim.2002010102
Robey, D., & Rodriguez-Diaz, A. (1989). The
organizational and cultural context of systems
implementation: Case experience from Latin
America. Information & Management, 17(4),
229–239. doi:10.1016/0378-7206(89)90046-3
Straub, W. (1994). The effects of culture on IT
diffusion: E-mail and fax in Japan and the USA.
Information Systems Research, 5(1), 23–47.
doi:10.1287/isre.5.1.23
Rogers, E. M. (1983). Diffusion of innovations.
New York: The Free Press.
Ryan, R. (1993). Brief communications. The
Electronic Library, 11(3), 193–195. doi:10.1108/
eb045230
Sambharya, R. B., Kumaraswamy, A., & Banerjee, S. (2005). Information technologies and the
future of the multinational enterprise. Journal
of International Management, 11(2), 143–161.
doi:10.1016/j.intman.2005.03.005
Schein, E. H. (1983). The role of the founder in
creating organizational culture. In Staw, B. M.
(Ed.), Psychological dimensions of organizational
behavior. New York: MacMillan.
Schmitz, J., & Fulk, J. (1991). Organizational
colleagues, media richness and electronic mail:
A test of the social influence model of technology
use. Communication Research, 18(4), 487–523.
doi:10.1177/009365091018004003
Singelis, T. M., & Brown, W. J. (1995). Culture, self, and collectivist communication:
Linking culture to individual behavior. Human
Communication Research, 21(3), 354–389.
doi:10.1111/j.1468-2958.1995.tb00351.x
Soeters, J., & Schreuder, H. (1988). The interaction between national and organizational cultures.
Accounting, Organizations and Society, 13(1),
75–85. doi:10.1016/0361-3682(88)90026-8
Tan, B. C. Y., Wei, K. K., Watson, R. T., Clapper, D.
L., & McKean, E. R. (1998a). Computer-mediated
communication and majority influence: Assessing
the impact in an individualistic and a collectivistic
culture. Management Science, 44(9), 1263–1278.
doi:10.1287/mnsc.44.9.1263
Tan, B. C. Y., Wei, K. K., Watson, R. T., &
Walczuch, R. M. (1998b). Reducing status effects with computer-mediated communication:
Evidence from two distinct national cultures.
Journal of Management Information Systems,
15(1), 119–141.
Thatcher, J. B., Srite, M., Stepina, L. P., & Liu, Y.
(2003). Culture, overload and personal innovativeness with information technology: Extending the
nomological net. Journal of Computer Information
Systems, 44(1), 74–81.
Tinsley, C. (1994). The influence of culture on the
management of workplace conflict. Unpublished
doctoral dissertation, Northwestern University,
USA.
Trevino, L. K., Webster, J., & Stein, E. W. (2000).
Making connections: Complementary influences
on communication media choices, attitudes, and
use. Organization Science, 11(2), 163–182.
doi:10.1287/orsc.11.2.163.12510
Triandis, H. C. (1995). Individualism and collectivism. Boulder, CO: Westview Press.
39
The Influence of National and Organizational Cultures on Technology Use
Umanath, N. S., & Campbell, T. L. (1994). Differential diffusion of information systems technology
in multinational enterprises: A research model.
Information Resources Management Journal,
7(1), 6–18.
Yeniyurt, S., & Townsend, J. D. (2003). Does
culture explain acceptance of new products in
a country? An empirical investigation. International Marketing Review, 20(4), 377–396.
doi:10.1108/02651330310485153
Usunier, J. C. (1998). International and crosscultural management research. London: Sage.
Zhang, D., Lowry, P. B., Zhou, L., & Fu, X. (2007).
The impact of individualism—collectivism, social
presence, and group diversity on group decision
making under majority influence. Journal of
Management Information Systems, 23(4), 53–80.
.doi:10.2753/MIS0742-1222230404
Watson, R. T., Ho, T. H., & Raman, K. S. (1994).
A fourth dimension of group support systems.
Communications of the ACM, 37(10), 45–55.
doi:10.1145/194313.194320
Watson-Manheim, M. B., & Belanger, F. (2007).
Communication media repertoires: Dealing with
the multiplicity of media choices. Management
Information Systems Quarterly, 31(2), 267.
Zmud, R. W., Lind, M. R., & Young, F. W. (1990).
An attribute space for organizational communication channels. Information Systems Research,
1(4), 440–457. .doi:10.1287/isre.1.4.440
Yates, J., & Orlikowski, W. J. (1990). Mediated
communication in organizations: A theoretical
framework and research agenda. Proceedings of
the Conference of Sloan Working Papers, Cambridge, MA.
This work was previously published in International Journal of Global Information Management, Volume 17, Issue 4, edited
by Felix B. Tan, pp. 74-94, copyright 2009 by IGI Publishing (an imprint of IGI Global).
40
41
Chapter 3
Understanding IT Governance:
A Case of Two Financial Mutuals
Alastair Robb
University of Queensland, Australia
Michael Parent
Simon Fraser University, Canada
ABSTRACT
Legislators, regulators, and shareholders increasingly demand good governance over all aspects of
their business. While much is made of financial governance, most legislation and regulation implicitly
recognizes the need for prudent governance of information technology (IT) functions. In this study we
conduct an exploratory collective case study of IT governance (ITG) in two financial mutuals - one in
Australia and one in Canada, using a contextual lens. In one case, the mutual governs its IT through
Board participation in a subsidiary. In the second, governance is delegated to management and a Lead
Director. Both of these mechanisms appear to minimize ITG risk, and are the result of their respective
regulatory environments. This research begins to lend some clarity regarding IT governance choices by
firms, and denotes important contextual differences between countries’ regulatory environments. This
will allow researchers, managers, and directors to better understand and discriminate between ITG
processes and structures.
INTRODUCTION AND RESEARCH
OBJECTIVES
Legislators, regulators, and shareholders increasingly demand that directors and managers exercise
good governance over all aspects of their business.
Indeed, since the release of the Cadbury Report
(1992) into corporate governance, much effort has
DOI: 10.4018/978-1-60960-605-3.ch003
been put into ensuring governance remains high
on the agenda of directors and managers. Following such failures as Enron, Parmalat, One-Tel,
WorldCom, and HIH regulators, too, have made no
secret of their willingness to pursue directors and
managers who do not exercise good governance
over their organizations. As the inimitable Donald Trump stated (regarding the Sarbanes-Oxley
Act (SOX)): “They [regulators] make you sign
documents that basically say every transaction
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Understanding IT Governance
made by everybody in your company is 100 per
cent honest. If it isn’t, you go to jail for the rest of
your life” (Pitts, 2007). Further, in the wake of the
Global Financial Crisis, there is a real likelihood
that governance will, once again, resume centre
stage. In the latter part of 2010, The Basel Committee is expected to announce a series of new
initiatives designed to help avoid a repeat of the
Global Financial Crisis. Referred to as Basel III,
the initiatives focus on banks, their liquidity, and
capital (The Economist, 2010).
While much is made of financial governance,
implicit in most governance legislation and
regulation is the need for prudent governance of
organizations’ IT functions. Further, regulators
fail to distinguish between organization types in
mandating good governance.
In this study, we seek to better understand the
effect of different regulatory environments on IT
governance (ITG) frameworks by conducting an
exploratory collective case study of IT governance in two financial mutuals - one Australian
Credit Union and one Canadian Credit Union.
Both outsource their IT functions but use different approaches in doing so. The Australian
regulatory environment differs significantly from
the Canadian regulatory environment, largely
due to Canada’s proximity to the US. Unlike
Australia, the closeness of Canada and the US,
both geographically and commercially, tends to
result in US regulation more directly affecting
Canadian business interests. For example, the
Canada-US Free Trade Agreement has been in
place for over twenty years. In its preamble, one
of its objectives is “to ensure a predictable commercial environment for business planning and
investment” (Foreign Affairs and International
Trade Canada, 1987, p.5) The intention of the FTA
is that both the US and Canada pursue stable and
open markets, but it serves to underline that Canadian and Australian mutuals operate in structures
and environments that are contextually unique to
each country (Markus & Soh, 2002; Weisinger &
Trauth, 2002). Using a cross-national approach
42
to investigate the contextual differences between
Australian and Canadian ITG frameworks is warranted, particularly given the relatively similar
market sizes, but markedly different context in
which the two mutuals operate. Furthermore,
mutual organizations tend to fall under the same
regulatory framework as mainstream financial
institutions. Unlike mainstream financial institutions, however, mutual organizations have some
unique characteristics, largely arising from their
raison d’être. For example, their responsibilities
typically do not include maximizing shareholder
dividends, nor do mutual organizations have the
luxury of targeted recruiting for Board members.
In addition, as their boards are usually elected from
their membership, mutual organizations typically
experience elevated levels of director turnover. As
a result, mutual organizations represent unique,
if under-studied cases in ITG. Insights gained
from this study may help other non-mainstream
businesses.
The main objective of this research is to seek a
deeper understanding of the drivers behind adoption of different IT governance (ITG) mechanisms
for mutual organizations. While a substantial
number of prior studies have focused on ITG in
mainstream organizations (for example, Willcocks
et al., 2006; Weill & Ross, 2004), we are not aware
of any other studies that expressly focus on mutual
organizations operating in markedly different
national regulatory contexts. Weisinger & Trauth
(2002), in fact, note the lack of guidance available
to aid our understanding of context in the global
IT setting. More specifically, we investigate how
the different legislative and regulatory operating
environments of the focal organizations affect the
ITG mechanisms they adopt. This study seeks to
address the gap that exists between research on
ITG relative to mutual organizations in different
operational contexts. We expect this study will
help mutual organization directors in at least
three ways. First, it will reinforce the message
that directors of mutual organizations of the need
to ensure their ITG mechanisms remain strong,
Understanding IT Governance
particularly when IT functions are outsourced.
Second, it may help directors assess their current
ITG mechanisms and develop plans to address
shortcomings they may uncover. Third, it can help
directors understand the need to consider mutuals’
operating environments and contexts when planning and implementing ITG frameworks.
THEORETICAL FOUNDATIONS
In this section we develop the theoretical bases
for our investigation. First, we explain the importance of sound IT governance and pose our
research question. Next, we describe the theory
underpinning our study.
Directors and IT Governance
Addressing the Australian Institute of Company
Directors in August 2006, Chairman of the Australian Securities and Investments Commission
(ASIC), Jeffrey Lucy, stated that “Directors are
expected to meet an increasing range of obligations amidst commercial and legal expectations
of their actions.” (Lucy, 2006) He also indicated
that directors no longer are merely expected to
comply with the legalities of their position, but that
there are other expectations such as the efficient
conduct of their business, setting strategy for their
management to work towards, safeguarding the
assets of their business and, fostering an environment where instances of material fraud and error
are not present. Reinforcing Lucy’s (2006) address
and also speaking to the Australian Institute of
Company Directors, ASIC Commissioner Belinda
Gibson, outlining where global regulators stand
post-Global Financial Crisis indicated that “we
must promote market integrity – the attributes
of transparency and fairness…” (Gibson, 2009).
Information Technology (IT) has the potential
to be one of the most significant drivers of economic wealth. In many organizations IT is a critical
asset, not simply for organizational success, but
to provide opportunities to obtain competitive advantage (IT Governance Institute, 2003). Further, a
large portion of the market value of organizations
has transitioned from the tangible, (e.g., facilities,
inventory, etc.) to the intangible (e.g., information,
knowledge, expertise, reputation, etc.). However,
despite the large investments and potentially huge
risks associated with IT, boards typically focus on
business strategy and strategic risks, perhaps at
the cost of less effective IT Governance (ITG) in
the hope that nothing goes wrong (IT Governance
Institute, 2003).
While sound economic and technical reasons
may exist to pursue the outsourcing of IT functions,
the issue of governance of those outsourced IT
functions remains significant. ASIC’s message is
clear - outsourcing of IT functions will not absolve
directors of their IT governance responsibilities.
Shailer (2004) has defined governance as “…
decision-making in the exercise of authority for
direction and control” (p.11). This definition implies four interrelated principles: first, directors
should know the strategic direction the company
is pursuing. Second, they act, or make decisions.
Third, directors hold ultimate authority over the
affairs of the organization. Fourth, directors’ dutyof-care centers on oversight and control. Gillan
(2006) suggests that corporate governance consists
of a set of mechanisms internal and external to
the firm. The former includes control systems
(like information systems) that enable regulatory compliance. The Australian Stock Exchange
(ASX) uses Justice Owen’s interpretation of corporate governance, viz, “the framework of rules,
relationships, systems and processes within and
by which authority is exercised and controlled
in corporations.” (ASX, 2010). The ASX further mentions setting and achieving objectives,
assessing and monitoring risk, and optimising
performance. In sum, directors need to exercise
a duty of care, using both internal and external
mechanisms. Boards generally get themselves into
trouble, either through incompetence (which leads
to civil penalties) and/or dishonesty, which can
43
Understanding IT Governance
have criminal consequences (Colley et al., 2005;
Waring & Pierce, 2005).
Earlier research (Parent & Reich, 2009) has
noted that a plethora of possible ITG frameworks
exist – over 12 at last count, with more evolving.
These frameworks differ somewhat in their approach, for example, CoBIT, COSO, and ITIL
provide comprehensive guidance from the micro
level upwards. Given their focus, they also tend to
be fairly prescriptive. In contrast, ISO/IEC 38500,
the International Standard for ICT governance
(ISO/IEC 38500:2008 was prepared by Standards Australia as AS 8015:2005, the Australian
Standard for ICT governance, hence, the two
standards are, with minor wording differences,
identical) is targeted at the strategic level. Its focus
is more macro level and discretionary, offering
principles rather than prescription (see Appendix
A for an overview of current ITG frameworks).
While these frameworks differ relative to their
focus, they still have a single common goal: the
good governance of organizational IT. Given the
number of alternative ITG frameworks, however,
it is fair to conclude that no single approach to IT
governance has emerged. Rather, recent research
has conceived of IT Governance as having two
distinct modes: defensive and strategic (Parent &
Reich, 2009). Defensive ITG seeks to fire-proof
the organization by preventing or mitigating the
consequences of disasters. Strategic ITG, on the
other hand, aims to create sustainable shareholder
value by either reducing costs (such as the cost
of capital, or of IT projects) or creating a sustainable competitive advantage. We contend that
governance legislation and regulations help shape
organizational responses to ITG, as do the particular organizations’ approach to their IT functions.
That is, organizations’ ITG mechanisms evolve
so they align with the legislation and regulation
prevailing in their particular jurisdiction and their
methodology relative to sourcing IT resources.
Continuing this line of reasoning we propose the
following principal research question: “To what
extent does regulatory context affect the ITG of
44
mutual organizations when their IT resources are
outsourced?”
Outsourcing of IT Functions
In common with others in the same business
environment, outsourcing of IT functions has
penetrated the finance sector. While popular
opinion suggests IT outsourcing is advantageous,
the evidence on outsourcing remains contentious
(e.g., Berg & Stylianou, 2009; Caldwell, 1997;
Clemons et al., 1993; Gwebu et al., 2010; Kobelsky & Robinson, 2010; Lacity & Willcocks,
1998; Subramani & Walden, 2001). Much of the
literature on outsourcing centers on transaction
cost economics (Walden & Hoffman, 2007).
Transaction cost economics’ premise is that
firms engaging in outsourcing are attempting to
leverage economies of scale and thus cut down
on transaction costs (Walden & Hoffman, 2007).
The transaction-based view of the firm has
been augmented by resource-based views that
emphasis the importance of resources in guiding
firm activity and the management of a firm’s
various capabilities when seeking competitive
advantage (Mata el al., 1995; Holcomb & Hitt,
2007). The resource-based view focuses on the
importance of the relative capabilities of focal
firms and their outsource partners (Holcomb &
Hitt, 2007). The resource-based view posits that
firms are largely heterogeneous relative to their
resources and capabilities and hence carry out
the same activity with different efficiencies and
costs (e.g., Barney, 1991; Wernerfelt, 1984). Accordingly, individual firms that can accomplish
the same activity in different ways can achieve
different efficiencies and costs (Holcomb & Hitt,
2007). Given the potential to reduce costs and
leverage service providers’ expertise, organizations might appropriately consider outsourcing
their IT functions to improve their competitive
position. Organizations in the finance sector
may find outsourcing IT functions particularly
Understanding IT Governance
appealing especially where cost and expertise
considerations dominate.
The simplest form of outsourcing involves the
decision to outsource existing production, with
capabilities provided by intermediate markets
(Gilley & Rasheed, 2000). By contrast, organizations may decide to outsource ex ante, acquiring
capabilities from intermediate markets rather than
incurring the expenses to internalize production
(Gilley & Rasheed, 2000). Walden & Hoffman
(2007) make the point that one of the primary
steps in the outsourcing decision is evaluation.
Organizations considering outsourcing must
understand the circumstances of the decision to
outsource. That is, unless prospective outsourcing
partners can provide a product that is superior,
outsourcing is not a viable option.
Relative to outsourcing IT functions, by implication then, ensuring strong ITG should form
part of any outsourcing decision. To reinforce
this point, Australia’s corporate regulators, ASIC
and APRA, have clear messages to organizations
- outsourcing of IT functions will not absolve
directors of their ITG responsibilities.
IT Governance
As mentioned above, there is a plethora of IT
governance frameworks, which tends to suggest
that there is no one solution to good IT governance.
Further, defining what IT governance is, in an
agreed and clear fashion has proved elusive (Van
Grembergen, 2004). What appears to be generally
agreed is that implementing and using ITG minimizes risk to the organization associated with IT
investments. ISO/IEC 38500 (2008) suggests that
implementing sound ITG frameworks minimizes
risks to directors and management of organizations in two ways. First, sound ITG frameworks
reduce the risk of director and management of not
fulfilling their responsibilities to conform to the
laws in force. Second, sound ITG frameworks help
minimize the risk of not obtaining the best return
on the organizations’ investment in IT. While ISO/
IEC 38500 (ISO/IEC, 2008) provides no specific
procedure for ITG, it does suggest a framework
of ITG. That framework includes three main elements. First, the evaluation of the pressures on
the business, and, taking those into account, the
current and future business needs relative to IT.
Second, the preparation and implementation of
plans and policies for the implementation of the
required IT investments. Third, the monitoring
of the conformance and performance of the IT
implementation relative to the plans and policies. In other words, ITG may be conceived as
consisting of structure, process, and measurement
(Bowen et al., 2007). Such a framework: structure,
process, and measurement, provides an appropriate and meaningful means of analyzing the ITG
mechanisms of our focal organizations.
IT Governance Decisions
As Agarwal & Sambamurthy (2002) and Zain et
al. (2005) note, IT plays a more prominent role in
corporate agility, helping enable rapid and continual business innovation. Implicit in Agarwal
& Sambamurthy’s (2002), and ISO/IEC’s (2008)
view, is the notion that there can be no one solution to ITG, particularly in light of organizations’
need to respond rapidly to their unique operating
environments.
Like Agarwal & Sambamurthy (2002), Brown
(1997) also contends that there is no universal
“best” solution to ITG. Analogous with this notion,
we contend that different legislative jurisdictions,
likewise, oblige organizations to pursue ITG governance mechanisms that best suit their particular
business environments. Brown (1997) asserts that
the best ITG solution for a firm is contingent on
its organizational context.
Brown’s (1997) work on predictors of systems
development governance at the business unit level
is informative and compelling. By inference, and
intuitively, it provides guidance for predicting
ITG mechanisms in different legislative jurisdictions. Brown (1997) compares centralized versus
45
Understanding IT Governance
decentralized systems development governance
in organizations. In her study, centralized refers
to uniform, enterprise-wide governance solutions,
i.e., locus of decision-making authority belongs
to a central unit, while decentralized refers to
governance solutions for a specific business unit,
i.e., the locus of decision-making authority belongs
to the particular business unit.
A pertinent comparison between centralized
and decentralized governance in legislative
jurisdictions could be made between the US
and Australia. The US Securities and Exchange
Commission’s mission is to “protect investors,
maintain fair, orderly, and efficient markets, and
facilitate capital formation” (SEC, 2010). Of
the laws within the SEC’s remit, the SarbanesOxley (SOX) legislation is probably the most
recognized. In particular, Section 404 mandates
organizations’ annual reports contain an “internal
control report”. Further, SOX requires identification of the systems which will have a material
effect on financial statements (Pinder, 2006).
Typically, organizations affected by SOX make
such assessments against the COBIT or COSO
frameworks (Pinder, 2006). Both frameworks
are highly prescriptive with much emphasis on
micro-level controls. McFarlane (2005) notes that
COBIT involves 34 processes, it also details each
process’s control objectives and critical quality
criteria. Parent and Reich (2009) observe that
from a Board perspective, many IT governance
frameworks are too simplistic and high-level or,
so detailed and technically intricate, that Boards
fail to implement them due to their complexity.
Given the nature of SOX, and as put forward
by Pinder (2006), ITG frameworks like CoBIT and
COSO are more likely than others to be selected
as the ITG framework of choice for organizations
affected by SOX. Accordingly, such organizations
are likely to have little discretion with regard to
implementing their ITG mechanisms. In brief,
organizations operating in jurisdictions affected
by SOX (including SOX by proxy) are analogous
46
to Brown’s (1997) firms that maintain centralized
systems of control.
Like the SEC in the United States, ASIC,
Australia’s corporate regulator is charged with
protecting consumers, investors, and creditors
by enforcing and regulating company and financial services laws (ASIC, 2010). ASIC regulates
“Australian companies, financial markets, financial services organisations and professionals who
deal and advise in investments, superannuation,
insurance, deposit taking and credit”. APRA,
Australia’s prudential regulator’s, mission is to
“establish and enforce prudential standards and
practices designed to ensure that, under all reasonable circumstances, financial promises made
by institutions we supervise are met within a
stable, efficient and competitive financial system”
(APRA, 2010).
While both ASIC and APRA have the task of
ensuring good governance in Australian companies, the (then) Treasurer of Australia in his
Statement of Expectations to APRA states, “The
Government’s preference is for the avoidance
of unnecessarily prescriptive regulation and for
APRA’s prudential regulation to identify the
outcomes that are desired from financial institutions rather than prescribe how those outcomes
should be achieved” (Costello, 2007). Clearly, the
Treasurer’s expectations are for compliance and
good governance, but the governance frameworks
and mechanisms used are at the organizations’
discretion.
This discretionary theme is reflected in ISO/
IEC38500, the International ICT Standard (formerly AS8015). ISO/IEC38500 focuses on Boardlevel governance mechanisms, consequently ISO/
IEC38500 focuses on strategy and outcomes rather
than prescribing operational-level processes to
accomplish sound governance (ISO/IEC, 2008).
Governance in Australia and by inference, ITG,
both by expectation and legislation, falls within
the remit of the individual organization. While the
regulators make clear their desire for good governance, its achievement is left to the individual
Understanding IT Governance
firms. The Australian approach thus, appears to
be substantially consistent with Brown’s (1997)
description of decentralized governance solutions,
i.e., decision-making authority residing locally.
Harking back to our primary research question,
viz., “how the different legislative and regulatory
operating environments of the focal organizations
affect the ITG mechanisms they adopt” we posit
that there should be substantial differences in ITG
mechanisms between different business environments. That is, where the jurisdiction’s locus of
decision-making control is more centralized and
prescriptive, we expect implementations of ITG
mechanisms that closely conform to ‘black letter’
laws, e.g., SOX or SOX by proxy. In contrast,
where the locus of decision-making resides locally,
we expect implementations of ITG mechanisms
that reflect the ‘spirit’ of the prevailing laws, e.g.,
Australian Prudential Standard APS 510.
To investigate “…how the different legislative
and regulatory operating environments of the focal organizations affect the ITG mechanisms they
adopt” we undertook a cross-national multi-case
study. The methodology is discussed in the following section.
RESEARCH METHODOLOGY
Our investigation focuses on two credit unions in
different countries. These credit unions have many
similar characteristics, in that they both outsource
their IT operations, however, both have pursued
different models in doing so. While there are many
similarities between the two credit unions in this
study, their respective operating environments
differ significantly. The Canadian credit union,
because of its geographical and commercial
proximity to the US finds itself being influenced
by the US SOX governance legislation. On the
other hand, the Australian credit union’s primary
influence is the governance legislation enforced
by APRA. While both the SOX and APRA seek
the same goal, that is, good governance, as men-
tioned previously, the SOX legislation tends to be
more prescriptive than the legislation enforced by
APRA. We would expect to observe noticeable
differences between the ITG approaches adopted
by the Canadian and Australian credit unions.
The primary research question of this study
is to discover why different legislative and
regulatory operating environments affect the ITG
mechanisms an organization adopts. We draw on
an array of documentary evidence, as suggested
by Yin (2003). For example, current ITG frameworks, published governance guidelines, and prior
research on ITG. We contend, however, that to
find out why different legislative and regulatory
operating environments affect ITG we needed
to get data from people directly involved in the
execution of ITG. We posit, therefore, that a case
study methodology is appropriate to this research.
Yin (2003) notes that case study methodologies
are useful when trying to answer ‘who’, ‘what’,
‘where’, ‘how’, and ‘why’ type questions. Further,
we adopted a case study approach as case studies
permit the investigation of real-life events such
as organizational and managerial processes (Yin,
2003). Case studies are appropriate where the
boundaries between context and phenomenon are
not clearly evident (Yin, 2003). Case studies are
generalizable to theoretical propositions, if not
to populations (Yin, 2003). While we study only
one credit union in each country, the legislation
affecting each credit union is largely uniform
within the sector. Accordingly, we believe the
consequences of the prevailing regulation and
legislation is generally applicable within each
jurisdiction. Lastly, by engaging in a collective
case study, we will be able to potentially discern
a richer description and understanding of the
phenomenon (Stake, 1995).
Specifically, we used a cross-national approach
that investigated the cases of two mutuals. Regulatory environment aside, as outlined in Table 1, the
Canadian and Australian financial sectors share
many traits and similarities. The countries have
comparable ownership concentrations, market
47
Understanding IT Governance
Table 1. Economic Comparison between Australia and Canada
Characteristic
Australia
Canada
Ownership concentration (mean % held by top 3 shareholders for top 10 companies)
28
40
Market capitalization (mean USD million for top 10 companies.)
5,943
3,015
GNP per capita (USD)
17,500
19,970
Table 2. Key characteristics
Characteristic
Canadian
Australian
Location
British Columbia
Queensland
Number of Directors
12
7
Term of directorship
Varied (staggered appointments)
3 years before standing for election
Number of branches
17
7
Asset base
CAN3.4B
AUD135M
Primary Market
Savings, mortgages
Secured housing loans
Committees
Executive, Audit
Executive, Audit, Risk Management, Director Nomination
Regulator: Risk
Canadian Public Accountancy Board
APRA for Prudential Risk Management
Regulator: Compliance
Province of BC
ASIC for adherence to Corporations Act, Accounting
Standards disclosures in the financial report, and Financial Services Reform requirements
Auditors report to:
Members, CPAB
APRA, ASIC, Audit Committee
capitalizations, and GNP per capita (La Porta et
al., 1998). They are also notably culturally similar (Hofstede, 2010). Further, as noted in Table
2, there are also many similarities between the
two mutuals that are the focus of this study. We
posit that the two mutuals are sufficiently similar
to permit meaningful comparison of the effects
of their respective operational contexts on their
ITG frameworks. The access to the organizations became available to the authors through
acquaintance with the managers and boards of
the organizations. The data were collected at
the board and corporate level from the two focal organizations. Open-ended interviews were
conducted with the CIO and board members of
the Canadian mutual. The GM and Chairman of
the Australian mutual were interviewed using
the same open-ended interview technique. The
interviews lasted some 90 minutes, and covered
48
topics including regulation, outsourcing, and IT
governance. To ensure the information offered by
the interviewees’ was adequately reflected, we also
drew on observations, field notes, and secondarysource documents provided by the organizations.
Our aim was to reveal the interviewees’ rationales
for adopting their respective ITG frameworks in
all its nuances.
Analysis of the interviews was undertaken
using grounded techniques. A grounded theory
approach allows researchers to focus on elements
of context and process and on the actions of the
main players in the organization (Orlikowski,
1993; Fernandez, 2005). Our approach to analysis was consistent with Glaser’s (2001) and Yin’s
(2003) approaches to case study research (cf.
Lehmann, 2001). In this approach, ‘slices’ of data
are collected, codified and categorized in an evernarrowing spiral that leads to a deeper understand-
Understanding IT Governance
ing of the phenomenon. In our case, we first independently open-coded the interviews (that is,
coded for as many categories as possible, with no
pre-existing codes in mind). Repeated engagement
with the data led to emergence of patterns which
formed the basis for our findings regarding ITG
decisions in the two organizations.
In Canada, proximity to the United States and
to contagion by SOX has led Canadian regulators
to adopt SOX-like (SOX by proxy) measures. That
is, the tendency is to be punitive rather than preventative, confrontational (especially when breaches
occur) rather than collaborative. In Australia, the
approach has been to have an industry-led standard
(AS8015, now ISO/IEC38500:2008) developed.
As a result, Australian companies have willingly
and widely adopted the practices embodied in
this standard, and treated IT Governance and
compliance as business processes, not as punitive
proscriptions. We posit therefore, that, a priori, we
would see different forms of organization for ITG
in organizations in each country. Those forms of
ITG adopted such that they reflect the prevailing
legislation of the particular jurisdiction.
ORGANIZATIONAL STRUCTURE
Mutuals
Both organizations are mutuals, that is, they operate for the benefit of their members. As is typical
for mutuals, each member has one share in the
organization, with that share conferring certain
rights. Of those rights, probably the most exercised
are the right to stand for election as a director of
the mutual, and the right to vote for a member
standing for election to the board. For mutuals a
major effect of such a structure is the inability to
target recruiting for board members. Hence, the
skill set of the board may vary substantially from
term to term.
Like most organizations operating in the finance sector, there are significant pressures on
our two credit unions. For example, domestic and
international competition is driving down margins,
there is a surfeit of financial products, and ever
increasing demands for compliance with legislation have demanded that our credit unions respond
rapidly to a volatile operating environment. To
ensure survival in their respective operating environments, our credit unions have had to make
sure they are both lean and agile.
A BRIEF HISTORY OF
THE CREDIT UNIONS
Friendly and Amity
Friendly Credit Union was created in the Province
of British Columbia (BC), Canada, when two
long-standing credit unions merged. Friendly
has a number of subsidiary businesses including
Friendly Insurance Services, Friendly Investment
Services, Friendly Leasing and iSupport Technology Services. Amity Savings was formed in
Alberta (AB) when eight credit-unions merged,
and two additional credit unions were purchased.
Its subsidiary businesses include iSupport Technology Services.
In 2004, the two companies created a strategic
partnership. Under Canadian laws, credit unions
are not allowed to join forces, or to operate interprovincially, at least not by full-scale mergers.
The joint strategy, then, centered on creation of
a jointly-owned strategic plan and formation of
jointly-owned companies for IT-centered business
operations, insurance services, wealth management, and auto dealer services. Each credit union
retained its own members, separate boards, and
existing brands, branding, name and products.
The partnership explicitly recognized that to
avoid unnecessary duplication of functions and
to maximize cost efficiencies, there had to be a
single point of leadership for back-office activities.
49
Understanding IT Governance
Responsive
Responsive credit union originated in Brisbane,
Australia. Responsive was one of the major providers of financial services to a vertical industry
sector in Queensland. The mutual had a board of
directors, a general manager, functional managers
and line staff.
As indicated in Table 2, aside from the asset
base, there are substantial similarities between the
two mutuals. Both outsource their IT functions;
however, each has taken a very different approach
to their IT governance responsibilities.
IT FUNCTION
Friendly and Amity
In recognition of the need for a single point of
leadership on back-office activities, Friendly and
Amity’s strategic IT plan called for a joint core
banking system. It adopted Fincentric’s Wealthview Banking System as the common platform for
both organizations. One CIO was appointed and
charged with its implementation in both organizations. The end result of strategic IT plan was the
creation of iSupport Technology Services Ltd, a
wholly-owned subsidiary company responsible
for all IT services in both credit unions.
iSupport is responsible for maintaining and
managing the core banking system in both credit
unions; all information processing operations; and
all desktops. The company also has an outward
mandate to act as a credit union outsourcer, and is
looking to sell its services to other credit unions
in Canada.
Responsive
Responsive had historically outsourced its IT function and continued with that strategy. Responsive
had just completed a major update of its core
banking system. The Data Action Phoenix system
50
provided core banking, loans origination, collections, internet banking, and archiving facilities.
Data Action was selected by management and
the directors who believed Phoenix offered more
functionality than the previous system and better aligned with Responsive’s corporate strategy
of high-level personalized banking. Responsive
outsourced its IT function for two primary reasons.
First, Data Action was able to provide services to
Responsive that fulfilled current and future product requirements, met customers’ expectations of
high-level personalized banking services, and,
importantly, satisfied cost control objectives i.e.,
Responsive leverages Data Action’s expertise.
Second, Responsive relied on Data Action to
adhere to all appropriate operations-level regulations (e.g., privacy, security). Responsive, via Data
Action, thus ensured its own compliance with
operational regulations relative to its IT function.
In the GM’s words, using Data Action was “safer”.
In summary, having assessed the pressures in
their respective operating environments Friendly,
Amity, and Responsive have outsourced their IT
functions for at least the following three reasons.
First, the organizations were able to leverage
the expertise of their IT providers, e.g., security
and privacy management. Second, in response
to customer demands, the credit unions used the
capabilities of their IT providers’ platforms to
offer new or extended products. Third, outsourcing offers economies of scale and, hence, cost
efficiencies that otherwise would not be available
to the credit unions.
IT GOVERNANCE PROCESSES
iSupport
iSupport is a privately-owned company, and as
such, not subject to the usual listing and other
requirements of public organizations. It is a small
organization with less than 25 employees. iSupport’s structure is shown in Figure 1.
Understanding IT Governance
Figure 1. iSupport Structure
In addition to ensuring high levels of IT expertise, customer satisfaction, and cost efficiencies, Friendly and Amity had a further compelling
consideration in their decision to outsource their
IT function. Friendly and Amity had to make
certain liability issues between the two credit
unions were avoided. For example, if a problem
occurred with data processing, then the members
of one credit union could not sue the other
credit union for negligence. As a separate company, iSupport, an outsourcer, is at arm’s length
from the credit unions, and assumes all liability.
Canadian credit unions are governed federally by the Canadian Cooperatives Act and the
Canadian Banking Act as well as their respective
provincial statutes. BC and AB have also signed
a Free-Trade act, which allows for, amongst
other things, unfettered sales of some financial
products like insurance. The creation of iSupport
was reviewed by, and approved, a priori, by the
relevant provincial regulators.
Prior to the creation of iSupport, the CIO
implemented the CoBIT governance framework in
both Friendly and Amity. He did so for a number
of reasons, foremost among them that it was the
framework used by, and recommended by their
auditors along with a number of other auditing
firms – in effect the standard for the industry.
Furthermore, the CIO was very mindful of the
need to implement an ITG framework that was
acceptable to both the national and provincial
regulators. The CIO also felt that CoBIT was more
focused on process management than competing
frameworks like ITIL. In addition, the CIO and
his staff also conduct annual SAS 70 audits on
their operations.
iSupport’s external auditor was assigned the
task of completing an IT Risk audit and letter as
well as a full governance audit. Both the external and internal auditors report directly to the
Board’s Audit Committee. The CIO describes the
relationship with auditors as a partnership – one
in which they both work together to improve the
organization. The CIO also works with the external
and internal auditors to develop a 3-year audit
plan. In his words, the auditors are “protagonists,
not antagonists, who help us to manage risk.”
He sees them acting as a check-and-balance on
management.
According to the CIO, only one director was
IT-savvy. As a result, the Board tends to rely on
the CIO for advice and for his expertise. In his
words, the Board “just trusts the CIO”. He asserts
that directors confuse the size of a project and its
risk, often causally linking the latter to the former.
He disagrees, stating that the board should not be
governing “IT-guys doing ERP but the real risk like
evergreening, data management and storage, and
other functions with organization-wide impacts.”
The CIO had prepared a comprehensive IT
Governance model that was presented to the board
at a regular meeting for approval. It is reproduced
in Figure 2. The CIO believes that IT and business strategies across all 3 companies are strongly
aligned. This is due, he states, to the single, common point of leadership in all 3 organizations,
Friendly’s dominant role in the alliance, and in the
focus on creating and sustaining business value
in all 3 organizations.
As mutuals, credit unions have lay boards, and
often cannot recruit with specific skills, like IT,
in mind. For example, Annual General Meetings
typically only attract a very small percentage of
members. Further, only a small number of members cast absentee ballots. Resulting from such
low turnout, and low response rates, directors may
51
Understanding IT Governance
Figure 2. iSupport’s IT Governance Model
not reflect the interests of all members, or even a
majority of them. The CIO believes that it is incumbent on senior staff in the credit unions, and
now him at iSupport, to educate directors on the
scope and nature of their responsibilities. As a
result, and as the above framework attests, IT
governance is very much viewed as an operational item rather than a board responsibility
under these circumstances. As the CIO states,
“We assist the board in that the IT audit is presented
to them, the IT strategy is shared, the subsidiary
is reported on and we have the skills-based recruiting in the works. However, at the high level,
the operations of IT would not be the normal
reporting practice, more about efficiency, forward
planning for expansion and scale as well as some
performance items that are customer-impact and
member-experience related.”
52
Responsive
As noted in Table 2, Responsive operated in a
regulatory framework overseen by ASIC and
APRA. ASIC ensures that organizations such as
credit unions adhere to the Corporations Act, for
example, complying with such matters as Accounting Standards disclosures in financial reports.
Responsive’s structure is shown in Figure 3.
The regulatory framework for Authorised
Deposit-taking Institutions (ADIs), such as
credit unions, in Australia is comprehensive,
binding, and actively enforced. Whether outsourced or not, organizational IT functions come
under the scrutiny of APRA. Complying with IT
governance requirements necessitates knowledge
of the applicable prudential standards. Responsive’s Board has delegated responsibility for IT
governance to the General Manager. Delegating
governance responsibility to the General Manager and functional responsibility to Data Action
does not, as noted in APRA’s (2002) APS231,
Understanding IT Governance
Figure 3. Responsive Credit Union Structure
absolve the Directors of any of their governance
obligations and responsibilities.
A persistent and pervasive thread of Board discussions was the need to ensure all strategies and
decisions were aligned with APRA’s expectations
and requirements. With regard to outsourcing its
IT function, the Board was guided by APS 231:
Outsourcing. For example, APS231 states that
directors must assess and understand the business
case for outsourcing, must assess the selection
process, undertake a due diligence review of the
provider, and ensure the agreement contains all
appropriate matters. Furthermore, the Board has
to ensure any outsourcing agreements are entered
into with providers that have the ability to conduct
their business on an ongoing basis, that agreements
are subject to review, and that contingency plans
are put in place should the need arise to bring the
activity back in-house. By working within regulatory frameworks, and regularly engaging with
auditors and regulators, Responsive, its managers and directors, had fulfilled its IT governance
obligations to the satisfaction of its regulators.
Both the internal and external auditors reported
directly to the Audit Committee. The internal and
external auditors had a cordial relationship with
Responsive. Points of contention were generally
resolved by way of exit interviews. Responsive’s
directors and management felt that maintaining a
cordial, rather than adversarial, relationship with
its auditors resulted in better business processes,
greater awareness of regulatory requirements, and
better risk management. In brief, both directors
and management of Responsive viewed the audit
function as a benefit rather than an impost.
Like Amity and Friendly, Responsive typically
had very low member turnouts at Annual General
Meetings. Further, only a handful of proxy votes
were exercised. Like the Canadian mutuals,
Responsive’s board composition came about,
perhaps, more by chance than design. Of the 7
board members, two had IT expertise. Certainly,
all board members were interested in IT issues,
however, most board members lacked the specific
knowledge and skills to critically evaluate current
and planned IT implementations. Consequently,
they relied heavily on the advice and judgment of
the GM, at least, where IT matters were concerned.
53
Understanding IT Governance
IT GOVERNANCE MEASUREMENT
Since entering into its agreement with its new IT
provider, Responsive has undertaken measurements of its IT governance from a number of
perspectives. The following four examples are
indicative of Responsive’s means of measuring
ITG success. First, Responsive reviewed the core
banking service provided by Data Action relative
to key business practices. Second, to ensure risk
arising from use of Data Action is minimized,
i.e., Data Action is a dependable provider of IT
functions, Responsive required that Data Action
provide its Business Continuity Plan for scrutiny
both by their auditors and by APRA. Third, actual
financial costs and financial benefits are regularly
compared to the budgeted costs and benefits for
the new agreement. Fourth, Responsive reviews
intangible elements such as staff satisfaction
with the Data Action product, as well as seeking
to ascertain customer satisfaction with the Data
Action web interface.
In contrast, ITG measurement at Friendly and
Amity is more institutional than process-based. By
creating iSupport, its wholly-owned subsidiary,
Friendly and Amity have effectively adopted a
series of governance and control mechanisms
embodied in the structure of the new organization.
They have decided to use the CoBIT and SAS70
frameworks, both of which contain specific, measurable ITG metrics, and to have their external
auditor conduct an IT risk audit annually. Any
deficiencies arising from the audit then become
action items for the board and iSupport’s management. As such, ITG mechanisms in this case, are
the result of imposition of a formal organizational
context, and thus are embedded in the firm’s
operations and subject to fiduciary verification.
FINDINGS & IMPLICATIONS
Friendly, Amity, and Responsive have many common points. Both are mutuals, both had recently
54
upgraded their core banking system with off-theshelf software, both outsource their IT function,
and they have lay Boards. However, the regulatory environment of the Canadian and Australian
mutuals is substantially different. In Australia, the
regulatory and legislative framework is national,
industry focused, clear, and actively enforced.
How the individual organization implements
governance mechanisms within the legislative
framework, however, is left to the discretion of
the organization. John Trowbridge, an Executive
member of APRA addressing The Institute of
Actuaries on 29 September 2009 reinforces this
approach,
“An important part of our oversight is our reliance on the board to take full responsibility for
the company. i.e., APRA holds the board directly
accountable for the company meeting APRA’s
prudential standards.”
Indeed, some would argue that the reasons for
Australia’s better performance than most during
the Global Financial Crisis were APRA’s conservative approach to financial regulation and in the
words of John Laker, APRA’s Chairman (2009)
that “the buck stops with the board!”
The thrust of the legislation remains similar
between Australia and Canada, that is, to ensure
good governance and hence protection of stakeholders, however, the execution is different. The
legislation under which Canadian institutions
operate tends to be more punitive than in the
Australian environment, most likely as a result of
Canada’s proximity to the US, and the attendant
contagion of SOX. Canadian legislation is more
concerned with punishment after the fact (in
the case of egregious breaches) than in prevention. In the previous section, we mentioned that
Friendly and Amity have implemented CoBIT
ITG frameworks. As noted by Pinder (2006),
organizations affected by SOX tend to assess
their ITG frameworks against frameworks like
CoBIT. SOX appears to have, de facto, promoted
Understanding IT Governance
a centralized, uniform ITG framework, that, by
way of threat of punitive action appears to have
elevated frameworks like CoBIT to the position of
ITG frameworks of choice. Organizations affected
by SOX appear to be driven by compliance with
“black letter” law and avoidance of penalty. That
is, the locus of control for ITG, in effect, resides
centrally with the SEC.
In contrast, the Australian approach tends to
be more cooperative as it arose from industry-led
initiatives and its focus is on ongoing compliance. The legislation and, in consequence, the
regulators’ focus centers on good governance
but without as the (then) Australian Treasurer
put it “unnecessarily prescriptive regulation” and
“to identify the outcomes that are desired from
financial institutions rather than prescribe how
those outcomes should be achieved” (Costello,
2007). In brief, Australian ITG frameworks appear driven by compliance with the “spirit” of the
law, whereby the locus of control for ITG resides
with the particular organization. That is, control
is decentralized.
Returning to our research question: “How
the different legislative and regulatory operating
environments of the focal organizations affect
the ITG mechanisms they adopt”? The Australian
model with its clear regulatory and legislative
framework and focus on the actions of directors
and managers provides a well-defined operational
environment for mutuals. The expectations of
those operating within the industry are made abundantly clear. Consequently, the mutuals, directors
and managers, auditors, and service providers are
all marching to the beat of the same drum. If all of
the stakeholders adhere to the framework, good
governance of the IT function should take place.
In the Canadian context, governance of the IT
function of mutuals seems to rest more heavily on
the CIO and his or her ability to, as Willcocks et
al. (2006, p. 30) state ”… devise organizational
arrangements – structures, processes and staffing –
to successfully manage the interdependencies…”
In brief, both the Canadian and Australian models
seek to ensure good ITG. In the Canadian model
it is more dependent, however, on the individual,
which is why it might make sense to curtail this
individual’s influence by creating a hierarchical
structure (in this case, a wholly-owned subsidiary)
to minimize potential ITG shortcomings.
The consequences for directors of these two
disparate IT governance models are somewhat different. The Australian model does not permit directors to side-step their responsibilities. Regardless
of whether IT, or any other function, is outsourced,
directors remain personally responsible for their
actions and the effects of those actions on owners. As such, it makes more sense for them to opt
for a multi-facetted (e.g., outsourcing operational
processing, delegating managerial authority, while
retaining strategic control) form of ITG to help
minimize potentially negative outcomes. In the
Canadian case, directors are no less responsible.
However, the existence of the subsidiary limits
that liability to only that part of the organization.
The creation of a separate entity such as iSupport
would be unlikely reduce the liability of directors of organizations were a similar undertaking
to happen in Australia. However, unlike the
Australian experience, creation of an entity like
iSupport mitigates the power of the individual CIO
by having them directly accountable to a Board
composed of executives/members of its owners.
Therefore, in this case, where regulations are
punitive, potential penalties are minimized using
hierarchical mechanisms.
IMPLICATIONS FOR PRACTICE
There are two key implications of this study for
practice. First, is the necessity of mutuals to use
ITG mechanisms that reflect and compliment
the regulations and legislation in force in their
particular jurisdiction. In Canada where proximity to the US has lead to alignment with the
SOX legislation, adoption of ITG frameworks
such as COSO and CoBIT offer ITG processes
55
Understanding IT Governance
that have regulators’ imprimatur. While it may be
possible to adopt other ITG frameworks, COSO
and CoBIT are widely known and their adoption
is likely to garner support from regulators keen to
see implementation of proven ITG frameworks.
In Australia, there appears to be more flexibility in choosing appropriate ITG frameworks,
as implied by the (then) Treasurer Peter Costello’s
(2007) Statement of Expectations. In the case of
the Australian credit union, it was a small organization, offering straightforward products hence,
its ITG framework is appropriate to its situation.
That said, its ITG framework, at all times, was
subject to scrutiny by APRA during its regular
inspections. On all occasions the ITG framework
had been given APRA’s imprimatur.
Second, while directors may not need to understand every technical aspect of their respective
ITG frameworks, it is imperative that they understand their rationale and operation. Furthermore
they need to have a clear understanding of their
responsibilities relative to good ITG. During
APRA’s scrutiny of Responsive’s ITG framework
(and other aspects of governance) its inspectors
interviewed Responsive’s directors to ensure they
understood the rationale and the operation of the
ITG framework. Directors were also questioned
in relation to their responsibilities should failures
of governance, both within Responsive and Data
Action, arise. Directors of Friendly and Amity,
likewise, have had to demonstrate their understanding of the ITG framework through board
meetings and management briefings.
IMPLICATIONS FOR RESEARCH
Mutual organizations offer an interesting, but
seemingly understudied area of research for information systems researchers. While many are
individually small, as an industry their financial
worth is substantial. For example, Australian credit
unions account for some $73 billion in assets and
have some 4.5 million members (Abacus 2010).
56
Mutuals have at least three features that make them
unique from other mainstream financial organizations. First, their Boards are typically elected
from the membership. An obvious consequence
of this is their restricted ability to target specific
skill sets for the Board. This restricted ability to
target specific skill sets has a number of implications. For example, it is quite conceivable that a
member with limited or no skills in business or
commerce is elected to the Board (Australian
Prudential Standard 520: Fit and Proper Standard
does limit the likelihood of such a member being
elected to the Board).
Second, they do not have to pay dividends in
the same way as mainstream financial organizations. The dividend is typically returned by way
of reduced fees, lower cost loans, etc., in consequence, maximizing profit may not be mutuals’
primary goal. Third, mutuals, as financial institutions, are often subject to the same regulatory
and legislative controls as mainstream financial
organizations, however, many are smaller, have
fewer resources, and often have a different raison
d’être to mainstream financial institutions. They
often deal with their regulatory responsibilities
in unique and innovative ways.
Weisinger & Trauth’s (2002), comments relative to the lack of guidance to help understanding
of context in the global IT setting offer great scope
for further research. As regulation becomes more
harmonized, particularly post-GFC, understanding
how different national contexts affect the implementation of regulations offers fruitful research
opportunities. Our work on ITG frameworks is
but one aspect of the global IT sphere.
REFERENCES
Abacus. (2010). Factsheets. Retrieved November
10, 2010, from http://www.abacus.org.au/images/
stories/factsheets/2010/CUBS_Factsheet_October_2010.pdf
Understanding IT Governance
Agarwal, R., & Sambamurthy, V. (2002). Principles and models for organizing the IT Function.
MIS Quarterly Executive, 1(1), 1–16.
APRA. (2010). About APRA. Retrieved on November 8, 2010, from http://www.apra.gov.au/
aboutApra/
ASIC. (2010). Our role? Retrieved on October 5,
2010, from http://www.asic.gov.au/asic/asic.nsf/
byheadline/Our+role?openDocument
Australia, S. (2005). Corporate governance of
Information and Communication Technology.
Sydney, Australia: Standards Australia.
Australian Prudential Regulatory Authority.
(2002). Prudential standard APS231 – Outsourcing. Retrieved on October 5, 2010, from http://
www.apra.gov.au/policy/final_adi_standards/
APS231.pdf
Australian Securities Exchange. (2010). Corporate governance principles and recommendations
with 2010 amendments (2nd ed.). Sydney, Australia: Australian Securities Exchange.
Barney, J. (1991). Firm resources and sustained
competitive advantage. Journal of Management,
17(1), 99–120. doi:10.1177/014920639101700108
Berg, B., & Stylianou, A. (2009). Factors considered when outsourcing an IS system: An empirical
examination of the impacts of organization size,
strategy and the object of a decision. European
Journal of Information Systems, 18(3), 235–248.
doi:10.1057/ejis.2009.18
Bowen, P., Cheung, M., & Rohde, F. (2007). Enhancing IT governance practices: A model and case
study of an organization’s efforts. International
Journal of Accounting Information Systems, 8,
191–221. doi:10.1016/j.accinf.2007.07.002
Brown, C. (1997). Examining the emergence of
hybrid IS governance solutions: Evidence from
a single case site. Information Systems Research,
8(1), 69–94. doi:10.1287/isre.8.1.69
Caldwell, B. (1997, September 29). Outsourcing
backlash. Information Week, 650, 14–16.
Clemons, E., Reddi, S., & Row, M. (1993). The
impact of information technology on the organization of economic activity: the “move to the middle”
hypothesis. Journal of Management Information
Systems, 10(2), 9–29.
Colley, J., Doyle, J., Logan, G., & Stettinius, W.
(2005). What is corporate governance?New York,
NY: McGraw-Hill.
Costello, P. (2007). Statement of expectations from
the treasurer. Retrieved on October 5, 2010, from
http://www.apra.gov.au/AboutAPRA/upload/
Statement-of-Expectations-from-Treasurer-20Feb-07.pdf
Fernandez, W. D. (2005). The grounded theory
method and case study data in IS research: Issues and design. In D. Hart & S. Gregor (Eds.),
Information Systems foundations: Constructing
and criticising, (pp. 43-59). Canberra, AU: ANU
E Press.
Foreign Affairs and International Trade Canada.
(1987). The Canada – US free trade agreement.
Toronto, Canada: Foreign Affairs and International
Trade Canada. Retrieved on October 6, 2010, from
http://www.international.gc.ca/trade-agreementsaccords-commerciaux/assets/pdfs/cusfta-e.pdf
Gibson, B. (2009). Regulators at the forefront of
change. Australian Securities and Investments
Commission, 11 June 2009. Retrieved on October
5, 2010, from http://www.asic.gov.au/asic/pdflib.
nsf/LookupByFileName/Gibson-ASIC-Company-directors-speech-regulators-11-June-2009.
pdf/$file/Gibson-ASIC-Company-directorsspeech-regulators-11-June-2009.pdf
Gillan, S. L. (2006). Recent developments in corporate governance: An overview. Journal of Corporate Finance, 12(3), 381–402. doi:10.1016/j.
jcorpfin.2005.11.002
57
Understanding IT Governance
Gilley, K., & Rasheed, A. (2000). Making more
by doing less: An analysis of outsourcing and its
effects on firm performance. Journal of Management, 26(4), 763–790. doi:10.1016/S01492063(00)00055-6
Lacity, M., & Willcocks, L. (1998). An empirical
investigation of Information Technology sourcing
practices: Lessons from experience. Management
Information Systems Quarterly, 22(3), 363–408.
doi:10.2307/249670
Glaser, B. G. (2001). The grounded theory
perspective: Conceptualisation contrasted with
description. Mill Valley, CA: Sociology Press.
Laker, J. (2009). Mutuals after turbulent times.
Australian Prudential Regulation Authority, 9 November 2009. Retrieved on October 6, 2010, from
http://www.apra.gov.au/Speeches/upload/09Abacus-Convention-9-Nov-09.pdf
Gwebu, K., Wang, J., & Wang, L. (2010). Does
IT outsourcing deliver economic value to firms?
The Journal of Strategic Information Systems,
19(2), 109–123. doi:10.1016/j.jsis.2010.05.003
Hofstede, G. (2010). Cultural dimensions. Retrieved October 5, 2010, from http://www.geerthofstede.com/hofstede_australia.shtml and http://
www.geert-hofstede.com/hofstede_canada.shtml
Holcomb, T., & Hitt, M. (2007). Toward a model
of strategic outsourcing. Journal of Operations
Management, 25(2), 464–481. doi:10.1016/j.
jom.2006.05.003
ISO/IEC. (2008). Corporate governance of
Information Technology. Geneva, Switzerland:
ISO/IEC.
IT Governance Institute. (2003). Board briefing
on IT governance (2nd ed.). Rolling Meadows,
IL: IT Governance Institute.
Kobelsky, K., & Robinson, M. (2010). The impact
of outsourcing on information technology spending. International Journal of Accounting Information Systems, 11(2), 105–119. doi:10.1016/j.
accinf.2009.12.002
La Porta, R., Lopez-de-Silanes, F., Shleifer, A.,
& Vishny, R. (1998). Law and finance. The Journal of Political Economy, 106(6), 1113–1155.
doi:10.1086/250042
Lehmann, H. (2001). A grounded theory of international Information Systems. Unpublished
doctoral dissertation, The University of Auckland.
Lucy, J. (2006). Directors’ responsibilities: The
reality vs. the myths. Australian Securities and
Investments Commission, 17 August 2006. Retrieved on October 5, 2010, from http://www.
asic.gov.au/asic/pdflib.nsf/LookupByFileName/
Directors_responsibilities_August2006.pdf/$file/
Directors_responsibilities_August2006.pdf
Marcus, M., & Soh, C. (2002). Structural influences on global e-commerce activity. Journal of
Global Information Management, 10(1), 5–12.
doi:10.4018/jgim.2002010101
Mata, F., Fuerst, W., & Barney, J. (1995). Information Technology and sustained competitive advantage: A resource-based analysis. Management
Information Systems Quarterly, 19(4), 487–505.
doi:10.2307/249630
McFarlane, G. (2005, 1 July). A model for CIO
success. CIO Canada.
Orlikowski, W. (1993). CASE tools as organizational change: Investigating incremental and radical changes in systems development. Management
Information Systems Quarterly, 17(3), 309–340.
doi:10.2307/249774
Parent, M., & Reich, B. H. (2009). Governing
IT risk. California Management Review, 51(3),
134–152.
58
Understanding IT Governance
Pinder, P. (2006). Preparing information security
for legal and regulatory compliance (Sarbanes-Oxley and Basel II). Information Security Technical
Report, 11, 32–38. doi:10.1016/j.istr.2005.12.003
Pitts, G. (2007, March 20,). Black shouldn’t
have gone public, Trump says. The Globe and
Mail online. Retrieved on March 21, 2007, from
http://www.theglobeandmail.com/servlet/story/
RTGAM.20070320.WxBlackTrump20/BNStory/
ConradBlack
Walden, E., & Hoffman, J. (2007). Organizational form, incentives and the management
of information technology: Opening the black
box of outsourcing. Computers & Operations
Research, 34(12), 3575–3591. doi:10.1016/j.
cor.2006.01.002
Waring, K., & Pierce, C. (Eds.). (2005). The
handbook of international corporate governance.
London, UK: Institute of Directors (IoD) &
Kogan-Page.
Report, C. (1992). The report of the Committee on
the Financial Aspects of Corporate Governance.
Retrieved on October 6, 2006, from http://rru.
worldbank.org/Documents/PapersLinks/1253.pdf
Weill, P., & Ross, J. (2004). IT governance: How
top performers manage IT decision rights for
superior results. Boston, MA: Harvard Business
School Press.
SEC. (2010). What we do. Retrieved on October
5, 2010, from http://www.sec.gov/about/whatwedo.shtml
Weisinger, J., & Trauth, E. (2002). Situating
culture in the global information sector. Information Technology & People, 15(4), 306–320.
doi:10.1108/09593840210453106
Shailer, G. (2004). An introduction to corporate
governance in Australia. Frenchs Forest, NSW:
Pearson Education Australia.
Stake, R. (1995). The art of case study research.
Thousand Oaks, CA: Sage Publications.
Subramani, M., & Walden, E. (2001). The impact
of e-commerce announcements on the market
value of firms. Information Systems Research,
12(2), 135–154. doi:10.1287/isre.12.2.135.9698
The Economist. (2010). The banks battle back:
Basel 3. The Economist, 395(8684), 75. London.
Trowbridge, J. (2009). Beyond the global financial crisis. A Prudential perspective. Australian
Prudential Regulation Authority, 29 September
2009. Retrieved on October 6, 2010, from http://
www.apra.gov.au/Speeches/upload/IAA-Beyondthe-GFC-Sep-09.pdf
Wernerfelt, B. (1984). A resource-based view
of the firm. Strategic Management Journal, 5,
171–180. doi:10.1002/smj.4250050207
Willcocks, L., Feeny, D., & Olson, N. (2006).
Implementing core IS capabilities: Feeny-Willcocks IT governance and management framework
revisited. European Management Journal, 24(1),
28–37. doi:10.1016/j.emj.2005.12.005
Yin, R. (2003). Case study research design and
methods (3rd ed.). Thousand Oaks, CA: Sage
Publications.
Zain, M., Rose, R., Abdullah, I., & Masrom, W.
(2005). The relationship between information
technology and organizational agility in Malaysia.
Information & Management, 42(6), 829–839.
doi:10.1016/j.im.2004.09.001
Van Grembergen, W. (2004). Strategies for Information Technology governance. Hershey, PA:
Idea Group Publishing.
59
Understanding IT Governance
APPENDIX
Table 3. IT Governance Frameworks. Adapted from citation omitted
Framework
Origin / Definition
Description
CoBIT
Control Objectives for Information and related Technologies – developed by the IT Governance Institute (ITGI – www.itgi.org) for
the Information Systems Audit and Control
Association (ISACA – www.isaca.org)
First published in 1996, and now in its fourth version,
this is a best practices framework that lists 34 high-level
objectives covering 215 control objectives grouped into 4
domains: Plan & Organize; Acquire & Implement; Deliver
& Support; and Monitor & Evaluate.
COSO
Committee of Sponsoring Organizations of the Treadway
Commission (www.coso.org)
A private-sector initiative formed in 1985 to deal with
fraudulent financial reporting. Published its 8-component
Enterprise Risk Management Integrated Framework in
2004 as a result of the passage of SOX in 2002. This framework has been endorsed by the SEC as SOX-compliant.
ITGAP
IT Governance Assessment Process – Peter
Weill & Jeanne W. Ross (2004). IT Governance: How
Top Performers Manage IT Decisions Right for Superior
Results. Cambridge: Harvard Business School Press.
A 4-stage, matrix process in which organizations and
managers map 5 IT Decision Domains against one or
more of 5 Governance Archetypes.
ITGDF / GAM
IT Governance Design Framework / Governance Arrangements Matrix (Weill & Ross, 2004)
Part of the ITGAP process, in which managers first map
IT-related processes in their organizations before changing
them to conform to one or more governance archetype.
CMM / CMMI
Capability Maturity Model / Capability Maturity Model Integration (Software Engineering Institute at Carnegie-Mellon
University – www.sei.cmu.edu/cmmi/)
CMM was originally developed in the mid-1980s to aid in
managing large software development projects. It posits
5 maturity levels. CMM was replaced by CMMI which
is broader in scope to include most business processes.
ITServiceCMM
Information Technology Service CMM (Consortium of 3
companies and 3 universities in the Netherlands, c1998 –
the Kwintes Project (www.itservicecmm.org)
CMM for providers of IT services, with corresponding
levels of service maturity.
ITIL
IT Infrastructure Library (www.itil-itsm-world.com/ or
www.itil.co.uk)
A set of 8 reference books developed by the UK Office of
Government Commerce (OGC), dealing with the management of IT services and asset management.
ASL
Application Services Library (www.aslfoundation.org)
Provides a framework for IT applications development that
centers on 3 areas: functional management, application
management, and technical management.
SDM / SDM2
Software Design and Management (Cap Gemini, www.
capgemini.com)
Developed in 1970 (by Pandata-since bought by Cap
Gemini) and revised in 1987, it presents a 7-stage waterfall model.
SAS 70
Statement on Auditing Standards no. 70 (American Institute
of Certified Public Accountants – AICPA, www.sas70.com)
Developed in 1992 as a follow-on to SAS 55 (internal
controls), this is an auditing standard to assess the internal
controls on transaction processing. Became the basis of the
standard eventually advocated by COSO.
ISO / IEC 17799
(soon to be 27002)
International Organization for Standardization / International Electrotechnical Commission Standard 17799,www.
standardsdirect.org
An information security standard first published in 2005.
Provides best practice recommendations in 12 key information security areas. To be renumbered in 2007.
6-Sigma
Improving business processes to within 6 standard deviations (+/-) from perfection (www.motorola.com)
Developed by Motorola in 1986, and widely-used and
adapted since, 6-sigma is a business improvement methodology aimed at measuring and correcting process and
product defects. This may include IT services.
Prince2
PRojects IN Controlled Environments(www.prince2.
org.uk)
A project management and control methodology developed
in 1989 by the UK government for project managers. It
defines project management along 8 broad processes,
with 45 subprocesses.
continued on following page
60
Understanding IT Governance
Table 3. continued
Framework
Origin / Definition
Description
AS 8015 (2005)
(now ISO /
ICE38500: 2008)
Australian Standard for Corporate Governance of Information & Communication Technology (ICT) (www.
standards.org.au)
The world’s first national standard for governing ICTs, introduced in March, 2003 and subsequently revised in 2005.
It prescribes a 3-sequential-step approach to governing ICT
projects and ICT operations: EVALUATE (uses of ICT) –
DIRECT (preparation & implementation of ICT plans and
policies to best support the organization) – MONITOR (conformance to policies and performance against the plans).
61
Section 2
Cases and International
Perspectives
63
Chapter 4
User Evaluation of
E-Government Systems:
A Chinese Cultural Perspective
Nan Zhang
Tsinghua University, China
Xunhua Guo
Tsinghua University, China
Guoqing Chen
Tsinghua University, China
Patrick Y. K. Chau
University of Hong Kong, China
ABSTRACT
Based on Information Technology adoption theories and considering Chinese cultural characteristics,
this chapter proposes a user centric IT/IS evaluation model composed of three determinants, namely
perceived usefulness, perceived ease of use, and perceived fit, for investigating the e-government systems
application and management in China. By empirically validating the model with survey data, it is demonstrated the perceived fit has significant impacts on the end users’ evaluation towards e-government
systems, due to the special element of Hexie in the Chinese culture. The results also indicate that the
reasons for failures in e-government systems application in China largely lie in the lack of fit, which
may root in the long power distance characteristic of the Far Eastern culture.
INTRODUCTION
In recent years, e-government has created a lot
of interest among researchers in the IS field. The
adoption of IT/IS leads to dramatic changes in the
DOI: 10.4018/978-1-60960-605-3.ch004
relationship between governments and citizens
(G2C), governments and businesses (G2B), and
governments and governments (G2G). Policy
makers and practitioners are facing additional
challenges arising out of the application of egovernment information systems. Issues regarding
IT/IS evolution, adoption, and diffusion in govern-
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
User Evaluation of E-Government Systems
mental organizations have been widely addressed
at international academic conferences, as well as
major MIS journals (Grant 2005; Hackney et al.
2005; Heeks et al. 2006; Irani et al. 2007; Srivastava et al. 2006). To the extent of our knowledge,
however, the studies on e-government in China
from either theoretical or empirical perspectives
are all still scarce. Furthermore, in the existing
studies on e-government adoption and diffusion,
cultural factors have been widely noticed as
important but not yet thoroughly examined (Gallivan and Srite 2005). Accordingly, this chapter
is aimed at probing into the e-government adoption or evaluation mechanism from the cultural
perspective, in the light of data collected from a
Chinese context.
On the other hand, as the economy of China
keeps growing rapidly, IT penetration brings dramatic changes to organizations and individuals on
various respects. According to some observations,
the impact of IT/IS application in China might
be even more profound than that in any other
country, as China is changing from an isolated
centrally-controlled economy to a market that
opens to the global economy (Martinsons 2005).
On such a background, it is worthwhile to probe
into the research issues regarding IT/IS adoption
and diffusion in Chinese governments.
As one of the driving forces of IT/IS applications, Chinese governmental organizations have
long been striving to promote the use of information systems and are achieving elementary
progress in their own IT/IS implementation and
use. Government websites have been developed
continuously. The ranking of China in the chart of
e-government application (or readiness) has been
rising as well (Liu 2006; UN. 2005; West 2006).
Despite the rising in the ranking systems which
are mostly based on evaluating the functions of
government websites, it is believed that IT/IS
application in Chinese governments still lacks
the abilities to support the goal of “providing
more services and more convenience to citizens”,
64
which is generally considered as the essential
target for e-government applications (Holliday
et al. 2005). According to a recent investigation,
most of the e-government projects implemented in
Chinese governments on various levels were not
planned and designed for the citizens (Lu 2006).
Moreover, Chinese government leaders are using
information technology to drive efforts both to
accelerate decentralized public administration
and at the same time to enhance government’s
ability to oversee key activities (Ma et al. 2005).
The concurrent pursuit of these two seemingly
paradoxical objectives leads to a highly demanding context for e-government application and
management, in which administrative reform and
systems implementation are tightly linked and
frequently interacting.
A recent study examined the status the IT/IS
diffusion in Chinese governmental organizations
using a two-dimension framework, in which
diffusion width (the extent to which IT/IS has
reached in the organization) and depth (the extent
to which an organization depends on IT/IS) were
considered, and concluded that the e-government
application in China has expanded to a large extend
but not yet reach effective depth of use (Zhang et
al. 2007b). While evolving from an “expanding
stage” (during which the diffusion width expands)
to a “penetrating stage” (during which the diffusion
depth increases), user evaluation on the systems
becomes a critical force that might accelerate or
constraint the process (Zhang et al. 2007b). Consequently, a user-centric IT/IS evaluation model
would be particularly helpful for understanding
the development of e-government application in
China in the current period.
As a typical Eastern civilization, Chinese
culture has always been deemed as very much
different from the West in many aspects (Hofstede
2001). Some studies have examined the characteristics of IT/IS management in Chinese companies
(Guo et al. 2005; Mao et al. 2006; Martinsons
2005). While a lot of Chinese companies have
User Evaluation of E-Government Systems
already transformed into international enterprises,
in which different cultures are fusing gradually,
governments in China remain as traditional Chinese organizations where all the characteristics
of Chinese culture are preserved (Lu et al. 2005).
Therefore, we feel that it is worthwhile to take the
culture issues into account while studying the IT/
IS diffusion in Chinese governments.
In this chapter, a user-centric IT/IS evaluation
model is proposed, based on a comprehensive
review on related literature and incorporating the
concept of perceived fit, a factor that typically
reflects some distinguishing characteristics of the
Chinese culture which holds a high esteem for
Hexie, a Chinese word that can be approximately
interpreted as interactive cooperation and synergy
in a complex system that includes a large amount
of subsystems or elements (Xi et al. 2006). As a
cultural concept derived from traditional Chinese
philosophy, Hexie is particularly considered as
not equal to “Harmony” in English. It refers to
not only the cooperation among the organization
members’ expectation, but also the coordination
in member’s tasks or resource allocation in the
organization (Xi et al. 2006). Furthermore, the
proposed model is validated in the light of survey
data. The survey was conducted in the local government of an administrative district in Beijing, the
capital of China. The district is one of the largest
in Beijing, which accounts for a big portion of
the capital’s economy. It is also where the Central
Business District (CBD) of the city and the main
venues of the 2008 Olympic Games are located.
There are over 3,000 foreign capital enterprises
in the district, and 130 of them are among the 500
world largest companies. Through the empirical
study, we expect that the presented model and
the validation results may provide scholars and
practitioners with better understanding of the user
evaluation regarding e-government systems in a
Chinese cultural context.
THEORETICAL CONSTRUCTION
Review of Related Research
As mentioned above, our research was aimed at
understanding the IT/IS user evaluation regarding
e-government systems from a Chinese cultural
perspective. Therefore, the research is based on
three major areas of efforts in IS discipline, namely
IT/IS adoption, e-government, and culture. In the
following part, we will review the related literature
in these three areas, respectively.
IT/IS Adoption and Evaluation
Since late 1980s, information technology adoption and use have remained a central concern in
the field of information systems research. Related
efforts have produced a number of theoretical
models, such as Technology Acceptance Model
(TAM) (Davis 1989; Davis et al. 1989; Venkatesh
et al. 2000a), Task-Technology Fit Model (TTF)
(Goodhue et al. 1995), and Unified Theory of
Acceptance and Use of Technology (UTAUT)
(Venkatesh et al. 2003), to interpret the psychological and social mechanisms that potentially
determine the behavior of technology adoption. As
well, influential theories in other areas, including
Theory of Planned Behavior (TPB) (Mathieson
1991; Taylor et al. 1995), Social Cognitive Theory
(SCT) (Compeau et al. 1999), and Innovation Diffusion Theory (IDT) (Moore et al. 1991; Plouffe
et al. 2001; Rogers 1995), were borrowed into the
studies of technology adoption. Meanwhile, large
amounts of empirical and field studies were conducted in various regions of the world to validate
the theories. Results from these studies illustrated
that the models generally explain a substantial
proportion (about 40% in average) of the variance
in usage intention and behavior (Legris et al. 2003)
and it is believed that the achievements in technology adoption research could essentially help IT
65
User Evaluation of E-Government Systems
manufacturers and managers to better handle the
development, application, and management of IT.
During the past two decades, TAM has been
prevailing in the area of IT adoption research.
The model was firstly proposed by Davis in 1989
(Davis 1989; Davis et al. 1989) and later gained
substantial theoretical and empirical support
(Chau 1996; Chau et al. 2002; Legris et al. 2003;
Venkatesh et al. 2000a; Venkatesh et al. 2007).
Recently, however, the over-intensive focus on
expanding the TAM is being criticized for the
lack of innovation in the theoretical nature and
the departure from the current important IT/IS
management problems (Benbasat et al. 2007; Venkatesh et al. 2007). It is suggested that the future
research on IT/IS adoption should be redirected
toward examining different antecedents (e.g., IT
artifact and design) and different consequences
(e.g., adaptation and learning behaviors) in order
to reach a more comprehensive understanding
of what influences adoption and acceptance in
different IT use contexts and to provide more
useful recommendations for practice. (Benbasat
et al. 2007). In other words, it would be more
promising to take the conceptual models as tools
for examining the implementation and management of specific applications in various contexts.
Evidentially, in recent years, TAM and related
theories have been introduced to discussing the
issues regarding e-government systems application (Carter et al. 2005; Fu et al. 2006; Phang et
al. 2006), as well as analyses from cultural perspectives (Lippert et al. 2007; Mao et al. 2006).
Conceptually, IT/IS evaluation is closely
related to adoption. In early 1980s, motivated
by management’s desire to improve productivity
of IS, researchers started to measure and analyze user satisfaction. As the first variable that
described individual’s feeling, satisfaction was
an inclusive concept that covered many aspects
of one’s reactions to the target IT/IS (Bailey et
al. 1983). Dividing satisfaction into usefulness
and ease of use, the most two important dimensions to examine systems, TAM has been used
66
in both adoption studies and evaluation research
extensively (Keil et al. 1995; Legris et al. 2003;
Venkatesh et al. 2000b). Around the Millennium,
the third generation of IT/IS evaluation models
that added some factors from usability design
and human-computer interaction (HCI) research,
was developed. Among the efforts Microsoft usability guideline (MUG) is the most influential
one, which comprises five specific categories:
content (similar as usefulness, focused on some
specific kinds of systems, e.g. web sites), ease of
use, promotion, made-for-the-medium (MFTM),
and emotion (Agarwal et al. 2002).
Although MUG provides a powerful model
that has been used to evaluate some on-line
e-commerce systems (Agarwal et al. 2002;
Venkatesh et al. 2006a; Venkatesh et al. 2006b),
the factors in the model may not be suitable for
studying e-government evaluation. For instance,
promotion, which represents the advertisement
investment and performance, is critical to web
sites but may not have strong impact on the user
evaluation of e-government system because of
the partly mandatory adoption settings. Similarly,
the discussion on emotion is more meaningful for
a hedonic website than a system in workplace.
Generally, IT/IS adoption and evaluation issues
have been extensively discussed in the IS area
for the past twenty years. However, the adoption/
evaluation of e-government systems has not yet
been sufficiently addressed. Furthermore, to the
extent of our knowledge, few of the existing studies
have taken into account the cultural perspective,
which is gaining more and more attention in related
research efforts (Gallivan and Srite 2005). In other
words, it would be worthwhile to probe into the
e-government adoption or evaluation mechanism
from the cultural perspective.
E-Government
In recent years, the application of IT/IS in governmental organizations has developed rapidly
and created a lot of interest among researchers.
User Evaluation of E-Government Systems
As reported, the number of papers regarding egovernment systems published on journals has
also increased dramatically in the past three years
(Zhang et al. 2007a).
Interestingly, although e-government has
been discussed extensive, there has not yet been
a commonly accepted definition for the concept.
In some studies in that e-government is defined
by the objectives of the activities while in others
by the specific technology used (Yildiz 2007).
Considering e-government from a perspective
of the use of IT/IS to enhance the access to and
delivery of government information and service
to citizens, Layne and Lee provided a four step
framework for understanding e-government development process, which includes the catalogue
stage, the transaction stage, the vertical integration
(local systems are linked to higher levels) stage,
and the horizontal integration (systems are integrated across different functions) stage (Layne
et al. 2001). From the application view, Siau and
Long provided another framework, describing
four types of e-government systems, namely
government-to-customer (G2C), governmentto-business (G2B), government-to-government
(G2G), and Government-to-Employee (G2E)
(Siau et al. 2006). According to this framework,
our empirical study in this chapter can be regarded
as conducted in G2E settings.
IT/IS and Culture
The past decade has witnessed growing interests
in cultural factors, particularly national culture
dimensions, in the areas of IT/IS research (Davison et al. 2003; Evaristo 2003; Weisinger et al.
2002), as the trends towards globalization have
been accelerating and IT/IS is generally considered
to be one of the most significant driving forces
(Friedman 2005).
When cultural issues are taken into account,
Hofstede’s well-known five dimensions model
provides the most influential theoretical framework, which has been widely cited for cross-
cultural studies in various areas (Davison et al.
2003; Ford et. al. 2003; Gallivan et. al. 2005).
The original version of Hofstede’s model includes 4 dimensions, namely power distance, uncertainty avoidance, individualism/collectivism,
and masculinity/femininity. It was later found that
the above four dimensions provide limited ability
to explain the characteristics of Eastern cultures,
so the fifth dimension, Long-term Orientation, or
Confucian Dynamism, was added, referring to the
extent to which a culture programs its members
to accept delayed gratification of their material,
social, and emotional need (Hofstede 2001; Hofstede et al. 1988). Although this framework has
sometimes suffered from criticism for the lack
of practical feasibility and incompleteness of the
dimensions, most of the cross-cultural researches
in the past two decades still adopt one or more
dimensions from the model (Ford et al. 2003;
Lim 2004; Lippert et al. 2007; Mao et al. 2006;
Straub et al. 1997).
A recent literature review of culture in IS
research categories the accumulated efforts into
four types, namely IS development, IT adoption
and diffusion, IT use and outcomes, and IT management and strategy (Leidner et. al. 2006). The
IT/IS researches that considered Chinese culture
can also be found in these four directions (Chen
et. al. 2007; Guo et. al. 2005; Hempel et al. 2001;
Huang et. al. 2003; Martinson 2005; Mao et. al.
2006). Although these studies were conducted on
different perspectives, they were commonly based
the fundamental judgment that at least some of
the special characteristics in IT/IS application
and management in China can be attributed to
China’s Eastern cultural nature and, consequently,
the Chinese culture and Confucians values may
essentially affect IT/IS development strategy and
management practice in China.
After a critical review on the related literature
of culture in IT/IS research in China and other
Eastern countries, we found that the existing studies, especially those on IT/IS adoption by Chinese
users (Huang et. al. 2003; Mao et al 2006), were
67
User Evaluation of E-Government Systems
mostly designed to analyze the special phenomena
in China with Western theoretical frameworks, or
to explain some unexpected empirical results with
some Chinese cultural considerations. In comparison with this, our study in this chapter attempts
to extend the classical IT/IS adoption/evaluation
model by introducing new factors originated from
Chinese cultural values, so as to better reflect the
IT/IS practice, especially e-government systems
implementation and diffusion, in China.
HEXIE AND THE PERCEIVED FIT
Hexie in Chinese Culture
As mentioned above, Hofstede’s original four dimensions model was developed based on the West
cultural philosophy. Since it was later discovered
that the model lacks the capability to explain the
characteristics of Eastern cultures, Hoftede conducted a “Chinese Value Survey” (CVS) in 1985
and proposed the well known fifth dimension,
long term orientation (LTO), which is also called
Confucius values (Hofstede et al. 1988). However,
this new dimension has not been really accepted
as the other dimensions were, as it not seems unfamiliar to Western people, but also tends to get
lost in confusion for Chinese minds. Hofstede’s
divides the Confucian values into the “positive”
pole and the “negative” pole, in a similar way as the
other four dimensions (Hofstede 2001). However,
in the traditional philosophy of China, the positive
and negative aspects are often considered to be
indivisible and depend on the specific contexts
in which they are discussed. Especially, if the
prefixes tai (too much) or guofen (excessive) are
added to these values, the positive one would be
likely to become negative (Fang 2003). According to an ancient Chinese understanding of how
things work, the Yin-Yang principle (Wang 2005),
the positive and negative aspects both produce one
another and overcome one another. Therefore the
ideal status of everything is to achieve a balance
68
between positive and negative, and moreover, to
achieve Hexie, the interactive cooperation and
synergy in the whole system.
Many Chinese researchers believe that Hexie
is the most principal rule of Confucian values (Ye
2006). Since the ancient times, Hexie has always
been one of the basic elements of the Chinese
culture, as indicated with an old proverb: “Hexie is
priceless”. However, it is not easy to clearly define.
As mentioned above, Hexie describes a balance
status of complementary equals in the Yin-Yang
theory (Fang 2003), and can also be approximately
interpreted as interactive cooperation and synergy
in a complex system that includes a large amount
of subsystems or elements from systems theories
(Xi et al. 2006). The importance of Hexie shows
that the Chinese culture puts emphasis on the
smooth relationships among all aspects of all the
involved persons and organizations, and usually
prefers evolution rather than revolution when innovations are introduced. In such situations, gradual
changes are much easier to be accepted. This
basic characteristic is reflected in various areas.
For instance, Chinese medicine prefers “therapy”
than “treatment”. Although frequent revolutions
in the economy and society had taken place in
China in the 20th century, in the current period,
however, the country is consciously rebuilding
the traditional cultural values, as significantly
symbolized with the concept of “Hexie Society”
proposed by Hu Jintao, the leader of the central
government of China.
Recognizing the important role of Hexie in
Chinese culture, some IT/IS researchers have
started to introduce this concept the related studies
in China or some other Eastern environment. For
instance, researchers have analyzed the unique key
factors for e-commerce success or information
sharing in China through exploring the importance
of Guanxi network (Martinson 2002, Shin et al.
2007), where Guanxi refers to “the existence of
direct particularistic ties between people” (Shin
et al. 2007) and in considered as a feasible way to
preserve Hexie. Another study on Bunkhun in Thai
User Evaluation of E-Government Systems
culture analyzed the inner relationship network
in a firm during the process of ERP implementation, where Bunkhun refers to “the psychological
bond between two persons: one who renders the
needy help and favors out of kindness and other’s
remembering of the goodness done and his everreadiness to reciprocate the kindness, not bound
by time or distance” (Walsham 2001). In our
study, we will discuss Hexie in a comparatively
narrow sense and focus on individuals’ behavior
and related perceptions in the workplace.
Perceived Fit: The Equivalent of
Hexie Value in the Workplace
With the development of globalization and the
fusion of Eastern and Western culture, the traditional Confucian values and implications of Hexie
have also be evolving in latest years. A recent
empirical research found through principal factor
analysis that the values of current Chinese people
have been further dispersed, comparing to their
father-generation (Hwang 2006). Although the
rules such as Zhongyong (moderation, following
the middle way) and Jinshen (prudence) were the
basic behavior pattern to practice Rendao (kindness) in traditional Confucian values, modern
Chinese people tend to regard them as a series
of instrumental values that can be applied in the
workplace, namely as work values (Hwang 2006).
With an overview on some key factors and
principles of Confucian work values, Zhongyong,
Jinshen, Guoyoubuji (excessive maybe worse than
scarce), and Shiying (Adaptability), we found that
the common ground of those values is opposed to
Jigongjinli (eager for quick success and instant
benefit). Accordingly, the Hexie value in the
workplace can be defined as to practice with fit
to current status and environment. Based on this
consideration, we introduce the new concept of
perceived fit, which is regarded as equivalent of
Hexie in the Chinese work values, referring to
“the degree in user perception to which the target
innovation (e-government applications for this
study) fits to all aspects of the user’s work style
and environment”.
As described in a study from a historical view,
the development process of IT/IS application
in China has experienced the “contagion” and
“cooling” stages and is currently progressing in
the “permeation” stage, during which the growth
patterns are usually steady and smooth (Guo et al.
2005; Guo et al. 2003). It can be inferred that in
such a stage, the cultural value of Hexie would play
a more important role the evaluation and adoption
of IT/IS in Chinese organizations, especially the
governmental organizations that are generally seen
as more “traditionally” structured. Consequently,
it is reasonable to predict that the perceived fit,
which represents the degree of Hexie between the
IT/IS and the other aspects of the users’ work and
life style, would have a strong impact on the end
user evaluation towards e-government systems.
There are some similar concepts in former
IT/IS literature, such as the “fit” in TTF and the
“compatibility” in IDT (and its derived models).
It needs to be clarified that the perceived fit in our
model is not equal to any of them. The “fit” in
TTF focuses on the relationship between technology and individuals’ performance (Goodhue et al.
1995), while the “compatibility” in the classical
IDT theory is defined as the degree to which an
innovation is perceived as consistent with the
existing values, past experiences, and client needs
(Rogers 1995). The concept of compatibility was
later derived into a new construct of perceived
characteristics of innovating (PCI) (Moore et al.
1991). Although PCI is actually a narrower concept
than the compatibility in IDT, as it is limited to
the matching of the tasks, it has been so widely
accepted that the original compatibility factor has
almost been abandoned. A recent research note
even proposed that the content of compatibility
should be disaggregated into four separable constructs and modeled as a multivariate structure
(Karahanna et al. 2006). Their suggestions provide
more in-depth insights on the compatibility con-
69
User Evaluation of E-Government Systems
Figure 1. E-Government Evaluation Model
struct and imply that it is meaningful to consider
the factor more comprehensively.
Conceptually, the perceived fit in our model is
more close to the original compatibility by Rogers,
but the new concept has its particular implications
at least on the following aspects: First, perceived
fit as a related dimension to Hexie in Confucian
values, would easier to be accepted than compatibility by practitioners and managers in Chinese
and other Eastern culture; Second, since Moore
and Benbasat’s compatibility has become too pervasive to be adjusted, a new concept can provide
researchers with a new perspective on this issue.
Therefore, we introduced the perceived fit in our
research model.
E-GOVERNMENT
EVALUATION MODEL
Based on TAM and considering the characteristic
of Hexie in the Chinese culture, we developed
our research model to explain the determinants of
individuals’evaluation towards new e-government
systems, as illustrated in Figure 1.
As a recent extension to TAM, UTAUT has
integrated the outcomes of a large number of
related studies. This comprehensive model, how-
70
ever, has sometimes been criticized for having
incorporated too many inter-related concepts and
even challenged as “deceptively parsimonious”
(Straub et al. 2007). Moreover, the results from
empirical test on hypotheses in UTAUT are mixed
(Al-Gahtani et al. 2007, Carlsson et al. 2006). As
the research of this chapter was focused on the
cultural factors, our model has been developed
based on the traditionally TAM. The model inherits TAM’s two core variables, perceived usefulness (PU), defined as “the prospective user’s
subjective probability that using a specific application system will increase his or her job
performance within an organizational context”
(Davis et al. 1989), and perceived ease of use
(PEOU), defined as “the degree to which the
prospective user expects the target system to be
free of effort” (Davis et al. 1989). Traditionally
TAM and other former behavioral intention models (e.g. TPB, TAM2) all follow the logical path
of “Determinant → Attitude → Intention → Actual Use”, which has been widely validated in the
voluntary environment (Davis et. al. 1989, Taylor
et al. 1995, Venkatesh et. al. 2000). However, in
the mandatory environment, it is frequently assumed that there is little variance in usage, making it difficult to be predicted empirically (Hartwick et. al. 1994, Venkatesh et. al. 2003). For this
User Evaluation of E-Government Systems
reason, some scholars introduced the concept of
Symbolic Adoption in mandatory environment to
replace the actual use for exploring user’s mental
acceptance (Nah et. al. 2004). In our study, although the individual users are required to use
the system by their superiors, the extent of use
may vary, and in turn, the users’ performance may
also vary more or less. Therefore, the influence
path in the mandatory environment is considered
as “Determinant → Attitude → User Performance”.
In governmental organizations, individuals
usually do not have the right to decide to adopt
the system or not. Employees in the government
often have to abide to their superiors’ intention in
information systems adoption. In other words, the
adoptive environment for e-government systems
is usually mandatory. For the case in our study,
the situation is more complex. The voluntary and
mandatory environments both exist in different
sub-units of the local government due to the variance of the leaders’ perceptions and determinations. Therefore, our model is focused on the determinants of end users’ attitude on e-government
systems, rather than the linkage between attitude
and behavioral intention or actual use, because
it would be meaningful to measure the users’ attitude towards the systems in both voluntary and
mandatory environment. Since attitude has been
reckoned as a medium factor in most previous
behavioral models, we replace it by a closely
related concept, namely evaluation, refers to
“the degree of a user’s overall perceptions on the
power and performance of the target system”. The
instruments of evaluation were designed according to the items of attitude in previous research.
Therefore, following Davis’ original model (Davis
1989), the three basic hypotheses are as follows:
•
Hypothesis 1: Perceived usefulness will
have a positive effect on general evaluation
toward the target system.
•
•
Hypothesis 2: Perceived ease of use will
have a positive effect on general evaluation
toward the target system.
Hypothesis 3: Perceived ease of use
will have a positive effect on perceived
usefulness.
As mention above, when considering the IT/
IS evaluation issues in the Chinese governments,
it is worthwhile to take into account the characteristics of Chinese culture. Consequently, we
introduced the factor of perceived fit, which is
developed from the Chinese cultural concept of
Hexie, as complementary to the two TAM factors,
perceived usefulness and perceived ease of use.
Previous research has discussed the different effect paths of perceived ease of use (Davis et al.
1989, Szajina 1996). Accordingly, it is reasonable
to hypothesize that the effect paths of perceived
fit will show similar differences. There are evidences that the users’ perception may change along
with the technology diffusion process (Szajina
1996). Besides directly impacting the evaluation
perception, perceived fit may also influence that
perceived usefulness, as a user that feels that the
system does not fit with his or her work and life
style is likely to consider the system as not useful to him or her. Consequently, in the proposed
model, we suppose that perceived fit would have
significant influence on IT/IS evaluation both
directly and indirectly through perceived usefulness, as does perceived ease of use. Therefore,
we have the below hypotheses:
•
•
Hypothesis 4: Perceived fit will have a
positive effect on general evaluation toward the target system.
Hypothesis 5: Perceived fit will have a
positive effect on perceived usefulness.
71
User Evaluation of E-Government Systems
EMPIRICAL STUDY
To validate our model, we conducted a survey to
investigate users’ evaluation and perceptions of
a new public service management system implemented in the local government of the Chaoyang
District, Beijing China, in 2006.
Research Site
More than 10,000 employees work for the local
government of the studied district, including all
of its departments and other subsidiaries. Partly
motivated by China’s accession to the World
Trade Organization (WTO) in 2001, the district
government accelerated its adoption of advanced
information technologies to improve international communication. Especially since 2003,
the executive officers have paid more and more
attention to e-government services and electronic
data storage/exchange in the local government,
and consequently lots of applications have been
implemented, such as the “One-Stop Service
System”, the “E-Document Exchange System”,
and the “Public Service Management System”.
Currently, the government allocates 4 million
dollars in its annual budget to the development
of e-government. Combined with the IT budgets
of all subsidiaries, the annual IT/IS spending of
the government has exceeded 20 million dollars
and the number is increasing continuously (CINC.
2006). While the large amount of IT/IS investment
has contributed to the fast and extensive network
connections in the district, some serious problems
are increasingly concerning the officials, such as
the lack of utilization of established systems, the
conflicts between different systems, the “information island” problems, and so on. More than
30 e-Government application systems have been
implemented and promoted among the government’s subsidiaries and citizens in the district
since 2001. Each time when a new system was
introduced, the government placed weighty
expectation on it and promoted it strongly, and
72
the reward was always an exciting beginning of
usage. About three months later, however, users
would gradually give up using the system. By June
2006, none of the systems has been effectively
utilized, making the officers of the government
disappointed and depressed. As such failures accumulated, the most critical view looks upon IT/
IS implementation as a “money burning” behavior
of the government with high expenditure and low
performance. Facing such difficulties, most of the
government officials feel that it would be helpful to develop efficient evaluation instruments in
the local government in search of enlightenment
regarding e-government practice.
Methodology
Instrument Development and
Questionnaire Design
While inheriting the measurement scales of
usefulness and ease of use from Davis’ original
work (Davis et al. 1989), we developed the scale
items for the new construct, perceived fit (PF),
through a pilot study among ten employees of
the IT/IS management office of the focus district
government, who are the first group of people
that experience the target system and were very
familiar with it. The 16 candidate items drawn
from former studies regarding related factors such
as compatibility, job fit, job relevance and some
other similar concepts (Chau et. al. 2002; Hu et.
al. 2003; Moore et al. 1991; Taylor et. al. 1995;
Thompson et al. 1991; Venkatesh et al. 2000b) were
all focused on the relations between the target IT/IS
and the all aspects of workplace and environment
(See Table 1). Through a rigorous categorizationprioritization method (Davis 1989), three items,
numbered 01, 04, and 16 respectively, were finally
selected for our survey. The two items of the
construct of user evaluation were also inherited
from some former studies (Davis et al. 1989;
Venkatesh et al. 2006a). All the 13 items for the
three independent constructs and one dependent
User Evaluation of E-Government Systems
Table 1. Candidate Items of Perceived Fit (PF)
Item
No.
Content
Original Article
1
Using … is compatible with all aspects of my (day-to-day) work.
2
Using … is completely compatible with my current situation.
3
I think that using … fits well with the way I like to work.
4
Using … fits into my work style.
5
Use of … will have no effect on the performance of my job (reverse score).
6
Use of … can decrease the time needed for my important job responsibilities.
7
Use of … can significantly increase the quality of output of my job.
8
Use of … can increase the effectiveness of performing job tasks.
9
… can increase the quantity of output for same amount of effort.
10
Moore & Benbasat 1989
Thompson et al. 1991
Considering all tasks, the general extent to which use of … could assist on job.
11
The setup of … will be compatible with the way I work.
12
In my job, usage of the system is important.
13
In my job, usage of the system is relevant.
Taylor & Todd 1995
Venkatesh & Davis 2000
14
Using … does not fit with my practice preferences.
15
Using … fits with my services need.
16
I would find the system fits well with the other IT/IS applications (including hardware and software)
used in my work.
variable were listed in the Appendix 1. Although
the original TAM study utilized a seven point
Likert scale, both 5 and 7 point scales are deemed
suitable for related studies (DeVellis 2003).In the
our questionnaire, we measured all the 13 factors
with a five points Likert-type scale, ranging from
“strongly disagree” (1) to “strongly agree” (5).
Data Collection
The system we studied was designed as an integrated workflow management system to support
and routine procedures of public service in subdistricts. Approximately 200 service-agents in
42 sub-districts are supposed to be the end-users
of the system. Three month later than the system
was put online, the IT/IS management office of
the district government arranged a distance video
training for employees in 20 subsidiaries that were
intended to use the system.
Chau & Hu 2002
Hu et. al. 2003
After the training, we uploaded our questionnaire to the intranet of the government and encouraged the users of the systems to participate.
Two weeks later, we collected in total 97 valid
responses for analysis (including 35 male and
62 female employees), which accounts for about
50% of the number of users that attended the
training. Respondents’ age are distributed from
23 to 55, while 31 of them are elder than 40. The
demography information of the survey is shown
as Table 2. Chaoyang is a “mixed” district consisting of urban and suburban sub-districts. In our
survey, 54 percent of the respondents were from
suburban areas.
Reliability and Validity
The internal consistency reliability (ICR) was
assessed by computing composite reliability coefficients (Fornell coefficients), of which values
higher than 0.8 generally indicate acceptable
73
User Evaluation of E-Government Systems
Table 2. Demography Information
Measure
Items
Frequency
Percent
Gender
Female
62
63.9
Male
35
36.1
Age
23-29
35
36.1
Mean = 35.0
30-39
31
31.9
St. Dev = 8.6
40-49
25
25.8
50-55
6
6.2
IT experience (year)
1-5
10
10.3
Mean = 9.9
6-10
49
50.5
11-15
29
29.9
15-21
9
9.3
St. Dev = 4.1
reliability (Gefen et al. 2005). In our study, the
ICR values range from 0.89 (for PEOU) to 0.93
(for evaluation and perceived fit). With none of
the values for all 4 constructs less than 0.8 (see
Table 3), the reliability of the scales could be accepted. Although most quantitative studies using
PLS-Graph reported Fornell coefficients because
the software provides the values of Fornell with
SEM analysis results, we agree that the Cronbach
Alpha is a more rigorous index for reliability.
Generally, Cronbach Alpha values higher than
0.7 indicate acceptable reliability. The Cnronbach
Alpha values of the four constructs calculated by
SAS 9.1 software are 0.86 (evaluation), 0.87 (PU),
083 (PEOU), and 0.88 (PF), respectively, which
also demonstrate significant reliability.
Convergent validity was evaluated by the
average variance extracted (AVE). According to
related studies, AVE values higher than 0.5 are
acceptable. For a satisfactory degree of discriminant validity, the square root of AVE of a construct
should exceed inter-construct correlations that
reflect the variance shared between the construct
and the other ones in the model (Gefen et al. 2005).
In our research, although some of the variables’
inter-correlations were relatively high, convergent
and discriminant validities of the model both at-
74
tained a satisfying level, with all the AVE square
root values above 0.7.
Analysis Results
The research model was tested using partial least
squares (PLS), a structural equation modeling
(SEM) technique suitable for highly complex
predictive models. Whereas covariance-based
SEM techniques such as LISREL and EQS use a
maximum likelihood function to obtain the estimated values in the models, the component-based
PLS uses a least-squares estimation procedure. By
this means, PLS avoids many of the restrictive
assumptions underlying covariance-based SEM
techniques, such as multivariate normality and
large sample size (Chin 1998; Chin et al. 2003;
Gefen et al. 2005). For the model provided in the
chapter, a minimum sample size of 84 is needed
with a medium effect to obtain a power of 0.8.
With a large effect size, the sample requirement
drops to 39 (Chin et al. 1999). Therefore, the 97
responses in our survey are sufficient for validating the model.
We used the PLS-Graph software (version 3.0)
for the analysis, utilizing the bootstrap resampling
method (200 resamples) to determine the significance of the paths within the structural model
(Chin et al. 2003; Gefen et al. 2005). Validating
results for the classical TAM (Davis 1989) and
our “perceived fit” model are shown in Figure 2
and Figure 3, respectively.
The results reveal that the new factor, perceived
fit, has significantly positive effects on both
evaluation and usefulness, demonstrating its
importance in this user-centric evaluation framework in the current Chinese governmental settings.
Comparing the two figures, it can be concluded
that by adding the perceived fit construct into
TAM, our evaluation model explains higher variance in the two endogenetic variables than the
original TAM. The variance explained increases
from 28% to 41% for PU and from 49% to 59%
for Evaluation. Therefore, it is reasonable to ac-
User Evaluation of E-Government Systems
Table 3. Measurement Properties and Correlations of Latent Variables
Evaluation(2)
ICR
Mean
St. Dev
Evaluation
0.93
3.49
0.84
0.94
PU
PEOU
PU(4)
0.92
3.76
0.76
0.67
0.86
PEOU(4)
0.89
3.59
0.70
0.55
0.52
0.82
PF(3)
0.93
3.34
0.80
0.69
0.66
0.57
PF
0.90
Figure 2. The PLS validating results of the TAM
Figure 3. The PLS validating results of our model
75
User Evaluation of E-Government Systems
cept that the IT/IS evaluation model proposed in
this chapter could help us better understand and
describe individuals’ attitudes and perceptions
towards e-government systems in China.
Meanwhile, while four of the five hypotheses
in the model are supported by the statistical results, the impact of ease of use on evaluation was
not validated in our study. Additional interviews
with some service agents in the government who
gave low scores to perceived ease of use reveal
that most of them tend to appeal for more training
and will still keep using the system. The reason
for this unexpected result may also lie in some
characteristics of Chinese culture. In fact, the
lack of direct relationship between ease of use
and evaluation in users’ perceptions has already
been observed in other studies in China and its
neighboring countries (Mao et al. 2006; Straub
et al. 1997). Generally, ease of use is one of the
most important characteristics of a good system.
When a user feels that a system is difficult to use,
the reason may lie in either the system or the user.
The responses in additional interviews showed
that most service agents in the government were
often inclined to learn more about the system
rather than to give the system bad evaluation
when they felt that the systems was not easy to
use. This also reflects the tendency of introspection, or Xiushen (improving oneself is the most
important) (Hofstede et al. 1988; Hwang 2006), a
typical behavior principle of Confucian traditions.
Moreover, the significance of the path from PEOU
to evaluation declines remarkably after adding
the perceived fit to the TAM. The phenomenon
may indicate that ease of use is not as dominant
as predicted by TAM or other derived models. At
least a notable portion of the reasons that drive
the users from accepting the system lies in fit,
instead of ease of use.
We also categorized our samples along three dimensions: sub-unit locations (urban or suburban),
gender, and age. The results are shown in Table 4.
Consistent with previous studies, men are usually
more willing to accept new information technolo-
76
gies than women (Venkatesh et al. 2000b), and
young people are usually more willing to accept
information technology than elders (Lam et al.
2006). The practice of Chaoyang District shows
that the working staffs in urban areas are usually
more willing to accept information technology
than those in suburban areas. In Table 4, along all
the three dimensions, the model provides better
results in the groups of higher evaluation levels.
Another notable phenomenon is that the impacts
of perceived fit are stronger in the groups of higher
evaluation levels.
DISCUSSION
It can be inferred from the results of our study that
regarding e-government application in China, end
users care more about fit than ease of use when
they are evaluating an information system. It is
not easy to explain this phenomenon with classical theories such as IDT and TAM. As mentioned
above, we suggest to probe into this result from
a cultural perspective.
In Hofstede’s famous UAI-PDI matrix
(Hofstede 2001), China has been described as a
culture with long power distance (the extent to
which the less powerful members of organizations accept and expect that power is distributed
unequally) and weak uncertainty avoidance the
extent to which a culture programs its members
to feel either uncomfortable or comfortable in
unstructured situations. Moreover, there is a long
existing principle in Chinese administration which
is called “government by man”, in contrast to the
Western idea of “government by law” (Hofstede
2001). From the Confucian values and the Hexie
perspective, it is the principle of Zunbeiyouxu
(Ordering relations by status and observing this
order) that obliges Chinese to follow the superior
as long as possible (Fang 2003; Ye 2006). In this
case, when the head of government recognizes
the importance of IT/IS application, implementation will be carried out fleetly under the direct
User Evaluation of E-Government Systems
Table 4. The Results of Cross-Group Test
Eval.
PU
Sub-unit
Eval.
R =0.82
R =0.74
Age
0.15
0.61***
R2=0.49
0.36**
0.44***
R =0.45
2
0.49**
0.09
0.39*
R2=0.53
0.28*
0.56***
0.11
0.56***
R =0.45
0.24*
0.50***
Overall
PF
0.39*
0.16
0.24
R2=0.38
0.17
0.49***
R =0.54
0.32*
0.18
0.36*
R2=0.38
0.28
0.40**
Elder than 40 (N = 31)
0.21*
2
PEOU
Female (N = 63)
2
Younger than 40 (N = 66)
R2=0.62
PU
PU
PU
Male (N = 34)
2
PU
Eval.
Eval.
Village (N = 51)
0.27**
Gender
Eval.
PF
Block (N = 46)
2
PU
Eval.
PEOU
R2=0.65
0.56***
0.23
0.14
R =0.35
0.23
0.42*
2
N = 97
R2=0.59
0.36***
0.14
0.40**
R =0.41
0.26*
0.46***
2
Notes: * p < 0.05, ** p < 0.01, *** p < 0.001
supervision of top administrators. Such strong
support enables Chinese governments to do well
in IT/IS development during the expanding stage
characterized by high diffusion width (Zhang et
al. 2007b) and also led to the success of governmental portals (UN. 2005).
Unfortunately, the effects of such characteristics of Chinese culture may change when IT/IS application in governmental organizations evolves to
the penetrating stage. With the centralized decision
making mechanism and the top-down implementation patterns, many systems are implemented in
hurries and superficially. They facially fit with
the bosses’ expectations but eventually conflict
with the real needs of end users and requirements
of tasks. Obviously, such systems would never
be used effectively. As far as the system studied
in this chapter is concerned, service agents were
the last one to know about the system. They were
expected to accept the system without any participation in the process of design and development
before the implementation. This phenomenon was
observed not only in the cases of small systems
for several hundred users, but also in the cases of
large public e-service systems facing millions of
citizens. While a lot of MIS studies emphasized
top-leader supports in IT/IS implementation (Chen
et al. 2007), our study provides evidence to show
that top-leaders’ determination can often lead to
harm in the e-government practice in a Chinese
cultural context.
In our IT/IS evaluation model, the significant
impact of perceived fit has been validated by
empirical tests among users. As discussed above,
this factor is closely related to Hexie, which has
played a continuously important role in Confucian values since 500 B. C. and roots in Chinese
society in all ages (Hofstede 2001; Hofstede et al.
1988). In other words, the fit between the technology and the other aspects of work are considered
more important in the Chinese culture.
Furthermore, the above results also imply that
the reason for the low success rate of e-government
application in China may lie in the low level of
fit. Interestingly, the lack of fit, again, is due to
the Far Eastern cultural characteristics in Chinese
governmental organizations. Because of the nature
of long power distance in the Far Eastern culture,
the decision making mechanism in Chinese government is often highly centralized, making the
degree of fit highly dependent on the vision the top
administrator. In such a situation, it is extremely
77
User Evaluation of E-Government Systems
difficult, if not impossible, to increase the fit of
newly implemented e-government systems. This
problem is less perplexing in enterprises, where
CIO and IT/IS managerial teams play more effective roles in planning and coordination. As
reported, in 2003, it is no longer a top urgent
mission to endow senior IT/IS managers with
a proper position and sufficient power, because
this has already been done in many Chinese
companies, where the top persons in charge of IT/
IS departments are now CIO or vice-presidents
(Chen et al. 2007). It is critical not to treat the IT/
IS team purely as a technical service department
(McFarlan et al. 2007). In Chinese governmental
organizations, however, the IT/IS departments are
still often regarded as technical support forces. In
the Chaoyang district, 87% of the IT/IS managers
reported that the main task of the IT/IS departments
is “maintenance and technical support for current
systems”, and their departments have little chance
to participate in the planning and design for new
systems. In many sub-units, there are only network
administrators, instead of IT/IS managers. There
would be little chance for increasing the degree
of fit, if the situation cannot be changed.
These findings may at least convey managerial implication for e-government application
and management on two respects. First, we have
demonstrated that it is a feasible way to analyze
the users’ evaluation by using our extended model
to examine the influence of determinants in Chinese government settings. Moreover, we believe
that the model can be applied in other situations
in Eastern cultural contexts for understanding IT/
IS adoption issues deeply. For instance, a former
cross-culture study found that TAM has not been
successful in explaining user’s behavior in Japan
and the authors speculated that it may be the high
uncertainty avoidance that has led to this unexpected result (Straub et. al. 1997). Based on the
findings of this chapter, it is also possible that the
concept of perceived fit and the extended model
may help better interpret this phenomenon, since
78
Japan is also an Eastern country deeply influenced
by the Confucian values.
Second, at least some of the failures in systems
application were rooted in the planning and design
of the software or systems themselves because
the fit issue, which reflects the level of harmony
or Hexie between systems and other aspects of
the users’ work and life, had not been considered
thoroughly. It would be helpful, if not necessary,
for government leaders and IT/IS managers to
evaluate the users’ recognition before and after
the implementation of new systems, so as to
understand whether the systems bring positive
impressions to the users’ perceived fit.
CONCLUDING REMARKS
Based on information technology adoption theories and considering Chinese cultural characteristics, this chapter proposed a user centric IT/IS
evaluation model composed of three determinants,
namely perceived usefulness, perceived ease of
use, and perceived fit, for investigating the e-government systems application and management in
China. After validating four of the five hypotheses
through empirical tests, we analyzed the results
from a cultural perspective and illustrated that the
perceived fit is an important antecedent to end users’ evaluation towards e-government application
in China, because of the special element of Hexie
in the Chinese culture. The results also indicate
that the reasons for failures in e-government systems application in China largely lie in the lack
of fit, which may root in the long power distance
characteristic of the Far Eastern culture. These
findings may help better understand the IT/IS
implementation and adoption characteristics in
Chinese governmental organizations and evaluate
e-government applications in a more effective way.
As an empirical study from the cultural
perspective, a major limitation of our work is
that we only validate the extended model in one
country, without actual cross culture comparison.
User Evaluation of E-Government Systems
Therefore, on-going research will attempt to
conduct more in-depth studies on the perceived
fit, especially cross-culture comparisons, so as to
further test and develop the research model, as
well as to further investigate the cultural driving
factors of IT/IS management in China and other
Eastern countries.
REFERENCES
Agarwal, R., & Venkatesh, V. (2002). Assessing
the firm’s Web presence: A heuristic evaluation
procedure for the measurement of usability.
Information Systems Research, 13(2), 168–186.
doi:10.1287/isre.13.2.168.84
Al-Gahtani, S. S., Hubona, G. S., & Wang, J.
(2007). Information Technology in Saudi Arabia: Culture and the acceptance and use of IT.
Information & Management, 44(8), 681–691.
doi:10.1016/j.im.2007.09.002
Bailey, J. E., & Pearson, S. W. (1983). Development of a tool for measuring and analyzing
computer user satisfaction. Management Science,
29(5), 530–545. doi:10.1287/mnsc.29.5.530
Benbasat, I., & Barki, H. (2007). Quo vadis, TAM?
Journal of AIS, 8(4), 211–218.
Carlsson, C., Carlsson, J., Hyvonen, K., Puhakainen, J., & Walden, P. (2006). Adoption of
mobile devices/services: Searching for answers
with UTAUT. In Proceedings of the 39th Hawaii
International Conference on System Sciences,
Hawaii, USA.
Carter, L., & Belanger, F. (2005). The utilization of e-government services: Citizen trust,
innovation and acceptance factors. Information
Systems Journal, 15(1), 5–25. doi:10.1111/j.13652575.2005.00183.x
Chau, P. Y. K. (1996). An empirical investigation
on factors affecting the acceptance of CASE by
systems developers. Information & Management, 30(6), 269–280. doi:10.1016/S03787206(96)01074-9
Chau, P. Y. K., & Hu, P. J. (2002). Examining a
model of information technology acceptance by
individual professionals: An exploratory study.
Journal of Management Information Systems,
18(4), 191–229.
Chen, G., Wu, R., & Guo, X. (2007). Key issues in
information systems management in China. Journal of Enterprise Information Management, 20(2),
198–208. doi:10.1108/17410390710725779
Chin, W. W. (1998). Issues and opinion on structural equation modeling. Management Information
Systems Quarterly, 22(1), vii–xvi.
Chin, W. W., Marcolin, B. L., & Newsted, P. R.
(2003). Partial least squares latent variables modeling approach for measuring interaction effects:
Results from a Monte Carlo simulation study
and an electronic-mail emotion/adoption study.
Information Systems Research, 14(2), 189–217.
doi:10.1287/isre.14.2.189.16018
Chin, W. W., & Newsted, P. R. (1999). Structural
equation modeling analysis with small samples
using partial least squares. In Hoyle, R. (Ed.),
Statistical strategies for small sample research
(pp. 307–341). Sage Publications.
CINC. (2006). The blueprint of informationization
development in Chaoyang district: 2006~2010.
Chaoyang Info-Net Center. (in Chinese). Retrieved
July 29, 2008, from www.chy.egov.cn
Compeau, D., Higgins, C. A., & Huff, S. L. (1999).
Social cognitive theory and individual reactions
to computing technology: A longitudinal study.
Management Information Systems Quarterly,
23(2), 145–158. doi:10.2307/249749
79
User Evaluation of E-Government Systems
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems
Quarterly, 13(3), 319–340. doi:10.2307/249008
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R.
(1989). User acceptance of computer technology:
A comparison of two theoretical models. Management Science, 35(8), 982–1003. doi:10.1287/
mnsc.35.8.982
Gallivan, M., & Srite, M. (2005). Information
technology and culture: identifying fragmentary
and holistic perspectives of culture. Information
and Organization, 15(2), 295–338. doi:10.1016/j.
infoandorg.2005.02.005
Gefen, D., & Straub, D. W. (2005). A practical
guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of
AIS, 16(1), 91–109.
Davison, R. M., & Martinsons, M. G. (2003). Cultural issues and IT management: Past and present.
IEEE Transactions on Engineering Management,
50(1), 3–7. doi:10.1109/TEM.2003.808249
Goodhue, D. L., & Thompson, R. L. (1995).
Task-technology fit and individual performance.
Management Information Systems Quarterly,
19(2), 213–226. doi:10.2307/249689
DeVellis, R. F. (2003). Scale development: Theory
and applications. Sage Publications.
Grant, G. (2005). Realizing the promise of
electronic government. Journal of Global Information Management, 13(1), 1–4. doi:10.4018/
jgim.2005010101
Evaristo, R. (2003). Cross-cultural research in
IS. Journal of Global Information Management,
11(4), i–iii.
Fang, T. (2003). A critique of Hofstede’s fifth
national culture dimension. International Journal
of Cross Cultural Management, 3(3), 347–368.
doi:10.1177/1470595803003003006
Ford, D. P., Connelly, C. E., & Meister, D. B.
(2003). Information systems research and Hofstede’s culture’s consequences: An uneasy and
incomplete partnership. IEEE Transactions on Engineering Management, 50(1), 8–25. doi:10.1109/
TEM.2002.808265
Friedman, T. L. (2005). The world is flat: A brief
history of the twenty-first century. Farrar, Straus
and Giroux.
Fu, J., Farn, C., & Chao, W. (2006). Acceptance of
electronic tax filing: A study of taxpayer intentions.
Information & Management, 43(1), 109–126.
doi:10.1016/j.im.2005.04.001
80
Guo, X., & Chen, G. (2005). Internet diffusion in
Chinese companies. Communications of the ACM,
48(4), 54–58. doi:10.1145/1053291.1053318
Guo, X., Chen, G., & Reimers, K. (2003). IT diffusion stages in the network era of Chinese companies. In Proceedings of the Third International
Conference on Electronic Business, Singapore.
Hackney, R., Kim, S., & Wastell, D. (2005). Editorial. Information Systems Journal, 15(1), 1–3.
doi:10.1111/j.1365-2575.2005.00182.x
Hartwick, J., & Barki, H. (1994). Explaining the
role of user participation in information system
use. Management Science, 40(4), 440–465.
doi:10.1287/mnsc.40.4.440
Heeks, R., & Bailur, S. (2006). Analyzing egovernment research: Perspectives, philosophies,
theories, methods, and practice. Government Information Quarterly, 24(2), 243–265. doi:10.1016/j.
giq.2006.06.005
User Evaluation of E-Government Systems
Hempel, P. S., & Kwong, Y. K. (2001). B2B ecommerce in emerging economies: I-metal.com’s
nonferrous metals exchange in China. The Journal
of Strategic Information Systems, 10(3), 335–355.
doi:10.1016/S0963-8687(01)00058-0
Keil, M., Beranek, P. M., & Konsynski, B. R.
(1995). Usefulness and ease of use: Field study
evidence regarding task considerations. Decision
Support Systems, 13(1), 75–91. doi:10.1016/01679236(94)E0032-M
Hofstede, G. (2001). Culture’s consequences:
Comparing values, behaviors, institutions, and
organizations across nations (2nd ed.). Sage
Publications.
Lam, J. C. Y., & Lee, M. K. O. (2006). Digital
inclusiveness: Longitudinal study of Internet adoption by older adults. Journal of Management Information Systems, 22(4), 177–206. doi:10.2753/
MIS0742-1222220407
Hofstede, G., & Bond, M. H. (1988). The Confucius connection: From cultural roots to economic
growth. Organizational Dynamics, 16(4), 5–21.
doi:10.1016/0090-2616(88)90009-5
Holliday, I., & Yep, R. (2005). E-government in
China. Public Administration and Development,
25(3), 239–249. doi:10.1002/pad.361
Hu, P. J., Clark, T. H. K., & Ma, W. W. (2003).
Examining technology acceptance by school
teachers: A longitudinal study. Information &
Management, 41(2), 227–241. doi:10.1016/
S0378-7206(03)00050-8
Huang, L., Lu, M., & Wong, B. K. (2003). The
impact of power distance on e-mail acceptance:
Evidence from the PRC. Journal of Computer
Information Systems, 44(1), 93–101.
Hwang, K. K. (2006). Confucian relationalism:
Cultural reflection and theoretical construction.
Peking University Press. (in Chinese)
Irani, Z., Love, P. E. D., & Montazemi, A. R.
(2007). E-government: Past, present and future.
European Journal of Information Systems, 16(2),
103–105. doi:10.1057/palgrave.ejis.3000678
Karahanna, E., Agarwal, R., & Angst, C. M.
(2006). Reconceptualizing compatibility beliefs
in technology acceptance research. Management
Information Systems Quarterly, 30(4), 781–804.
Layne, K., & Lee, J. (2001). Developing fully
functional e-government: A four stage model. Government Information Quarterly, 18(2), 122–136.
doi:10.1016/S0740-624X(01)00066-1
Legris, P., Ingham, J., & Collerette, P. (2003). Why
do people use information technology? A critical review of the technology acceptance model.
Information & Management, 40(3), 191–204.
doi:10.1016/S0378-7206(01)00143-4
Leidner, D. E., & Kayworth, T. (2006). A review of
culture in information systems research: Toward a
theory of information technology culture conflict.
Management Information Systems Quarterly,
30(2), 357–399.
Lim, J. (2004). The role of power distance and
explanation facility in online bargaining utilizing software agents. Journal of Global Information Management, 12(2), 27–43. doi:10.4018/
jgim.2004040102
Lippert, S. K., & Volkmar, J. A. (2007). Cultural
effects on technology performance and utilization:
A comparison of U.S. and Canadian users. Journal
of Global Information Management, 15(2), 56–90.
doi:10.4018/jgim.2007040103
Liu, L. (2006). Evaluations on China e-government
from international organizations. In Wang, C.
(Ed.), China e-government development report
(pp. 19–30). Social Sciences Academic Press.
(in Chinese)
81
User Evaluation of E-Government Systems
Lu, Y. (2006). E-government and the enhancement
of government efficiency. In Wang, C. (Ed.), China
e-government development report (pp. 31–46).
Social Sciences Academic Press. (in Chinese)
Lu, Y., & Zhou, T. (2005). An empirical analysis of
factors influencing consumers’ initial trust under
B2C environment. Nankai Business Review, 8(6),
2005, 96-101 (in Chinese).
Ma, L., Chung, J., & Thorson, S. (2005). E-government in China: Bringing economic development
through administrative reform. Government Information Quarterly, 22(1), 20–37. doi:10.1016/j.
giq.2004.10.001
Mao, E., & Palvia, P. C. (2006). Testing an extended model of IT acceptance in the Chinese
cultural context. The Data Base for Advances in
Information Systems, 37(2/3), 20–32.
Martinsons, M. G. (2002). Electronic commerce
in China: Emerging success stories. Information
& Management, 39(7), 571–579. doi:10.1016/
S0378-7206(02)00009-5
Martinsons, M. G. (2005). Transforming China.
Communications of the ACM, 48(4), 44–48.
doi:10.1145/1053291.1053316
Mathieson, K. (1991). Predicting user intentions:
Comparing the technology acceptance model
with the theory of planned behavior. Information
Systems Research, 2(3), 173–191. doi:10.1287/
isre.2.3.173
McFarlan, F. W., Chen, G., Reimers, K., &
Guo, X. (2007). Managing the transition from
a product-oriented towards a service-oriented
company. (HBS Case #9-307-093). Digital China
Holdings Ltd.
Moore, G. C., & Benbasat, I. (1991). Development
of an instrument to measure the perceptions of
adopting an information technology innovation.
Information Systems Research, 2(3), 192–222.
doi:10.1287/isre.2.3.192
82
Nah, F. F., Tan, X., & Teh, S. H. (2004). An empirical investigation on end-users’ acceptance
of enterprise systems. Information Resources
Management Journal, 17(3), 32–53. doi:10.4018/
irmj.2004070103
Phang, C. W., Sutanto, J., Kankanhalli, A., Li,
Y., Tan, B. C. Y., & Teo, H. H. (2006). Senior
citizens’ acceptance of information systems: A
study in the context of e-government services.
IEEE Transactions on Engineering Management,
53(4), 555–569. doi:10.1109/TEM.2006.883710
Plouffe, C. R., Hulland, J. S., & Vandenbosch,
M. (2001). Richness vs. parsimony in modeling
technology adoption decisions: Understanding
merchant adoption of a smart card-based payment
system. Information Systems Research, 12(2),
208–222. doi:10.1287/isre.12.2.208.9697
Rogers, E. M. (1995). Diffusion of innovations
(4th ed.). The Free Press.
Shin, S. K., Ishman, K., & Sanders, L. (2007). An
empirical investigation of socio-cultural factors
of information sharing in China. Information &
Management, 44(2), 165–174. doi:10.1016/j.
im.2006.11.004
Siau, K., & Long, Y. (2006). Using social development lenses to understand e-government development. Journal of Global Information Management,
14(1), 47–62. doi:10.4018/jgim.2006010103
Srivastava, S. C., & Teo, T. S. H. (2006). Performance impact of e-government: An international
perspective. In Proceedings of the Tenth Pacific
Asia Conference on Information Systems, Kuala
Lumpur, Malaysia.
Straub, D. W., & Burton-Jones, A. (2007). Veni,
vidi, vici: Breaking the TAM logjam. Journal of
AIS, 8(4), 223–229.
User Evaluation of E-Government Systems
Straub, D. W., Keil, M., & Brenner, W. (1997).
Testing the technology acceptance model across
cultures: A three country study. Information &
Management, 33(1), 1–11. doi:10.1016/S03787206(97)00026-8
Szajna, B. (1996). Empirical evaluation of the revised technology acceptance model. Management
Science, 42(1), 85–92. doi:10.1287/mnsc.42.1.85
Taylor, S., & Todd, P. A. (1995). Understanding
information technology usage: A test of competing models. Information Systems Research, 6(2),
144–176. doi:10.1287/isre.6.2.144
Thompson, R. L., & Higgins, C. A. (1991). Personal computing: Toward a conceptual model of
utilization. Management Information Systems
Quarterly, 15(1), 125–143. doi:10.2307/249443
Venkatesh, V., & Morris, M. G. (2000). Why
don’t men ever stop to ask for directions? Gender, social influence, and their role in technology
acceptance and usage behavior. Management
Information Systems Quarterly, 24(1), 115–239.
doi:10.2307/3250981
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information
technology: Toward a unified view. Management
Information Systems Quarterly, 27(3), 425–478.
Venkatesh, V., & Ramesh, V. (2006). Web and
wireless site usability: Understanding differences
and modeling Use. Management Information
Systems Quarterly, 30(1), 181–205.
Walsham, G. (2001). Making a world of difference: IT in global context. John Wiley & Sons.
UN. (2005). Global e-government readiness
report 2005: From e-government to e-inclusion.
United Nations. Retrieved July 29, 2008, from
www.unpan.org
Wang, R. R. (2005). Dong Zhounshu’s transformation of Yin-Yang theory and contesting of gender
identity. Philosophy East & West, 55(2), 209–231.
doi:10.1353/pew.2005.0013
Venkatesh, V., & Agarwal, R. (2006). Turning visitors into customers: A usability-centric
perspective on purchase behavior in electronic
channels. Management Science, 52(3), 367–382.
doi:10.1287/mnsc.1050.0442
Weisinger, J. Y., & Trauth, E. M. (2002). Situating
culture in the global information sector. Information Technology & People, 14(5), 306–320.
doi:10.1108/09593840210453106
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance
model: Four longitudinal field studies. Management Science, 46(2), 186–204. doi:10.1287/
mnsc.46.2.186.11926
Venkatesh, V., Davis, F. D., & Morris, M. G.
(2007). Dead or alive? The development, trajectory and future of technology adoption research.
Journal of AIS, 8(4), 267–286.
West, D. M. (2006). Global e-government. Center
for Public Policy, Brown University.
Xi, Y., & Wang, D. (2006). Harmony configuration and Hexie management: An empirical
examination of Chinese. In Proceedings of the
13th International Conference on Management
Science and Engineering.
Ye, J. (2006). The modern value of Confucianism
and Hexie mentality. Guangdong People’s Press.
(in Chinese)
Yildiz, M. (2007). E-government research:
Reviewing the literature, limitations, and ways
forward. Government Information Quarterly,
24(3), 646–665. doi:10.1016/j.giq.2007.01.002
83
User Evaluation of E-Government Systems
Zhang, N., & Guo, X. (2007). Review and trends
analysis on e-government research. In Proceedings of the Second CNAIS National Congress,
Kunming, China (in Chinese).
84
Zhang, N., Guo, X., & Chen, G. (2007). Diffusion and evaluation of e-government systems: A
field study in China. In Proceedings of the 11th
Pacific Asia Conference on Information Systems,
Auckland, New Zealand.
85
Chapter 5
Factors Influencing SME
Compliance with Government
Regulation on Use of IT:
The Case of South Africa
Michael Kyobe
University of Cape Town, South Africa
ABSTRACT
This study investigated the factors influencing SME compliance with regulation on use of IT in South
Africa. The researcher argues that these consist of a combination of business, industry, economic, technological, sociological, and psychological factors. The results show that cost of compliance was the
main influencing factor and that both rural and urban SMEs make limited effort to develop policies and
demonstrate compliance. Furthermore, a discriminant function analysis revealed that rural SMEs can
be distinguished from their urban counterparts in terms of their disposition towards IT regulation by
five factors. Perception of high compliance costs was the key distinguishing factor followed by lack of
awareness, lack of training on compliance and security, perception of unfair regulation and possession
of inadequate security controls. The author hopes that this research-based evidence will provide better
understanding of SME compliance behaviors and guide the development of appropriate solutions to
compliance challenges in these organizations.
INTRODUCTION
Information technologies (IT) play a key role in
the development of nations. Governments are encouraging IT adoption by small and medium-sized
organizations (SME) to address poverty, facilitate
networking and alliances between buyers and
sellers, improve market intelligence, and increase
productivity (Nicol, 2003). While IT can provide
such benefits, the rise in the level of electronic
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Factors Influencing SME Compliance with Government Regulation on Use of IT
abuse has led to the establishment of regulatory
measures by governments and several SMEs are
struggling to comply with them (SMME Review
2003, 2004; SBP, 2003). In addition, there have
been very few studies investigating compliance
with legislations in SMEs (Massey, 2003; SBP,
2003; Washkush, 2006) and in particular compliance with regulation on use of IT. Consequently,
little assistance or guidance is available for these
organizations on how to address these issues
(Upfold & Sewry, 2005). The present study examines this problem in one developing country,
South Africa.
South Africa has recently enacted the Electronic Communications and Transactions Act
(ECT Act, 2002) and compliance with this law
has however created many challenges for business
organizations. Computer Business Review (2004)
shows that non-compliance with regulations
governing Web sites and online sales of goods
have been on the rise in South Africa. This was
confirmed by Buys Inc., who reported that several
organizations had not implemented notices, terms
and conditions and opt-out options on their Web
sites and that many did not even know how to go
about handling compliance issues (Elc, 2005).
SMEs in South Africa operate in a unique
regulatory environment characterized by overregulations, poor resource allocation, high illiteracy levels and lack of capital. The factors
influencing SME compliance with regulations on
use of IT have not been investigated. Furthermore,
given the fact that the profile of SMEs in urban
areas differs from that of rural SMEs in South
Africa (see Orford, Herrington & Wood, 2004),
it is possible that factors constraining compliance in these groups may also be different. These
factors need to be understood clearly if effective
solutions to SME compliance challenges are to
be provided and appropriate enforcement policies developed. SBP (2003) argues however that
there is limited research-based evidence to create this level of understanding and to guide the
86
development of useful solutions to compliance
challenges in South Africa. They maintain that
available information is patchy, contradictory,
and over-reliant on anecdote.
The contribution of this article is in providing
empirical evidence about the factors influencing
SME compliance with the ECT Act of South
Africa. Literature on compliance across various
fields was synthesized to create a comprehensive
framework for examining compliance behaviors
in SMEs. The study confirms that several factors
(e.g., business, industry, economic, technological, sociological and psychological) combine to
influence compliance behaviors in SMEs. The
study also shows that compliance levels are much
lower in rural than urban SMEs. This difference
in behavior can be explained by the fact that rural
SMEs are more likely to incur high compliance
costs; less likely to be aware of regulations; less
likely to be educated on compliance and security;
more likely to perceive regulations to be unfair
and less likely to have adequate system control
measures. SMEs in the marketing and finance
sectors however tend to respond positively to the
Act because they establish formal procedures and
adopt good practices.
In the following sections the researcher begins
with a review of the South African regulatory
environment and its impact on the SME sector.
The ECT Act (2002) and the key compliance
elements examined in the present study are introduced and compared with e-commerce laws
of other countries. This is followed by a review
of the theories of compliance with regulations
which leads to the development of a framework
for evaluating compliance with legislation on use
of IT in SMEs. The research methodology is then
presented followed by the results and analysis
of findings. Finally, conclusions are drawn and
useful recommendations are made at the end of
this paper.
Factors Influencing SME Compliance with Government Regulation on Use of IT
LITERATURE REVIEW
South Africa’s Regulatory
Environment & SMEs
South Africa has both First World and Third World
characteristics in one country. It is faced with a
double challenge of establishing its competitive
position in the global market while simultaneously addressing internal problems created by
the legacy of apartheid. This has resulted in the
enactment of many pieces of legislation (SBP,
2005) and consequently, a high regulatory burden
for business organizations.
While it is acknowledged that a vibrant SME
sector holds the potential to drive national economic growth, and indeed much in form of finance
and other resources have been invested in this
sector by the government, over-regulation and
poor allocation of resources continue to threaten
the success of the small business sector. Some of
the main areas of concern include legislations on
taxation, tourism, labor and IT. According to the
DPRU (Development Policy Research Unit, 2007),
South Africa ranks 84th worldwide in terms of ease
of paying taxes compared to Botswana (59th) and
New Zealand (16th). Obstacles identified include
VAT requirements, South African Revenue Service (SARS) administration, penalties and interest
charges. Rankin (2005) also argues that labor
market regulations (e.g., LRA, BCEA, EEA, and
Skills Act) constrain growth in smaller firms by
limiting the hiring of new employees (both skilled
and unskilled). Some firms have reacted by subcontracting and outsourcing labor while others
have replaced labor with machines. Firms in the
tourism industry have also been constrained by
the regulatory requirements of the Tourism Act of
1993 (amended in 2000), municipal regulations,
foreign exchange regulations, and excessive visa
requirements. In the IT industry, main challenges
relate to IT security, costly bandwidth problems,
complexity of the ICT-sector regulations, lack
of resources and skills to meet the requirements
of recent IT regulations (SBP, 2005; Technews,
2004; Upfold et al., 2005).
Lack of capital, IT and legal skills, poor
planning and high illiteracy levels are common
problems facing the SME sector in South Africa
(Orford et al., 2004). The combined impact of
resource limitations and the implications of numerous regulations make it difficult for SMEs to
perform effectively and respond positively to legal
demands. Hudson (2003) argues that in an environment characterized by such resource limitations,
it is imperative to understand the implications
regulations impose on regulated entities in order
to develop appropriate solutions to these problems.
If existing regulatory burdens are not addressed
soon enough, the economic contribution of the
SME sector and South Africa’s role in the global
arena may be affected. In the following sections
the author presents the ECT Act of 2002 and the
elements that constitute compliance requirements
for organizations. These are then compared with
e-commerce laws enacted in other countries.
The Electronic Communications and
Transactions Act (ECT Act, 2002)
The ECT Act of 2002 is a wide South African
legislation dealing with any form of electronic
communication (e.g., by e-mail, the Internet, and
SMS) and other issues relating to cyber inspectors, service provider liability and domain names.
Its main purpose is to provide for the facilitation
and regulation of electronic communications and
transactions; provide for the development of a
national e-strategy; promote universal access to
electronic communications and transactions and
the use of electronic transactions by SMMEs;
provide for human resource development in
electronic transactions; prevent abuse of information systems; encourage the use of e-government
services and other related matters.
According to Michalson and Hughes (2005,
pp. 2-6), one does not have to comply with the
entire act but with sections relating to incor-
87
Factors Influencing SME Compliance with Government Regulation on Use of IT
poration by reference; electronic signatures;
electronic evidence; production of information;
record retention; automated transactions; Web
site architecture and content; contract formation;
cryptography service providers; secure payment
systems; spam and protection of critical data
(i.e., chapters III, V, VI, VII, IX, XII, and XIII).
A person who contravenes these sections would
be guilty of an offence and liable on conviction
to a fine or imprisonment.
In the present study, the author will focus on
the following sections:
i.
ii.
iii.
iv.
Electronic Evidence & Record retention
(Part 1, Chapter III);
Consumer Protection - Web site content &
Spam (Chapter VII);
Personal Information and Privacy Protection
(Chapter VIII);
Illegal activities and offenses (Cyber Crime
- Chapter XIII).
These are chosen because of the growing
concern over non-compliance reported in these
areas (Burrows, 2004; Elc, 2005; Morgan, 2004;
Mullon, 2006; Upfold & Sewry, 2005).
Electronic Evidence and Record
Retention (Part 1, Chapter III)
According to Michalson and Hughes (2005, p.
2), this section aims to remove legal barriers to
electronic transactions by providing for the legal
recognition of electronic contracts and signatures
and facilitating record retention, electronic evidence and automated transactions. They explain
that electronic documents and signatures (e.g., a
typed name or a scanned image of hand written
signature) can serve as the electronic equivalent
of the paper based counterpart. Special types of
electronic signature would however be required
in situations where the law requires a signature.
Minimum requirements for transactions on the
Web where signatures are not required by parties
88
may be an expression of intent (e.g., clicking on
an “I agree” button). The act also permits keeping
records in electronic form and makes provision
for integrity as key to ensuring proper evidentiary weight of electronic evidence. Contracts
can now be performed by machines functioning
as electronic agents for parties to an electronic
transaction. This section also makes presumptions
as to the time and place of receipt of information.
This section therefore makes management of
electronic documents a critical compliance issue
because such documents may be required in legal
proceedings. The importance of proper e-mail
record keeping has been shown in recent high
profile corporate cases where firms like Morgan
Stanley, a giant U.S. financial institution, was fined
15 million U.S. dollars in March, 2006, for failing
to manage its e-mails (Image & Data Manager,
2006). Even where back-ups are regularly done,
the discovery costs could turn out to be extremely
high if this process was not conducted properly.
Consumer Protection: Web Site
Content and Spam (Chapter VII)
This section stipulates certain information to be
provided on the Web site. According to Michalson
and Hughes (2005, p. 2), merchants (foreign and
local) are obliged to provide consumers with a
minimum set of information such as the price of
products, contact details, and the right to withdraw
from an electronic transaction before completion.
In certain circumstances, consumers are also
entitled to a “cooling off” period within which
they may correct mistakes or withdraw from the
transaction without incurring any penalty. Any
provision in the agreement that excludes any
rights guaranteed under this chapter is null and
void. In addition, the act also places on businesses
trading online the responsibility of ensuring that
sufficiently secure payment systems are used. If
a payment system is breached, the supplier must
reimburse the consumer for any loss suffered.
Factors Influencing SME Compliance with Government Regulation on Use of IT
Consumers are further protected from unsolicited communications (spam). A merchant who
sends unsolicited electronic communication must
provide the consumer with the option to cancel its
subscription to the mailing list and must identify
the source from which that merchant obtained such
customer’s personal information. The consumer
has the right not to be bound to unsolicited communication. It is an offense to continue to send
unsolicited communications after having been
advised that they are not welcome. No agreement may be concluded if the consumer has not
responded to the spam.
There are already many indications that South
African firms are not compliant with these sections
of the act. Technews (2004) shows that compliance levels dropped by more than 30% between
2002 and 2004. They also show that 81% of the
Web sites did not even have legal notices. Some
had simply adopted notices and disclaimers from
foreign Web sites which never addressed South
African legal requirements (Technews, 2004).
These have been attributed to high Web site
development expenses, limited understanding of
legal requirements, misinformation about legal
compliance and poor coordination of Web projects
(Technews, 2004).
users in South Africa have limited knowledge of
who else shares their personal information on the
Web. They found that the top 100 South African
economic sites had not implemented appropriate
information protection principles.
Personal Information and Privacy
Protection (Chapter VIII)
E-Commerce Regulation in Other
Countries
This chapter establishes a voluntary regime for
protection of personal information (Michalson
& Hughes, 2005, p.2). Personal information
includes any information capable of identifying
an individual. Collectors of such information
must have the express written permission of the
consumer for the collection, collation, processing
or disclosure of any personal information on that
consumer. Information obtained must be used for
the lawful purpose for which it was obtained and
the collectors are expected to subscribe to a set of
universally accepted data protection principles.
Joubert and Van Belle (2004) allege that Internet
Most countries have e-commerce laws similar to
the South African ECT Act since these have been
modeled after the UNCITRAL Model laws on
electronic commerce and e-signature (1996, 2001).
UNCITRAL is the United Nations Commission
on International Trade Law established by United
Nations in 1996 to harmonize International Trade
law (UNCITRAL, 2004). This organization also
focuses on issues relating to contracting, online
dispute resolution and removal of legal barriers to
e-commerce. Most countries have the following
issues addressed by their e-commerce laws: the
assimilation of electronic forms of transaction to
Illegal Activities and Offenses
(Cyber Crime - Chapter XIII)
This chapter addresses the problems relating to
cyber crime in South Africa. According to Michalson and Hughes (2005), it introduces statutory
criminal offenses relating to unauthorized access
to data (e.g., through hacking), interception of data
(e.g., tapping into data flows or denial of service
attacks), interference with data (e.g., viruses) and
computer related extortions, fraud and forgery.
They also state that a person aiding those involved
in these crimes will be guilty as an accessory. The
Act prescribes the penalties for these offences.
Cyber-crime and other factors identified above
impact on the development of e-commerce globally. Consequently, many countries have found
it necessary to implement e-commerce laws to
address these issues. Some of these national ecommerce laws are discussed below and compared
with the South African ECT Act.
89
Factors Influencing SME Compliance with Government Regulation on Use of IT
conventional ones; enforceability and formation
of online contracts; use of economic agents; data
management and consumer protection. Differences however exist where national and cultural
concerns have been taken into consideration. For
instance, Quebec province in Canada has its own
e-commerce regulation; the South African ECT
Act addresses the imbalances created by apartheid
regime; while the development of local languages
has been an issue in South East Asian nations.
Different approaches have also been adopted in
regulating spam and resolving online disputes.
The adoption process has been generally slow
in developing than developed countries. Mauritius,
Tunisia and Cape Verde were among the first countries in Africa to pass e-commerce laws in 2000
(Ogunyemi, 2006). The Electronic Transactions Act
of Mauritius was modeled after the UNCITRAL
Model E-Commerce law of 1996. Key provisions
in the Tunisian Electronic Exchange and Electronic
Act include use of electronic contracts, signatures
and establishment of a certification authority while
the Cape Verde law covers the admissibility of
electronic evidence (Ogunyemi, 2006). Egypt implemented its E-Signature Law in 2004, two years
after the enactment of the South African ECT Act.
Countries like Kenya, Uganda and Tanzania are
in the process of finalizing their cyber crime laws
which will cover data security, network security,
cyber crime, information systems and electronic
transactions (Ruiz, 2006).
Developing countries in South East Asia (e.g.,
Malaysia and Singapore) adopted the e-commerce
legislation in 1998, much earlier than South Africa.
Their laws are also based on the UNCITRAL
model law and security. Other countries like
Columbia approved similar laws in 1999 and
Argentina in 2001. Most developed countries (e.g.,
United States of America, EU countries, Canada
and Australia) have often led the development of
e-commerce regulatory activity. The Australian
E-Commerce Privacy and Online Gambling legislation is remarkable for its controls over online
content and spam.
90
While national regulations and legislations
have had significant impact on e-commerce and
have provided certainty in respect of a number
of previously confusing areas, compliance with
such laws continue to be a major challenge for
many organizations (SBP, 2003; Massey, 2003,
Upfold et al, 2005). In the following sections, the
researcher reviews some fundamental theories on
compliance and the strategies adopted to address
compliance challenges.
Compliance Theories and Strategies
Compliance is a state in which someone or something is in accordance with established guidelines,
specifications, or legislation. Theories about
compliance provide accounts of why institutions
and individuals comply with or do not comply
with international and domestic laws (Bentham,
1789; Becker, 1968). In the current study we will
focus on compliance with domestic laws. According to Grossman and Zaelke (2005), rationalist
and normative models have been widely used to
explain compliance. Rationalist models focus on
deterrence and enforcement as a means to prevent
and punish non-compliance while normative
models encourage cooperation and compliance
assistance. They contend that compliance has to
do with behavioral motivation and categorized
the basic logic of human action into the logic of
consequences and logic of appropriateness. In the
first category, the actors are perceived to choose
rationally among alternatives based on their calculations of expected consequences while in the
second category human action is considered to be
based on identities, obligations, and conceptions
of appropriate action.
Rationalist Theories
The rationalist model of domestic compliance
follows the logic of consequences and posits that
regulated individuals act rationally to maximize
their economic self-interest. This emphasizes en-
Factors Influencing SME Compliance with Government Regulation on Use of IT
forcement and deterrence as measures to change
the individual’s economic perceptions. However,
this model has several limitations. For instance, it
does not consider social action based on values,
beliefs, or emotions. Value is restricted to utility
measured in economic terms. The assumption
that self-interested actors calculate the costs and
benefits of alternatives does not consider peoples’
inabilities to calculate probabilities of compound
and conditional events (Coleman, Fararo & Zey,
1993).
Furthermore, the model assumes certainty in
present and future evaluations of consequences.
This may not always be true especially in the present environment characterized by rapid changes in
demand, technology and legislations. This model
also fails to explain the issue of conflict. While
compliance is conceptualized as an economic
transaction in which both parties benefit from the
relationship, in reality there may be conflicts and
resistance when one party gains from a transaction and the other does not (Coleman et al., 1993).
In addition, many examples show that deterrence is difficult and costly to enforce. During
apartheid, the laws discouraged the development of black entrepreneurial activities in South
Africa and it was impossible for blacks to get
financial assistance from banks and government institutions. Despite this discouragement
and discrimination, successful taxi businesses,
Spaza shops and personal services developed
in the homelands (SMME Review 2003, 2004).
Schronen and Van der Merwe (2002) also argue
that the ineffectiveness of the enforcement system
may facilitate non-compliance. They blame the
escalating e-crime problem on the South African
court system and on the detectives’ inability to
handle e-crime cases. They state that 20% of the
reported white-collar crimes reach the courts and
of these only 8.3% result in convictions. Gordon
(n.d.) argues that since computer crime is a new
field in South Africa, the police service may be
hesitant to get involved in certain computer crime
investigations. He adds that the decision to prosecute is usually difficult to make since such cases
take a long time and they are expensive. This is
strongly supported by recent findings showing
that it takes 206 days to enforce legal contracts in
South Africa compared to 39 days in Netherlands
(SMME Review 2003, 2004).
Studies conducted elsewhere also report incidents where the law has been found to be lacking
in its enforcement mechanisms and penalties
(Furlong, 1991). In Australia, for instance, there
has been concern over the fact that the types of
penalties invoked on spammers did not address
the severity of the crime (Vircom.com, 2004).
More recently in United States, there has also
been concern over the CAN-SPAM Act of 2003.
Critics argue that this Act may potentially increase the amount of spam by providing a set of
guidelines for spammers on how to spam legally
(Zhang, 2005).There is also fear that this act will
lead more advertisers to rely on spam as their
preferred method of advertising.
Sometimes an organization may deliberately
fail to comply with aspects of the legislation if
the cost of compliance far exceeds the potential
liabilities (Mayne, 2006). Such organizations may
set aside funds at the beginning of their projects
to cover potential liabilities. Lynch (2005) discusses the difficulties in deterring and catching
phishers. She argues that computer crime’s effective anonymity and the fact that cybercrimes
are much less expensive to commit limits the
chances of catching and punishing perpetrators.
Zhang (2005) also contends that unlike traditional
telemarketers and junk mailers, spammers spend
significantly less costs in advertising their stuff
and often shift the costs to recipients. Cheating
in online auctions (e.g., shill bidding) also leaves
no direct evidence of its occurrence to validate
the facts and as such it is difficult to punish the
cheaters via law enforcement (Jenamani, Zhong
& Bhargava, 2007).
91
Factors Influencing SME Compliance with Government Regulation on Use of IT
Normative Theories
The assumption that people obey the law because
it is in their interest to do so has been criticized for
failing to account for factors such as social influence, moral values and perceived legitimacy of the
regulations (Grossman et al., 2005; Tyler,1990).
The normative perspective on compliance held by
the sociology literature is that laws that are developed and implemented fairly should be followed
and that individuals and firms will comply if they
believe the rules are legitimate and fairly applied
(Tyler, 1990). Similar views have been expressed
in the public choice literature and psychological
theories of leadership (Tyler, 1990). In his study
of the challenges SMMEs faced in reconstructing South Africa, Visagie (1997) reports that as
many as 25.9% of the entrepreneurs surveyed
considered the affirmative action policy to be
reversed discrimination, 28.1% refused to apply
this policy, and 39.1% believed it would lead to
lowering of standards.
Research in psychology and sociology emphasizes the importance of cognitive and social learning processes (Kohlberg, 1984). Here, compliance
with rules is perceived to depend very much on
the individual’s capabilities and ability to address
environmental influences. They maintain that
non-compliance will occur mainly in situations
where the regulated entity lacks capacity (e.g.,
knowledge of the rules, financial abilities and
technological abilities) and commitment. Many
small businesses are complacent about cyberattacks and often shun good security systems
(Zorz, 2002). Upfold and Sewry (2005) found
that most SME leaders in South Africa had not
adopted any security standards and saw information security as a technical intervention to address
basic security issues such as virus threats and
data backup. This false sense of security is partly
attributed to the lack of awareness of the security
problem. Orford et al. (2004) attributes the high
rate of small business failure to poor education
and business skills. Lack of compliance with the
92
taxation and computer security regulations in the
South African SME sector has also been attributed
to factors such as lack of planning, lack of skills,
limited resources, and poor communication. Such
factors impede the implementation of legislative
reforms and upgrade of technologies.
Psychological and sociological theories
therefore call for a more cooperative approach,
increased dissemination of information, technological assistance and adequate inspections.
The South African Revenue services adopted
this approach by providing incentives to SMEs
to encourage compliance with taxation regulations (South African Revenue Services, 2006).
Thatcher, Foster and Ling (2005) argue that the
adoption of Electronic Data Interchange (EDI)
in Singapore was successful because the government took a leading role in IT development and
launched educational programs which exposed
the communities to this technology.
However, normative models also have some
limitations. According to Grossman et al. (2005)
compliance norms become salient when there are
indications of the relevance of the norm. Actors
therefore need to be conversant with the standards
and have authority to initiate actions. However,
in an environment where rules and regulations
are changing rapidly and increasing in numbers
and complexity, the actors may lack a clear understanding of what is required of them or the
capacity to comply (Brown, 1994). Furthermore,
this model implicates an environment where
there is adequate information flow and interactions between stakeholders (e.g., owner, manager,
employees, etc.). This may not always be the case
in smaller organizations.
Other Models
There are other models that can be used to explain
compliance. In his sense-making model, Weick
(1995, 2001) argues that where there is information
overload, complexity, and ambiguity (e.g., lack of
clarity and consistency) people will ignore what-
Factors Influencing SME Compliance with Government Regulation on Use of IT
ever does not make sense to them. Game theory
has also been used to explain compliance issues.
For instance, Rabin (1993) introduced the concept
of fairness equilibrium whereby it is argued that
the belief about the attitude of a counterpart in a
game may change behavior of people and that of
the organization. Compliance is usually achieved
when the beliefs of players are consistent.
Trust also influences compliance to a great
extent. This consists of correct expectations
about actions of others that have an influence on
one’s own choices (Gambetta, 1988). Gupta and
Zhdanor (2006) contend that lack of trust among
individuals involved in a transaction may result
in non-compliance. In early 2000, SMEs in South
Africa lost their confidence in the Khula support
program for failing to deliver on its mandate due
to poor management, poor corporate governance
and greed by its members (Hudson, 2003). Jensen
(2004) found that one of the reasons inhibiting
SMEs from adopting e-commerce effectively was
the fact that the legal system did not provide them
with proper protection especially when transactions occur internationally.
Research in the business and strategic management fields also shows that structural and
organizational components of the firm influence
compliance behavior (Henriques & Sadorsky,
1996; Malloy, 2003). Large firms have many
characteristics that encourage compliance e.g.,
size, resources, skills, public image, and so forth.
However greater coordination, monitoring, or inspection costs may affect their ability to comply.
Small-sized firms, on the other hand, face poor
allocation of resources, limited capital to invest in
technology or hire appropriate resources, limited
cash flow to pay for penalties and lack of planning.
Compliance Strategies
The theories introduced above provide useful explanatory frameworks for examining compliance
issues in the SMEs. Researchers and practitioners
have also developed various compliance strategies
based on the above assumptions and some of these
are discussed in this section. Kalember (2004) has
suggested that enforcement of compliance with
e.g., SOX, HIPAA & GLBA, can be achieved by
adopting good practices. For instance, he states
that organizations can successfully comply with
SOX by following these steps:
•
•
•
•
•
Determine how the system will be operated
and configured once it is in compliance,
including processes and controls.
Assess the current state of the system,
performing a gap analysis relative to the
compliant state.
Implement any process improvements or
new controls, and remedy identified vulnerabilities.
Monitor the system to ensure that it is in line
with the compliance requirements (i.e., with
vulnerability scanning, intrusion detection,
or log monitoring).
Report on the compliance status in a format
that is intelligible to the audit staff or other
management.
Since it is now important for organizations
to know which documents to save and what can
be safely deleted, Mullon (2006) and Elc (2005)
also recommend the adoption of professional and
international standards like ISO 17999 and SAN
15801 (South African National standard) to effectively manage electronic documents (Mostert,
2005). They argue that these can help organizations understand their information assets, the
asset risks involved and also provide a basis for
development of good document retention policies.
Organizations are also realizing the importance of enforcing compliance by empowering
the regulated entities through capacity building
and use of technology. A general view held by
many is that organizations fail to comply not
because they do not want to, but because they
lack awareness of the law and its implications,
lack necessary skills and resources and techno-
93
Factors Influencing SME Compliance with Government Regulation on Use of IT
logical abilities (Allan, Annear, Beck & Beveren,
2003; Upfold & Sewry, 2005). The government of
South Africa has implemented capacity building
programs and support programs such as Ntsika,
Khula and SETAs. Use of technologies can also
enable compliance by facilitating planning and
analysis, and by automating the compliance and
monitoring processes. ISIZA developed tools
to assist SMEs evaluate their compliance with
IT security policies. Modern applications have
tools and templates that could be used to draw
contracts, archive e-mails, update documents
and notices required for legal compliance. These
cost less than the legal fees. Microsoft Exchange
2007 is another useful tool for e-mail archiving
and many audit applications can also be used to
demonstrate compliance.
Towards a Framework for Measuring
Compliance in SMEs
The literature suggests that compliance with
legislation is influenced by various factors. For
instance, economic factors (e.g., potential legal/
illegal gains, cost of compliance); psychological
factors (e.g., cognitive capabilities, learning, previous interactions, individual capabilities, ability to
address environmental influences); sociological
factors (e.g., what is perceived to be moral, fair or
equitable, norms of the groups involved and trust);
the industry (professional standards, ethics, good
practice); technological factors (e.g., IT skills, IT
resources, content and complexity of electronic
information) and business related factors (such
as type, size and location).
This suggests therefore that no single model
(e.g., rationalist, normative or business management models) can comprehensively explain
compliance behaviors (Black, 2001; Brown,
1994). One framework that captures most of these
aspects is the Australian Taxation Office compliance model (Murphy, 2004). This framework
blends various compliance aspects to provide
insight into compliance behaviors of regulated
94
entities. It has assisted the Australian Taxation
Office (ATO) in understanding short comings in
their practice, helped them acknowledge relationships with their clients and also in addressing
various compliance issues (Murphy, 2004). This
framework has therefore been adapted by adding
the technological factor which is crucial to the
present study. Figure 1 represents the adapted
framework. The researcher contends that the six
factors used in this framework mold the perceptions and reactions of SMEs to the regulation on
use of IT. By using this framework to examine
these compliance factors, useful insight into the
problems experienced by SMEs will be provided
and organizations may use it to make appropriate
predictions about compliance behaviors.
Literature suggests that organizations that
comply with legislations usually possess or have
positive perceptions of certain drivers of compliance. Compliance was therefore determined by
evaluating the possession and the perceptions of
SMEs of certain compliance drivers. First the researcher identified relevant drivers of compliance
as indicated in Figure 1. Respondents were then
requested to indicate their opinion about statements that evaluated these drivers. For instance,
technological drivers such as possession of adequate security controls and effective management
of electronic records indicate compliance with
requirements in chapters III, VIII, and XIII of
the ECT Act. If the respondents possessed these
drivers, this would then indicate a possibility of
complying with the act. On the other hand, if
respondents perceived the act to be unfair or immoral (sociological factor), chances of compliance
with the act would be slim. A questionnaire was
developed based on this framework and the details
are provided in the following section.
METHODOLOGY
The researcher employed three techniques (observations, survey and interviews) to collect and
Factors Influencing SME Compliance with Government Regulation on Use of IT
Figure 1. Factors influencing SME compliance with regulation on use of IT (Adapted from the Australian
Taxation Office -ATO)
Business
e.g. Appropriate business
exposure, proximity to
support facilities (location),
approprite allocation of
resouces, availability of
Capital
Sociological
e.g. perception of
fair/moral legislation
Technological
e.g. possession of IT skills,
up-to-date IT systems,
appropriate electronic
record management
capabilities, quality
systems controls/security
SME
compliance
with regulation
on use of IT
Industry
e.g. Adoption/use of good
practices, demonstration of
compliance
Psychological
e.g. possession of cognitive
capabilities, awareness of the
legislation, ability to
understand environ. issues
validate the accuracy of responses in the present
study (Yin, 1994). A search on Proudly South African Web site and also in Braby business directory
provided several SMEs engaged in e-commerce.
A random sample from different business sectors,
age, size, and locations was extracted.
A questionnaire was developed to collect further
information from SME respondents (see Appendix
1). The framing of the questions was guided by similar previous studies (e.g., Evans & Shirley, 2005;
Hurley, 2006; SBP, 2003), key issues discussed in
literature, and input from academics and business
managers. This questionnaire was piloted with
selected business managers, IT service providers,
students and academics in order to get feedback on
its structure, content and other possible problems.
The questions used cover most of the compliance
elements outlined in the sections above.
Section A collected general information about
the characteristics of the organization and in particular, years in business, the business sector, size,
number of employees, and experience in doing
business on the Internet. Section B measured the
extent to which respondents possessed or used the
drivers and their perceptions of some of these drivers. The questions asked in this section evaluated
the elements in the compliance model. For instance,
these determined:
Economic
e.g. perception of benefits,
perception of lower costs of
compliance
1.
Whether they are aware of the electronic
communication and transaction act.
2. Whether they adopted or possessed professional standards such as 1SO 17799, SANS
15801.
3. Whether they perceived the costs of compliance to be high.
4. Whether they demonstrated compliance, for
example through security audits.
5. Whether there was a specific person responsible for ensuring compliance in the
organization.
6. Whether they possessed policies on compliance and record retention.
7. Whether the compliance process was automated, for example, through the use of
application tools.
8. Whether adequate system security measures
or controls were implemented.
9. Whether backups and e-mail archiving were
done promptly.
10. Whether they participated in compliance
and security education or training.
11. Whether sufficient IT resources were allocated for ensuring compliance.
12. Whether they perceived the act to be just and
fair and trusted its implementation process.
95
Factors Influencing SME Compliance with Government Regulation on Use of IT
In the last part of section B, the researcher
collected information about the opinions of the
respondents regarding the fairness of the ECT Act.
In April, 2007, a letter explaining the purpose
of the study together with the questionnaire were
sent to the organizations in four provinces of
South Africa. Two hundred questionnaires were
administered in total and only 50 were returned
resulting in a response rate of only 25%. Further
effort was made to increase the number of responses by contacting non-respondents. Fifteen
additional responses were received in July while
others declined to respond because of company
policy restrictions, lack of time and lack of interest.
In September, 2007, a second round of surveys was
conducted. An additional 120 questionnaires were
administered to respondents in different organizations located in Cape Town, Limpopo, Eastern
Cape, and Johannesburg. Fifty-nine responses
were received thereby providing 124 responses
in total and a response rate of 39 percent.
Follow-up interviews with respondents were
then organized by the researcher. Twenty six interviews were conducted altogether (16 with urban
managers and 10 with rural managers). Only ten
of these interviews were held at the respondents’
premises. The rest had to be conducted by telephone because respondents had limited time. The
interviews were semi-structured, guided by earlier
observations on Web sites, the questionnaire and
key responses or comments made by managers.
These interviews allowed the researcher an opportunity to verify and validate several survey
responses and earlier Web site observations.
Test for Non-Response Bias
In order to confirm that the responses came from
the same population, a test was conducted whereby
the responses obtained in the earlier survey were
compared with those obtained in the second (including late responses). The t test results show that
no significant difference between the two groups
existed (t = 1.45; p = 0.161 at 5% significant level).
96
RESULTS AND ANALYSIS
In this section, the researcher presents the findings and analysis of the results. Both qualitative
techniques and quantitative methods were used
to analyze the data.
General Information about
Respondents
The characteristics of the respondents are summarized in Table 1. Most respondents were
business managers or owners and majority came
from the service industries (e.g., retail, finance
and marketing). Those involved in agricultural
activities and property management possess
more years of business experience (18.81, 17.17
respectively). While managers in property management, tourism, marketing, finance and retail
appear to have much broader Internet experience,
those in the agricultural sector are least involved
in online trading. The researcher found that the
Internet is mainly used for online buying and
selling, provision of services, marketing and
advertising. Further analysis shows that 31% of
the respondents were female managers mainly
in the retail and finance sectors. Furthermore,
only 37% of the respondents are located in urban
areas and majority (63%) operate in rural regions
of the Free State, Kwazulu-Natal, Eastern Cape
and Limpopo provinces. The breakdown of the
sample by industry corresponds to some extent
to the industry’s e-commerce contribution to the
national product as reflected by SAITIS Baseline
(2000). For instance, of the 16 billion Rand generated from e-commerce in 1998, Manufacturing
contributed (38%), Retail (16%), Finance (13%),
Construction (3%), Agriculture (3%) and other
services (19%).
Since there are major differences in the profile of rural and urban managers in South Africa
(Orford et al, 2004), and it is alleged that these
differences impact on SME potential, planning and
performance, the researcher decided to compare
Factors Influencing SME Compliance with Government Regulation on Use of IT
Table 1. Sample characteristics of SMEs
Industry
No
Business experience
(Yrs) Mean (SD)
No. of employees
Mean (SD)
Internet Trading Experience (Yrs) Mean
(SD)
Gender of Managers
M
F
Manufacturing and Production
10
11.29 (4.79)
10-50
4.72 (2.24)
10
0
Retail and Wholesale
28
14.52 (5.16)
0-15
5.19 (3.15)
20
8
Finance
21
12.52 (5.19)
4-10
5.75 (3.85)
14
7
Construction
Marketing
Education and Training
Agriculture
Tourism, Hotel and Tours
Property Management
Total
8
13.87 (5.84)
15-40
2.63 (1.36)
8
0
22
12.41 (5.37)
3-12
7.86 (3.44)
17
5
5
11.25 (3.14)
1-9
2.75 (0.96)
2
3
9
18.81 (8.64)
5-24
2.22 (1.48)
7
2
10
14.36 (8.72)
15-44
9.64 (3.93)
5
5
11
17.17 (6.91)
0-15
10.53 (1.22)
124
the compliance results in these two groups. First,
the mean score for each group on the driver was
determined by assigning values to the responses.
The range of values used corresponded to the
number of choices provided in each questions
(excluding the N/A option). For example, values
from 1 to 5 (where 1 = lowest and 5 = highest)
were used in the case of five choices, and 1 to 2
(where 1 = No, 2 = Yes) in the case of two choices.
The results are presented in Table 2 and discussed
in subsequent sections.
Awareness and Training
Awareness of the Act
Table 2 indicate that awareness of the ECT Act had
the lowest mean score in the rural region and fairly
high score in urban areas. This means that most
rural SMEs were not certain about the requirements
and liabilities of the act (mean score = 2.32) where
as their urban counterparts knew some of these
requirements (mean score = 3.41). This difference in
mean scores suggests that disparities in awareness
exist between these two groups. Further analysis
indicates that in total, 32% of the respondents were
not aware of the requirements and liabilities of the
act, 16% were fully aware and 34% only knew some
3
86 (69%)
8
38 (31%)
of the requirements. The rest of the respondents
indicated that the question on awareness was not
applicable to them. The researcher also conducted
t-tests to determine the significance of the differences due to location and gender. Results confirm
that such differences in awareness exist between
rural and urban SMEs (t = 1.68; p = 0.001) and also
between male and female respondents (t = 1.48; p
= 0.005) at 5% significant level.
These results support earlier claims that lack of
awareness is a major factor affecting compliance
with regulations in South Africa (Elc, 2005; Orford
et al., 2004; Technews, 2004; Upfold & Sewry,
2005). Discussions with four female respondents
in rural areas revealed that attention to compliance issues placed additional time constraints on
their domestic and business responsibilities. They
attributed the lack of awareness of the regulations to the high degree of illiteracy and lack of
support for female entrepreneurs in their region.
This confirms earlier observations by Rogerson
(2004) that existing national support programs
respond better to the needs of urban than rural
and emerging SMEs.
The qualitative analysis of responses also
provides further evidence to support some of the
mentioned findings. Some of the remarks made
by managers were:
97
Factors Influencing SME Compliance with Government Regulation on Use of IT
Table 2. Mean scores and ranks
Rural: N = 78 (63%)
Urban: N= 46 (37%)
Mean Score
Mean Score
Awareness of the legislation
2.07(1.17)
3.39(1.29)
2
Adoption of professional standards
2.62(1.12)
3.41(1.38)
3
IT budget allocation
2.32(1.22)
3.01(1.19)
4
Cost of compliance
4.53 (1.58)
4. 01(1.43)
5
Demonstration of compliance
2.44(1.25)
2.91(1.18)
6
Backup, restore, electronic document management
3.01(1.10)
3.59(1.01)
7
Compliance and security training
2.53(0.96)
2.87(0.90)
8
Implementation of security controls
2.81(1.12)
3.81(1.29)
9**
Perception of penalties and liabilities
1.33(0.49)
1.64(0.55)
10
Possession of record retention policy
1.29(0.47)
1.44(0.51)
11
Possession of compliance policy
1.11(0.21)
1.14(0.22)
12
Presence of personnel responsible for compliance
1.15(0.31)
1.55(0.46)
13
Presence of qualified IT person
1.55(0.42)
1.60(0.51)
Ref
Compliance drivers
1*
* Items 1 – 8 were measured on a scale of 1 to 5 (N/A responses were excluded)
** Items 9 – 13 were measured on a scale of 1 to 2 (N/A responses were excluded
This act is never intended for small firms like mine
…. Besides no one has bothered to tell us more
about it …. [Urban manager]
What is this ECT Act?” …… “Which one is this
now? Don’t we have enough regulations already?
[Rural manager].
Three urban managers had this to say when
asked why they had not implemented legal notices,
opt-out options and clear terms on their Web sites:
We are not sure of all these requirements….”
[manager 1]. “When we implemented our Web
site, our main focus was mainly on meeting business needs not the compliance you are asking me
about…..” [manager 2]. “You ask me about legal
notices……I do not even know what format these
should take but I’m sure this should be handled
by our staff…. [manager 3]
98
Lack of awareness and misconceptions of regulations in SMEs seem to be common problems not
only in South Africa but also in other parts of the
world. Mayne (2006) argues that small firms in the
developed countries also lack awareness and clear
understanding of the legal requirements governing
trade across international borders. Schmidt, Bennison, Bainbridge and Hallsworth (2007) report
that information overload and lack of awareness
of where to get information on regulations affect
the ability of UK SME retailers to comply with
regulations. Unum (2004) also found that almost
75% of small business owners surveyed in UK
were entirely ignorant of the changes to the Disability Discrimination Act.
Respondents in the present study who were
fully aware of the act were motivated by factors
such as participation in the consultative process
that led to the drafting of the act. Others were
forced to work towards compliance by external
consultants from banks, auditing firms and insur-
Factors Influencing SME Compliance with Government Regulation on Use of IT
ance companies. There were also those who simply
feared the consequences of non-compliance. These
findings indicate therefore that factors such as
pressure from business partners, fear of loss of
reputation and punishment, and moral reasons
can impact on SME compliance.
Compliance and Security Training
Table 2 indicates that rural and urban respondents
were not involved in regular compliance and security training programs (2.53, 2.87 respectively).
The researcher found that 48% participated in
these programs once a year and none conducted
these programs weekly. It was also revealed that
regular training could not be conducted due to lack
of sufficient financial resources to hire consultants.
Respondents also alleged that where training
assistance was provided, this was limited to certain individuals or regions and in some cases the
mentors assigned to them inspired limited trust.
Training on security and compliance are vital for
SMEs which possess limited skills and resources
to meet compliance requirements.
Good Practice
Michalson and Hughes (2005) stated that in the case
of controversial issues such as those relating to the
authenticity and admissibility of electronic imaging, an organization would be in a better position
to counter technical challenges to evidential weight
if it consistently adopted good practices. These
may include use of professional standards; proper
policies, processes and procedures; making use of
expert skills; and use of appropriate data management principles. The researcher examined the extent
to which these practices were used by SMEs.
Adoption of Professional Standards
ISO 17799 and SANS 15801
Since the law does not often provide sufficient
guidelines on how to achieve compliance, profes-
sional standards can act as useful frameworks for
developing good practice necessary for ensuring
compliance. Table 2 suggests however that several
SMEs have not adopted these standards. The urban
group only implemented some of these standards
(3.41) while most rural SMEs were just planning
to do so (2.62). Further analysis indicates that only
26% adopted most of the professional standards,
12% adopted a few and 44% had not adopted any
standards. The rest of the respondents indicated
that the question was not applicable to them. Most
of those who implemented standards operate in
the urban areas in industries such as finance,
marketing and production. The researcher found
that some urban SMEs possessed ITIL, SANS
17799-2, SAN 15489 and HIPAA compliance
certifications while others had implemented procedures which were in line with King II report
and JSE (Johannesburg Stock Exchange) listing
requirements. There were concerns however that
the process of adoption was generally difficult
and assistance with the implementation had to be
provided. According to one manager:
We struggled at first with the issue of document
retention. We did not clearly know what exactly
this meant, what needed to be retained, how and
when. Fortunately, with the assistance of our
consultants, we have adopted some guidelines
in SANS 15801 and SANS 15489. I can now confidently say that our documents are reliable to a
reasonable extent.
Similar difficulties in adopting standards and
good practices are also experienced by firms in the
developed countries. Patton (2006) reports that in
the USA, small firms still have trouble complying
with HIPAA requirements and identified cost and
limited resources as the major constraints. She
cites the AHIMA survey in which 55% of the
respondents identified resources as their most
significant barrier to full privacy compliance.
Taylor, McWilliam, Gresty and Hanneghan (2005)
also found that many SMEs in UK struggle to
99
Factors Influencing SME Compliance with Government Regulation on Use of IT
achieve accreditation and it is not easy for them
to keep up-to-date with relevant and changing
EU legislations
Possession of Policies (Record Retention Policy and ECT Act Compliance
Policy)
Table 2 also indicates that most rural and urban
respondents did not possess a record retention
policy (1.29, 1.44 respectively) and an ECT
compliance policy (1.11, 1.14 respectively).These
organizations did not seem to appreciate the fact
that with proper policies in place, compliance effort can be focused and planning conducted more
proactively. Planning and policy development are
still problems in many SMEs in the Southern
African region. In their study of e-readiness of
SMEs in Botswana, Mutula and Van Brakel (2006)
found that a number of organizations could not
develop e-readiness strategies. Such problems
have been attributed to lack of skills and planning
information (Macleod, 1995). Entrepreneurs in
many countries are also known to have strong
desire for autonomy and control. They tend to be
rigid and traditional in their business practices
(Curtis, 1983) which affects the development of
policies and specialized skills in areas like IT.
Existence of Support Personnel
(Person Responsible for Compliance,
Qualified IT Person)
Twenty-three percent of the respondents had qualified IT personnel assisting with compliance and
only 8% had a specific person fully responsible
for compliance. Table 2 shows that while both
rural and urban SMEs had someone to assist with
IT needs (1.55, 1.60 respectively); only the urban
SMEs had specific people dedicated to compliance
activities (1.15, 1.55). This is not surprising given
the level of awareness disparities in the regions
and resource constraints. Majority of the SMEs
100
are still struggling to acquire affordable and reliable support services in technical and legal fields.
Backup and E-Mail-Archival
Table 2 suggests that most rural and urban SMEs
appear to backup and archive records once a year
(3.01, 3.59 respectively). Forty-eight percent of
the respondents indicated that they back-up and
archive twice a year, 12% quarterly, 10% weekly
and 16% never do so. Experts suggest that an
effective backup strategy should enable the recovery of electronic data whenever necessary. It
is usually recommended that a planned schedule
of backup cycles should be implemented. For
instance, an end of month full backup should be
done, followed by daily or weekly incremental
backups for the remainder of the month. Monthly
backups should be retained for at least a year and
copies of which kept off-site.
Demonstration of Effort Made Towards
Compliance
The results in Table 2 indicate that while the urban score on this driver is slightly higher (2.91)
compared to that of the rural respondents (2.44),
SMEs in this study do not generally demonstrate
their effort towards compliance. Majority (54%) of
all respondents never reported their effort towards
compliance to auditors, 4% reported twice a year,
23% reported once a year, 6% reported quarterly
and 13% indicated that this question was not
applicable to them. This problem could perhaps
be explained by the fact that small organizations
do not keep records and may not engage the services of auditors (Rwigema & Karungu, 1999).
Interviews held with some managers confirm that
many are not involved in rigorous audits and find
the service fees of auditors and lawyers unaffordable. While some have occasionally hired the
services of accountants, these are usually limited
to preparations of end of year financial statements
and tax returns. Rigorous examination of systems
Factors Influencing SME Compliance with Government Regulation on Use of IT
functionality and control is hardly done. The
researcher also found that the approaches used
to evaluate compliance are still predominantly
manual. These organizations have not adopted
automated techniques to measure compliance on
a continuous basis.
These findings contrasted with those obtained
by Evans et al. (2005) in Australia. According to
Evans et al., over 72% of the respondents perceived
the quality of their business records to be high and
65% used computerized record-keeping systems.
The problem of failure to demonstrate compliance regularly seems to be world-wide however.
A world-wide study by the Security Compliance
Council (2005), which involved over 200 IT securities and compliance professionals shows that
95% of the respondents still depend on manual
procedures in IT for demonstrating compliance.
This limits the ability of the organizations to
identify problems before hand and makes it difficult to evaluate the effectiveness or necessity of
proposed changes to business procedures.
However, there were a few firms in the financial and marketing sectors that benefited from the
automation of the audit processes in the present
study. In order to establish whether those reporting to auditors had implemented better system
controls, participated in training and adopted
professional standards than those that failed to
do so, a chi-square test was conducted. This
confirmed that the difference was statistically
significant (p = 0.007).
Perceptions of Cost of Compliance
and Budget Allocation for ECT Act
Compliance
Table 2 also shows that rural SMEs perceive the
cost of compliance to be very high (4.53 = rural,
4.01 = urban). Overall, 72% indicated that the
costs were high or very high, 18% found them to
be moderate, 8% indicated that they were low and
2% stated that they were very low. The researcher
verified some of these responses by inspecting
financial records in a few organizations. These
revealed that fairly high expenses were incurred
not only for maintenance or upgrade of hardware
and software but also for consultation, access to
information, documentation of controls, training
and correction of errors. These findings confirm
earlier observations by the Security Compliance
Council (2005), that IT functions in many parts
of the world spent significant amount of staff time
documenting controls, prioritizing deficiencies for
remediation and making changes to procedures.
Schmidt, Bennison and Bainbridge (2007) also
report that over 63% of the SME retailers surveyed
in UK spent much time every week on compliance related work. Other factors raised by SMEs
which made compliance costly in the present
study include the burden of complying with other
regulations and the fact that compliance impact
on ability to perform other business functions.
One rural female respondent complained about
having to spend her private time in the evening
working on compliance issues.
The analysis of budget allocations shows that
rural SMEs allocate not more than 10% of their
IT budget on ensuring compliance (2.32) while
that of urban SMEs does not exceed 30% (3.01).
This indicates that not many SMEs allocate sufficient resources for this purpose. Since the cost of
compliance was generally high, it is possible that
SMEs had to divert funds or resources from other
commitments to meet compliance obligations. It
is important therefore that SMEs understand the
cost implications of compliance and also plan
properly for this activity to minimize costs. In his
study of the legal and regulatory environment for
SMEs in Kazakhstan and Uzbekistan, Klawonn
(2001) reports that an overly burdensome legal
and regulatory environment made it difficult and
costly for SMEs to compliance. Similar concerns
over costs of compliance have also been echoed
in studies conducted in other areas in South Africa, New Zealand and Australia. For instance,
The Strategic Business Partnership for growth
in Africa - SBP (2005) reports that firms in the
101
Factors Influencing SME Compliance with Government Regulation on Use of IT
tourism industry are burdened with high regulatory costs compared to firms in other sectors.
Goldsworth (2002) also reports that compliance
costs are an issue for every business in New
Zealand and in particular administrative costs are
quite substantial for SMEs. This is confirmed by
Massey (2003) who identified factors such as cost
and time needed to represent the firm overseas,
lack of technical skills and difficulties in firing
employees who do not perform. In Massey’s study,
57.8% of the respondents felt that compliance
distracts and diverts senior staff time, 36.3% were
concerned about the ambiguity and misinterpretation of regulations and 36.1% felt that it dampens
manager’s enthusiasm for innovation.
Possession of Adequate Systems
Controls
This was determined by asking respondents to
indicate the quality of measures implemented
to protect their information resources. Possession of only basic measures such as passwords
and anti-virus software would indicate that the
organizations had inadequate controls while the
presence of advanced security mechanisms certified by recognized authorities or professional
bodies would indicate existence of tougher and
adequate controls. Table 2 suggests that controls
implemented by rural SMEs (2.81) were relatively
inadequate compared with those implemented by
urban SMEs (3.81). Very few SMEs (18%) had
implemented advanced security measures. Only
4% of the organizations reported possession of
ITIL, ISIZA, Microsoft and other proprietary
certifications. It was difficult to prove the actual
existence of security measures because such
permission was declined in most cases. With
the escalating levels of e-crime, it is surprising
to find that few organizations have implemented
advanced security measures. Technologies can
easily become outdated as new and dynamic
attacks take place. Certification provides some
level of assurance that the controls implemented
102
are up to standard and meet general compliance
requirements. The above problems have also been
identified in many other places. Mutula and Brakel
(2006) found that SMEs in Botswana were not
exploiting the potential of technologies due to lack
of skills. They found that organizations were still
using obsolete technologies and only employed
basic security controls such as anti-virus software
and regular backups.
Perceptions of the Penalties and
Liabilities Imposed by the ECT Act
of 2002
Table 2 also shows that most respondents in the
urban areas agree that the penalties or liabilities
imposed by the act are just and fair (rural = 1.33,
urban = 1.64). Those who agreed were 34%,
28% did not agree and 38% indicated that they
did not know or the question was not applicable
to them. One respondent could not imagine that
small organizations could ever run into trouble
with the electronic law. Another respondent was
not bothered about the ECT Act requirements
because he felt such issues should be handled
by his service providers and the insurance firm.
Those that disagreed were concerned about lack
of clarity on issues relating to handling scanned
documents and some felt that penalties were not
commensurate with the crime committed in some
cases. Four of these respondents indicated that
legal provisions such as the right to withdrawal
from transactions limited them from selling certain goods online.
Respondents also felt that the consultation
process leading to the drafting of the act was not
all that inclusive. Consequently, their views were
excluded and as such the act was perceived to
be unfair. The researcher could not verify these
claims but in another study reported by ITWeb
(2002), it is stated that only 11% of the respondents were consulted during the drafting of the
ECT legislation.
Factors Influencing SME Compliance with Government Regulation on Use of IT
Similar views have been expressed in other
parts of the world. In their report on corruption in
SMEs, Tag (2006) states that SMEs in countries
like Slovakia engage in corruption because they
do not have strong ties or connections to influence
policy decisions.
Discriminant Function Analysis
Table 2 indicates that in many instances rural and
urban managers had different opinions concerning
compliance with the IT regulation. For instance,
the mean scores for awareness were (2.07, 3.39)
respectively, implementation of controls (2.81,
3.81), cost of compliance (4.53, 4.21), and perception of penalties and liabilities (1.59, 1.64). In
order to understand what factors distinguish rural
SMEs from their urban counterparts in terms of
their psychological, sociological, technological,
business, industry, and economic disposition to IT
regulation, a discriminant function analysis was
conducted and the results are presented in Table 3.
A stepwise Wilk’s Lambda was used and one
discriminant function emerged. This accounted
for 20% of the total variance. Respondents were
also correctly placed in their corresponding groups
(e.g., 82% – rural, 54% – urban). As indicated
in Table 3, correlation coefficients between the
variables and the discriminant function indicate
that five variables contribute to the discriminant
function. Where the rural group scored highly on
the variable, a negative coefficient is indicated.
Five distinguishing factors are revealed in Table
Status of Existing South African
Web Sites
The researcher also examined 30 of the Web site
of organizations involved in this study. About
40% of these had not implemented necessary
legal requirements. Organizations that implemented most requirements were mainly urban
firms in the marketing, finance and property
management industries. Perhaps this is due to
awareness of the requirements, availability of
resources, good practice and regular exposure
to Internet-trading. The researcher also observed
that while most sites had information about their
products and services, few provided information
on legal notices, opt-out options and clear terms
and conditions. These organizations could be in
breach of certain provisions of the ECT Act.
Table 3. Discriminant function analysis results
Ref
Predictor variables
Standardized Canonical Discriminant function coefficients
Wilk’s
Lambda
F-Value
1
Perception of the cost of compliance
-0.74
0.990
111.36**
2
Awareness of the Act
0.66
0.992
41.47*
3
Compliance and security training
0.31
0.942
31.6*
4
Perception of penalties and liabilities
0.21
0.913
10.12*
5
Implementation of adequate security controls
0.20
0.911
9.33*
Canonical R
0.44
Eigen value
0.20
Chi-Square
122.29
Significance
p< 0.001
** p < 0.001, * p < 0.01
103
Factors Influencing SME Compliance with Government Regulation on Use of IT
3. This suggests that rural SMEs are more likely
to incur high compliance costs (-0.74), less likely
to be aware of regulations (0.66), less likely to
be educated on compliance and security (0.31),
more likely to perceive the regulation to be unfair
(0.20) and less likely to have adequate security
controls (0.20). The Eigen value, chi-squared and
Wilk’s Lambda suggest that the variable utilized
give moderate discriminatory power in separating
rural from urban SMEs.
The discriminant function analysis shows that
the cost of compliance (economic factor) was the
key discriminant of rural SMEs from their urban
counterparts in terms of their disposition to the
regulation on use of IT. As revealed in Table 2,
rural SMEs perceived the costs of compliance
to be very high. Further analysis of the results
showed that indirect costs such as difficulties
involved in comprehending the regulations, time
spent looking for information and assistance, overreliance on consultants and the failure to attend
to other important issues affected compliance
in these SMEs. Apparently indirect costs have
not been given much consideration by policymakers in South Africa (SBP, 2003) and in some
developed countries like New Zealand (Massey,
2003). The compliance burdens relating to other
legislations (e.g., penalties, interest charged and
complicated tax and labor registration processes)
also complicate SME compliance problem. The
study therefore supports calls for a review of regulations to take into account the practical realties of
SMEs and to reduce regulatory costs (SBP, 2005;
World Bank, 2004). Regulators should ensure
that complexity in the information presented is
avoided and regular consultations with businesses
on technical and legal issues done. Assistance
through provision of financial support for training
and awareness campaigns will also be necessary.
Other factors distinguishing rural from urban
SMEs were psychological, sociological and technological. Awareness of the Act was the second
highest discriminant variable. Table 2 confirms
that there exists a great disparity in resources
104
and awareness between these two groups. Many
regulations are made on the incorrect assumptions
that all citizens (including those in rural areas)
are equally literate and understand English or
Afrikaans. In their study of issues preventing
compliance with regulatory requirements in the
mining, agri-processing and tourism sectors in
South Africa, SBP (2005) found that many SME
respondents did not know the regulations governing their sectors nor did they know where to find
assistance. SMEs in rural areas are most affected
because of lack of support and resources in their
areas. Similar problems relating to such disparities
have also been reported in the developed world.
For instance, in the UK, the geographic location
of rural SMEs presents major challenges to the
provision of e-government products and services
(Choudrie, Weerakkody & Jones, 2005).
Policy-makers and support institutions should
be more active in assisting SMEs understand regulations and obligations. This could be achieved
through effective communication mechanisms
such as radio programs, advertisements, regional
seminars and affordable online access to materials.
Much on the ECT Act regulation and discussion
forums can be found on the Internet. However,
not many small organizations can afford regular
access to the Internet. SBP (2003) suggests that
basic techniques such as visits, telephone helplines and leaflets could also be very effective.
These measures would also be appropriate in
addressing the growing misconceptions about
the new regulations.
The third factor distinguishing rural SMEs
relates to their perception of the fairness of the
act (sociological factor). The efficacy of the
ECT Act appears to impact on the compliance
of rural SMEs. Some respondents felt that the
‘opt-out’ provision limits what could be sold
online and some alleged that they were not
consulted during the drafting of the Act. While
this lack of involvement could not be verified,
evidence suggests that minority groups often
fail to have their views considered because they
Factors Influencing SME Compliance with Government Regulation on Use of IT
can not lobby policy-makers (Common Wealth
Secretariat, 2002; ITWeb, 2002). The responses
obtained from the female managers in the present study indicate that while the government has
made much effort to address the inequalities of
the past, more work is still needed to reduce the
legislative burdens of female entrepreneurs. Very
few female respondents in this study knew much
about the regulation. Many possess limited skills
and often struggle to manage business, compliance and domestic responsibilities. Extensive
consultations on legal issues affecting different
SMEs and managers should be done if the desired
compliance results are to be achieved.
Technological factors (e.g., implementation
of security controls) surprisingly had the lowest
influence as reflected in Table 3. Table 2 shows
earlier that most SMEs (mainly from rural areas)
had not implemented adequate system controls.
Basic security controls were in use and just a
few possessed controls certified by recognized
professional bodies. One would have expected
this variable to have greater discriminant effect.
Closer examination of results in Table 3 suggests
a shift in the perspective of managers regarding
security. Apparently, concern over compliance
issues such as cost (0.74) and awareness (0.66)
are overtaking the traditional concerns about
security, virus and worms (0.20).The implication
of this would be that attention may be diverted
from the escalating security crisis which SMEs
desperately need to address in order to survive.
This problem should be investigated further by
researchers in future studies.
The present study shows that SMEs did not
make substantial effort towards ensuring compliance and not many have implemented measures to
demonstrate such effort. Comments such as “…
no one has bothered to tell us about it ….” (p.15)
clearly suggest that someone else should take that
responsibility and perhaps should carry the blame
for non-compliance. However, much is revealed
in this study that suggests that SMEs have not
done much on their part. We found, for instance
that more than half of the respondents were still
using basic security measures. Situations where
SMEs have been reluctant to abandon obsolete
and risk prone technologies have been reported in
many parts of the world (Jensen, 2004; Mutula &
Brakel, 2006). Enforcement and deterrence may
be necessary in such situations to alter the calculation of those organizations less inclined to comply
voluntarily. SMEs need to take a more proactive
stance in terms of compliance rather than wait
for the government to do everything for them.
For instance, visits to information centers where
relevant materials are freely provided, upgrading
their systems and taking basic measures to secure
them would reduce potential risks and liabilities.
The industry factor (e.g., good practice) was
excluded from the discriminant function. This
confirms earlier results that both rural and urban
SMEs are not performing very well in areas like
policy development, adoption of professional
standards and demonstration of compliance. This
suggests therefore that South African SMEs in
general need to be encouraged to adopt good
practices in order to minimize potential risks and
liabilities as suggested earlier by (Michaelson and
Hughes, 2005). This study also confirms that business related factors such as structure and location
influence compliance with the law. Providing such
assistance to organizations especially in rural areas
which have limited support and resources will be
necessary if compliance goals are to be achieved.
CONCLUSION, LIMITATIONS, AND
IMPLICATIONS
This study has some limitations. It was quite
difficult getting many SMEs to respond to this
survey. A response rate of 39% was disappointing
given the importance of this issue to the survival
of many SMEs. Many showed limited interest in
this area and this seems to be a major impediment
to the effort directed at ensuring better compliance
with regulations in this sector.
105
Factors Influencing SME Compliance with Government Regulation on Use of IT
Not all regions of South Africa were represented in the sample therefore caution need to be
taken in generalizing the findings. Furthermore,
while some effort was made to gather and verify
responses from multiple sources, few observations
and interviews were conducted to draw strong
conclusions. To gain a more understanding of the
compliance problem in SMEs, further in-depth
investigations involving managers, technical
staff and other stakeholders (e.g., policy-makers)
should be conducted by researchers. In addition,
the variables identified in the model as compliance drivers are not necessarily causal factors,
therefore the causality of these factors need to
be tested in future studies.
However, this study achieved its main objective
of investigating and providing empirical evidence
about the factors influencing SME compliance
with the ECT Act. Such research–based information is necessary to create better understanding and
also enable the development of effective solutions
to the compliance problem in SMEs. By blending
rationalist, normative and business management
models, the researcher provides more comprehensive insight into the effect of compliance drivers
on SME behaviors. The findings indicate that
SME decision to comply or violate the IT law may
be influenced by business, industry, economic,
technological, sociological and psychological
factors. This therefore implicates a combined
strategy that encourages cooperation, assistance
and incentives while maintaining some degree of
enforcement and deterrence where compliance
can not be achieved voluntarily.
Economical factors such as indirect compliance costs were found to be the main barriers to
SME compliance in the present study. Unfortunately, this continues to receive limited attention
from policy-makers. Regulatory impact assessments conducted regularly will be necessary to
identify ways to minimize these costs. The study
also revealed differences in compliance behaviors
of rural and urban SMEs. Policy-makers need to
be aware of the fact that rural SMEs are more
106
likely to incur high compliance costs; are less
likely to be aware of regulations; are less likely
to be educated on compliance and security; are
more likely to perceive regulations to be unfair
and are less likely to have adequate system control
measures. Such differences in behaviors demand
specific rather than blanket solutions to compliance challenges in SMEs.
Majority of the firms surveyed were not proactive in their approaches to compliance. Few
firms planned their security systems, allocated
sufficient resources for compliance, trained their
staff regularly and developed policies. SMEs
need to be encouraged to adopt good practices,
demonstrate compliance effort regularly, and
establish appropriate procedures that will ensure
better and continuous compliance in this sector.
The findings of this study have implications
for other developing countries. For instance Kenya, Uganda, and Tanzania, which are currently
developing similar legislations to enable the establishment of e-government and e-commerce
programs have much to learn from South African
findings (Ruiz, 2006). According to Macculloch
(2001), the regulatory burden of SMEs in East
Africa is very high, the private sector is overregulated, requirements are often confusing and
contradictory and costly administrative delays are
common. Businesses operate in an environment
where there is lack of basic services, facilities,
infrastructure and unreliable power supply. There
is little doubt that given such circumstances,
there will be major barriers to compliance with
the proposed new regulations as revealed in the
present study. It is, therefore, imperative that East
African policy-makers take cognizance of these
potential problems, minimize the complexities of
their regulations, involve many stakeholders in
policy development and address potential disparities between rural and urban SMEs.
This study has also implications for foreign
firms doing (or intending to do) business with
South African SMEs. Understanding of the provisions of the ECT Act, particularly how agreements
Factors Influencing SME Compliance with Government Regulation on Use of IT
are formed using online transactions, rules on
consumer protection and online dispute resolution, will be important. Precautions need to be
taken however when dealing with firms that do
not meet legal requirements. It is imperative that
careful assessment of relationships with business
partners, terms and conditions of agreement and
accuracy of information on product or services
are done. Firms can also seek assistance from
the department of trade and industry or other
support organizations. Foreign firms should also
be aware that agreements concluded on ‘foreign’
Web sites that do not comply with the ECT Act
requirements may not be enforceable in South
Africa, if challenged.
REFERENCES
Allan, C., Annear, J., Beck, E., & Beveren, J.
(2003). A framework for the adoption of ICT
and security technologies by SMEs. Retrieved
January 11, 2005, from http://www.cecc.com.au/
programs/resource_manager/accounts/seaanz_
papers/62AnnearetalFinal.pdf
Becker, G.S. (1968). Crime and punishment: An
economic approach. Journal of Political Economy,
76(2), 169-217.
Bentham, I. (1789). An introduction to the principles of morals and legislation. Oxford: Basil
Blackwell.
Black, J. (2001). Managing discretion. Unpublished manuscript, London School of Economics,
UK.
Brown, R. (1994). Theory and practice of regulatory enforcement: Occupational health and safety
regulation in British Colombia. Law and Policy,
16, 63-71.
Burrows, T. (2004). Making web site compliance
easy. ITWeb. Retrieved September, 04 2005,
from http://www.itWeb.co.za/sections/Internet/2004/0409 220806.asp?A=COV&S=Cover
Business.iafrica (2006). BEE “an opportunity”
for small businesses. Business.iafrica. Retrieved
February 20, 2007, from http://business.iafrica.
com/hidden/542064.htm
CATA – Common wealth Association of Tax Administrators, 2006. Taxation of self employment
sector. Cata Newsletter. Retrieved March 10, 2007,
from http://www.cata-tax.org/upiloads/051006/
NL.spt%202006.pfd
Choudrie, J., Weerakkody, V., Jones, S. (2005).
Realising e-government in the UK: Rural and
urban challenges. Journal of Enterprise Information Management, 18(5), 568-585.
Coleman, S., Fararo, T., & Zey, M. (1993). Rational
Choice Theory: Advocacy and critique. Social
Forces, 72(1), 273-275.
Common wealth Secretariat. (2002). Common
wealth business women: Trade matters, best
practices and success stories. London.
Computer Business Review. (2004). Web site
compliance survey. Computer business review.
Retrieved September 20, 2006, from http://www.
cbr.co.za/article.aspx?pklArticleId=3246&pklCa
tegoryId=384
Curtis, A. (1983). Strategic planning for smaller
businesses. Toronto: Lexington Books.
Dans, E. (2003) IT investment in Small and
Medium Enterprises: Paradoxically Productive?
Electronic Journal of Information Systems Evaluation, 4(1), Retrieved September 20, 2006, from
http://www.ejise.com/volume-4/volume4-issue1/
vol4-issue1-papers.htm
DPRU – Development Policy Research Unit.
(2007). Recent findings on tax-regulated regulatory burden on SMMEs in South Africa. DPRU
Policy Brief series, School of Economics, University of Cape Town.
ECT Act. (2002). Electronic communications and
transactions Act. 2002. Acts Online. Retrieved
March 30, 2005, from http://www.acts.co.za/
ect_act/
107
Factors Influencing SME Compliance with Government Regulation on Use of IT
Elc (2005). 17799 security standard and document
retention. Electronic Consultancy. Retrieved September 13, 2005, from http://elc.co.za/article.php
Evans, C., Carlon, S., & Massey, D. (2005). Record
keeping practices and tax compliance of SMEs.
E-Journal of Tax Research, 3(2), 288-334.
Furlong, W.J. (1991). The deterrent effect of regulatory enforcement in the fishery. Land Economics,
67(1), 116-29.
Gambetta, D.G. (1988). Can we trust trust? In
D.G. Gambetta (Ed.), Trust, (pp. 213-237). New
York: Basil Blackwell.
Goldsworthy, B. (2002). Address by bruce goldsworthy ema (n) to HSNO compliance costs
workshop. ERMA New Zealand. Retrieved
January 10, 2007, from www.ermanz.govt.nz/
news-events/archives/events/erma-conf2002/
bruce-goldsworthy.pdf
Gordon, B.J. (n.d). Internet Criminal Law. Cyberlaw@SA. Retrieved June 22, 2006, from
http://www.cyberlawsa.co.za/cyberlaw/cybertext/
chapter15.htm
Grossman, D., & Zaelke, D. 2005. An introduction to theories of why states and firms do (and
do not) comply with law. INECE Conference
Proceedings. INECE. Retrieved September 10,
2006, from www.inece.org/conference/7/vol1/
index.html
Gupta, A., & Zhdanov, D. (2006). Trust and Fairness as incentives for compliance with Information
security policies. WITS-2006, Milwaukee, WI,
December 9-10, 2006.Retrieved February 12,
2007, from www.misrc.umn.edu/workingpapers/
fullpapers/2006/0607_102306.pdf
Henriques I., & Sadorsky, P. (1996). The determinants of an environmentally responsive firm:
An empirical approach. Journal of Environmental
Economics and Management, 30, 381-384.
108
Hudson, J. (2003). RIAS and private sector development: Some thoughts from the South African
context. Centre on Regulation and Competition.
Retrieved January 4, 2007, from http://www.
competition-regulation.org.uk/conferences/
mcrria03/conf8.pdf
Hurley, J. (2006). The struggle to manage security compliance for multiple regulations. White
paper: Enterprise security. Symantic. Retrieved
February, 15, 2007, from http://searchsecurity.
techtarget.com/whitepaperPage/0,293857,sid14_
gci1169051,00.html
Image & Data Manager. (2006). Poor e-mail
management cost US dollar 20 million. Image
& Data Manager, Retrieved November 20, 2006
from http://www.idm.net.au/story.asp?id =7016
ISIZA- Information Security Institute of South
Africa. (2004). Resources and self assessment
tool. ISIZA. Retrieved September 5, 2004, from
http://www.isi-za.org
ITWeb, 2002. Online industry ignorant of
new laws. ITWeb. Retrieved February 20,
2006, from www.itWeb.co.za/sections/Internet/2002/0210141156.asp?O=TE
Jenamani, M., Zhong, Y., & Bhargava, B. (2007).
Cheating in online auction – Towards explaining the popularity of English auction. Electronic
commerce research and applications. 6, 53-62.
Jensen, J. (2004). Issues facing SMEs in their
adoption of electronic commerce. Retrieved February 24, 2005, from http://www.crf.dcita.gov.au/
papres03/ jensenpaper12final.pdf
Joubert, J., & Van Belle, J.P. (2004). Compliance
of South African E-Commerce Web sites with
Legislation to protect consumer rights. Retrieved
March 14, 2007, from http://www.commerce.uct.
ac.za/InformationSystems/Staff/PersonalPages/
jvbelle/pubs/IBIMA04.doc
Factors Influencing SME Compliance with Government Regulation on Use of IT
Kalember, R. (2004). Compliance Essentials:
standard method of fulfilling requirements, storage
& security journal. Retrieved September 20, 2006
from http://issj.sys-con.com/47516.htm
Klawonn W. (2001). Some observations on the
legal and regulatory environment for SMEs
in Central Asia. Retrieved February 20, 2007,
from http://rru.worldbank.org/paperslinks/open.
aspx?id=3529.
Kohlberg, L. (1969). Stage and sequence: the
cognitive-development approach to socialization.
In Goslin, DA. (Ed.), Handbook of socialisation
theory and research. New York:Rand McNally.
Lombard, E. (2003). Hacker cleans out bank
accounts. Sunday Times News. Retrieved October 22, 2004, from http://www.sundaytimes.
co.za/2003/07/20/news01.asp
Lynch, J. (2005). Identity theft in cyberspace:
Crime control methods and their effectiveness in
combating phishing attacks. Berkeley Technology
Law Journal, 20, 259-300.
Macculloel, F. (2001). Government administrative burdens on SMEs in East Africa: Reviewing
issues and Action. Retrieved May, 20, 2006,
from http://www.blackwell-synergy.com/ doi/
pdf/10.1111/1468-0270.00287
Macleod, G. (1995). Starting your own business
in South Africa (8th ed.). South Africa: Oxford
University Press
Malloy, T.F. (2003). Compliance and the firm.
Temple Law Review, 76, 451-457.
Massey, C. (2003, June 15-18). Business compliance and SMEs: Too much a cost? In Proceedings of the 48th ICSB World conference.,Dublin,
Ireland: ICSB.
Mayne, M. (2006). How are businesses facing up to
the compliance challenge? SC Magazine Australia.
Retrieved November 30, 2006, from http://www.
scmagazine.com.au/feature/how-are-businessesfacing-up-to-the-compliance-challenge.aspx
Michalson, L., & Hughes, B. (2005). Guide to the
ECT Act. Michalsons Attorneys. Retrieved September 20, 2006, from http://www.michalson.com
Mostert. (2005). Imaging Law and SANS 15801.
Mostert Opperman Goodburn Incorporated.
Retrieved January 25, 2007, from World Wide
Web: http://www.mostert.co.za/ Publications.htm
Morgan, G. (2004). Managing e-mail to avoid liability and ensure compliance. Computer Business
Review. Retrieved June 20, 2005, from http://cbr.
co.za/news.aspx
Mutula, S., & Van Brakel, P. (2006). E-readiness
of SMEs in the ICT sector in Botswana with
respect to information access. Emerald. Retrieved January 15, 2006, from www.emeraldinsight.com/.../published/emeraldfulltextarticle/
pdf/2630240310_ref.html
Mullon, P. (2006). The six elements of legally
acceptable electronic documents. Computer Business Review. Technews. Retrieved December 05,
2006, from http://cbr.co.za/article.aspx?pklArticl
eId=3972&pklIssueId=447&pklCategoryId=384
Murphy, K. (2004). Moving towards a more effective model of regulatory enforcement in the
Australian taxation office. Working paper No.
45. Retrieved November 30, 2006, from http://
ctsi.anu.edu.au/publications/WP/45.pdf
Nicol, C. (2003). ICT Policy: A beginner’s Handbook. The Association for Progressive Communications (APC). South Africa. Internet and ICT
for Social Justice and Development.
Ogunyemi, D. (2006). Key challenges to implementing e-commerce in ghana. Economic Commission for Africa. Retrieved October 20, 2007,
from http://www.uneca.org/disd/events/2006/
ecowas-uemoa/content/Key%20challenges%20
in%20implementing%20e-commerce%20in%20
Ghana%20-%20Dayo%20Ogunye mi%20-%20
EN.pdf
109
Factors Influencing SME Compliance with Government Regulation on Use of IT
Orford, J., Herrington, M., & Wood, E. (2004).
South African Report Global Entrepreneurship
Monitor. Retrieved January 22, 2005, from www.
gsb.uct.ac.za/gsbWebb/userfiles/GEM_ 2004.pdf
Patton, S. (2006). Small firms still having trouble
complying with HIPAA. CIO, Retrieved February
20, 2007, from http://www.cio.com/article/25787/
Small_Firms_Still_Having_ Trouble_Complying_with_HIPAA
Rabin, M. (1993). Incorporating fairness into game
theory and economics. The American Economic
Review, 83(5), 1281-1302.
Rankin, N. (2005). The regulatory environment
and SMMEs. Evidence from south african level
data. Retrieved January 24, 2007, from http://
uamp.wits.ac.za/sebs/downloads/2006/the_
regulatory_environment_and_smmes_final.pdf
Rogerson, C. (2004). The impact of the South
African government’s SMME programmes: a tenyear review (1994-2003). Development Southern
Africa, 21(5), 765-773.
Ruiz, M. (2006). Internet Law – Kenya, Uganda
and Tanzania adopt cyber laws. Ibls.com. Retrieved February 20, 2007, from http://www.ibls.
com/Internet_law_news_portal_region.aspx?s
=Africa&id=7
Rwigema, H., & Karungu, P. (1999). SMME development in Johannesburg’s Southern Metropolitan
Local Council: An assessment. Development
Southern Africa, 16(1), 107-124.
SAITIS. (2000). A survey of the IT industry and
related jobs and skills in south africa. SAITIS
BASELINE STUDIES. Retrieved October 14,
2004, from http://www.saitis.co.za
SBP – Strategic business partnership for growth
in Africa (2003). Is south africa a good place
to do business? SME Alert. Retrieved January,
15, 2006, from http://www-za.sbp.org.za/docs/
SME_Alert_Nov_2003.pdf
110
SBP - Strategic business partnership for growth
in Africa (2005). The impact of sector-specific
policies and regulations on the growth of SMEs in
8 sectors of the SA economy. Retrieved February
10, 2007, http://www.thepresidency.gov.za/docs/
pcsa/economic/sbp.pdf
Schmidt, R., Bennison, D., Bainbridge, S., &
Hallsworth, A. (2007). Legislation and SME
retailers—compliance costs and consequences.
International Journal of Retail and Distribution
Management, 35(4), 256-270.
Schronen, J., & Van der Merwe, J. (2002).
White-collar crime cleans up R40bn a year. IOL
South Africa. Retrieved October 15, 2004, from
http://www.iol.co.za/index.php?set_id=1& click_
id=13&art_id=ct20010319091018396L300510
Schwella, E. (2002). Regulation and competition in south africa. Centre on Regulation and
Competition, Institute for Development Policy
and Management, University of Manchester, UK.
Security Compliance Council. (2005). The CSO’S
security compliance Agenda, Benchmark Research Report. Retrieved February 17, 2007, from
http://www.theiia.org/download. cfm?file=94803
SMME Review 2003. (2004). Annual Review
of Small Business in South Africa – 2003. Retrieved January 18, 2007, from http://www.tips.
org.za/2003/SMMEReview SCREENFINAL.pdf
Stern, E.R., & Barbour, P.A. (2005). Designing a small business tax system that enhances
growth: lessons from Africa. Retrieved February, 10 2006, fromhttp://www.fias.net/
ifcext/fias.nsf/AttachmentsByTitle/Zambiataxconference_PapersRichardandPaul/$FILE/
Ta x i ng +SM E s+ i n+A f r ic a _
Richard+Stern+and+Paul+Barbour.pdf
South African Revenue Services. (2006). Introduction of the Small Business Tax Amnesty. SARS.
Retrieved January 22, 2007, from http://www.
sars.gov.za/Small%20Business%20 Amnesty/
default.htm
Factors Influencing SME Compliance with Government Regulation on Use of IT
Sunday Times. (2002). Dozens of threats beset
your data. Sunday Times Surveys. Retrieved
October 5, 2004, from http://www.sundaytimes.
co.za/business/surveys/Internet/survey10.asp
Tag (2006). Expert group meeting on small business development and corruption. Discussion
Paper, 6-7 March. Retrieved January 15, 2006,
from http://www.tag.org.ph/pdf/SmallBussDevt_Corruption.pdf
Taylor, M., McWilliam, J., & Hannegham, M.
(2005). Cyber law: Case studies in the SME
environment. System Research and Behavioral
science, 22(3), 261-267.
Technews. (2004). 2004 Web site compliancy
survey, Computer Business Review. Retrieved
January 15, 2005, from World Wide Web: http://
cbr.co.za/article.aspx
Thatcher, M. Foster, W., & Zhu, L. (2006). B2B
e-commerce adoption decisions in Taiwan: The
interaction of cultural and other institutional
factors. Electronic Commerce Research and Application, 5, 92-104.
Tyler, T. R. (1990). Why people obey the law. New
Haven: Yale University Press.
UNCITRAL (2004). Raising confidence in
e-commerce: The legal framework. Retrieved
September 20, 2006, from http://www.unescap.
org/tid/projects/ecom04_s4sorieul.pdf
Unum (2004). SME’s lack awareness of disability law changes. Retrieved September 20, 2006,
from http://www.unum.co.uk/Home/Corporate_Information/Press_ Releases/2004/SMEs_
lack_awareness_of_Disability_Law_changes.
htm?UPCC=True
Upfold, C.T., and Sewry, D.A. (2005). An investigation of Information security in small and medium
enterprises (SMEs) in Eastern Cape. Retrieved
September 20, 2006, from http://icsa.cs.up.ac.za/
issa/2005/Proceedings/Research/082_Article.pdf
Vircom.com (2004). Can laws block spam? An
analysis of the effect of international spam legislation. White paper, Vircom.
Visagie, J.C. (1997). SMMEs’ challenges in reconstructing South Africa. Management Decision,
35(9), 660-667.
Washkuch, F. (2006). Compliance still a struggle
for most corporations. News, SC Magazine Australia, Retrieved November, 30, 2006, from http://
www.scmagazine.com.au/news/66100
Weick, K.E. (1995). Sense making in organizations. Thousand Oaks, CA: Sage.
Weick, K.E. (2001). Making sense of the organisation. Oxford: Blackwell Publishers.
World Bank. (2004). Doing business 2004: Understanding regulation. A co-publication of the World
Bank, the International Finance Corporation and
Oxford University Press. The International Bank
for Reconstruction and Development/World Bank.
Retrieved June 10, 2006, from http://www1.worldbank.org/publications/pdfs/ 15341frontmat.pdf
Yin, R. (1994). Case study research: Design and
methods. London: Sage Publications.
Zhang, L. (2005). The CAN-spam Act: An insufficient response to the growing spam problem.
Berkeley Technology Law Journal, 20, 301-332.
Zorz. (2003). Small firms ‘shun’ PC security, BBC
NEWS, Retrieved October 15, 2004, from http://
www.net_security.org/news:php?id=2650
111
Factors Influencing SME Compliance with Government Regulation on Use of IT
APPENDIX
Cover Letter
Dear Sir/Madam
RE: Compliance with the Electronic Communications & Transactions - ECT Act (2002)
The Electronic Communications & Transactions Act (ECT Act, 2002) is a South African law that
facilitates regular electronic communication and transactions, promotes universal access to electronic
communications and prevents the abuse of information systems. All organizations in South Africa are
expected to comply with this Act in order to avoid serious risks and legal liabilities. However, compliance with this Act appears to be difficult for many organizations due to many different factors.
We would like to investigate some of these problems, gather your views and some information about the
steps your organization has taken towards ensuring compliance. Participation in this study is voluntary
and at the end of the study useful recommendations will be made known to the participants. Please be
assured that the information provided will be handled in a confidential manner and only used for the
purpose of this research
We request that you complete and submit this short questionnaire to us before 15th September 2007. If
you have any questions about the survey or the questionnaire please contact:
Michael Kyobe
Dept. of Information Systems, University of Cape Town
P.O.Box 34240, Rhodes Gift, Cape Town, 7707.
Tel: 021 6502597 Fax: 021 650 2280
Email: Michael.kyobe@uct.ac.za
Thank you very much for your time and cooperation
Yours truly,
Michael Kyobe
112
Factors Influencing SME Compliance with Government Regulation on Use of IT
SMEs Survey
1. Section A
Please provide the following general information about your organization
1. Name of organization and establishment date
2. Email
3. Telephone
4. Business sector (e.g., Retail, manufacturing)
5. Number of employees
6. How long has your organization been trading on the Internet? (state your answer in Years)
2. Section B
Please answer the following questions about compliance with the ECT Act of 2002, (section 25) by selecting only one number representing your choice.
Not at all
Have heard about it but not certain about its requirements
1. Is your organization aware of the ECT Act (2002)?
Aware of some of its requirements and liabilities
Aware of most of its requirements and liabilities
Fully aware of all its requirements and liabilities
Not Applicable
Not at all
2. Has your organization adopted any professional standards
(e.g., ISO 17799 or SANS 15801) to guide you towards ensuring compliance?
We plan to adopt some of the guidelines
Have adopted a few of the guidelines
Have adopted most of the guidelines
Have fully adopted all the guidelines
113
Factors Influencing SME Compliance with Government Regulation on Use of IT
3. What percentage of your information technology budget is
spent on ECT Act compliance?
Not Applicable
0%
1% – 10%
11% - 30%
31% - 50%
above 50%
4. Which of the following best describes the cost to your
organization of compliance with the ECT Act? (Tick one appropriately number)
1(Very Low); 2(Low); 3(Moderate); 4(High); 5(Very High)
Not applicable
Never
5. How often do you report the steps taken towards ensuring
compliance with the Act to auditors?
Once a year
Twice a year
Four times a year
Every month
6. Do you have a specific person fully responsible for ensuring
compliance with the act in our organization?
Not Applicable
No
Yes
Not Applicable
7. Do you have a record retention and disposition policy?
No
Yes
Not Applicable
8. Do you have an ECT Act compliance policy?
No
Yes
9. Do you have a qualified information technology person assisting your organizations with ECT Act compliance?
Not Applicable
No
Yes
114
Factors Influencing SME Compliance with Government Regulation on Use of IT
Not applicable
Have not yet implemented any measures
10. Have you implemented adequate systems controls to
prevent viruses, spam and other attacks?
Have only basic measures e.g., password & anti-virus. Have no
intentions to upgrade
Have basic measures but intend to implement stronger measures
in future
Have implemented reasonably strong physical and electronic
measures
Have implemented advanced and certified control measures
Not Applicable
Never done so
11. How often do you backup and archive electronic mail &
records?
Once a year
Twice a year
Quarterly (4 times a year)
Weekly
Not Applicable
Never
12. How often do you conduct or participate in compliance
and security training programs?
Once a year
Twice a year
Quarterly (4 times a year)
Weekly
13. Do you think the penalties or liabilities imposed by the
ECT Act of 2002 (section 25) are just and fair?
Not Applicable
No
Yes
115
Factors Influencing SME Compliance with Government Regulation on Use of IT
14. If you have any additional comments please write them
here
Thank you very much for your assistance.
This work was previously published in International Journal of Global Information Management, Volume 17, Issue 2, edited
by Felix B. Tan, pp. 30-59, copyright 2009 by IGI Publishing (an imprint of IGI Global).
116
117
Chapter 6
Knowledge Management
Systems Diffusion in
Chinese Enterprises:
A Multistage Approach Using
the Technology-OrganizationEnvironment Framework
One-Ki (Daniel) Lee
University of Massachusetts Boston, USA
Mo (Winnie) Wang
City University of Hong Kong, Hong Kong
Kai H. Lim
City University of Hong Kong, Hong Kong
Zeyu (Jerry) Peng
University of Science and Technology of China, China
ABSTRACT
With the recognition of the importance of organizational knowledge management (KM), researchers
have paid increasing attention to knowledge management systems (KMS). However, since most prior
studies were conducted in the context of Western societies, we know little about KMS diffusion in other
regional contexts. Moreover, even with the increasing recognition of the influence of social factors in KM
practices, there is a dearth of studies that examine how unique social cultural factors affect KMS diffusion in specific countries. To fill in this gap, this study develops an integrated framework, with special
consideration on the influence of social cultures, to understand KMS diffusion in Chinese enterprises.
In our framework, we examine how specific technological, organizational, and social cultural factors
can influence the three-stage KMS diffusion process, that is, initiation, adoption, and routinization. This
study provides a holistic view of the KMS diffusion in Chinese enterprises with practical guidance for
successful KMS implementation.
DOI: 10.4018/978-1-60960-605-3.ch006
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Knowledge Management Systems Diffusion in Chinese Enterprises
INTRODUCTION
Organizational knowledge has been recognized
as the primary driver of an enterprise’s long-term
growth and its sustained competitiveness (Bock,
Zmud, Kim, & Lee, 2005; Miller & Shamsie,
1996; Wasko & Faraj, 2005). Hence, enterprises
are becoming more interested in taking up knowledge management (KM) initiatives to manage
their knowledge assets (Kankanhalli, Tan, & Wei,
2005). A common practice is adopting knowledge
management systems (KMS) to “support and
enhance the processes of knowledge creation,
storage/retrieval, transfer, and application” (Alavi
and Leidner, 2001, p. 114). A research from KPMG
(2000) reports that a considerable number of
enterprises in Europe and the U.S. have initiated
KM with adoption of the relevant technologies.
Like their Western counterparts, more and more
Chinese enterprises recognize the importance of
KM and show great interest in KMS implementation (Burrows, Drummond, & Martinsons, 2005;
Xiao, 2005; Zhou, Hu, & Pang, 2005). However,
the overall KM maturity of Chinese enterprises
may still be in its infancy. For example, Mainland
Chinese enterprises have seldom been listed in
the Asian Most Admired Knowledge Enterprises
(Teleos, 2003, 2004, 2006, 2007; Voelpel & Han,
2005). Failing to take advantages of KM due to
technical limitations is one of the main difficulties
they face (Zhou et al., 2005). In particular, many
enterprises fail to maximize employees’ effective usage beyond the initial adoption of KMS
(Burrows et al., 2005). Therefore, many Chinese
enterprises simply postpone their decision on
KMS adoption, pondering whether their current
organizational conditions are ready for KMS
implementation. Thus, it will be both interesting and useful to examine the entire process of
KMS diffusion, from initiation to routinization,
in Chinese enterprises so as to provide practical
guidance to Chinese managers for their KMS
implementation.
118
Our literature review substantiates that most
of the existing research in the KM field has been
conducted in Western counties or highly developed
countries, such as the U.S., Western Europe, and
Japan (Voelpel & Han, 2005). Since “national
environments (e.g., economic development, cultural expectations, organizational structure) shape
the practice of KM” (Geng, Twonley, Huang, &
Zhang, 2005, p. 1031), key findings from the
context of these countries may only partially or
even inaccurately apply to the context in China
(Chow, Deng, & Ho, 2000; Geng et al., 2005;
Michailova & Hutchings, 2006; Ramasamy, Goh,
& Yeung, 2006). According to Selmer (2005), due
to the large cultural distance between China and
Western countries, China is frequently regarded
by Westerners as “the most foreign of all foreign
places” (p. 78). Moreover, Chinese enterprises are
highly embedded in the Chinese traditional cultural
context, such as Confucian cultural values, with
regard to their management practice, business
process, and organizational structures (Ramasamy
et al., 2006). As Burrows et al. (2005) pointed
out, KM practice within a Chinese enterprise
will also be strongly influenced by such cultural
values. Therefore, we aim to fill this cultural gap
of the literature in investigating organizational
KM initiative and providing practical guidance
for KMS diffusion within Chinese enterprises.
To achieve this, we set up the following research
objectives: (1) To develop an integrated framework
that enables a holistic perspective to investigate
potential factors that can affect the entire KMS
diffusion process within Chinese enterprises;
(2) To generate high-level propositions from the
framework developed so that future studies can
develop specific hypotheses from the propositions
for their empirical tests.
Drawing from Cooper and Zmud’s (1990)
technology diffusion process model and Zhu,
Kraemer, and Xu’s (2006) e-business diffusion
model, we propose a three-stage KMS diffusion
model in this study. We also adopt the TechnologyOrganization-Environment (TOE) framework
Knowledge Management Systems Diffusion in Chinese Enterprises
(Tornatzky & Fleischer, 1990) to capture factors
and theorize their effect on relevant stages of
KMS diffusion process. We organize our article
as follows: the next section provides an introduction to our theoretical base. The following section
comprises the conceptual development where
we proposes eight propositions to illustrate how
factors from the three aspects, that is, technology
aspect, organization aspect, and environment aspect, affect each of the stages of KMS diffusion
process. We then discuss both the theoretical and
practical implications of our study. Conclusions
are offered in the final section with the directions
of future research.
THEORETICAL BACKGROUND
This study draws from three streams of research:
(1) technology diffusion process, (2) technologyorganization-environment (TOE) framework, and
(3) Chinese Confucian culture, each of which is
discussed in greater detail.
Technology Diffusion Process
Innovation diffusion is recognized as a stage-based
process of “spreading a new technology within
a universe of potential adopters” (Nilakanta &
Scamell, 1990, p. 25). From this technological
diffusion perspective, Cooper and Zmud (1990)
suggest a six-stage model of diffusion process,
consisting of (1) initiation: scanning organizational problems, collecting, and evaluating the
information for IT solutions, finding the “right”
IT application for the organization, (2) adoption:
getting organizational support and resource commitment for IT implementation by negotiation, (3)
adaptation: installing the IT application, adjusting both the IT and organizational procedures to
achieve a good fit, and preparing employees to
use the IT, (4) acceptance: encouraging employees to commit to using the IT application in their
work, (5) routinization: using the IT application
to become a part of the working procedures and
employees’ habit, and (6) infusion: using the IT
application in a more integrated manner to obtain
its full potential in supporting the organization’s
work. On the other hand, Zhu, Kraemer, and Xu
(2006) suggested a simpler version of this multistage diffusion process model to develop their
e-business diffusion model, in which the above
six stages were simplified into three stages of
initiation, adoption, and routinization.
KMS diffusion, like the diffusion of other
kinds of technology, is also believed to be a
process consisting of multiple stages (Xu &
Quaddus, 2005c). For parsimony, following Zhu
et al.’s (2006) approach, we propose a threestage model of KMS diffusion. The three stages
are KMS initiation, adoption, and routinization.
First, the KMS initiation stage incorporates the
activities of information gathering, synthesizing,
and KMS evaluating. Second, the KMS adoption
stage includes decision making on KMS adoption,
allocation of the necessary resources for KMS,
KMS development, adjustment of organizational
procedures, and employee training. This stage corresponds to the adoption and adaptation stages in
the original technology diffusion process model.
Third, the KMS routinization stage, which corresponds to the acceptance, routinization, and
infusion stages in the original technology diffusion
process, involves operating KMS and inducing
employees to use the system as a part of their
work process.
Technology–Organization–
Environment (TOE) Framework
To define the factors that may affect the three stages
of KMS diffusion, we rely on the TOE framework
proposed by Tornatzky and Fleischer (1990). The
TOE framework suggests investigating the effects
of technology itself, organizational characteristics, and the external environment on adoption
and implementation of technological innovation
(Tornatzky & Fleischer, 1990). The TOE frame-
119
Knowledge Management Systems Diffusion in Chinese Enterprises
work has been thought to be a good theoretical
angle for defining IT deployment factors which
are rooted in technological, organizational, or
environment contexts and thus are widely adopted
by IS researchers (e.g., Charalambos, Benbasat,
& Albert, 1995; Chau & Tam, 1997; Cooper &
Zmud, 1990; Kuan & Chau, 2001; Premkumar
& Ramamurthy, 1995; Thong, 1999; Zhu et al.,
2003). Therefore, we believe the TOE framework
is useful in understanding KMS diffusion process.
KMS diffusion is a complex social technical
process (Alavi & Leidner, 1999; Chauvel & Despres, 2002; Davenport, De Long, & Beers, 1998;
Davenport & Prusak, 1998; Kamla & Lorne, 2005;
Xu & Quaddus, 2005a). In the literature, several
researchers have pointed out that technical factors
are not the only factors that cultivate KMS success
and that organizational and cultural factors also
make considerable contributions to KMS success
(Al-Busaidi & Olfman, 2005; Kankanhalli et al.,
2005; McDermott, 1999; Waston & Hewett, 2006).
In particular, we focus on the cultural context
for the organizational and environmental aspects.
In the literature, several researchers (Deans &
Ricks, 1991; Raman & Watson, 1994; Watson,
Kelly, Galliers, & Brancheau, 1997) have suggested that cultural differences at national level
may explain differences in IT value. They usually adopt Hofstede’s (1991) framework which
include five cultural dimensions, that is, distance,
uncertainty avoidance, individualism, masculinity,
and time orientation. This framework has been
widely adopted to explain the impacts of cultural
differences on organizational behaviors, including IT behaviors. In this study, our aim is not to
compare the diffusion process under different
cultural backgrounds, but rather to investigate the
role of specific cultural influence on KMS diffusion process in a specific cultural context (namely
China). Therefore, Hofstede’s framework, which
is useful for cross-cultural comparison, does not
meet the aim of our study. Rather, we focus on
Chinese-specific cultural factors with regard to
KMS diffusion.
120
Chinese Society and
Confucian Culture
Prior studies on Chinese culture revealed several
cultural values which are unique to Chinese society. Examples include harmony, interpersonal
relationships, reciprocal benefits, and impression
management (Cheung et al., 2001; Hwang, 1987;
Liu, Friedman, & Chi, 2005; Liu, 2003). One of
the most fundamental bases of these values is Confucianism, a Chinese philosophy which regards
appropriate human relationships as the basis of
society (Yun, 2001). Although new to IS research,
it has been widely studied in the organizational
behavior domain to explain various behavioral
phenomena in Chinese society (Jaw, Ling, Wang,
& Chang, 2007; Shin, Ishman, & Sanders, 2007;
Wong, Leung, Hung, & Ngai, 2007). Therefore,
investigating this cultural background will also be
vital to understand social interaction processes of
the KMS diffusion in Chinese enterprises.
Confucianism regulates human relationships
by the Five Code of Ethics, namely (1) affection
between father and son, (2) righteousness between
rulers and subjects, (3) distinction between husband and wife, (4) order between older and younger
brothers, and (5) faithfulness between friends
(Chen and Chung, 1994; Liu, 2003). Influenced
by these culture values, Chinese enterprises are
known for the status-based hierarchy which is
demonstrated in their organizational structure and
behaviors (Lockett, 1988; Sheh, 2001; Tjosvold,
Yu, & Liu, 2004). They are also known for the
reciprocal obligation embedded in interpersonal
relationships (Chen & Chung, 1994; Liu, 2003).
The former can be characterized as hierarchical
relationships and the latter as social reciprocal
relationships (Chen & Chung, 1994; Liu, 2003;
Yum, 1988). In particular, this study focuses on
guanxi and renqing, which are perceived as the
interlocking components of such reciprocal relationships (Yun, 2001). Since the KMS diffusion
process in Chinese enterprises involves diverse
interpersonal and interorganizational relation-
Knowledge Management Systems Diffusion in Chinese Enterprises
Figure 1. A KMS diffusion model for Chinese enterprises
ships, we believe that the cultural value of guanxi
and renqing, that is, reciprocity, will affect various
stages of the diffusion process. Moreover, since
these cultural factors influence both social and
public life in China more than in most Western
countries (Pye, 1988), examining these cultural
factors would provide us a deeper understanding
of the context in which KMS diffusion proceeds.
This also allows us to explore the specificity of the
context and to look for better methods to facilitate
the diffusion process.
our research model. Each of the variables and
proposed relationships is discussed in this section.
Conceptual Development
Organizational IT competence refers to “a firm’s
capacity for IT-based innovation” (Sambamurthy,
Bharadwaj, & Grover, 2003, p. 244). Prior studies have identified several important elements of
IT competence, which include IT infrastructure,
human IT resource (both technical and managerial
skills), and IT/business partnerships (Bharadwaj,
2000; Feeny & Wilcocks, 1998; Henderson, 1990;
Ross, Beath, & Goodhue, 1996; Sambamurthy et
Chau and Tam (1997) emphasize the importance
of tailoring frameworks borrowed to cater for the
context of a specific application. Likewise, when
we adopt the TOE framework to study KMS diffusion in Chinese enterprises, we pay attention to the
specific context of China and tailor the variables
according to China’s specificity. Figure 1 shows
Technological Aspect
We first examine the effect of the factors from
technological aspect on KMS diffusion process in
terms of organizational IT competence and KMS
characteristics.
Organizational IT Competence
121
Knowledge Management Systems Diffusion in Chinese Enterprises
al., 2003; Weill & Broadbent, 1998). These elements have been illustrated as playing important
roles in organizational processes to launch, deploy,
and manage technologies and IT-based systems
(Bharadwaj, 2000; Ross et al., 1996; Wade &
Hulland, 2004). For example, organizations with
a flexible IT infrastructure can rapidly adopt new
technologies at lower costs and risks (Bharadwaj,
2000; Premkumar & Ramamurthy, 1995). Organizations with strong human IT resources may
have an advantage in terms of integrating IT and
business resources more effectively (Bharadwaj,
2000; Piccoli & Ives, 2005). Moreover, organizations with a strong partnership between IS and
business units can smooth IT project diffusion by
reducing resistance from business units (Feeny &
Wilcocks, 1998; Ross et al., 1996). In line with
these arguments, we believe that IT competence
plays an important role during the KMS diffusion process in Chinese enterprise, especially
when considering that technical deficiency or
immaturity has been one of the biggest barriers
for Chinese enterprises to adopt new technology
resources in general (Harrison & Farn, 1990) and
to conduct KM activities in specific (Burrows et
al., 2005; Hu, 2006; Zhou et al., 2005).
The influence of IT competence, however, may
vary throughout the entire diffusion process. In the
first two stages, that is, KMS initiation and adoption stages, an organization’s IT competence may
have a direct effect on how the organization evaluates certain KMS. A high level of IT competence
with a flexible IT infrastructure, strong IT human
resources, and a strong IT-business partnership,
may allow resources to be more effectively utilized
for KMS initiation and implementation. In particular, IT competence may influence whether there
are available or sufficient resources for a KMS
implementation project and how these resources
are allocated for the project and its related activities, such as procedural adjustment and employee
training. On the other hand, since organizational
IT competence may not have a direct bearing on
employees’ personal motivation to accept and
122
continuously use the KMS, it is unlikely to have
a direct impact on the last stage of KMS diffusion process, that is, KMS routinization. Based
on these arguments, we propose that:
P1: Organizational IT competence will have
positive impacts on KMS initiation and
adoption stages.
KMS Characteristics
In the literature, the influence of the perceived
characteristics of a specific innovation on the
adoption has been widely studied (Rogers, 1995).
According to Tornatzky and Klein (1982), three
characteristics of an innovation, that is, compatibility, relative advantage, and complexity, are significantly associated with its adoption. Following
this perspective, we posit that the compatibility,
relative advantage, and complexity of a certain
KMS influence its diffusion process. Drawing
from the literature (Kuan & Chau, 2001; Rogers,
1995; Thong, 1999), we define KMS compatibility
as the extent to which KMS is consistent with the
existing values, needs, and work practices of an
enterprise. KMS relative advantage refers to the
degree to which KMS can provide benefits to the
organization (Kuan & Chau, 2001; Rogers, 1995;
Thong, 1999). Particularly, this relative advantage
refers to the potential new benefit which KMS can
bring to the organization and/or employees when
compared to the traditional knowledge management practices without such systemic support.
On the other hand, KMS complexity refers to the
extent to which KMS is difficult to use.
The first two characteristics of compatibility
and relative advantage are believed to be positively
related to KMS diffusion while the last characteristic of complexity may be negatively related to
KMS diffusion. These technology characteristics
will become the critical concerns particularly for
the post-initiation stages, that is, adoption and
routinization of a specific KMS. Furthermore,
the three characteristics are believed to be impor-
Knowledge Management Systems Diffusion in Chinese Enterprises
tant particularly in the China context for several
reasons. First, several China-based studies (e.g.,
Hu, 2006; Zhou et al., 2005) have documented
that some Chinese enterprises considered only the
benefits that the system could bring but neglected
whether or not the system was actually compatible
with their Chinese-specific business practices. As
a result, their KMS could not achieve continuous
usage by employees. On the other hand, by carefully taking this compatibility issue into consideration, other enterprises could achieve successful
adoption and continuous use of KMS. Based on
these arguments, we propose that:
P2: KMS compatibility will have positive impacts on KMS adoption and routinization
stages.
Second, KMS relative advantage is the potential benefits derived from using a specific KMS.
The benefits can be viewed from two distinctive
levels, that is, organizational level and individual
level. Moreover, the perceived benefits by organization and individual employees may not be the
same. Hence, we propose their different impacts
on KMS diffusion process. First, organizationallevel relative advantage may have a positive relationship with the adoption stage. This is mainly
because the benefits perceived at organizational
level can lead to an organization’s decision on
adopting a specific KMS and also motivate the
organization to adjust for this new IT-based initiative. On the other hand, individual-level relative
advantage may have a positive relationship with
the routinization stage. This is because individual
employees should be more motivated to use the
KMS when they recognize the usefulness of the
system to their work (Davis, 1989). Based on
these arguments, we propose that:
P3a: KMS relative advantage at the organizational
level will have positive impacts on KMS
adoption stage.
P3b: KMS relative advantage at an individual
level will have positive impacts on KMS
routinization stage.
Third, the complexity of KMS is also another
major concern for potential adopters because it
affects how much resources should be invested and
how much effort should be made for adaptation of
both the IT and operational procedures. Moreover,
since the complexity can make employees’ use of
the proposed system difficult (Davis, 1989), it will
eventually influence whether or not employees
can achieve a rountinized usage. Based on these
arguments, we propose that:
P4: KMS complexity will have negative impacts
on KMS adoption and routinization stages.
Organizational Aspect
Top Management Commitment
Incorporated in the traditional respect for status
which originates from the Confucian cultural
values, a status-based behavioral tendency exists
between top management and employees within
Chinese enterprises. Specifically, top management
behaves as the authority and employees show
obedience and respect for their superiors (Li &
Scullion, 2006; Lockett, 1988). Many prior studies
pointed out that Chinese particularly follow the
principle of respecting and obeying superiors (e.g.,
Han, Li, & Kwang-Kuo, 2006; Hofstede, 1991;
Wei & Hwang, 1998). Therefore, the opinions and
behaviors of top management may have a strong
effect throughout the entire diffusion process. In
particular, top management’s commitment toward
organizational KM and a specific KMS may
directly dictate how the organization perceives
organizational opportunities and problems with
regard to this technology-based innovation and
how the organization evaluates KMS. Moreover,
top management’s strong commitment toward an
IT project has shown to be a critical success fac-
123
Knowledge Management Systems Diffusion in Chinese Enterprises
tor of successful implementation of the project
(Jarvenpaa & Ives, 1991; Keil, Cule, Lyytinen,
& Schmidt, 1998). This will be especially true
for Chinese enterprises because top management’s opinion usually plays an important role in
allocating organizational resources and making
adjustments of business procedures. Furthermore,
top management commitment may be a significant driving force of the last stage, that is, KMS
rountinization. This is because the opinion of top
management greatly influences how the organization introduces KMS to its employees and further
employees have a high obedience and respect for
their top management. Based on these arguments,
we propose that:
P5: Top management commitment toward KM
initiative and a specific KMS will have positive impacts on KMS initiation, adoption,
and routinization stages.
Hierarchical Organizational Structure
Chinese enterprises usually have a strong and
deep hierarchical structure in management and
communication (Jiang & Liang, 2005; Sheh,
2001). Under such a hierarchical environment,
upper-level managers may restrict lower-level
employees’ access to crucial information by exerting control over the vertical and horizontal flow
of information (Ardichvili, Maurer, Li, Wentling,
& Stuedemann, 2006; Hofstede, 2001). Moreover,
individual employees tend to easily accept the
delivered decisions and the information given
from their supervisors (Jiang & Liang, 2005).
Under this situation, the common practice of
organizational knowledge transfer and sharing
in Western organizations having less hierarchical
structure may not apply to Chinese organizations.
Furthermore, as Ardichvili et al. (2006) pointed
out, higher-level managers who emphasize their
authority and image do not want to participate in
online-based communications. Under a strong and
deep hierarchical structure, employees in differ-
124
ent departments also may not realize the value of
knowledge sharing across departments. Hence,
even if a KMS has been well implemented in an
organization, the KMS may not actually facilitate
sharing of knowledge if the organization has a
strong and deep hierarchical structure. Based on
these arguments, we propose that:
P6: A strong and deep hierarchical organizational
structure will have a negative impact on
KMS routinization stage.
Social Cultural Aspect:
Environmental Aspect
Confucian ethics places high values on interpersonal harmony and views social interaction as a
reciprocally obligatory, giving-and-taking process
(Chen & Chung, 1994; Liu, 2003; Yum, 1988).
Influenced by such a cultural value, China has
been thought to be a relation-centered society, in
which guanxi and renqing dominate interpersonal
relationship (Fan, 2002; Farh, Tsui, Xin, & Cheng,
1998; Hwang, 1987; Ramasamy et al., 2006).
Guanxi can be understood as “drawing on connections to secure favors in personal relationships”
(Luo, 1997, p. 44). Guanxi emphasizes the value
of interdependence, mutuality, and reciprocity. It
has been recognized as the lifeblood of personal
and business relationships (Hutchings, 2005; Ramasamy et al., 2006; Shin et al., 2007; Su, Sirgy, &
Littlefield, 2003; Yeung & Tung, 1996). The other
concept tightly coupled with guanxi is renqing,
which is perceived as the interlocking component
and a prerequisite of guanxi (Yun, 2001). According to Hwang (1987), renqing implies both a
normative standard for regulating social exchange
and a social mechanism for individuals to obtain
desirable resources. The rule of renqing regulates
that in a mutual relationship, people who receive
help are obligated to repay (Hwang, 1987). People
who refuse to return favors are thought to be immoral and untrustworthy (Shin et al., 2007). Hence,
it is the social norm that people need to follow in
Knowledge Management Systems Diffusion in Chinese Enterprises
order to maintain harmonious guanxi with each
other (Yun, 2001). Furthermore, people can use
renqing to build and improve guanxi, which is
neatly captured by the Chinese phrase “sending
renqing.” For example, when a person has happy
occasions or meets difficulties, the other person
can use resources to give a gift or provide help
(Hwang, 1987). This promotes the indebtedness
feeling of the receiver with the need to look for
opportunities to repay (Hoivik, 2007; Zhang &
Zhang, 2006). Through such repeated sending and
repaying, people build and maintain their guanxi
in order to make more use of their connections
for the future occasions (Chan, Denton, & Tsang,
2003). Thus, skillful practitioners of guanxi may
use the way of renqing to cultivate relationships
with particular individuals or groups of people
who might provide help in the future (Yun, 2001).
Based on these understandings, we believe that
the cultural value of guanxi and renqing affect the
KMS diffusion process in Chinese enterprises.
This is because the diffusion process involves
diverse interpersonal and interorganizational
relationships.
In particular, the cultural value of guanxi and
renqing in the relationship with external vendors
may facilitate the KMS initiation and adoption
stages. This is because Chinese enterprises may
tend to initiate and evaluate system vendors based
on the closeness of the guanxi rather than on an
objective cost-benefit justification. Moreover,
the decision on the selection of a specific vendor
could also be treated as an opportunity to repay
the renqing debt to the vendor. Based on these
arguments, we propose that:
P7: A strong cultural value of “guanxi” and
“renqing” in managing external vendors will
have positive impacts on KMS initiation and
adoption stages.
On the other hand, in order to proactively
build guanxi, internal employees are likely to
intentionally provide their valuable knowledge
to colleagues who are perceived as potential
resources of future help. Hence, they prefer a
face-to-face knowledge sharing to cultivate a
direct indebtedness feeling of the receiver. Since
knowledge can be viewed as a significant resource
in building interpersonal relationships, employees
may have a tendency to keep it privately and not
to publicize their knowledge through KMS. Based
on these arguments, we propose that:
P8: A strong cultural value of “guanxi” and
“renqing” among internal employees will
have a negative impact on KMS routinization stage.
DISCUSSION AND IMPLICATIONS
This study proposes an integrated framework to
examine how the technology, organization, and
social-cultural (environment) factors affect KMS
diffusion in the context of Chinese enterprises. In
particular, the study highlights the roles of cultural specificities of Chinese enterprises, such as
Confucianism, guanxi, and renqing, in explaining
the impacts of those factors on each of the stages
of KMS diffusion process. With regard to their
impacts, there should be a variation among the
sub-cultural groups within China, such as Center
China, Northern China, Southern China, Hong
Kong, and Taiwan. Moreover, one could recognize
the cultural difference among the different types
of Chinese enterprise, such as government-owned,
private, foreign-invested, and public enterprises.
Regardless of such variances among the subcultural groups, however, the nation-wide cultural
specificities play an important role in organizational behavior (Hofstede, 1991). Thus, it will
be both interesting and important to understand
how these cultural specificities define specific
behavioral pattern during KMS diffusion process.
The study has several significant implications.
First, the study suggests a holistic view of KMS
diffusion process stages and the factors that may
125
Knowledge Management Systems Diffusion in Chinese Enterprises
affect the stages involved in the process. Thus
the study enriches practitioners with a comprehensive understanding of critical areas of concern
in implementing KMS in Chinese enterprises.
Through this study, we have conceptualized KMS
diffusion process as a parsimonious three-stage
model. We also adopt the TOE framework to
frame the factors that influence the three stages
of KMS diffusion within Chinese enterprises.
The proposed framework will benefit Chinese
enterprises who are planning to initiate a KMS and
who are confronting difficulties in certain stages of
their KMS diffusion. In particular, the framework
highlights areas for management attention in each
of the stages of the KMS diffusion process. By
providing a deeper understanding of their potential
customers, our research framework can also help
foreign system vendors, who would like to take
an edge over their competitors in China market.
Second, in our conceptualization, we place emphasis on the influence of social culture factors,
that is, the cultural value of guanxi and renqing.
Our approach is consistent with the increasing
recognition that the success of KMS can be determined by social issues to a large extent (Kamla
& Lorne, 2005; Kankanhalli et al., 2005; Ruppel
& Harrington, 2001; Scott, 1998; Voelpel & Han,
2005). This also implies that practitioners need
to take into consideration the specific context in
which a KMS is embedded when implementing
the KMS. Third, this study will serve as a base
for further empirical study with conceptual extension and testable hypotheses. Fourth, our research
framework, which adopts TOE framework, can
be extended by exploring the potential influence
of other additional factors. For example, another
salient Chinese cultural value that has been recognized as exerting significant influence on human behaviors in Chinese society is face concern
(Chow et al., 2000; Hwang, Francesco, & Kessler,
2003; Kim & Nam, 1998). Taking additional factors into consideration will make the proposed
framework more comprehensive and with higher
prediction power.
126
CONCLUSION
Future research can extend our conceptualization
of KMS diffusion. In particular, a multicase study
might be appropriate for this type of study. Case
study has been known to be especially useful when
the phenomenon under investigation is contemporary and when the study addresses the “how” and
“why” questions (Benbasat, Goldstein, & Mead,
1987; Zhang, Lee, Huang, Zhang, & Huang, 2005).
Moreover, case study has been used successfully
by previous IS implementation research (e.g., Xu
& Quaddus, 2005b; Zhang et al., 2005). Since the
unit of analysis of this study is KMS diffusion
project, future research can select enterprises
which are involved in certain stages of the KMS
diffusion. Data can be gathered through observations and interviews. Active involvement in a
company’s decision making and manipulation on
certain factors will be another possible approach,
that is, action research (Myers, 1997). In addition
to such qualitative methods, the framework can
be validated using quantitative methods, such as
a survey and statistical analyses.
In conclusion, even with the increasing recognition of the influence of social cultural factors
in KM practices, there is a dearth of studies that
specifically examine how unique social cultural
factors affect KMS diffusion in specific countries.
This research is an attempt to capture the social
cultural factors, in combination with other factors,
to explore the intricate influence on the KMS
diffusion process. We provide a starting point for
future researchers to investigate the phenomenon
further based on the logic and knowledge that this
framework provides.
ACKNOWLEDGMENT
The work described in this article was╯supported
by a grant from the Research Grants Council of
the Hong Kong Special Administrative Region,
China (Project No. CityU 1497/06H)
Knowledge Management Systems Diffusion in Chinese Enterprises
REFERENCES
Al-Busaidi, K. A., & Olfman, L. (2005). An
investigation of the determinants of knowledge
management systems success in Omani organizations. Journal of Global Information Technology
Management, 8(3), 6–27.
Alavi, M., & Leidner, D. E. (1999). Knowledge
management systems: Issues, challenges and
benefits. Communications of AIS, 1(7), 2–37.
Alavi, M., & Leidner, D. E. (2001). Review:
Knowledge management and knowledge management systems: Conceptual foundations and
research Issues. Management Information Systems
Quarterly, 25(1), 107–136. doi:10.2307/3250961
Ardichvili, A., Maurer, M., Li, W., Wentling, T.,
& Stuedemann, R. (2006). Cultural influences on
knowledge sharing through online communities
of practice. Journal of Knowledge Management,
10(1), 94–107. doi:10.1108/13673270610650139
Benbasat, I., Goldstein, D. K., & Mead, M. (1987).
The case research strategy in studies of information systems. Management Information Systems
Quarterly, 11(3), 369–386. doi:10.2307/248684
Bharadwaj, A. S. (2000). A resource-based perspective on information technology capacity and
firm performance: An empirical investigation.
Management Information Systems Quarterly,
24(1), 169–196. doi:10.2307/3250983
Bock, G.-W., Zmud, R. W., Kim, Y.-G., & Lee,
J.-N. (2005). Behavior intention formation in
knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces, and
organizational climate. Management Information
Systems Quarterly, 29(1), 87–111.
Burrows, G. R., Drummond, D. L., & Martinsons,
M. G. (2005). Knowledge management in China.
Communications of the ACM, 48(4), 73–76.
doi:10.1145/1053291.1053322
Chan, A. K. K., Denton, L. T., & Tsang, A. S.
L. (2003). The art of gift giving in China. Business Horizons, 46(4), 47. doi:10.1016/S00076813(03)00051-X
Charalambos, L. I., Benbasat, I., & Albert, S. D.
(1995). Electronic data interchange and small
organizations: Adoption and impact of technology. Management Information Systems Quarterly,
19(4), 465–485. doi:10.2307/249629
Chau, P. Y. K., & Tam, K. Y. (1997). Factors affecting the adoption of open systems: An exploratory
study. Management Information Systems Quarterly, 21(1), 1–24. doi:10.2307/249740
Chauvel, D., & Despres, C. (2002). A review
of survey research in knowledge management:1997-2001. Journal of Knowledge Management, 6(3), 207. doi:10.1108/13673270210434322
Chen, G.-M., & Chung, J. (1994). The impact
of Confucianism on organizational communication. Communication Quarterly, 42(2), 93–105.
doi:10.1080/01463379409369919
Cheung, F. M., Leung, K., Zhang, J.-X., Sun,
H.-F., Gan, Y.-Q., & Song, W.-Z. (2001). Indigenous Chinese personality constructs: Is
the five-factor model complete? Journal of
Cross-Cultural Psychology, 32(4), 407–434.
doi:10.1177/0022022101032004003
Chow, C. W., Deng, F. J., & Ho, J. L. (2000). The
openness of knowledge sharing within organizations: A comparative study in the United States
and the People’s Republic of China. Journal of
Management Accounting Research, 12, 65–95.
doi:10.2308/jmar.2000.12.1.65
Cooper, R. B., & Zmud, R. W. (1990). Information
technology implementation research: A technology diffusion approach. Management Science,
36(2), 123–139. doi:10.1287/mnsc.36.2.123
127
Knowledge Management Systems Diffusion in Chinese Enterprises
Davenport, T. H., De Long, D. W., & Beers, M. C.
(1998). Successful knowledge management projects. Sloan Management Review, 39(2), 43–57.
Davenport, T. H., & Prusak, L. (1998). Working
knowledge: How organizations manage what they
know. Boston, MA: Harvard Business School
Press.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems
Quarterly, 13(3), 319–340. doi:10.2307/249008
Deans, P. C., & Ricks, D. A. (1991). MIS research:
A model for incorporating the international dimension. The Journal of High Technology Management Research, 2(1), 57–81. doi:10.1016/10478310(91)90014-F
Fan, Y. (2002). Questioning guanxi: Definition,
classification and implications. International
Business Review, 11, 543–561. doi:10.1016/
S0969-5931(02)00036-7
Farh, J.-L., Tsui, A. S., Xin, K., & Cheng, B.-S.
(1998). The influence of relational demography
and guanxi: The Chinese case. Organization Science, 9(4), 471–488. doi:10.1287/orsc.9.4.471
Harrison, W. L., & Farn, C.-K. (1990). A comparison of information management issues in the
United States of America and the Republic of
China. Information & Management, 18, 177–188.
doi:10.1016/0378-7206(90)90038-J
Henderson, J. C. (1990). Plugging into strategic
partnerships: The critical IS connection. Sloan
Management Review, 31(3), 7–18.
Hofstede, G. (1991). Cultures and organizations:
Software of the mind. New York: McGraw-Hill.
Hofstede, G. (2001). Culture’s consequences:
Comparing values, behaviors, institutions and
organizations across nations (2nd ed.). Thousand
Oaks, CA: Sage Publications.
Hoivik, H. W. (2007). East meets West: Tacit
messages about business ethics in stories told by
Chinese manager. Journal of Business Ethics,
74(4), 457–469. doi:10.1007/s10551-007-9508-z
Hu, X. (2006). The current situation and existing
problems in Chinese enterprises’ knowledge management implementation. Technology Economic
Market, 11, 202.
Feeny, D. F., & Wilcocks, L. P. (1998). Core IS
capabilities for exploiting information technology.
Sloan Management Review, 39(3), 33–50.
Hutchings, K. (2005). Examining the impacts of
institutional change on knowledge sharing and
management learning in the People’s Republic
of China. Thunderbird International Business
Review, 47(4), 447–468. doi:10.1002/tie.20062
Geng, Q., Twonley, C., Huang, K., & Zhang, J.
(2005). Comparative knowledge management: A
pilot study of Chinese and American universities.
Journal of the American Society for Information
Science and Technology, 56(10), 1031–1044.
doi:10.1002/asi.20194
Hwang, A., Francesco, A. M., & Kessler, E.
(2003). The relationship between individualismcollectivism, face, and feedback and learning
process in Hong Kong, Singapore, and the United
States. Journal of Cross-Cultural Psychology,
34(1), 72–91. doi:10.1177/0022022102239156
Han, K.-H., Li, M.-C., & Kwang-Kuo, H. (2006).
Cognitive response to favor requests from different social targets in a Confucian society. Journal
of Social and Personal Relationships, 22(2),
283–294. doi:10.1177/0265407505050952
Hwang, K.-k. (1987). Face and favor: The Chinese
power game. American Journal of Sociology,
92(4), 944–974. doi:10.1086/228588
128
Knowledge Management Systems Diffusion in Chinese Enterprises
Jarvenpaa, S. L., & Ives, B. (1991). Executive
involvement and participation in the management of information technology. Management
Information Systems Quarterly, 15(2), 205–227.
doi:10.2307/249382
Jaw, B.-S., Ling, Y.-H., Wang, C. Y.-P., & Chang,
W.-C. (2007). The impact of culture on Chinese
employees’ work values. Personnel Review, 36(5),
763. doi:10.1108/00483480710774034
Jiang, Y., & Liang, L. (2005). The study on the
relationship between Chinese traditional culture
and knowledge management. Science Research
Management, 26(3), 116–120.
Kamla, A. A.-B., & Lorne, O. (2005). An investigation of the determinants of knowledge
management systems success in Omani organizations. Journal of Global Information Technology
Management, 8(3), 8–27.
Kankanhalli, A., Tan, B. C. Y., & Wei, K.-K.
(2005). Contributing knowledge to electronic
knowledge repositories: An empirical investigation. Management Information Systems Quarterly,
29(1), 113–143.
Keil, M., Cule, P. E., Lyytinen, K., & Schmidt, R.
C. (1998). A framework for identifying software
project risks. Communications of the ACM, 41(11),
76–83. doi:10.1145/287831.287843
Kim, J. Y., & Nam, S. H. (1998). The concept and
dynamics of face: Implications for organizational
behavior in Asia. Organization Science, 9(4),
522–534. doi:10.1287/orsc.9.4.522
KPMG. (2000). Knowledge management research
report 2000. KPMG Consulting.
Kuan, K. K. Y., & Chau, P. Y. K. (2001). A
perception-based model for EDI adoption in
small businesses using a technology-organization-environment framework. Information
& Management, 38(8), 507–521. doi:10.1016/
S0378-7206(01)00073-8
Li, S., & Scullion, H. (2006). Bridging the distance: Managing cross-border knowledge holders.
Asia Pacific Journal of Management, 23, 71–92.
doi:10.1007/s10490-006-6116-x
Liu, L. A., Friedman, R. A., & Chi, S.-C. (2005).
Ren Qing vs. big five: The role of culturally sensitive measures of individual difference in distributive negotiations. Management and Organization
Review, 1(2), 225–247. doi:10.1111/j.17408784.2005.00010.x
Liu, S. (2003). Cultures within culture: Unity
and diversity of two generations of employees in
state-owned enterprises. Human Relations, 56(4),
387–417. doi:10.1177/0018726703056004001
Lockett, M. (1988). Culture and the problems of
Chinese management. Organization Studies, 9(4),
475–496. doi:10.1177/017084068800900402
Luo, Y. (1997). Guanxi: Principles, philosophies,
and implications. Human Systems Management,
16(1), 43–51.
McDermott, R. (1999). Why information technology inspired but cannot deliver knowledge
management. California Management Review,
41(4), 103–117.
Michailova, S., & Hutchings, K. (2006). National
cultural influences on knowledge sharing: A comparison of China and Russia. Journal of Management Studies, 43(3), 384–405. doi:10.1111/j.14676486.2006.00595.x
Miller, D. T., & Shamsie, J. (1996). The resourcebased view of the firm in two environments:
The Hollywood film studio from 1936 to 1965.
Academy of Management Journal, 39(3), 519–543.
doi:10.2307/256654
Myers, M. D. (1997). Qualitative research in
information systems. Retrieved August 1, 2008,
from http://www.qual.auckland.ac.nz/
129
Knowledge Management Systems Diffusion in Chinese Enterprises
Nilakanta, S., & Scamell, R. W. (1990). The effect of information sources and communication
channels on the diffusion of innovation in a data
base development environment. Management
Science, 36(1), 24–40. doi:10.1287/mnsc.36.1.24
Sambamurthy, V., Bharadwaj, A., & Grover,
V. (2003). Shaping agility through digital options: reconceptualizing the role of information
technology in contemporary firms. Management
Information Systems Quarterly, 27(2), 237–263.
Piccoli, G., & Ives, B. (2005). Review: ITdependent strategic initiatives and sustained
competitive advantage: A review and synthesis of
the literature. Management Information Systems
Quarterly, 29(4), 747–776.
Scott, J. E. (1998). Organizational knowledge
and Internet. Decision Support Systems, 23(4),
347–357.
Premkumar, G., & Ramamurthy, K. (1995). The
role of interorganizational and organizational
factors on the decision mode for adoption of
interorganizational systems. Decision Sciences,
26(3), 303–336. doi:10.1111/j.1540-5915.1995.
tb01431.x
Pye, L. W. (1988). The Mandarin and the Cadre:
China’s political cultures. Ann Arbor, MI: The
University of Michigan Press.
Raman, K. S., & Watson, R. T. (1994). National
culture, IS, and organizational implications. In
Deans, P. C., & Karwan, K. R. (Eds.), Global
information systems and technology: Focus on
the organization and its functional areas (pp.
493–513). Harrisburg, PA: Idea Group.
Ramasamy, B., Goh, K. W., & Yeung, M. C. H.
(2006). Is guanxi a bridge to knowledge transfer.
Journal of Business Research, 59(1), 130–139.
doi:10.1016/j.jbusres.2005.04.001
Rogers, E. M. (1995). Diffusion of innovations
(4th ed.). New York: Free Press.
Ross, J. W., Beath, C. M., & Goodhue, D. L. (1996).
Develop long-term competitiveness through IT
assets. Sloan Management Review, 31–45.
Ruppel, C. P., & Harrington, S. J. (2001). Sharing
knowledge through intranets: A study of organizational culture and intranet implementation. IEEE
Transactions on Professional Communication,
44(1), 37–52. doi:10.1109/47.911131
130
Selmer, J. (2005). Western expatriates in China:
Adjusties to the most foreign of all foreign places.
In Scullion, H., & Linehan, M. (Eds.), International firms: A critical text. London: Palgrave
Macmillan.
Sheh, S. (2001). Chinese cultural values and their
implications to Chinese management. Singapore
Management Review, 23(2), 309–342.
Shin, S. K., Ishman, M., & Sanders, G. L. (2007).
An empirical investigation of socio-cultural factors of information sharing in China. Information
& Management, 44(2), 165–174. doi:10.1016/j.
im.2006.11.004
Su, C., Sirgy, M. J., & Littlefield, J. E. (2003). Is
guanxi orientation bad, ethically speaking? A study
of Chinese enterprises. Journal of Business Ethics, 44, 303–312. doi:10.1023/A:1023696619286
Teleos. (2003). 2003 Asian most admired knowledge enterprises study: Executive summary.
Retrieved August 1, 2008, from http://unpan1.
un.org/intradoc/groups/public/documents/APCITY/UNPAN020331.pdf
Teleos. (2004). 2004 Asian MAKE finalists named.
Retrieved August 1, 2008, from http://findarticles.
com/p/articles/mi_m0EIN/is_2004_Oct_13/
ai_n6233691
Teleos. (2006). 2006 Asian most admired knowledge enterprises (MAKE) winners. Retrieved August 1, 2008, from http://knowledgemanagement.
wordpress.com/2007/01/05/2006-make-winners/
Knowledge Management Systems Diffusion in Chinese Enterprises
Teleos. (2007). 2007 Asian most admired
knowledge enterprises study: Executive summary. Teleos. Retrieved August 1, 2008, from
http://www.knowledgebusiness.com/knowledgebusiness/templates/TextAndLinksList.
aspx?siteId=1&menuItemId=133
Waston, S., & Hewett, K. (2006). A multi-theoretical model of knowledge transfer in organizations: Determinants of knowledge contribution
and knowledge reuse. Journal of Management
Studies, 43(2), 142–173.
Thong, J. Y. L. (1999). An integrated model of
information systems adoption in small businesses.
Journal of Management Information Systems,
15(4), 187–214.
Watson, R. T., Kelly, G. G., Galliers, R. D., &
Brancheau, J. C. (1997). Key issues in information
systems management: An international perspective. Journal of Management Information Systems,
13(4), 91–115.
Tjosvold, D., Yu, Z.-y., & Liu, H. (2004). Traditional values for applying abilities and leader
effectiveness in China. Leadership and Organization Development Journal, 25(3/4), 318–331.
doi:10.1108/01437730410538653
Wei, C. F., & Hwang, K. K. (1998). Positive duties
and negative duties: A cross-cultural comparison of moral judgment between Taiwanese and
American College Students. Chinese Journal of
Psychology, 40, 137–153.
Tornatzky, L. G., & Fleischer, M. (1990). The
processes of technological innovation. Lexington,
MA: Lexington Books.
Weill, P., & Broadbent, M. (1998). Leveraging the
new infrastructure: How market leaders capitalize on information technology. Cambridge, MA:
Harvard Business School Press.
Tornatzky, L. G., & Klein, L. (1982). Innovation
characteristics and innovation-implementation: A
meta-analysis of findings. IEEE Transactions on
Engineering Management, 29(11), 28–45.
Voelpel, S. C., & Han, Z. (2005). Managing
knowledge sharing in China: The case of siemens
ShareNet. Journal of Knowledge Management,
9(3), 51–63. doi:10.1108/13673270510602764
Wade, M., & Hulland, J. (2004). Review: The
resource-based view and information systems
research: Review, extension, and suggestions for
future research. Management Information Systems
Quarterly, 23(1), 107–142.
Wasko, M. M., & Faraj, S. (2005). Why should I
share? Examining social capital and knowledge
contribution in electronic networks of practice.
Management Information Systems Quarterly,
29(1), 35–57.
Wong, Y. H., Leung, T. K. P., Hung, H., & Ngai,
E. W. T. (2007). A model of guanxi development:
flexibility, commitment and capital exchange. Total Quality Management & Business Excellence,
18(8), 875. doi:10.1080/14783360701350607
Xiao, X.-f. (2005). Knowledge management in
China under the knowledge economic. Technology
and Innovation Management, 26(4).
Xu, J., & Quaddus, M. (2005a). From rhetoric towards a model of practical knowledge management
systems. Journal of Management Development,
24(4), 291–319. doi:10.1108/02621710510591325
Xu, J., & Quaddus, M. (2005b). Exploring the
perceptions of knowledge management systems.
Journal of Management Development, 24(4),
374–389. doi:10.1108/02621710510591361
Xu, J., & Quaddus, M. (2005c). A sixstage model for the effective diffusion of
knowledge management systems. Journal of
Management Development, 24(4), 362–373.
doi:10.1108/02621710510591352
131
Knowledge Management Systems Diffusion in Chinese Enterprises
Yeung, I. Y. M., & Tung, R. L. (1996). Achieving
business success in Confucian societies: The importance of guanxi (connections). Organizational
Dynamics, 25(2), 54–65. doi:10.1016/S00902616(96)90025-X
Zhang, Z., Lee, M. K. O., Huang, P., Zhang, L., &
Huang, X. (2005). A framework of ERP systems
implementation success in China: An empirical
study. International Journal of Production Economics, 98, 56–80. doi:10.1016/j.ijpe.2004.09.004
Yum, J. O. (1988). The impact of Confucianism
on interpersonal relationships and communication
patterns in EastAsia. Communication Monographs,
55, 374–388. doi:10.1080/03637758809376178
Zhou, Y., Hu, H.-h., & Pang, A.-c. (2005). Investigation and analysis of current states of the knowledge management activities in Chinese enterprises.
Science Research Management, 26(4), 80.
Yun, G. (2001). Personal relations in Chinese
enterprise reforms: The interaction between formal-impersonal structure and informal-personal
power in the process of transforming state-owned
enterprise property rights. Unpublished doctoral
dissertation, Temple University.
Zhu, K., Kraemer, K. L., & Xu, S. (2003). Electronic business adoption by European firms: A
cross-country assessment of the facilitators and
inhibitors. European Journal of Information
Systems, 12(4), 251–268. doi:10.1057/palgrave.
ejis.3000475
Zhang, Y., & Zhang, Z. (2006). Guanxi and organizational dynamics in China: A link between
individual and organizational levels. Journal
of Business Ethics, 67, 375–392. doi:10.1007/
s10551-006-9031-7
Zhu, K., Kraemer, K. L., & Xu, S. (2006). The
process of innovation assimilation by firms in
different countries: A technology diffusion perspective on e-business. Management Science,
52(10), 1557–1576. doi:10.1287/mnsc.1050.0487
This work was previously published in International Journal of Global Information Management, Volume 17, Issue 1, edited
by Felix B. Tan, pp. 70-84, copyright 2009 by IGI Publishing (an imprint of IGI Global).
132
133
Chapter 7
Factors Affecting Information
Communication Technologies
Usage and Satisfaction:
Perspective from Instant
Messaging in Kuwait
Kamel Rouibah
Kuwait University, Kuwait
Hosni Hamdy
Kuwait University, Kuwait
ABSTRACT
Instant messaging (IM) technology has received extensive focus in the West while there is lack of knowledge
of it in the Arab world. This study aims to shed light on factors affecting IM usage and user satisfaction
in an Arab country (Kuwait). To achieve this objective, this study develops a theoretical model that is
based on three well-known models. This model includes curiosity (from the theory of flow), compatibility (from the innovation diffusion theory), perceived usefulness and perceived ease of use (from the
technology acceptance model), and individual characteristics in the form of prior similar experience.
The proposed model was tested using survey data from 609 students, with the results lending support
for the proposed model. Importantly, results highlight the impact of social effect on curiosity as a new
mediator of technology adoption and satisfaction. This study contributes to the literature on technology
adoption in the Arab word and aids educational institutions and companies to understand the social and
technical nature of users’ attitudes with regard to ICT adoption and satisfaction.
DOI: 10.4018/978-1-60960-605-3.ch007
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Factors Affecting Information Communication Technologies Usage and Satisfaction
INTRODUCTION
The 21st century has witnessed a high growth in
the use of the Internet in the Middle East. This
growth has been substantial in the Gulf Cooperation Council countries and will likely continue to
increase. For example, the Internet penetration rate
has increased between 2000 and 2005 by 300% in
Kuwait, 443% in Qatar, 257% in Bahrain, 201%
in Oman, 207% in Saudi Arabia, and 310% in the
UAE (Internet World Stats 2008).
Because of this trend, Li, Chau, and Lou
(2005) call for studies to examine the value of
several information and communication technologies (ICT) available for use. It is important
to note, however, that although the Arab world
has increased its Internet usage and connectivity
(Loch, Straub, & Kamel, 2003); little is known
on how these ICTs are used and the motivation
behind their acceptance.
Among these ICTs, IM technology is one of
the most widespread in the world.
We define IM as the ability to see if a chosen
friend, co-worker, or associate is connected to the
Internet and, if they are, to exchange real time
messages with them. Two important components
define IM capabilities: synchronicity and presence
awareness. Synchronicity relates to the transaction
speed of the technology while presence awareness
lets someone knows whether his correspondent
is online or not. IM is used instead of e-mail if
an immediate response is desired, such as when
clarifying questions need to be answered before
the conversation can proceed or when a matter
must be settled quickly.
Related IM Past Studies
and Their Limits
With the widespread use of IM by individuals,
a recent focus in the MIS field started to focus
on why and how IM is used as well as what the
consequences of its usage are.
134
Analysis of previous IM studies reveals three
observations (see literature review in Rouibah,
2008, in appendix 1). First, since 2002, the number
of studies on IM has increased. Second, despite
an increased focus on IM, there has only been
three studies (Chen, Yen, & Huang, 2004; Li et
al., 2005; Rouibah, 2008) about IM in the leading,
international IS journals (e.g., MIS Quarterly, and
Journal of Global Information Management).
Third, while past studies have focused on IM,
both in the workplace and outside the workplace,
there has been a lack of studies that focused solely
on social usage in developing countries. With the
increasing role of social influences on IM use, Shen
& Gallivan (2006) suggested conducting further
research in this perspective. Fourth, this study
also notes that few studies focus on IM satisfaction as compared to current and intention-to-use
IM. Fifth, while few studies have examined IM
adoption in the workplace (Cameron & Webster,
2005), little is known about how IM is actually
used outside the workplace and for social usage
in an international context (except Rouibah 2008;
Simon, 2006). There is also a lack of research
that addresses IM consequence as observed by
Shen and Gallivan (2006). Sixth, there has been
an increase in research dedicated to IM, but these
studies were not based on well known technology acceptance theories (e.g., Nicholson 2002),
except De Vos, Hofte, and de Poot (2004), Lin,
Chan, and Jin (2004), Wang, Hsu, and Fang (2005)
Li et al. (2005), and Rouibah (2008). However,
these studies did not investigate the relationship
between IM usage and users’ satisfaction.
Moreover, with regard to IM usage in the Arab
world, only two studies focused on IM (Rouibah
2008; Rouibah & Ould-Ali, 2005). Rouibah and
Ould-Ali, (2005) described the factors that lead
211 Kuwaiti students to use IM and what were the
consequences of their IM usage. Results of their
study revealed that respondents use IM with people
of the same gender (64%) and opposite gender
(46%). As for motives of using IM, results revealed
two main motives: for curiosity satisfaction (81%)
Factors Affecting Information Communication Technologies Usage and Satisfaction
and for friendship (39%). As for impact of IM,
results revealed 90% have succeeded in creating
a wide social network, while 65% admitted that
IM has a negative impact since they lose a lot of
time, and 35% realized that it decreased their study
performance. The study also revealed a variety
of discussed topics such as social, entertainment,
cultural, political, love, study, family, scientific,
religion, medical, personal, unethical, and sports.
With regard to the overall appreciation of IM,
statistics revealed that 50% perceived it as good
and 50% as bad technology.
Rouibah (2008) studied motives for IM usage by 191 employees for social use outside the
workplace in Kuwait. Results indicate that social
norm, ease of use, and enjoyment affect the level
of IM usage by Kuwaiti employees.
Background on IM Acceptance
IM acceptance is the potential user’s predisposition toward personally using a specific system. In
order to adequately evaluate acceptance, multiple
constructs should be utilized. The constructs of
usage and user satisfaction are commonly studied
dimensions (DeLone & McLean, 1992). These two
constructs are utilized to form the dimensions of
IM acceptance in this study.
There are several technology adoption models,
such as the technology acceptance model (TAM).
Past studies have shown the limits of TAM when
applied outside the workplace and across cultures.
In particular the literature review done by Legris
et al., (2003) revealed the need to include other
components in order to gain a broader view and
a better explanation of IT/ICT adoption. Other
studies on intrinsic motivation (Anandarajan,
Igbaria, & Anakwe, 2002; Li et al., 2005) have
shown that adoption of information systems that
provide self-fulfillment, rather than being instrumental, are strongly connected to home and leisure
activities. Therefore, a new theory seems desirable
and timely to explain IM adoption.
Specifically, there is a need to include emotion and motivation in ICT adoption. Although
these affects are touched upon in some studies,
the affective aspects are incorporated in some
exceptional studies such as computer playfulness (Webster & Martocchio, 1992), flow (Ghani
& Deshpande, 1994), and cognitive absorption
(Agarwal & Karahanna, 2000). Even when some
affective constructs are studied, other important
constructs escape scrutiny, and researchers fail to
agree on definitions.
In order to advance the knowledge about ICT
adoption, this study includes curiosity as an effective/emotion variable besides IM.
THE ROLE OF CURIOSITY
IN IM ACCEPTANCE
Curiosity has its origin in the psychology theory of
flow (Csikszentmihalyi, 1990). flow offers a basis
to understand the important structural features of
intrinsically motivating activities and, therefore,
explains individual attitudes and behaviors towards a target IT/ICT. Flow is the state in which
people are so involved in an activity that nothing
else seems to matter (Csikszentmihalyi, 1990;
Ghani & Deshpande, 1994). Flow, according to
Agarwal & Karahanna, (2000), includes intense
concentration, a sense of being in control, and a
transformation of time. When people are in flow,
they shift into a common mode of experience when
they become absorbed in their activity.
In the last few years, flow has been studied
in the context of computer mediated environments and IT including the curiosity dimension
(Agarwal & Karahanna, 2000; Webster, Trevino,
& Ryan, 1993).
Malone (1981) reviewed a number of intrinsic
motivation theories and suggested that challenge,
fantasy, and curiosity are components of intrinsically motivating computer-based instruction.
However, he saw curiosity as the most important
feature of intrinsic motivation and stated that one
135
Factors Affecting Information Communication Technologies Usage and Satisfaction
of the most important features of an intrinsically
motivating environment is the degree to which
individuals can continue to arouse and then satisfy
their curiosity. Examples may include interacting
with the opposite gender or discovering other
cultures most individuals ignore.
Lieberman (1977) sees playfulness as a multifaceted construct encompassing five distinct
factors: cognitive spontaneity, social spontaneity,
physical spontaneity, manifest joy, and sense of
humor. He also states that the overt manifestations of cognitive spontaneity are curiosity and
inventiveness.
Berlyne (1965) goes further and claims that
the principal factor producing curiosity is what he
calls conceptual conflict. By this, he means conflict
between incompatible attitudes or ideas evoked
by a stimulus situation which may explain the
opposition between attitude in the real life world
and the other in a virtual world (e.g., the ability
to flirt online that is not possible in face-to-face
high context societies).
Since the flow construct has been operationalized, tested, and applied in different ways,
additional research is needed to shed light on its
meaning to further our knowledge about its positive influence on human computer interaction, as
suggested by previous researchers in playfulness
(Malone, 1981; Webster & Martocchio, 1992).
The next section explains the main characteristics of the Arab culture and argues why ICT is
highly affected by the national culture.
IM, ICT AND THE
CHARACTERISTICS OF
ARAB CULTURE
The Arab world includes 22 countries which share
similar culture, values, language, history and geographic location. It spans from the west coast of
Africa through the northern part of Africa to the
Arabian Gulf, and from Sudan to the Middle East
Gulf Cooperation Council states which include
136
Kuwait, Bahrain, Oman, Qatar, the United Arab
Emirates, and Saudi Arabia (see appendix 2).
While the Arab world is large in terms of
population (335,827,330), very few studies have
focused on IT/ICT in the Arab world compared
to those in North America and Europe and none
of them focused on IM (Rouibah, 2008). Rose
& Straub (1998) tested and validated TAM application in five Middle East countries and called
for further applications of TAM in other Arab
countries, because it was their view that there
are many cultural differences between Arab and
non Arab countries. Loch et al. (2003) studied the
role of social norms in the diffusion of Internet
in Egypt. Al-Gahtani (2004) explored the impact
of individual, technological, and organizational
factors on PC usage and satisfaction.
These studies made systematic efforts to ascertain that culture affects IT/ICT transfer to the
Arab world. This is probably why researchers
propose integrating culture in IS research (Myers
& Tan, 2002) as well as studying the compatibility
of the target technology with the national culture.
Loch et al., (2003) focused on factors affecting e-mail acceptance in Egypt. They indicated
that culture indirectly affects technology usage.
As with the aforementioned studies, this study
focuses in particular on the IM acceptance in a
high context society.
Kuwait is part of the Arab world, whose culture
has several characteristics.
First, Arab culture is highly social and family
oriented. It is high context where Arab values put
more emphasis on the group than on the individual.
the social values and patterns of relationship all
center on the primary group (family, tribes, and
friends) toward whom primary loyalty and responsibilities of the individual are essentially directed.
Second, Arab language emphasizes indirectness, politeness and ambiguity in communication.
At the same time, love discussions are not viewed
favorable.
Third, people in the Arab world like maintain
high social interactions and personalization of
Factors Affecting Information Communication Technologies Usage and Satisfaction
relationships. In line with this idea, Al-Shareef
(1995) found that Saudi female office workers
in an educational institution commonly make
frequent personal phone calls at work and visit
socially in colleagues’ offices.
Fourth, Arab culture is a high masculinity
culture that is directly influenced by Islam, which
significantly impacts Arab society as a whole. The
Muslim is guided by his Islamic beliefs to maintain
high ethical standards during his life. All the acts
that non-married couple may do, such as being
alone in secluded areas, loving, touching, kissing, and so forth, are prohibited and condemned
in Islam. In their lives, Arab people show a high
commitment to the Islamic work ethic and comply with its principles. Arab culture is masculine,
where men dominate in most settings, clear gender
roles are the norm, and social interactions with
the opposite gender are not tolerated.
In summary, Arab culture puts an emphasis
on social relationships, is based on oral communication, and has its priority on face-to-face
interactions. These characteristics may explain (in
a certain context) why Arabs like to use IM. With
the emergence of new ICT, Arab people found
new channels to disguise their real identity, to talk
free of any social norm and to use direct language
with the opposite sex. Such an opportunity makes
IM usage a controversial issue in Arab countries,
including Kuwait.
With globalization, the widespread use of the
Internet and users experience with e-mail and the
Web, people may use IM either to satisfy their curiosity about the opposite sex or to enjoy knowing
other people and cultures. It is not surprisingly
that Arab people may use IM to socialize since it
is compatible with the way they live.
GENERAL RESEARCH QUESTION
Therefore, the deployment of new ICT (including
IM) in Arab societies requires understanding the
role played by IM curiosity, IM compatibility
with tasks and values of users, as well as the role
of prior similar experience of related technologies. However, evidence documenting the causal
relationship between these variables is lacking.
To fill in this gap, this paper seeks to shed light
on the issue using a sample of Kuwaiti students,
through the following question:
How does compatibility and similar prior experience relate to perceived ease of use, curiosity,
perceived usefulness, level of usage IM and user
satisfaction?
In order to shed light on this research question,
this article is organized as follows: section 2 discusses the theory and the proposed research model;
the methodology used in this study is described
in section 3; results are reported in section 4; and
section 5 concludes and presents future research
directions and points to managerial implications.
THEORY AND BACKGROUND
The Research Model
While the study claims that several factors affect
IM usage and user satisfaction, it limits its focus
to two external variables and their effect on dependent variables. Figure 1 depicts the research
model that includes two independent variables:
(compatibility and prior similar experience), and
five dependent variables (PU, PEOU, curiosity,
usage, and user’ satisfaction).
This model is based on the technology acceptance model-tam (Davis, 1989), which advocates that perceived ease of use and perceived
usefulness are always the primary determinants
of behavior. Since this model has limited capabilities to predict technology adoption outside the
workplace, it was enriched with additional constructs borrowed from other three models. Usage
and user satisfaction are commonly studied dimensions of technology success (Al-Gahtani & King,
1999; Delone & McLean, 1992). Curiosity is
derived from the theory of flow (Csikszentmihalyi,
137
Factors Affecting Information Communication Technologies Usage and Satisfaction
Figure 1. Research model
1990). Compatibility is derived from the diffusion
of innovation theory (IDT) of Rogers (1983). Only
compatibility was added for the following reasons:
Moore and Benbasat (1991) analyzed previous literature on IDT and found that: only three
innovation characteristics (relative advantage,
complexity, and compatibility) are being consistently related to adoption behavior (triability and
demonstrability are excluded); relative advantage
is similar to the notion of PU; and complexity is
similar to PEOU, so the integration of the IDT
and TAM requires only adding compatibility to
TAM, besides PU and PEOU. Trialability and
demonstrability (which are not issues here) were
not included because the values are too low and
in essence a constant given that this study focuses
only at one technology (IM).
Research Hypotheses
The study hypotheses are outlined in Table 1. The
expected type of association is stated for each
of the 19 hypotheses. These associations were
hypothesized based on prior supporting studies
listed in Table 1.
IM Usage and User Satisfaction
IS usage and satisfaction are two common measure
of IS success. With regard to type of relationships
138
between the two construct Baroudi, Olson, and
Ives, (1986) suggested three models: the dominant model is that satisfaction and usage are not
related; usage influences satisfaction; and satisfaction influences usage. Furthermore, Delone and
McLean (1992) argued that system usage and
user’s satisfaction affect each other simultaneously and that the type of relationship between
them is reciprocal. Torkzadeh and Dwyer (1994)
reported that this issue is still debated among MIS
researchers and practitioners, and further study
is required to investigate the causality direction
between the two constructs. While Al-Gahtani and
King (1999) examined if satisfaction influences
usage and failed to find any significant relationship, this study hypothesizes that usage influences
satisfaction. Empirical studies have found that
IS usage is directly and positively related to user
satisfaction (Anandarajan et al., 2002; Baroudi
et al., 1986). In the Arab world, few empirical
studies which focused on the computer in the
workplace, found a correlation between IS usage
and user satisfaction (Al-Gahtani, 2004). As Arab
culture strongly influences social interaction and
personalization of relationships, it is likely that
the use of IM will increase users’ satisfaction.
Factors Affecting Information Communication Technologies Usage and Satisfaction
Table 1. Hypotheses to be tested and selected supporting references with findings between hypotheses
Hypotheses
Supporting references outside the Arab
countries
Supporting references from Arab
countries
H1a. There is a positive effect between
compatibility and PU.
There is a positive relationship between compatibility and PU in the workplace office automation system
(Al-Gahtani & King, 1999; Moore & Benbasat, 1991)
None
H1b. There is a positive effect between
compatibility and PEOU.
There a positive effect between compatibility and
PEOU of spreadsheet (Al-Gahtani & King, 1999).
None
H1c. There is a positive effect between
compatibility and curiosity.
Tested for the 1st time
Tested for the 1st time
H1d. There is a positive effect between
compatibility and IM usage.
There is a positive effect between compatibility and
usage of computer resource center (Taylor & Todd,
1995a), and the Web (Agarwal & Prasad, 1997).
There is a positive relationship between
compatibility and PC usage in Saudi Arabia
(Al-Gahtani, 2004).
H1e. There is a positive effect between
compatibility and user’ satisfaction.
There is a positive relationship between compatibility spreadsheet and user’ satisfaction in UK
(Al-Gahtani & King, 1999).
There is a positive relationship between
compatibility and PC user’ satisfaction in
Saudi Arabia (Al-Gahtani, 2004).
H2a. There is a positive effect between
PSE and PU.
There is a positive relationship between PSE and
PU of PCs (Igbaria, Giumaraes, & Davis, 1995)
None
H2b. There is a positive effect between
PSE and PEOU.
There is a positive relationship between PSE and
PEOU of PCs (Igbaria et al., 1995)
None
H2c. There is a positive relationship
between PSE and curiosity.
Tested for the 1st time
Tested for the 1st time
H2d. There is a positive effect between
PSE and IM usage.
There is a positive relationship between PSE and
usage of PCs (Igbaria et al., 1995), usage of Spreadsheet (Al-Gahtani & King, 1999)
None
H2e. There is a positive effect between
PSE and user’ satisfaction of IM.
Webster and Mortocchio (1992) found a positive
relationship between PSE and PC user’ satisfaction.
No study integrates PSE in technology
adoption.
H3a. There is a positive effect between
PEOU and PU.
Past studies on TAM found a positive relationship
between PEOU and PU on office automation systems
(Davis, 1989).
Past studies on TAM found a positive relationship between PEOU and PU (Rose &
Straub, 1998).
H3b. There is a positive effect between
PEOU and curiosity.
Tested for the 1st time
Tested for the 1st time
H3c. There is a positive effect between
PEOU and usage.
There is a positive relationship between PEOU and
PC usage (Davis, 1989; Anandarajan et al., 2000).
There is a positive relationship between PEOU and
social use of IM (Chen et al., 2004; Lancaster & Yen
2007; Lin et al., 2004; Wang et al., 2005).
There is a positive relationship between PEOU and PC usage (AlGahtani, 2004; Rose & Straub, 1998).
There is a positive relationship between
PEOU and the level of IM usage by employees (Rouibah, 2008).
H3d. There is a positive effect between
PEOU and IM satisfaction.
There is a positive relationship between PEOU and
user’ satisfaction of PCs (Anandarajan et al., 2002).
There is a positive relationship between
PEOU and PC user satisfaction in Saudi
Arabia (Al-Gahtani, 2004).
H4a. There is a positive effect between
curiosity and Usage.
Tested for the 1st time
Tested for the 1st time
H4b. There is a positive effect between
curiosity and IM satisfaction.
Tested for the 1st time
Tested for the 1st time
H5a: There is no positive effect between
PU and usage.
Past studies (Al-Gahtani & King, 1999; Davis,
1989;) found a positive relationship between
PU and usage of office automation systems.
There is a positive relationship between PU and the
level of IM usage in the workplace (De Vos et al.,
2004); and for IM social use (Wang et al., 2005)
Past studies found a positive relationship between PU and usage of office automation systems (Al-Gahtani,
2004; Rose & Straub, 1998;).
There is no significant relationship between
PU and the level of IM usage by employees
(Rouibah, 2008).
continued on following page
139
Factors Affecting Information Communication Technologies Usage and Satisfaction
Table 1. continued
Hypotheses
Supporting references outside the Arab
countries
Supporting references from Arab
countries
H5b. There is a positive effect between
PU and user’ satisfaction.
There is a positive relationship between PU and user’
satisfaction (Anandarajan et al., 2002).
Al-Gahtani (2004) found a positive relationship between PU and PCs user’ satisfaction.
H6. Current usage of IM will positively
affect user satisfaction.
There is positive relationship between Usage and
user’ satisfaction when using office automation systems (Baroudi et al., 1986; Anandarajan et al., 2002).
There is positive relationship between Usage and user’ satisfaction when using PCs
(Al-Gahtani, 2004).
Antecedents of Curiosity
•
Compatibility: When a technology is used,
it is important that it fits and is consistent
with the task it will be used to accomplish
and with the culture where it will be used.
Such a fit calls for the compatibility of the
culture and the technology. The concept of
compatibility stems from the IDT (Moore
& Benbasat, 1991) who defined it as the
degree to which an innovation is perceived
as consistent with the existing values, past
experiences, and needs of potential adopters. Al-Gahtani and King (1999) viewed
compatibility as “the adequacy of the system to the task performed.”
Most previous studies investigated the compatibility of a technology with regard to its adequacy
and fit with the individual’s task or style of work
(Agarwal & Prasad, 1997;-Al-Gahtani & King,
1999; Moore & Benbasat, 1991; Taylor & Todd,
1995a). However, there is very little conceptual
and empirical work done on the effects of compatibility in user acceptance theories in high context
societies.
Any technology that has a chance to be used on
a large scale should be compatible with people’s
value and culture. If a technology increases the
social presence between people, it is likely that
it will be adopted and used; therefore, a person is
unlikely to accept a technology that is perceived
incompatible with his or her life and practice.
Several past studies integrate compatibility in
the following cases: workstations (More & Ben-
140
basat, 1991), the Web (Agarwal & Prasad, 1997),
spreadsheet (Al-Gahtani & King, 1999). Their
findings are reported in Table 1. However, no
study integrated compatibility on IM adoption.
In the Arab world, Al-Gahtani (2004) is the
only study that included compatibility to test the
success factor affecting computer acceptance in
the workplace in Saudi Arabia. The author found
that relative advantage (PU) and compatibility
have both positive and significant correlations
with computer usage and user satisfaction.
Since IM is the ICT used, compatibility can be
defined rather loosely in this article as the adequacy
with the social setting in which a user is able to
use a technology. This view is compatible with
Moore and Benbasat’s (1991) view.
In a high context culture, this research posits
compatibility to affect PU, PEOU, current usage,
and user satisfaction (see Table 1). Understandably,
users are likely to “accept” or “feel comfortable”
with IM when it is perceived to be compatible
with the way they live and socialize. At the same
time, users are likely to consider a technology
easy to use when its adoption does not require
practice or major changes in their life. Significant incompatibility necessitates major changes
that require a considerable shift in their life and
learning on the part of users who, as a result, are
likely to perceive the technology to be not easy
to use. In addition, users who feel that a technology is compatible with the way they live (e.g.,
increasing social interaction) are likely to use it
and be satisfied about its usage.
Moreover, this article posits for the first time
that compatibility is linked to curiosity (see pre-
Factors Affecting Information Communication Technologies Usage and Satisfaction
vious discussion on the characteristics of Arab
culture). We argue that the more a user feels that
an ICT is compatible with his way of life and
enables him to satisfy his own curiosity, the more
he or she is likely to use it. In turn, the curiosity
derived from the IM with other people (such as
the opposite gender) will positively affect an individual’s perception of the usefulness of the IM.
•
Prior similar experience: The second
determinant of IM acceptance focuses on
past and similar experiences (PSE) of users. This article argues that the degree to
which a user adopts a previous, similar
system will influence his acceptance process of another system. A user who has
past experience with technologies, such
as the computer, e-mail and the Web, and
has accumulated many skills in using these
technologies has less anxiety to approach
new technologies such as IM. Individuals
who are not computer literate usually need
more training than individuals who have
substantial similar experience in similar
technologies. Experience with technology
was found to be an important factor that influences IT acceptance (Agarwal & Prasad,
1997; Taylor & Todd, 1995b).
A number of studies have integrated prior
experiences in the adoption of different technologies including computers (Igbaria et al., 1995;
Webster & Martocchio, 1992), Web (Agarwal &
Prasad, 1997), spreadsheet (Al-Gahtani & King,
1999), and the Internet (Loch et al., 2003). These
findings are reported in Table 1.
In the Arab world, Loch et al., (2003) focused
on the Internet’s usage and found that a lack of
education was the second largest obstacle to Internet usage in Egypt, after training availability.
We define PSE as the extend of an end-user’s
characteristics that encompasses both, and an end
user’s past exposure to a particular technology and
the end user’s subsequent level of expertise with
the technology. PSE is viewed as an individual
characteristic which could affect how easily and
well a user utilizes a particular technology. Based
on previous studies, we posit for the first time,
that past experience with similar technologies that
makes knowledge more accessible in memory,
will affect PEOU, curiosity, PU, usage and user’
satisfaction (see Table 1). People with high skills
and experience in similar technologies are likely
to derive more usefulness from the IM usage,
feel the technology is easy the use, and can use
more the IM and to satisfy their curiosity about
things they have partial or incomplete knowledge
of (e.g., talking to opposite sex). Thus, the more
a user has skills about a similar technology, the
more likely he perceives the new technology as
effective, productive and efficient.
Mediating Variables
•
Curiosity: In the information system field,
focus was on two types of motivations: extrinsic and intrinsic. Curiosity has been the
focus of few studies and was recognized as
an important intrinsic motivator (Agarwal
& Karahanna, 2000; Malone, 1981; Webster
et al., 1993).
Several researchers, who concentrated on the
effect of culture, found that Arab people have a
tendency to perform tasks, not only for economic
reward, but also for intrinsic motivation (Rouibah,
2008; Rouibah & Ould-Ali, 2005). Considering
that the Arab culture is masculine, clear gender
roles are the norm, and social interactions with
the opposite sex are not tolerated, and where most
overseas films are censored for emotional content,
we expect that curiosity, as intrinsic motivation,
will play an important role in IM acceptance.
Research indicated that individuals who experience immediate pleasure and joy from using the
technology and perceive any activity involving use
of a computer as inherently enjoyable are likely
141
Factors Affecting Information Communication Technologies Usage and Satisfaction
to use it more extensively than others (Malone,
1981; Webster & Mortocchio, 1992).
It is well known that, when people are intrinsically motivated (possess a high degree of
curiosity), they become absorbed with technology
(Csikszentmihalyi, 1990). The study of Webster
and Martocchio (1992) about playfulness found
that this concept is positively related to positive
mood and user satisfaction.
Using a similar argument, it can be inferred
that an individual with high curiosity dispositions
can be described as being guided by internal
motivation and orientation toward process with
self-imposed goals, and a tendency to satisfy his
or her curiosity through knowing new things about
which he or she has incomplete knowledge of.
Curiosity is defined as the extent the experience
arouses an individual’s sensory and cognitive
curiosity (Malone, 1981).
For the first time, this study posits that PEOU
affects curiosity, which in turn affects both IM
usage and user’ satisfaction. The rational behind
is that it is unlikely that the more people feel a
system is easy to use, and does not require mental
effort to use, the more it helps them to arouse their
curiosity. Moreover, people with high curiosity
feel more inclined to interact and to use IM programs as well as to be satisfied with the intrinsic
motivation they derive from its usage. It is also
likely that those individuals who interact more
curiously with IM programs may use IM as well
to be satisfied. Therefore, the hypotheses related
to curiosity were posited (see Table 1).
•
142
PU and PEOU: These are recognized as
two important mediating variables in technology adoption. PU refers to the extent
to which a person believes that using a
system would enhance his or her job performance, productivity and effectiveness
(Davis, 1989). PEOU refers to the degree
to which the technology is perceived as
relatively easy to understand and to use
(Davis, 1989).
Past studies have shown that PEOU is correlated with PU (Davis, 1989; Wang et al., 2005),
PEOU and PU are also related to current usage
(Davis, 1989).
With regard to IM technology, and opposite to
Li et al., (2005) who excluded PEOU, this study
included it. Other studies have shown the motives
of using IM included getting information, to hang
out with a friend, to flirt, and to avoid being alone
(Rubin, Perse, & Barbato, 1988). Other studies on
IM found that PEOU and PU are positively correlated to intention to use IM (Chen et al., 2004;
Wang et al., 2005).
METHOD
To provide insights into the research question, a
field study was investigated that consisted of a
survey questionnaire.
Subjects and Procedure
Data was collected from student subjects enrolled
at Kuwait University. Besides being widely used
at the university, this technology is appropriate for
at least two other reasons: first, it is a voluntary
technology in the sense that students use it of their
own accord and not from any mandate; and second,
the technology exemplifies the characteristics of
contemporary ICT that Arab people embrace on
a large scale. Moreover, the technology is widely
available from a number of wireless locations on
campus, franchised cafés, and libraries; thus, access is not an inhibitor to technology usage. Target
students are those enrolled in social sciences and
who use IM more than any other students. The
number of questionnaires needed was estimated
before distribution. It was calculated as follows:
W2= [(Z2) * P(1-P)]/ N. W2 refers to the precision
of the study. P refers to the proportion of students
in social sciences compared to the total students
at Kuwait University, which accounts for 58%. Z
(1.96) refers to the critical value from the normal
Factors Affecting Information Communication Technologies Usage and Satisfaction
table which corresponds to 95% confidence, that
is, answers from the sample are 95% close to the
reality at Kuwait University. N refers to the total
number of students at Kuwait University (17,000
in 2006). Therefore, the precision is W2= 0.0379,
which requires a sample size of 650.
Since all students were from social sciences,
we applied the stratified sample according to
their gender which is 70% female and 30% male.
Therefore the sample consisted of 455 female
and 195 male students. Furthermore, the pretest
sample requires an additional of 10% of the total
sample (65), 46 female and 19 male students. From
among the male students at social sciences, 214
were selected applying a simple random sample,
and the same was applied to the female students.
The specification of the above sample size was
done in line with recommendations of past studies
which require a minimum of 150 (Hair, Anderson,
Tatham, & Black, 1998). Such a sample generates
a parameter estimate with standard errors small
enough to be of practical usefulness and adheres
to structural equation modeling (Hair et al., 1998).
Data was collected during the 2005 spring
semester. 715 questionnaires were distributed
randomly to students in five social science colleges, but only 609 were completed and returned.
This study offered no incentives for completing
the questionnaire.
to confirmatory analysis. In a second phase, an
instrument was designed. Two faculty members
checked the validity of the adapted measures and
made changes concerning the format and wordings of the questions.
In a third phase, a pilot phase was conducted.
For this purpose, the questionnaire was distributed
to 75 students from one college at Kuwait University. Reliability and validity of the instrument
were checked based on the return responses. The
results of the pre-tests suggest that the instrument
possessed adequate reliability and validity.
Constructs Measurement
Most of the constructs in the research model were
taken from past and well known studies (see
appendix 3) with the exception of curiosity and
user’s satisfaction. All the constructs were subject
to convergence and discriminant validity. The reuse of well established constructs re-ensures the
content validity of the current study. All measures
were translated into Arabic, then translated back
into English by an independent translator, and
verified by an independent native speaker.
•
Pre-Tests
Before questionnaire design, the authors conducted a pre-test in three phases in order to examine and
validate the survey instrument ensuring validity
and reliability. In the first phase and before data
collection, personal interviews were conducted
with 30 students in order to identity the basic
motives to use instant messaging. The answers
were gathered, compiled and summarized (see
Rouibah & Ould-Ali, 2005), and revealed the
importance of curiosity as a separate construct
which was included in the research model (Figure 1). The curiosity construct was also subject
•
Curiosity: Initially, curiosity was measured by three items from Webster et
al. (1993) and reused by Agarwal and
Karahanna (2000): “using the system excites my curiosity,” “interacting with the
system makes me curious,” and “using the
Web arouses my imagination.” However,
during the pilot phase, we found some difficulties by our respondents to comprehend
the third item. Moreover, our respondents
found similarities between the first and
second item. With feedback received from
the respondents and two academic professionals, the two first items were adapted
and two new items were added (see appendix 3)
Prior similar experience (PSE): was
measured using three similar indicators of
143
Factors Affecting Information Communication Technologies Usage and Satisfaction
Igbaria et al., (1995). Compatibility was
measured by three indicators adapted from
Moore and Benbasat (1991) to fit the IM.
PU and PEOU were measured with indicators of Davis (1989)
Items of all variables, except current usage and
user’s satisfaction, were evaluated on five-point
semantic differential scales, ranging from strongly
disagree (1) to strongly agree (5). Students were
asked to rate each item according to how they
feel about using IM.
•
144
Current Usage: Review of past literature
showed that usage was measured through
self-reporting and five commonly used
measures were used: perceived frequency,
perceived daily usage, number of used
application, perceived usage level, and
sophistication level of application used.
This study re-used and customized four
of these measurements. Usage volume or
daily usage (UV) refers to time spent on
the use of IM per day. Respondents were
asked to indicate the amount of time using a six point scale ranging from (1) “almost never” to (6) “more than three hours
per day.” Frequency of Use (FU) refers to
how many times per week a respondent
reports using the IM. It was measured using a six point scale ranging from (1) don’t
use it at all to (6) use it several times each
day. With regard to variety of use (VU),
respondents were given a list of topics
they may use during IM and were asked
to select those that often fit their interest
including: social, cultural, political, love,
study, family, scientific, religion, medical,
personal, unethical, sport and entertainment. Type of use and synchronicity (TUS)
refers to whom the user frequently communicates with and exchanges information in real-time. Respondents were given
a list of six choices that they were asked
•
to select from: Family members; friends
with the same gender; friends with the opposite gender; unknown person with the
same gender; and unknown person with
the opposite gender. Social presence (SP),
or perceived information richness (Daft &
Lendgel, 1986), refers to the preference of
respondents to an existing communication
channel including: typing, talking, visualizing pictures, or watching each other using Web camera.
Users’ satisfaction: It refers to the extent
to which the usage of IM impacts the performance of students either positively or
negatively. Since this is the first study that
investigates the impact of IM on students,
a scale was proposed that is related to impact of IM on their study performance. The
proposed scale includes eight items (see
appendix 3), and it should be noted that
the indicators entail both positive (USIM2,
USIM6, USIM7, and USIM8) and negative
impacts, that is, dissatisfaction, (USIM1,
USIM3, USIM4, and USIM5).
Sample Characteristics
77.1% of the respondents were female students.
This is a little higher than the percentage at
Kuwait University, which is 70%. The majority
of respondents (96.2%) are young and their age
range from 18 to 25. 82% of the respondents are
single, while 17.7% are married. 26.1% are from
the college of business administration, 21.2%
from the college of social sciences, 33.1% from
the college of education, 35% from the college of
law, and 13.7% are from the college of art. 28.7%
have spent one to two years at their college and
23.4% from 3-to-4 years. 55.2% of the respondents have a GPA comprised between 2 and 3. In
addition, MSN software was found to be the most
frequently used IM program (78.5%), followed
by Yahoo (21.4%) and IRC (21.3%), which are
similar to the study of Wang et al., (2005). 92%
Factors Affecting Information Communication Technologies Usage and Satisfaction
of the respondents use typing, 18.7% report talking instead of typing, 11% send their pictures,
while a small percentage, (9.8%), report using
web camera during IM usage. Furthermore, the
majority of respondents (79.3%) use a nickname
to disguise their real identity. With regard to the
location where students often use IM, the majority
reported they use IM from their home (83.2%),
and (25.6%) from their college.
RESULTS AND DISCUSSION
The research model represents a structural equation modeling. We used SPSS to achieve data
reduction and LISREL to build the path model as
well as to simultaneously examine the potential
relationships between variables. Before applying the LISREL, the researchers first assessed
measurement model (in term of convergent and
discriminant validity) and then tested for significant relationships in the structural model.
The Measurement Model
Convergent and discriminant validity was
achieved based on factor analysis. Factors were
extracted using covariance matrices and the method of principal components. The factor loadings
(see appendix 4) show eight distinct constructs
instead of seven as well as their item-indicators.
Usage was separated into two distinct constructs:
The first one is labeled “usage magnitude” and
includes daily usage and frequency of use, and the
second one is labeled “socialization” and is related
to variety of use, type of use and synchronicity,
and social presence. The variance extracted by the
eight factors accounts for 73.7%, which depicts
a good model. Five item-indicators loaded very
low. One of these items is related to curiosity
(CU4) and four are related to the positive impact
of IM(USIM2, USIM6, USIM7, USIM8). Those
which loaded very well refer to negative perception (negative impact) of IM which we refer to as
dissatisfaction. The four indicators that were not
loaded were excluded since their factor loadings
are less than the cutoff value (0.50) recommended
by Hair et al. (1998).
Convergent validity can be assessed by three
measures: reliability (Hair, et al., 1998), composite
reliability (Fornell & Larcker, 1981; Hair et al.,
1998), and average variance extracted (Fornell
& Larcker, 1981; Hair et al., 1998). Reliability
measures the internal consistency of the questionnaire. Composite reliability is the extent to which
a variable or a set of variables is consistent with
what it is intended to measure. Average variance
extracted (AVE) measures the amount of variance
captured by the construct in relation to the amount
of variance due to indicator error.
Table 2 shows reliability, composite reliability
and AVE. Consistent with Hair et al., (1998), all the
Cronbach’s alpha values are above 0.80. Therefore,
the scales demonstrate good distribution properties. Composite reliabilities were found to range
from 0.800 to 0.924, which are consistent with the
recommendations of Fornell and Larcker (1981)
and Hair et al. (1998) since all values are above
0.80. AVEs were found to range from 0.620 to
0.844, which are consistent with the recommendations of Fornell and Larcker (1981) and Hair
et al., (1998). These three indicators reflect high
levels of convergent validity.
Discriminant validity refers to the degree to
which indicators differentiate among construct
measured based upon the correlations between
the indicators of each pair of constructs. Table 2
presents the inter-correlation (r) and the shared
variance among variables. The values “b” in the
diagonal represent the AVE. As suggested by Hair
et al., (1998), all r2 are found not to exceed the
AVE. This suggests that the model constructs are
distinct and unidirectional and ensure discriminant
validity.
To test the goodness of fit of the structural
model, several criteria were computed (Hair et
al., 1998; Taylor & Todd 1995a,b). The model
parameters estimate show the following: χ2=785;
145
Factors Affecting Information Communication Technologies Usage and Satisfaction
Table 2. LISREL Inter-correlation Matrix and shared variance among variables of the model
CU: curiosity; CP: compatibility; PSE: Prior similar experience; PU: perceived usefulness; PEOU: perceived ease of use
1
2
3
4
5
6
7
1-CU
0.820
0.620b
0.800c
2-CP
0.450d
0.202e
0.892
0.736
0.858
3-PSE
0.260a
0.067b
0.390
0.152
0.924
0.803
0.878
4-PU
0.420 a
0.176b
0.490
0.240
0.400
0.160
0.910
0.788
0.890
5-PEOU
0.610a
0.372b
0.510
0.260
0.540
0.291
0.650
0.422
0.842
0.574
0.821
6-Usage magnitude
0.340a
0.115b
0.220
0.048
0.190
0.036
0.280
0.078
0.370
0.137
0.800
0.665
0.890
7-Socialization
0.340a
0.115b
0.250
0.062
0.250
0.062
0.280
0.078
0.480
0.230
0.190
0.006
0.840
0.639
0.900
8-Disatisfaction
0.080a
0.006b
0.060
0.003
0.050
0.002
0.070
0.004
0.10
0.010
0.160
0.025
0.130
0.016
8
a
0.913
0.844
0.837
a
Composite reliability, bAverage variance extracted, cCronbach alpha, dCorrelation; eShared variance among variables of the model (Square
correlation).
degree of freedom (DF)= 226; χ 2/DF=3.47, GFI
= 0.90; AGFI = 0.86; NFI= 0.95; NNFI = 0.96;
CFI = 0.96; RMSR = 0.056; RMSEA=0.05 and
SRMR = 0.056. This study’s results provide
evidence of the relatively strong model fit to the
observed data.
Test of the Structural Model
Figure 2 shows the validated model for IM usage
and students’ satisfaction in Kuwait. Parameters
whose t-values are greater than or equal to +- 1.96
are considered to be significantly different from
0 (Hair et al., 1998).
•
146
Predicting PEOU: Compatibility has a direct effect on PEOU (γ=0.36; P<0.05) and
•
PSE also has a direct effect on PEOU
(γ=0.40; P<0.05). Hypotheses (H1b and
H2b) are supported. Among these two variables, PSE plays the strongest effect on
PEOU.
Predicting curiosity: There is a direct effect between compatibility and curiosity
(γ=0.21; P<0.05), PEOU and curiosity (β
=0.57; P<0.05). However, PSE has a direct
and negative effect on curiosity (γ=-0.12;
P<0.05). Hypotheses H1c, H2c and H3b
are, therefore, valid. The negative effect
between PSE and curiosity means the lower the level of experience with computers,
web and e-mail, the more she or he is curious to use IM. The strongest direct and total effect on curiosity comes from PEOU,
Factors Affecting Information Communication Technologies Usage and Satisfaction
Figure 2. The LISREL model solution with significant direct effects of IM acceptance in Kuwait
•
while PSE exerts the strongest indirect effect (γ=0.23; P<0.05). In addition, PEOU
indirectly mediates the effect of compatibility and PSE on curiosity. However, the
indirect effect of PSE on curiosity is lower
than the direct effect of PEOU since the total effect of PSE (γ=0.10; P<0.05) is less
than that of PEOU (β =0.52; P<0.05).
Predicting PU: There is a direct effect
between compatibility and PU (γ=0.21;
P<0.05) and between PEOU and PU
(γ=0.52; P<0.05), but PSE did not effect PU. Therefore, hypothesis H1a, not
H2a, is supported. The strongest direct
and total effect on PU comes from PEOU.
Compatibility exerts the second largest direct and total effect, while PSE exerts the
strongest indirect effect (γ=0.21; P<0.05).
Similar to curiosity, PEOU mediates indirectly the effect of compatibility and
PSE on PU. However, the indirect effect
of PSE on PU is lower than the direct effect of PEOU since the total effect of PSE
(γ=0.24; P<0.05) is less than that of PEOU
•
(β =0.52; P<0.05). This implies that external variables play less an affect on PU than
does PEOU. Such a result reveals the importance of PEOU on IM acceptance in the
Arab world.
Predicting IM usage: Compatibility exerts only an indirect effect on usage magnitude (γ=0.13; P<0.05) and socialization
(γ=0.12; P<0.05); therefore, hypothesis
H1d is partially supported. Similar to compatibility, PSE exerts an indirect effect on
usage magnitude (γ=0.08; P<0.05), but it
also exerts a direct (γ=0.20; P<0.05) and
indirect effect (γ=0.11; P<0.05) on socialization. Hypothesis H2d is, therefore,
supported. While PEOU exerts a direct
(β =0.13; P<0.05) and indirect effect (β
=0.12; P<0.05) on usage magnitude, it
exerts only a direct effect on socialization
(γ=0.31; P<0.05). PEOU exerts a direct effect on usage magnitude (β =0.13; P<0.05)
and on socialization (β =0.31; P<0.05) supporting hypothesis H3c. Curiosity exerts a
direct effect on usage magnitude (γ=0.18;
147
Factors Affecting Information Communication Technologies Usage and Satisfaction
P<0.05) and no effect on socialization.
Hypothesis H4a is, therefore, partially
supported.
The strongest direct effect on usage magnitude comes from curiosity followed by PEOU.
Compatibility exerts the strongest indirect effect
followed by PEOU. Surprisingly, the total effect
of curiosity is less than that of PEOU.
PSE exerts the strongest direct effect on socialization followed by prior similar experience.
Surprisingly, the strongest indirect effect on socialization comes from compatibility followed by
prior similar experience. Similar to the total effect
on usage magnitude, PEOU exerts the strongest
total effect on socialization followed by prior
similar experience.
As hypothesized, PU has no effect on current usage (neither on usage magnitude nor on
socialization) since IM is mainly used for social
purpose which confirms hypothesis H5a.
•
148
Predicting
user
satisfaction:
Compatibility has no direct effect but exerts an indirect (γ =0.18; P<0.05) and total
effect (γ =0.27; P<0.05) on user dissatisfaction. However, PSE exerts a negative
direct effect (γ =-0.19; P<0.05) and positive indirect effect (γ =0.14; P<0.05) on
user dissatisfaction. The negative effect
means the more a user has previous experience with related technologies, the more he
is satisfied with IM. Thus, hypothesis H1e
is partially supported while H2e is fully
supported. Furthermore, the results indicate that PEOU exerts an indirect effect on
user dissatisfaction (β =0.20; P<0.05) and
PU exerts a direct effect (β =0.22; P<0.05).
Therefore, hypothesis H3d is partially validated while H5b is validated. Curiosity
exerts a direct positive effect (β =0.13;
P<0.05) on user dissatisfaction supporting
hypothesis H4b. Similarly, usage magnitude (γ =0.14; P<0.05) and socialization
(β =0.11; P<0.05) exert a direct effect on
user dissatisfaction leading to validate hypothesis H6. Results also indicate that PU
exerts the strongest direct effect on user
dissatisfaction followed by prior similar
experience. However, results highlight the
importance of PEOU as it exerts the strongest indirect effects on user dissatisfaction
followed by the compatibility. When computing the total effect, results reveal the
predominance of PEOU and compatibility
since they exert the strongest same effect,
followed by the curiosity construct.
Furthermore, results indicate that the model
explains substantial variance in PEOU (R2=40%),
curiosity (R2=40%), PU (R2=46%), usage magnitude (R2=17%), socialization (R2=25%), and
users’ dissatisfaction (R2=14%).
Table 3 summarizes the supported and nonsupported hypotheses.
In order to test the effect of gender on IM
acceptance, factor scores were first computed,
saved and then tested against gender using the
non-parametric Mann-Whitney test because the
scores were not normally distributed. Results
indicated that no significant differences (at 5%)
were found between male and female students
in their perception of factors scores. The sample
was, therefore, considered as one group.
Discussion
This study focused on factors affecting IM usage and user satisfaction in Kuwait, in an Arab
country. Importantly, it shows why, how and what
consequences of IM usage on a sample of students.
This study reveals two types of usage: People
use IM to socialize (socialization) in their daily
life with a high frequency (usage magnitude).
The more frequently people use IM, the more
they engage to know new people with whom
they spend much of their time. The long time
they spent enables users to satisfy their curios-
Factors Affecting Information Communication Technologies Usage and Satisfaction
Table 3. Summary of hypotheses validation
Hypotheses
Validation
H1a: Compatibility-PU
Yes
H1b: Compatibility-PEOU
Yes
H1c: Compatibility-Curiosity
Yes
H1d: Compatibility-Usage
Partially
H1e: Compatibility-User’s satisfaction
Partially
H2a: PSE-PU
No
H2b: PSE-PEOU
Yes
H2c: PSE-Curiosity
Yes
H2d: PSE-Usage
Yes
H2e: PSE- User’s satisfaction
Yes
H3a. PEOU-PU
Yes
H3b: PEOU-Curiosity
Yes
H3c: PEOU-Usage
Yes
H3d: PEOU- User’s satisfaction
Partially
H4a: Curiosity-Usage
Partially
H5a: PU-Usage
Yes
H4b: Curiosity- User’s satisfaction
Yes
H5b: PU-User’s satisfaction
Yes
H6: Usage – User’s satisfaction
Yes
ity from different angles including knowledge
about new subjects, habits, and cultures as well
as knowing with the opposite gender. This is an
expected result since the culture is characterized
by high social interaction and personalization of
relationships and gender segregation.
With regard to socialization, the study reveals
that sampled students use IM to socialize with
people they know (such as friends and family)
and those they do not know from both genders
based on IM synchronicity. Also, students use
IM for the social presence features since they use
several ways to communicate including typing,
talking, and seeing each other via pictures and
web camera. Sampled students also use IM for
several subjects including those related to their
studies, loves, politics, and so forth. In contrast,
user’s satisfaction is essentially associated with the
negative impact of IM on students’ performance,
which we labeled dissatisfaction.
The study findings support, conflict and extend previous findings, in particular those using
strong theory models outside the workplace and
limits the comparison to three (Chen et al., 2004;
Li et al., 2005; Wang et al., 2005). Therefore, this
study excludes from comparisons past studies
that focused on IM in the workplace (Cameron
& Webster, 2005; De Vos et al., 2004; Huang et
al., 2007; Huang & Yen, 2003; Leung 2006; Shen
& Gallivan, 2006).
While this study focuses on the social use of
IM, as the case of Li et al.’s (2005) study, it extends
their findings and highlights the current practices
of ICT for social use and outside the workplace
in an Arab country. In particular, the extensions
include the role of compatibility, prior similar
experience, and curiosity and their potential effect
on IM acceptance. Li et al. (2005) developed a
TAM model to explain an individual’s use of IM
in keeping and sustaining interpersonal relationships. Their model was tested using a sample 273
students and revealed that intention to use IM is
driven by perceived usefulness and perceived enjoyment since they influence the intention to use
with the same effect. Opposing Li et al. (2005),
our study focuses on IM usage and user’s satisfaction and reveals that social usage is ease of use
driven, usage magnitude is curiosity driven, while
user satisfaction is compatibility and ease of use
driven. In addition, the current study is different
from Li et al. (2005) since it includes ease of use
and excluded perceived enjoyment.
Results of this study support and extend the
results of Chen et al.’s (2004) who found that IM
users tend to use IM for both social and work/
course reasons because of its ease of use. Chen et
al.’s study found also IM usage for social interaction is higher, which also supports findings of our
current study since the variance of socialization is
the largest one 25%. Indeed, Chen et al.’s (2004)
compared the relation of eight motivation variables
(including: ease of use, social interactions, enjoy-
149
Factors Affecting Information Communication Technologies Usage and Satisfaction
ment, and other variables) with past experience
(desktop and wireless) and intention to use IM
in the future. The model was tested on a sample
similar to the current study (239 male and 219
female students in the USA). Chen et al. (2004)
revealed that IM users found IM more enjoyable,
easier to use, and better than e-mail for social
interactions. Chen et al.’s study also revealed that
certain factors (including enjoyment, ease of use
and social interaction) positively correlated with
the intention to use IM in the future. In addition,
our findings extend Chen et al.’s results who found
that previous experience (in the forms of years of
experience and frequency of use) has an effect on
intention to use IM in the future while our results
reveal that past similar experience (in the form of
Web, computer and e-mail) has an effect not only
on current usage (i.e., socialization) but also on
user’ satisfaction.
Our findings disagree with those of Wang et
al. (2005) in Taiwan who found that IM intention
to use is perceived as usefulness driven.
With regard to the new added construct, previous studies did integrate curiosity as a dimension
of the flow construct (Webster et al., 1993) or
cognitive absorption (Agarwal & Karahanna,
2000); however, this is one of the rare studies that
operationalizes curiosity as a separate construct
and provides evidence of its importance on ICT
adoption and satisfaction. This study found a
direct positive affect of curiosity on both usage
behavior and users’ dissatisfaction. Curiosity was
found to be essentially associated only with usage magnitude, and not with socialization, which
reveals that users spend a lot time to satisfy their
curiosity about other people they do not know or
the opposite gender.
Another finding of the article is the effect
played by prior similar experiences on current IM
usage since it plays the strongest indirect effect on
socialization. While PEOU exerts the most direct
influence on usage and users’ dissatisfaction, PSE
exerts the strongest direct effect on PEOU, PU and
curiosity, thus confirming the role of knowledge
150
gained from prior similar technologies to ease
the acceptance of new ones. This is in line with
previous studies conducted outside the Arab world
which have demonstrated the direct and indirect
effect of prior experience on either PEOU, PU
(Al-Gahtani & King, 1999; Igbaria et al., 1995;
Taylor & Todd, 1995b; Webster & Martocchio,
1992). This study has proved that prior similar
experience with computers, the Web and e-mail
has a direct affect on PEOU, curiosity, current
usage and users’ dissatisfaction. This study is also
distinct from previous studies since it contains one
of the rare studies that provides evidence of the
existence of a direct positive effect between prior
similar experience and users’ dissatisfaction which
call for caution when using IM in the workplace.
Another strong finding of the study is related
to the role of compatibility of ICT with the private
life of users (family, friends) and their workplace
(study). This study reveals that compatibility is
positively related to PU, which is in line with studies outside the Arab world (Al-Gahtani & King
1999; Moore & Benbasat, 1991). More valuable,
this study is the first that integrates compatibility
in the Arab world.
Another strong contribution of this article
outlines the role of compatibility on user’s dissatisfaction. Our study found that compatibility exerts
the strongest direct effect on user dissatisfaction
and the second strongest total effect on usage
magnitude after PEOU. These findings conflict
with those of Moore and Benbasat (1991) who
found a strong correlation between compatibility
and PU, and Al-Gahtani and King (1999) who
found compatibility as the strongest determinant
of PU, the current study reveals less an effect of
compatibility compared to PEOU.
This study conflicts and supports the findings
of previous studies (see Table 1) and extends
previous ones. In particular, the study tested and
validated for the first time five hypotheses (one is
partially validated) related to antecedents (compatibility, PSE, and PEOU) and consequences (use
and user satisfaction) of curiosity. The effect of
Factors Affecting Information Communication Technologies Usage and Satisfaction
curiosity supports previous results on the effect
of culture on ICT acceptance in the Arab world
(Loch et al., 2003).
With regard to the difference between the
study’s results and previous ones, four plausible
explanations can be advanced. First, the used technology is an ICT that has enjoyment components.
Second, the technology usage is voluntary at an
individual level, while most past studies referred
to mandatory office systems in workplace settings
(Al-Gahtani & King, 1999; Moore & Benbasat,
1991). Third, what could be valid in an individual
and high feminine culture may not be necessarily
valid in a collective and high masculine one (as
is the Arab culture). Fourth, the subjects were
young college students (between 17 and 25).
Older persons might use IM for both work and
non-work activities.
In summary with the findings discussed previously, it can be concluded that PEOU is the
strongest determinant of IM acceptance in the
Arab world, which, therefore, indicates that ICT
adoption is ease of used driven.
Another contribution of this article is related
to the potential effect between usage and user’s
dissatisfaction. With regard to the three models
proposed by Torkzadeh and Dwyer (1994), this
study succeeds in showing that current usage
directly and positively affects users’ satisfaction.
CONCLUSION AND IMPLICATIONS
This study develops a new model for ICT (i.e.,
instant messaging technology) usage and satisfaction valid in an Arab country. The study reveals
two types of use: Usage magnitude and socialization. Major findings indicate that socialization is
perceived ease of use driven; usage magnitude is
curiosity driven; and user satisfaction is ease of
use and compatibility driven.
This article makes four contributions to the
field of information system and information technology. First, the study tests an IM model that is
comprised of a widely held set of relationships
in an Arab country (Kuwait) where they have not
been tested before. Second, the study adds a new
driver, “curiosity,” for technology adoption. This
is a new mediating factor between external factors
and user satisfaction, since, to our knowledge,
no study has investigated curiosity and succeeds
to provide evidence about its value to IM circumstances. Third, it shows a strong distinction
between usage quality and quantity which may
be local or a missed factor across all studies on
technology acceptance. Fourth, it reveals that
some relationships are not as strong (e.g., the
relationship between curiosity and satisfaction)
which suggests room for further investigation.
The findings of this study contribute to a
better theoretical understanding of the factors
that promote ICT in the Arab world. It should be
noted that the variance (R2) explained by each
variable in the model is successively: 40% for
curiosity, 46% for PU, 40% for PEOU, 17% for
usage magnitude, 25% for socialization, and 14%
for user dissatisfaction. These values are acceptable and are quite similar to previous studies. To
limit the comparison to one study that focused on
the effect of PSE on intention to use, Taylor and
Todd (1995b) found: R2= 43% (intention to use)
and R2= 21% (usage) for experienced users; R2=
60% (intention to use); and R2= 17% (usage) for
inexperienced users.
The results of this study suffer from certain
limitations which must be considered in interpreting the results. First, the results of the study are
valid for students using IM for social purposes.
Thus, the generalizability of the respondents’
behaviors to a more general workforce may be
somewhat limited. However, for this particular age
group (18-23), one that likely is a primary user of
IM and that will move into the workforce in the
future, the study should be reasonably applicable.
Second, the age of the majority of the respondents
is between 18-23 years, and, therefore, study’s
results cannot be generalized to people of other
ages. Third, conclusions drawn in this study are
151
Factors Affecting Information Communication Technologies Usage and Satisfaction
based on IM, which is a single communication
technology, and some of the questions, particularly
regarding curiosity, were created specifically for
this technology. As a communication technology,
curiosity may play a larger role than in other categories of IT, which represents another potential
contingency.
Even though it has its limits, this study has
implications for both practice and research.
From a managerial perspective, this study has
several implications. First, this study suggests
that curiosity is a determinant of IM acceptance.
Thus, curiosity results in immediate subjective
experience such as people’s involvement in
their activities and, consequently, people will be
more motivated to engage in ICT adoption in the
future. Users with high curiosity will exercise
and develop skills through exploratory behavior
and, thus, will be better able to react to situations
requiring these skills in the future. As students
are potential employees, the usage of IM in the
workplace is questioned. One possible caution
of using IM in the workplace is that students
(potential employees) may not draw a clear line
between professional and personal use. This study
has shown that students (aged between 18-23),
will move into the workforce, have a tendency
to spent lot of time socializing with people and,
therefore, personal use of IM may distract them
from their business activities. Employees may
give priority to personal socializations, and not
business objectives, and thus, lead to lower employee productivity. Second, the study’s results
have far reaching implications for developed
countries as well. With the negotiation of World
Trade Organization, many global companies
are expected to penetrate the Gulf region in the
service (including banking1, investment, and real
state) and other business sectors. A recent study
has shown that the IT/ICT investment growth
rate in the Arabian Gulf countries during the last
three years represented 9.4% and is expected to
reach $7.9 billion (Research Institute for Digital
Economy, 2006). Another study has shown that IT
152
consulting services accounted for $700 million in
the Arabian Gulf countries in 2005, which is increasing annually (Gulf Business, 2006). Qatar has
invested $10.4 billions in the gas industry, while
Saudi Arabia is planning to invest $350 billion on
infrastructure projects, including IT/ICT. Other
reports showed that the ICT market in the region
is estimated at $46 billion and increases annually
by 11% (Delta Capital, 2006). The amount of 2,000
projects2 in the GCC is evaluated at $1 trillion.
Therefore, understanding what factors contribute
to successful IT/ICT adoption is crucial for global
companies wishing to tap into these investments
in potential sale. This study provides to a certain
extend some guidelines on how to understand the
Arab culture and people’s behavior with regard
to ICT adoption.
From a practical, educational and scholarly
perspective, this study suggests three perspectives.
First, it encourages researchers to consider the
whole world as potential locations for research
to test and enrich standard technology adoption
theories. In testing these theories, this study
suggests to consider both quantity and quality
measure such as the usage in this study. One
benefit of testing theories in varied settings is
that differences in culture may reveal differences
that exist everywhere but in different measures.
A potential region that deserves more focus is the
GCC3 countries since their total GDP is high (see
appendix 2). A longitudinal cross cultural research
among GCC, which share same culture in term of
language, history, values, wealth, and have enormous investment on IT/ICT about IM acceptance
may shed more light on ICT acceptance.
Second, while the study provides evidence that
curiosity contributes to an individual’s willingness
to try something new, the question of whether
curiosity continues to play the same effect in the
intention to continue using the technology and be
satisfied remains unanswered and needs further
research.
Third, the low variance explained by current
usage (usage magnitude with 17% and socializa-
Factors Affecting Information Communication Technologies Usage and Satisfaction
tion with 25%) and users’ dissatisfaction (14%)
indicate that a large percentage variance remains
unexplained and suggests the need for additional
research incorporating potential unmeasured
variables such as the inclusion of social norm.
This study reveals that Kuwaiti people use IM
to socialize with a high frequency and 79.3% of
respondents use a nickname which reveals that
they use IM to discuss subjects not allowed in
face-to-face discussions or those with the opposite
gender because of high social norm factors that
prevent such an attitude. This article encourages
investigating social norms as additional constructs.
ACKNOWLEDGMENT
This research was funded by Kuwait University,
Research Grant IQ 01/05. The author acknowledges the Research Administration Project for
its support.
REFERENCES
Abla, G., Flanagan, S. M., Peng, Q., Burruss, J.
R., & Schissel, D. P. (2006). Advanced tools for
enhancing control room collaborations. Fusion
Engineering and Design, 81(15-17), 2039–2044.
doi:10.1016/j.fusengdes.2006.04.059
Agarwal, R., & Karahanna, E. (2000). Time flies
when you’re having fun: Cognitive absorption
and beliefs about information technology usage.
Management Information Systems Quarterly,
24(4), 665–694. doi:10.2307/3250951
Agarwal, R., & Prasad, J. (1997). The role of
innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences, 28(3), 557–5582.
doi:10.1111/j.1540-5915.1997.tb01322.x
Al-Gahtani, S. S. (2004). Computer technology
acceptance success factors in Saudi Arabia: an
exploratory study. Journal of Global Information
Technology Management, 7(1), 5–29.
Al-Gahtani, S. S., & King, M. (1999). Attitudes,
satisfaction and usage: Factors contributing to
each in the acceptance of information technology. Behaviour & Information Technology, 18(4),
277–297. doi:10.1080/014492999119020
Al-Shareef, B. (1995). Positive and negative behavior at the workplace. Public Administration,
35(1), 129–170.
Anandarajan, M., Igbaria, M., & Anakwe, U. P.
(2002). IT acceptance in a less-developed country:
a motivational factor perspective. International
Journal of Information Management, 22, 47–65.
doi:10.1016/S0268-4012(01)00040-8
Baroudi, J. J., Olson, M. H., & Ives, B. (1986). An
empirical study of the impact of user involvement
on system usage and information satisfaction.
Communications of the ACM, 29(3), 232–239.
doi:10.1145/5666.5669
Berlyne, D. E. (1965). Structure and direction in
thinking. New York: Wiley.
Cameron, F. A., & Webster, J. (2005). Unintended
consequences of emerging communication technologies: Instant Messaging in the workplace.
Computers in Human Behavior, 21, 85–103.
doi:10.1016/j.chb.2003.12.001
Chen, K., Yen, D. C., & Huang, A. H. (2004).
Media selection to meet communications contexts: Comparing e-mail and instant messaging
in an undergraduate population. Communications
of the Association for Information Systems, 14,
387–4051.
Csikszentmihalyi, M. (1990). Flow: The psychology of optimal experience. New York: Harper
and Row.
153
Factors Affecting Information Communication Technologies Usage and Satisfaction
Daft, R. L., & Lengel, R. H. (1986). Organizational
information requirements, media richness, and
structural determinants. Management Science,
32, 554–571. doi:10.1287/mnsc.32.5.554
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems
Quarterly, 13(3), 319–340. doi:10.2307/249008
De Vos, H., Hofte, H., & de Poot, H. (2004).
IM at work: Adoption of instant messaging in a
knowledge organization. In proceedings of the
37th Annual Hawaii International Conference on
System Sciences (HICSS), (pp. 1-10).
Delone, W. H., & Mclean, E. R. (1992). Information systems success: the quest for dependent
variable. Information Systems Research, 3(1),
60–95. doi:10.1287/isre.3.1.60
Delta Capital. (2006). Al-Qabas Newspaper 20
December 2006
Fornell, C. R., & Larcker, D. F. (1981). Structural
equation models with unobservable variables and
measurement error. JMR, Journal of Marketing
Research, 18, 39–50. doi:10.2307/3151312
Huang, A. H., Hung, S. Y., & Yen, D. C. (2007).
An exploratory investigation of two internet-based
communication modes. Computer Standards
& Interfaces, 29(2), 238–243. doi:10.1016/j.
csi.2006.03.011
Huang, A. H., & Yen, D. (2003). Usefulness of
instant messaging among young users: social vs.
work perspective. Human Systems Management,
22(2), 63–72.
Igbaria, M., Guimaraes, T., & Davis, G. B. (1995).
Testing the determinants of microcomputer usage via a structural equation model. Journal of
Management Information Systems, 11(4), 87–114.
Internet World Stats. (2008), web: www.internetworldstats.com
Isaacs, E., Walendowski, A., & Ranganathan, D.
(2002). Mobile Instant Messaging through Hubbub. Communications of the ACM, 45(9), 68–72.
doi:10.1145/567498.567501
Lancaster, S., & Yen, D. C. (2007). The selection
of instant messaging or e-mail college students’
perspective for computer communication. Information Management & Computer Security, 15(1),
5–22. doi:10.1108/09685220710738750
Ghani, J. A., & Deshpande, S. P. (1994). Task
characteristics and the experience of optimal flow
in human-computer interaction. The Journal of
Psychology, 128(4), 381–391. doi:10.1080/002
23980.1994.9712742
Leung, L. (2006). Unwillingness-to-communicate
and college students’ motives in SMS mobile
messaging. Telematics and Informatics, 24(2),
115–129. doi:10.1016/j.tele.2006.01.002
Gross, E. F. (2004). Adolescent internet use: What
we expect, what teens report. Applied Developmental Psychology, 25, 633–649. doi:10.1016/j.
appdev.2004.09.005
Li, D., Chau, P. Y., & Lou, H. (2005). Understanding individual adoption of instant messaging: An
empirical investigation. Journal of the Association
for Information Systems, 6(4), 102–126.
Hair, J. F., Anderson, R. E., Tatham, R. L., &
Black, W. C. (1998). Multivariate data analysis
(5th ed.). New York: Prentice Hall.
Lieberman, J. N. (1977). Playfulness. New York:
Academy Press.
154
Lin, J., Chan, H. C., & Jin, Y. (2004). Instant
messaging acceptance and use among college
students. In Proceedings of the Pacific Conference
on Information Systems (PACIS), (pp. 181-194).
Factors Affecting Information Communication Technologies Usage and Satisfaction
Loch, K. D., Straub, D. W., & Kamel, S. (2003).
Diffusing the internet in the arab world: The role
of social norms and technological culturation.
IEEE Transactions on Engineering Management,
50(1), 45–63. doi:10.1109/TEM.2002.808257
Malone, T. W. (1981). Toward a theory of intrinsically motivating instructions. Cognitive Science,
4, 333–369. doi:10.1207/s15516709cog0504_2
McClea, M., Yen, D., & Huang, A. H. (2004).
An analytical study towards the development
of a standardized IM application. International
Journal of Computer Standards and Interfaces,
26(4), 343–355. doi:10.1016/j.csi.2003.11.002
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perception
of adopting an information technology innovation.
Information Systems Research, 2(3), 192–222.
doi:10.1287/isre.2.3.192
Myers, M. D., & Tan, F. B. (2002). Beyond models of national culture in informational system
research. Journal of Global Information Management, 24–32. doi:10.4018/jgim.2002010103
Nicholson, S. (2002). Socialization in the “virtual
hallway;” Instant messaging in the asynchronous
web-based distance education classroom. The
Internet and Higher Education, 5, 363–372.
doi:10.1016/S1096-7516(02)00127-6
Peter, J., Valkenburg, P. M., & Schouten, A. P.
(2006). Precursors of adolescents’ use of visual
and audio devices during online communication.
Computers in Human Behavior, 23(5), 2473–2487.
doi:10.1016/j.chb.2006.04.002
Rau, P., Gao, Q., & Wu, L. (2006). Using mobile communication technology in high school
education: Motivation, pressure, and learning
performance. Computers & Education, 50(1),
1–22. doi:10.1016/j.compedu.2006.03.008
Rogers, E. M. (1983). Diffusion of innovations
(3rd ed.). New York: The Free Press.
Rose, G., & Straub, D. (1998). Predicting IT use:
applying TAM to the arab world. Journal of Global
Information Management, 6, 39–46.
Rouibah, K. (2008). (Forthcoming). Social usage
of instant messaging by employees outside the
workplace in Kuwait: A structural equation model.
IT and People. doi:10.1108/09593840810860324
Rouibah, K., & Ould-Ali, S. (2005). Investigation of certain factors associated with the chat
technology acceptance and its impact on CBA
students. Arab Journal of Administrative Sciences,
12(2), 1–56.
Rubin, R. R., Perse, E. M., & Barbato, C. A.
(1988). Conceptualization and measurement
of interpersonal communication motives. Human Communication Research, 14, 602–628.
doi:10.1111/j.1468-2958.1988.tb00169.x
Shen, Y., & Gallivan, M. (2006, August 4-6). Understanding workplace instant messaging adoption, use and consequences via social perspectives.
In Proceedings of the 12th Americas Conference
on Information Systems, Acapulco, Mexico.
Simon, A. F. (2006). Computer-mediated communication: Task performance and satisfaction. The
Journal of Social Psychology, 143(3), 349–379.
doi:10.3200/SOCP.146.3.349-379
Taylor, S., & Todd, P. A. (1995a). Understanding
information technology usage: a test of competing models. Information Systems Research, 6(2),
144–174. doi:10.1287/isre.6.2.144
Taylor, S., & Todd, P. A. (1995b). Assessing IT
usage: The role of prior experience. Management
Information Systems Quarterly, 19(4), 561–570.
doi:10.2307/249633
Research Institute for Digital Economy. (2006),
Al- Watan 15 January 2006
155
Factors Affecting Information Communication Technologies Usage and Satisfaction
Torkzadeh, G., & Dwyer, D. J. (1994). A path analytic study of determinants of information system
usage. OMEGA International Journal of Management Science, 22(4), 339–148. doi:10.1016/03050483(94)90060-4
Wang, C. C., Hsu, Y. H., & Fang, W. C. (2005). Acceptance to technology with network externalities:
An empirical study of internet instant messaging
services. Journal of information technology theory
& application, 6(4), 15-29.
Webster, J., & Martocchio, J. J. (1992). Microcomputers playfulness: Development of a measure with workplace implications. Management
Information Systems Quarterly, 16(1), 201–224.
doi:10.2307/249576
Webster, J., Trevino, L. K., & Ryan, L. (1993).
The dimensionality and correlates of flow in
human-computer interactions. Computers in Human Behavior, (9): 411–426. doi:10.1016/07475632(93)90032-N
156
(2008). World Bank Development Indicator.
Washington, DC: World Bank.
ENDNOTES
1
2
3
Several foreign banks have already joined
the Kuwaiti market including: Citibank, BNP
Paribas, and HSBC.
This is a quotation of Hashem Al-Refaee,
CEO of Project Management Association,
Al-Qabas 30th May 2007.
GCC is short for Gulf Cooperative Council.
These countries include Kuwait, Saudi Arabia, Bahrain, Qatar, Oman, and the United
Arab Emirates.
Factors Affecting Information Communication Technologies Usage and Satisfaction
APPENDIX 1
Table A1. Past studies on IM usage (Rouibah 2008)
Study
Authors
Objectives
Journal/ conference
Sample
Usage vs. satisfaction
Isaacs et al., (2002)
Describe usage of an IM system
“Hubbub”
Communication of the
ACM
Observation and interviews with 25 users
Current and continuous
usage
Nicholson (2002)
Investigate why students use IM
Internet and Higher
Education
30 students at Syracuse University
Type of use
Huang and Yen, (2003)
Compare usefulness of IM among young
users for social and work perspective.
Identify factors that are important to
the usefulness of IM
Human Systems Management
500 college students
N/A
Gross (2004)
Social activities of online adolescents
on the Internet including IM
Applied Developmental Psychology
100 male and 161
female adolescents
Current usage
McClea et al., (2004)
IM development
Computer Standards &
Interfaces
N/A
N/A
Chen et al., (2004)
Compare intention and future use of IM
with email in the work and coursework
CAIS
239 male and 219 female students in USA
Intention to use
Lin et al., (2004)
Test and validate the motivational factors of using IM in Singapore
PACIS Conference
300 students at eight
faculties
Current usage
De Vos et al., (2004)
Investigate the motivational factors behind IM adoption in the workplace from
four months before to three months after
HICSS Conference
104 employees in
a Dutch knowledge
work organization
(28% female and 72%
male)
Current usage
Wang et al., (2005)
Propose a modified version TAM for
IM (MSN, Yahoo messenger and ICQ)
Journal of Information
Technology Theory
and Application
437 students (283 females and 154 males)
from several Taiwanese colleges
Current usage
Li et al., (2005)
Determinants of IM intention to use
(based on TAM)
Journal of Association for Information
Systems
273 undergraduate
students in two American universities
Intention to use
Cameron & Webster
(2005)
Investigation of IM usage in the workplace (why and type of use)
Computers in Human
Behavior
Interviews with 19
employees from four
organizations
Type of use
Huang et al., (2007)
Compare the use of IM versus e-mail
as the communication tool to facilitate
group problem-solving tasks for geographically dispersed teams
Computer Standards &
Interface
44 teams in the United
States
N/A
Peter et al., (2006)
Characteristics of individual adolescents who occasionally used webcams
and a microphone during IM for social
use.
Computers in Human
Behavior
1060 adolescents
between 12 and 17
years old
N/A
Leung (2006)
IM use and its impact on interpersonal
mediated communication (social use)
among teenagers and college students.
Telematics and Informatics
532 college students
in Hong Kong (China)
Current usage
Abla et al., (2006)
Description of software IM service for
collaboration
Fusion Engineering
and Design
Case study
N/A
Rau et al., (2006)
Impacts of using a combination of
mobile and Internet communication
technology (SMS, email and IM) in
education
Computers & Education
176 students
N/A
continued on following page
157
Factors Affecting Information Communication Technologies Usage and Satisfaction
Table A1. continued
Study
Authors
Objectives
Journal/ conference
Sample
Usage vs. satisfaction
Simon (2006)
Compare task performance and satisfaction among three communication
media: Face-to-face, IM and video
conferencing
Journal of Social Psychology
150 undergraduate
students (70 men and
80 women)
Current usage
Shen and Gallivan
(2006)
State why, how and what the consequences of IM use are
Americas Conference
on Information Systems
N.A
Current and satisfaction
Lancaster and Yen
(2007)
Investigate and compare the students’
perceptions of instant messaging and
e-mail by a sample of college students
based on mass richness theory
Information Management & Computer
Security
545 US college students
Perception about actual
usage
Rouibah (2008)
Investigate why Kuwaiti adults (employees) use IM in Kuwait
IT & People
191 adult employees
in Kuwait
Current usage
APPENDIX 2
Table a2. Arab countries: population size and number of Internet users (Internet World Stats 2008;
World Bank Development Indicator 2008)
Country
Country area (sq
km)
Population
Number of Internet users
Internet
penetration (%)
GDP (in 2007 in $
Billion)
1. Algeria
2,381,741
33,333,216
2,460,000 (Aug. 2007)
7.4
125.866
2. Bahrain
694
738,874
157,300 (Sept. 2007)
21.3
16.893
3. Comoros
1,862
711,417
21,000 (Sept. 2007)
3.0
0.436
4. Djibouti
23,200
496,374
11,000 (Sept. 2007)
2.2
0.834
5. Egypt
1,001,450
80,335,036
6,000,000 (Aug. 2007)
7.5
127.930
6. Iraq
434,128
27,162,627
6,000 (Oct. 2005)
0.1
45.239
7. Jordan
89,342
5,375,307
796,900 (Aug. 2007),
14.8
15.697
8. Kuwait
17,818
2,730,603
816,700 (Aug. 2007)
29.9
103.367
9. Lebanon
10,201
4,556,561
950,000 (Aug. 2007)
20.8
23.995
10. Libya
1,777,060
6,036,914
232,000 (Sept. 2007)
3.8
66.005
11. Mauritania
1,035,000
3,270,065
30,000 (Sept. 2007)
0.9
2.747
12. Morocco
458,730
33,757,175
6,100,000 (Sept. 2007)
18.1
72.764
13. Oman
309,500
2,452,234
319,200 (Aug. 2007)
13.0
40.523
14. Palestine
(West Bank and
Gaza)
6,242
3,070,228
266,000 (Sept. 2007),
8.7
5.320
15. Qatar
11,521
824,355
289,900 (Aug. 2007)
35.2
65.814
2,149,690
24,069,943
4,700,000 (Aug. 2007)
19.5
374.457
637,657
12,448,179
94,000 (Sept. 2007)
0.8
4.388
16. Saudi Arabia
17. Somalia
18. Sudan
2,505,810
39,379,358
3,500,000 (Sept. 2007)
8.9
46.708
19. Syria
185,180
19,514,386
1,500,000 (Aug. 2007),
7.7
37.414
continued on following page
158
Factors Affecting Information Communication Technologies Usage and Satisfaction
Table A2. continued
Country area (sq
km)
Population
Number of Internet users
Internet
penetration (%)
GDP (in 2007 in $
Billion)
20. Tunisia
163,610
10,276,158
1,618,440 (June 2007)
15.7
34.142
21. United Arab
Emirates
77,700
3,981,978
1,708,500 (Aug. 2007),
42.9
189.644
22. Yemen
528,076
21,306,342
270,000 (Aug. 2007)
1.3
22.738
13,806,212
335,827,330
31,846,940
-
1422.921
Country
Total
APPENDIX 3. MODEL MEASUREMENTS
Curiosity
CU1: Using IM excites my curiosity to get to know new friends.
CU2: Using IM programs excites my curiosity to get to know new people (from both genders).
CU3: IM programs help me to know new subjects and gain new knowledge.
CU4: IM programs help me to know new habits and cultures of other countries.
Prior Similar Experience (PSE)
PSE1: I am familiar with using computers.
PSE2: I am familiar with using the web.
PSE3: I am a familiar with using e-mail.
Compatibility
CP1: Using IM would be compatible with all aspect of my life with friends.
CP2: Using IM would be compatible with all aspect of my life with my family.
CP3: Using IM would be compatible with all aspect of my studies.
Perceived Usefulness
PU1: Using IM improves my performance.
PU2: Using IM increases my productivity.
PU3: Using IM would enhance my effectiveness.
Perceived Ease of Use
PEOU1: Interacting with IM does not require a lot of my mental effort.
PEOU2: I find IM flexible to interact with.
PEOU3: My interactions with IM are clear.
PEOU4: I find IM easy to use.
159
Factors Affecting Information Communication Technologies Usage and Satisfaction
Current Usage
UV (Usage Volume or daily usage): Time spent on the use of IM per day.
FU (Frequency of Use): Time per week a respondent reports using the IM.
VU (Variety of Use): Respondents were given a list of topics they may use during IM, and were asked
to select those they often fit their interest, including: social, cultural, political, love, study, family,
scientific, religion, medical, personal, unethical, sport and entertainment.
TUS (Type of Use & Synchronicity): to whom the user frequently communicates with and exchange
information in real-time (family members; friends with the same sex; friends with the opposite sex;
unknown person with the same sex; and unknown person with the opposite sex).
SP (Social Presence): Preference of respondents to an existing communication channel including: typing,
talking, visualizing pictures, or watching each other using digital camera.
Users’ Satisfaction of Instant Messaging
USIM1: My GPA has decreased since I started to use IM.
USIM2: IM usage has a positive impact on my study performance.
USIM3: IM usage makes me miss my classes.
USIM4: IM usage makes me overdue my homework’s and assignments.
USIM5: IM usage distracts my attention during class time.
USIM6: Use of IM helps me to finish my assignment on time.
USIM7: IM usage has enabled me to gain knowledge useful to my study.
USIM8: IM usage has enabled me to improve my GPA.
APPENDIX 4
Table A3. Results of factors analysis of loadings and cross loadings
PU╯
USIM
CU╯
PSE╯
PEOU╯
CP╯
╯Usage
magnitude
Socialization╯
CP1
0.13
0.10
0.23
0.22
0.16
0.76
0.14
0.06
CP2
0.15
0.07
0.07
0.14
0.14
0.84
0.05
0.14
Item
Compatibility
Curiosity
CP3
0.32
0.05
0.13
-0.02
0.07
0.70
0.02
0.01
CU1
0.16
0.15
0.83
0.05
0.18
0.09
0.11
0.11
CU2
0.13
0.15
0.84
0.07
0.21
0.12
0.07
0.09
CU3
0.33
0.13
0.70
0.07
0.15
0.20
0.16
0.06
CU4
0.37
0.01
0.31
0.09
0.16
0.09
0.04
-0.05
continued on following page
160
Factors Affecting Information Communication Technologies Usage and Satisfaction
Table A3. continued
Item
Prior Similar Experience
Usefulness
Ease of Use
PSE1
PU╯
USIM
CU╯
PSE╯
PEOU╯
CP╯
╯Usage
magnitude
Socialization╯
0.10
0.01
0.05
0.86
0.15
0.12
0.07
0.02
PSE2
0.08
-0.03
0.09
0.89
0.15
0.09
0.09
0.09
PSE3
0.12
0.01
0.08
0.82
0.21
0.07
0.17
0.05
PU1
0.64
0.03
0.35
0.25
0.17
0.09
0.12
0.10
PU2
0.78
0.09
0.22
0.15
0.22
0.13
0.01
0.11
PU3
0.73
0.12
0.25
0.14
0.24
0.06
0.05
0.14
PEOU1
0.15
0.12
0.07
0.20
0.70
0.01
0.08
0.04
PEOU2
0.21
0.05
0.23
0.12
0.79
0.13
0.06
0.05
PEOU3
0.28
0.12
0.20
0.08
0.74
0.16
0.12
0.07
PEOU4
0.17
0.02
0.24
0.24
0.75
0.15
0.17
0.03
Usage
magnitude
UV
0.08
0.05
0.16
0.06
0.11
0.06
0.13
0.81
FU
0.08
0.06
0.00
0.07
0.02
0.10
0.05
0.85
VU
0.17
0.04
0.04
0.14
0.11
-0.06
0.81
0.07
Socialization
TUS
0.03
0.01
0.14
0.15
0.16
0.00
0.77
0.10
SP
-0.01
-0.07
0.09
0.01
0.04
0.28
0.72
0.03
Users’ satisfaction
USIM1
0.03
0.77
0.20
-0.02
0.10
0.11
0.02
0.02
USIM2
0.46
0.48
0.04
0.08
0.11
0.24
0.10
-0.06
USIM3
0.15
0.86
0.07
-0.03
0.01
0.02
-0.01
0.03
USIM4
0.12
0.89
0.05
0.07
0.06
0.03
0.02
0.04
USIM5
0.14
0.83
0.03
-0.04
0.07
-0.03
-0.07
0.07
USIM6
0.29
0.29
0.04
-0.07
0.08
0.18
-0.01
-0.03
USIM 7
0.25
0.10
0.18
0.03
0.18
0.16
0.09
0.03
USIM 8
0.03
0.09
0.09
0.11
0.14
0.14
0.10
0.07
This work was previously published in International Journal of Global Information Management, Volume 17, Issue 2, edited
by Felix B. Tan, pp. 1-29, copyright 2009 by IGI Publishing (an imprint of IGI Global).
161
162
Chapter 8
The Information
Overload Paradox:
A Cross-Cultural Research Study
Ned Kock
Texas A&M International University, USA
Ana Rosa Del Aguila-Obra
University of Malaga, Spain
Antonio Padilla-Meléndez
University of Malaga, Spain
ABSTRACT
Information overload is one of the major problems for individuals and organizations in modern urban
environments. This phenomenon has been studied for many years, and has proven to be more complex
than researchers believed it to be. It is important to better understand this “pathology of information”
for two reasons. First, it has a deleterious impact on work productivity and quality. Second, it has traditionally been a driver of Information Technology developments aimed at helping individuals to better
cope with it. The study presented here aims at shedding light on the complexity of information overload,
by examining the relationship between perceived information overload intensity and three traditional
information overload predictors as well as one nontraditional predictor. The nontraditional predictor
is power distance, or the extent to which less powerful members of a national culture accept that power
is distributed unequally. Power distance was manipulated through the collection of data from 184 local managers and professionals (in New Zealand, Spain and the U.S.A.). The data analyses led to one
surprising conclusion: perceived information overload intensity seems to be more strongly related to
power distance than to the volume of written information or number of information transactions processed by an individual.
DOI: 10.4018/978-1-60960-605-3.ch008
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Information Overload Paradox
INTRODUCTION
Typically information overload has been viewed
as problematic and as leading to losses in work
productivity and quality of work outcomes. Information overload has also traditionally been a
driver of information technology developments;
information technology solutions have often
been developed specifically to help individuals
cope with information overload (Turetken &
Sharda, 2004). As early as 1970, the award winning writer and futurist Alvin Toffler argued that
information overload would become one of the
main problems facing modern society and organizations (Toffler, 1970). The emergence of the
Internet and its increasing use by individuals and
organizations (Chung & Tan, 2004; Teo, 2007) has
been presented as contributing to increasing levels
of information overload (Kiley, 1995; Berghel,
1997), apparently lending support to Toffler’s
(1970) prediction.
Generally speaking, information overload
can be defined as a state in which the amount of
information an individual must process exceeds
the individual’s information processing resources
(O’Reilly, 1980).
The study presented here aims at shedding light
on the complexity of the information overload
phenomenon, by looking at it from a different
and arguably novel lens. The study examined
the relationship between perceived information
overload intensity and one nontraditional and
three traditional information overload predictors.
One of the goals of the study was to compare the
influence, if any, of the nontraditional predictor
against the more traditional ones.
Power distance was the nontraditional predictor. Power distance is part of Geert Hofstede’s
model of cultural dimensions (Hofstede, 2001;
Lippert & Volkmar, 2007), and is defined as the
extent to which less (and more) powerful members
of organizations (e.g., employees and their supervisors) accept that power is distributed unequally.
Hofstede’s model has been widely applied in
various disciplines (Sivakumar & Nakata, 2001),
particularly in psychology, sociology, marketing,
and management (Søndergaard, 1994). Hofstede’s
model is considered by many to be the most
comprehensive model of the influence of national
culture on organizational behavior.
The traditional information overload predictors
were the volume of written information processed
by individuals, in terms of pages read and written on a daily basis; the number of information
transactions, or the average number of information
giving and information receiving interactions per
working day; and business process knowledge,
assessed as the number of months of formal education and hands-on practice needed to perform
work-related activities well.
This is a cross-cultural research study (Hunter,
2006) in which variations in the power distance
predictor were incorporated into the study’s design
through the collection of data from three different countries, which also differ significantly in
terms power distance. Data were obtained from
184 local managers and professionals in New
Zealand, Spain and the U.S.A. The data were
analyzed employing partial least squares-based
structural equation modeling. The analysis led to
one surprising conclusion, which is that perceived
information overload intensity is more strongly
related to power distance than to the volume of
written information or the number of information
transactions processed by an individual. This
surprising conclusion is referred to here as the
information overload paradox.
RESEARCH BACKGROUND
AND HYPOTHESES
Much research on information overload has taken
the view that the phenomenon has both organizational and societal implications (Edmunds &
Morris, 2000; Jones et al., 2004), and that those
implications are more negative than positive.
More frequently than not, information overload is
163
The Information Overload Paradox
perceived as an undesirable occurrence that must
be either minimized or completely eliminated
(Losee, 1989; Glazer et al., 1992; Meyer et al.,
1997). In many cases, new technology-based
information visualization and summarization
solutions are seen as among the key solutions
to the problems posed by information overload
(Johnsson, 1991; Turetken & Sharda, 2004).
However, many of those information processing
aids, such as electronic collaboration technologies,
can indirectly lead to an overall increase in the
amount of information that an individual has to
process (Schultze & Vandenbosch, 1998; Allen
& Shoard, 2005). For example, Mano and Mesch
(2010) report undesirable effects on performance
related with an excessive e-mail use.
Complicating the picture further is the fact
that rarely information overload is measured
directly and objectively. Usually information
overload can only be measured indirectly and
subjectively, through perceptions of information
overload. Many attempts to measure information
overload directly and objectively fall into the trap
of measuring it through effects that are caused
by information overload. Decision quality, for
example, is generally expected to go down as
information overload goes up (Eppler & Mengis, 2004). Yet, using decision quality as a proxy
measure for information overload would conflate
cause and effect.
When one looks at communication at work on
a daily basis, written information exchanges such
as those through electronic messages and printed
documents seem to be the ones used to convey high
volumes of information; with lower volumes transferred through unwritten information exchanges,
such as oral and telephone exchanges (Wainfan
& Davis, 2004). These patterns are probably motivated by choices that have a cognitive basis, as
argued by Robert and Dennis’s (2005) cognitive
model of media choice. For example, unwritten
information exchanges pose difficulties for the
time-disconnected review of complex information, which may be necessary for the effective
164
understanding of work-related activities. Hypothesis H1 below incorporates the notions that high
information volumes more often than not cause
information overload, and that high information
volumes are more likely to be exchanged through
written than unwritten media.
H1: The volume of written information processed
at work on a daily basis is significantly and
positively related to perceived information
overload intensity.
As can be inferred from hypothesis H1, this
study is particularly concerned with information
overload as perceived by workers. Arguably
perceived information overload is not the same
as actual information overload. Nevertheless, it
is reasonable to conclude based on past research
that the two variables are high correlated, and
that negative effects such as the deterioration of
decision making abilities are often associated
with perceptions of elevated information overload
(Edmunds & Morris, 2000; Eppler & Mengis,
2004; Evaristo, 1993).
While written information exchanges at work
are associated with high volumes of information
transfer, both written and unwritten information
exchanges seem to be associated with a high
number of information transfer transactions
(Chervany & Dickson, 1974; Evaristo, 1993). A
simple scenario can help illustrate this point. Let
us consider a lawnmower sales representative
who has received a manual about lawnmowers,
containing complex information that he must
understand in order to do an effective job as a
salesperson. He then sends 3 brief e-mails and
places 5 short telephone calls over a week to his
manager, with the goal of clarifying parts of the
lawnmowers’ manual. In this example, a large
written information exchange (the receipt of the
lawnmowers’ manual) leads to several short and
fragmented written and unwritten information
exchanges. This discussion highlights the difference between volume of information processed,
The Information Overload Paradox
and number of information transactions. Both are
likely to be associated with information overload
(not only the first), because they are both associated
with information exchanges that use up workers’
cognitive and time resources (Speier et al., 1997).
This is incorporated into hypothesis H2, which
is stated below.
H2: The number of information transactions taking
place at work on a daily basis is significantly
and positively related to perceived information overload intensity.
The information overload literature suggests
that individuals employ coping mechanisms
when facing information overload, and that those
mechanisms present a certain degree of uniformity.
Jones et al.’s (2004) study shows that individuals
experiencing information overload in online interaction environments are more likely to respond
to and generate simple messages, as opposed to
complex messages. This could potentially have a
negative overall effect on the outcomes of tasks
performed by the individuals, and illustrates the
fact that not all coping mechanisms are likely to
be effective ones in the long run.
There is also evidence that certain business
process characteristics are associated with reasonably effective information overload coping mechanisms, especially when one looks at those types
of mechanisms from an individual competence
perspective (Lindgren, Henfridsson & Schultze,
2004). One example of this is the amount of
knowledge viewed as necessary to perform work
well in connection with a business process (Iselin,
1989). The rationale here is that properly trained
and more experienced individuals are better able
to cope with information overload (Camerer &
Johnson, 1991; Chervany & Dickson, 1974), and
that the explicit recognition that individuals must
be appropriately trained to perform work well
contributes to that proper training. This leads to
the conclusion that the amount of business process
knowledge necessary to perform work well is
inversely correlated with perceived information
overload. The conclusion is incorporated into
hypothesis H3, formally stated below.
H3: The amount of business process knowledge
necessary to perform work well is significantly and negatively related to perceived
information overload intensity.
Kock’s (2000) research suggests one additional
predictor of perceived information overload that
is arguably associated with what Hofstede (2001)
refers to as power distance, or the extent to which
less (and more) powerful members of a national
culture accept that power is distributed unequally.
The majority of respondents in Kock’s (2000)
study, when asked for the main reasons why
they experienced information overload at work,
indicated that pressure placed on them to perform
tasks efficiently and effectively was the main reason. This finding is consistent with other studies
that linked information overload perceptions with
time pressure experienced by individuals (see,
e.g., Evaristo, 1993; Schick et al., 1990; Paul &
Nazareth, 2010). Geert Hofstede has conducted
extensive studies of organizational and national
cultures (Hofstede, 1980; 1991; 2001), and has
identified power distance as being likely associated with stress at work. The reason seems to be
that individuals who are more accepting of power
differentials in organizations are also likely to feel
more time pressure to perform work well. (Nearly
all individuals in organizations have to report to
other individuals, which makes power differentials
ubiquitous.) This conjecture, combined with the
notion that information overload is associated with
time pressure, leads to hypothesis H4.
H4: Power distance is significantly and positively
related to perceived information overload
intensity.
The link predicted through hypothesis H4 is
arguably more counterintuitive than the links
165
The Information Overload Paradox
predicted through hypotheses H1, H2, and H3.
It also contradicts some evidence suggesting that
societies that present high power distance are also
polychromic (Hall, 1976; Waarts & van Everdingen, 2006). In polychromic societies individuals
pay less attention to time constraints in businessrelated activities than in monochromic societies.
It should be noted, however, that the evidence
in question has not suggested the existence of a
causal relationship between power distance and
the extent to which a society is polychromic.
These two constructs may be independent from
each other.
A simple work-related example can be used to
illustrate the link predicted through hypothesis H4.
Let us assume a plant manager who is overloaded
with information about the plant’s operation; information that she needs to make various decisions
on a daily basis. The manager may experience a
reduction in the amount of information overload
by employing a decision support system that
automatically summarizes that information for
her based on a pooling of information from other
systems. Yet, the benefits of that reduction may
be lost due to an increase in the time pressures
placed on her by other managers to whom she
reports. She may be asked to provide additional
information to those managers, who are higher
up in the organization’s hierarchy, and who may
be more demanding because of their knowledge
of the existence of the decision support system.
Those extra information processing demands
may be amplified by a significant power distance,
causing an overall increase in perceived information overload intensity experienced by the plant
manager.
RESEARCH METHOD
Data from 184 local managers and professionals
were collected in New Zealand, Spain and the
U.S.A. In terms of gender distribution, 70.7%
of the respondents were males. The respondents’
166
distribution in terms of economic sector was approximately as follows: service (87%), manufacturing (12.5%), and agriculture (0.5%). In terms
of distribution by country, 26.6% of the respondents were from New Zealand, 41.3% were from
Spain, and 32.1% were from the U.S.A. Generally
the respondents were evenly distributed across
countries in terms of gender and economic sector.
The managers and professionals were participating in executive education programs in their
respective countries at the time the data were collected. The data were collected through questionnaires distributed in class by research collaborators
who taught in the executive education programs.
The questionnaires used in the three countries
had the same questions. The questions make up
a measurement instrument that was previously
used and validated in the single-country study
reported by Kock (2000). Those used in Spain
were first translated to Spanish. In order to check
the correctness of the translation, the questionnaire in Spanish was back-translated to English
by a second translator, and then compared with
the original questionnaire in English by a third
translator. Questions included both perceptual
and demographic items, and referred primarily
to work activities conducted on a regular basis
by those individuals.
The analysis of the data was conducted through
variance-based structural equation modeling employing the partial least squares method (Chin,
1998; 2001; Chin et al., 1996). It included independent variables, of which three were defined
as latent variables and measured through two
indicators. Unlike traditional reflective measures
(Chin, 1998; 2001), each indicator refers to a
different facet of the same underlying construct,
which justifies the use of only two (as opposed
to many) indicators (see, also, Kline, 1998). The
analysis also included control variables. The main
dependent variable of the structural model was
information overload intensity. These variables as
well as brief related definitions and measurement
descriptions are shown in Table 1.
The Information Overload Paradox
Table 1. Main variables of this study
Independent variables
Definition / measurement
Volume of information
processed
Average number of pages read and written per working day
Number of information
transactions
Average number of information giving and information receiving interactions per working day
Business process
knowledge
Number of months of formal education and hands-on practice needed to perform work-related activities well
Power distance
The extent to which less powerful members of a national culture accept that power is distributed
unequally
Control variables
Definition / measurement
Gender
Gender (male or female) of the individual participating in the study
Sector
Economic sector (service, manufacturing, or agriculture) of the organization to which the individual
belongs
Business process
complexity
Average number of relevant work-related decisions made and different work activities performed
made on a working day
Decision making
style
Decision making style in terms of scope (focus on details or big picture) and rationality (intuitive or
rational)
Dependent variable
Definition / measurement
Information overload
intensity
Perceived information overload intensity experienced at work
The three independent latent variables were
volume of information processed, number of
information transactions, and business process
knowledge. One of the independent variables,
namely power distance, was assigned a specific
score for each country. The scores were taken
from Hofstede’s (2001) cultural dimensions
model, and were the following: 22 for New Zealand, 57 for Spain, and 40 for the U.S.A. That is,
among the three countries New Zealand was assigned the lowest power distance score, followed
by the U.S.A., and then Spain with the highest
power distance score. Two of the control variables
were demographic variables: gender of the respondent and economic sector. The other two
control variables were perception-based variables:
business process complexity and decision making
style.
Hofstede’s (2001) cultural dimensions model
comprises power distance scores that have been
obtained primarily based on data collected from
employees of a single organization (i.e., IBM)
with offices in various countries. This may be
seen as detrimental to the external validity of those
scores, and their use as country scores. Nevertheless, one could also argue that the differences in
power distance proposed by Hofstede among
various countries provide a conservative measure
of the actual differences in power distance among
those countries. The reason is that being part of
the same multinational organization (i.e., IBM)
would tend to reduce variation of power distance
measures obtained from different countries (Hofstede, 2001; Mani, 2007); that is, the multinational
organization’s management-employee interaction
rules and procedures could be expected to have
a uniformity-inducing effect on power distance
perceptions, even if a small one. This rationale
suggests that the power distance scores proposed
by Hofstede can be used in studies that hypothesize effects of score differences on endogenous
variables, as this study does, as opposed to studies
that hypothesize null effects based on similarities
in scores (Bing, 2004; Chiang, 2005).
167
The Information Overload Paradox
Figure 1. Hypotheses shown as paths in a structural equation model
Figure 1 shows the hypotheses as part of a
structural equation model. Each hypothesis is
shown next to a path in the model, together with
the expected sign of the relationship represented
through the path. That is, a “+” sign indicates
a positive predicted relationship between two
variables in the model, and a “-” sign indicates a
negative predicted relationship. The control variables are not represented because no predictions
were made regarding their relationship with other
variables; that is, their inclusion in the analysis
was exploratory. In the structural equation model,
the control variables were added as variables that
actually pointed to the main dependent variable of
the model, but with no a-priori predicted relationships with that variable.
In Figure 1, three variables are indicated as
intuitive predictors of the variable information
overload intensity. Those variables are volume of
information processed, number of information
transactions, and business process knowledge.
They are indicated as such because it is intuitive
to think of them as contributing to increase (the
first two) or decrease (the third) information
overload intensity. Power distance, however, is
indicated as a counterintuitive predictor because
168
its relationship to information overload intensity
is less direct and obvious.
VALIDATION OF THE
MEASUREMENT MODEL
Structural equation modeling results can generally be considered trustworthy if the underlying
measurement model passes some validation tests.
Those tests normally address reliability and validity concerns (Kline, 1998; Rosenthal & Rosnow,
1991). Validity tests come in many forms, and the
most widely used are convergent and discriminant
validity tests. When used in combination and in
the context of questionnaire-based studies, reliability and validity tests allow for the conclusion
that respondents generally: (a) answered questions
in a careful way, as opposed to answering in a
hurried and mindless manner; (b) understood the
questions in the way that they were intended to be
understood by the researcher who designed the
questions; and (c) understood the questions in the
same way as the other respondents.
Reliability tests are conducted through the
calculation of reliability coefficients, such as composite reliability coefficients, and their comparison
The Information Overload Paradox
Table 2. Factor loadings and composite reliabilities
Infvol1
Infvol
Inftran
Knowle
CR
.78
.26
-.03
.712
Infvol2
.85
.12
.07
Inftran1
.14
.84
.14
Inftran2
.19
.82
.13
Knowle1
.03
.10
.91
Knowle2
.02
.20
.90
.940
.953
Notes:
Infvol = Volume of information processed
Inftran = Number of information transactions
Knowle = Business process knowledge
CR = Composite reliability
with a certain threshold coefficient (Nunnally,
1978; Nunnally & Bernstein, 1994). Similarly,
convergent validity tests rely on the calculation
of factor loadings, and the comparison of those
loadings against a threshold loading (Hair et al.,
1987). Finally, discriminant validity tests rely
on the calculation of correlations between latent
variables and the comparison of those correlations
with average variances extracted for each latent
variable (Fornell & Larcker, 1981).
Table 2 displays factor loadings, cross-loadings, and composite reliability coefficients for the
three latent variables in the structural equation
model. The loadings and cross-loadings are shown
under the columns labeled “Infvol” (volume of
information processed), “Inftran” (number of information transactions), and “Knowle” (business
process knowledge). The extraction method used
in the calculation of the loadings and cross-loadings was principal components, and the rotation
method was varimax (Ehremberg, & Goodhart,
1976; Thompson, 2004). Those loadings that
were expected to be conceptually associated
with the respective latent variables are shown in
shaded cells. In the column indicated as “CR”
the composite reliability coefficients calculated
for each of the latent constructs are shown also
in shaded cells.
For a measurement model to be considered as
presenting an acceptable level of convergent
validity certain factor loadings must be .5 or above;
namely the loadings of indicators expected to be
conceptually associated with their respective latent
variables (Hair et al., 1987). Those are the loadings shown in shaded cells in Table 2, which range
from .78 to .91, and therefore meet the criterion
for acceptable convergent validity.
Similarly to the convergent validity criterion,
a measurement model is generally considered to
present an acceptable level of reliability if the
composite reliability coefficients are equal to or
greater than a certain threshold. Normally, that
threshold is expected to be .7 (Fornell & Larcker,
1981; Nunnally, 1978). As can be seen from the
“CR” column in Table 2, the composite reliability
coefficients ranged from .712 to .953, which allows
for the conclusion that the reliability of the measurement model used in this study is acceptable.
With the model validated in terms of convergent
validity and reliability, the next step is to assess
the model’s discriminant validity. Table 3 displays
several figures that can be used in this assessment.
The correlation coefficient calculated for each pair
of latent variables is shown in the cell where each
pair of variables cross each other, and the square
root of the average variance extracted (also known
169
The Information Overload Paradox
Table 3. Correlations and square roots of AVEs
€€€€€€Infvol
€€€€€€Inftran
€€€€€€Infvol
€€€€€€(.741)
€€€€€€Inftran
€€€€€€.314
€€€€€€(.941)
€€€€€€Knowle
€€€€€€.045
€€€€€€.278
€€€€€€Knowle
€€€€€€(.954)
Notes:
Infvol = Volume of information processed
Inftran = Number of information transactions
Knowle = Business process knowledge
Coefficients shown in cross-cells are correlations
Square roots of average variances extracted (AVEs) are shown in diagonal
as AVE) for each of the latent variables is shown
in the diagonal within parentheses.
One can consider a measurement model to
present an acceptable level of discriminant validity if the square root of the average variance extracted for each latent variable is above all values
belonging to a certain set of values. Those values
are the correlations between the latent variable in
question and all of the other latent variables in
the measurement model (Fornell & Larcker, 1981).
As can be inferred from Table 3, all of the square
roots of the average variances extracted are
higher than the correlations shown below them
or to their left. (Those are all of the correlations
involving each latent variable.) Therefore, one
can conclude that the discriminant validity of the
measurement model is acceptable.
The above discussion suggests that the measurement model employed in this study meets the
general criteria that allow for the conclusion that
it is both reliable and valid. This is a precondition for the interpretation of the results of the
structural equation modeling analysis, discussed
below. Based on the results of the validity and
reliability tests, one can conclude that the level
of measurement errors found in the data is likely
to be low enough that the results of the analysis
can be used for a credible assessment of the hypotheses guiding the study.
170
DATA ANALYSIS RESULTS
Figure 2 summarizes the results of the structural
equation modeling analysis conducted to test the
hypothesized relationships proposed earlier. Arrows represent relationships between variables,
and β coefficients associated with each relationship
are shown near the arrows. Also near the arrows,
and below the β coefficients, are the hypotheses
associated with the relationships.
The β coefficients are the estimated path coefficients associated with each of the hypothesized
relationships. The symbol “*” follows the β coefficients associated with relationships significant
at the .05 level; and the symbol “**” at the lower
and more stringent .01 level. The letters “NS”
stand for “not significant” and are shown in place
of the β coefficient for one statistically insignificant relationship. The actual sigma associated
with that relationship was .16, which is much
higher than the .05 threshold generally used for
hypothesis testing.
Figure 2 suggests, somewhat surprisingly, that
the volume of information processed by individuals, in terms of pages read and written on a daily
basis, is unrelated to the perceived information
overload intensity experienced at work by those
individuals. The number of information transactions, or the average number of information giving
and information receiving interactions per working
day, was found to be significantly and positively
The Information Overload Paradox
Figure 2. Path coefficients in the structural equation model and related hypotheses
related to perceived information overload intensity
(β=.137, P<.05).
Business process knowledge, assessed as
the number of months of formal education and
hands-on practice needed to perform work-related
activities well, was found to be significantly and
negatively related to perceived information overload intensity (β=-.114, P<.05). That is, business
processes that require more knowledge acquisition
time and effort to be executed effectively seemed
to be associated with lower levels of perceived
information overload intensity.
Finally, power distance, or the extent to which
less powerful members of a national culture accept
that power is distributed unequally, was found to
be significantly and positively related to perceived
information overload intensity (β=.192, P<.01). In
terms of the strength of the hypothesized relationships, this relationship between power distance
and perceived information overload intensity was a
great deal stronger than the relationships between:
number of information transactions and perceived
information overload intensity (approximately
40% stronger), and business process knowledge
and perceived information overload intensity
(approximately 69% stronger).
As discussed earlier, the following control
variables were included in the structural equation modeling analysis as possible predictors of
perceived information overload intensity: gender
of the respondent, economic sector (service,
manufacturing, or agriculture) of the organization
to which the individual belongs, business process
complexity (measured through the number of
work-related decisions and different work activities on a working day), and decision making style
in terms of scope (focus on details or big picture)
and rationality (intuitive or rational). None of these
control variables were found to have a significant
relationship with perceived information overload
intensity.
DISCUSSION
Not only is perceived information overload
strongly related to power distance, according to
the structural equation modeling analysis results,
but that relationship appears to be stronger than
the relationship between perceived information
overload and other more intuitive predictors.
Among those more intuitive predictors are the
171
The Information Overload Paradox
volume of written information and number of information transactions processed on a daily basis.
The volume of written information processed on
a daily basis seems to be unrelated to perceived
information overload. This is rather surprising,
since it is reasonable to assume that most of the
information flow in organizations takes place
through written media.
Moreover, the relationship between power distance and perceived information overload intensity
appears to be 40% stronger than the relationship
between number of information transactions and
perceived information overload intensity. This
observation comes from the comparison of the
absolute path coefficients in the structural equation model, assuming that their absolute values
reflect the strength of their associated two-variable
relationships.
The above findings constitute the essence
of what is referred to here as the information
overload paradox, which is also reflected in the
summary of the hypothesized predictions provided
in Table 4. The fact that hypothesis H1 was not
supported by the analysis results indicates that the
associated prediction was incorrect. It nevertheless lends additional support for the information
overload paradox idea. That is, volume of written
information processed on a daily basis, which
likely correlates highly with the total amount of
information processed daily, does not matter much
in terms of information overload perceived by the
individuals processing the information.
Put simply, the paradox entails the conclusion
that perceived information overload is more
strongly related to power distance than to the
volume of written information or number of information transactions processed by an individual. This paradoxical conclusion follows from the
above findings, and is likely to serve the basis for
further research, either with the goal of disproving
it, or to further our understanding of the information overload phenomenon. The conclusion suggests that our understanding of the phenomenon
is rather limited, and in dire need of expansion
and refinement.
The importance assigned to the above conclusion assumes that perceived information overload
is a good proxy for actual information overload,
given the data collection and analysis methods
employed in this study. While it is very likely that
perceived information overload is not the same
as actual information overload, it is reasonable to
conclude that the two variables are highly correlated, and that the negative effects of information
overload are often associated with perceptions of
information overload (Edmunds & Morris, 2000;
Eppler & Mengis, 2004; Evaristo, 1993). Actual,
as opposed to perceived, information overload is
difficult to measure objectively (Evaristo, 1993;
Kock, 2000).
While the information overload paradox does
go against much of the literature on information
overload, it is consistent with the belief that perceived pressure placed on an individual to perform
work-related tasks efficiently and effectively is
Table 4. Support for the hypotheses based on the results
Hypothesis
Supported?
H1: The volume of written information processed at work on a daily basis is significantly and positively related to
perceived information overload intensity.
No
H2: The number of information transactions taking place at work on a daily basis is significantly and positively
related to perceived information overload intensity.
Yes
H3: The amount of business process knowledge necessary to perform work well is significantly and negatively
related to perceived information overload intensity.
Yes
H4: Power distance is significantly and positively related to perceived information overload intensity.
Yes
172
The Information Overload Paradox
one of the main reasons why an individual experiences information overload (Kock, 2000; Schick
et al., 1990). Given this, one can reasonably infer
that perceived time pressure to accomplish workrelated tasks has a significant and negative impact
on the cognitive abilities of an individual, and
thus a similar impact on decision making quality.
As such, work-related pressure may be viewed
as having a relationship with decision making
quality that is similar to that described by the
information overload inverted U-curve (Eppler
& Mengis, 2004), but with the magnitude of the
effect amplified by power distance.
As far as the control variables are concerned,
one noteworthy result is that both males and females seem to experience information overload
equally. Also, the insignificant relationship between business process complexity and perceived
information overload is consistent with the significant and negative relationship between business
process knowledge and perceived information
overload. That is, given the latter relationship, one
would expect business process complexity to be
met with better preparation by workers in terms
of knowledge acquisition, and thus no related
increase in information overload.
Several of the results in connection with the
control variables go against much of the information overload literature. The insignificant
relationship between decision making style and
perceived information overload intensity goes
against Kock’s (2000) suggestion that decisional
scope (i.e., whether one focuses on details or the
big picture when making decisions) is significantly
associated with information overload. The insignificant relationship between economic sector and
perceived information overload intensity goes
against the notion that volume of information
processed affects information overload (Eppler &
Mengis, 2004), although in a somewhat indirect
way. The reason is that the amount of information processed in service organizations is generally considered to be significantly higher than
in manufacturing organizations (Davenport &
Prusak, 2000; Drucker, 1995). This insignificant
relationship is nevertheless consistent with the
other findings of this study.
MAIN LIMITATIONS
As mentioned earlier, the managers and professionals who provided the data for this study were
participating in executive education programs
in their respective countries at the time the data
were collected. Because of the nature of those
programs, as well as the recruitment approaches
employed, the vast majority of the participants
were probably long-term residents of and in many
cases native to the countries in which the data were
collected. However, this cannot be ascertained
for all of the participants because data about their
nationality were not collected. Arguably a variation in within-country nationality could have led
to corresponding within-country variability in
the answers provided by the participants. Given
that lower within-country variability in answers
would have generally led to stronger effects in
our model, it is safe to conclude that our main
findings do not have to be revised. Nevertheless,
future studies aimed at replicating the findings
of this investigation should include one or more
questions related to the respondent’s nationality. A
related limitation of this study is that the data does
not differentiate between bosses and subordinates,
nor contains specific details about each group.
CONCLUSION
The phenomena addressed through information
systems research often appear simple at first, only
to reveal inner complexities upon closer examination. The identification of paradoxical results is one
of the many ways in which research progress can
be achieved, and the complexity of information
systems phenomena unraveled (Pearlson & Saunders, 2001; Whitley & Darking, 2006). Underlying
173
The Information Overload Paradox
this study is the belief that information overload
is a complex and misunderstood phenomenon.
As such it needs to be investigated from different
perspectives, such as in investigations involving
different organizational cultures, and the various
results triangulated so that the multiple facets
of the phenomenon can be properly grasped. It
was assumed in this study that the nature of the
interaction between individuals in organizations
may significantly influence information overload.
Predictions were made here about information
overload that incorporate traditional as well as
nontraditional views of the phenomenon. Among
the nontraditional views is the one that certain
organizational cultures may incorporate unstated
rules of interaction that may lead to perceived pressures on individuals, which are in turn reflected
in information overload perceptions.
Contrary to predictions, the volume of written
information processed by the individuals was found
to be unrelated to perceived information overload
intensity experienced at work. The number of
information transactions and business process
knowledge were found to be significantly related
to perceived information overload intensity; the
former positively and the latter negatively related.
Power distance was found to be significantly
and positively related to perceived information
overload intensity. Surprisingly, this relationship
was found to be much stronger than the other
relationships, and its contribution to explaining
the variance of the variable perceived information overload was found to be greater than the
combined contribution of the other two significant
relationships. As for the control variables, none of
them was found to have a significant relationship
with perceived information overload intensity.
The findings of this study are paradoxical
in light of the existing research literature on
information overload, as well as in light of commonsense expectations. It is intuitive to assume
that the volume of information and number of
information transactions processed should be more
strongly related to information overload than any
174
other possible variable; this assumption follows
directly from the definition of information overload (Eppler & Mengis, 2004; O’Reilly, 1980).
Yet, this study found support for the notion that
perceived information overload is more strongly
related to power distance than to the volume of
written information and number of information
transactions processed by an individual. This
conclusion notion is referred to here as the information overload paradox.
The results of this study are counterintuitive
enough to serve as the basis for future research
that will not only replicate but expand on the current research. Hopefully that will lead to a more
comprehensive theoretical understanding of the
information overload phenomenon. Such understanding is very much needed, given information
overload’s increasing importance as a societal and
organizational phenomenon. The negative effects
of information overload on work productivity and
quality are primarily what make it an increasingly
important phenomenon. Nevertheless, a better
understanding of its underlying causes holds an
additional potential promise. That understanding
can also shed light on important mechanisms of
the human mind, which is still one of the most
mysterious and complex research realms.
ACKNOWLEDGMENT
The authors would like to thank the Spanish, Kiwi
and American managers and professionals who
participated in this study. Thanks are also due to
John Buchanan for his help in the collection of part
of the data used in this analysis, and for previous
discussions in connection with the information
overload phenomenon from a decision making
perspective.
The Information Overload Paradox
REFERENCES
Allen, D. K., & Shoard, M. (2005). Spreading
the load: Mobile information and communications technologies and their effect on information
overload. Information Research, 10(2) paper 227.
Retrieved from http://InformationR.net/ir/10-2/
paper227.html
Bawden, D., & Robinson, L. (2009). The
dark side of information: Overload, anxiety
and other paradoxes and pathologies. Journal of Information Science, 35(2), 180–191.
doi:10.1177/0165551508095781
Berghel, H. (1997). Cyberspace 2000: Dealing
with information overload. Communications of the
ACM, 40(2), 19–24. doi:10.1145/253671.253680
Bing, J. W. (2004). Hofstede’s consequences: The
impact of his work on consulting and business
practices. The Academy of Management Executive,
18(1), 80–88. doi:10.5465/AME.2004.12689609
Chin, W. W., Marcolin, B. L., & Newsted, P. R.
(1996). A partial least squares latent variable
modeling approach for measuring interaction
effects: Results from a Monte Carlo simulation
study and voice mail emotion/adoption study. In J.
I. DeGross, S. Jarvenpaa, & A. Srinivasan (Eds.),
Proceedings of the 17th International Conference
on Information Systems (pp. 21-41). New York,
NY: The Association for Computing Machinery.
Chung, J., & Tan, F. B. (2004). Antecedents of
perceived playfulness: An exploratory study on
user acceptance of general information-searching
websites. Information & Management, 41(7),
869–882. doi:10.1016/j.im.2003.08.016
Davenport, T., & Prusak, L. (2000). Working
knowledge. Cambridge, MA: Harvard Business
School Press.
Drucker, P. F. (1995). The information executives
truly need. Harvard Business Review, 73(1),
54–62.
Camerer, C. F., & Johnson, E. J. (1991). The
process-performance paradox in expert judgment.
In Ericsson, K. A., & Smith, J. (Eds.), Toward a
general theory of expertise (pp. 195–217). Cambridge, MA: Cambridge University Press.
Edmunds, A., & Morris, A. (2000). The problem
of information overload in business organisations:
A review of the literature. International Journal of Information Management, 20(1), 17–28.
doi:10.1016/S0268-4012(99)00051-1
Chervany, N., & Dickson, G. (1974). An experimental evaluation of information overload in a
production environment. Management Science,
20(10), 1335–1344. doi:10.1287/mnsc.20.10.1335
Ehremberg, A. S. C., & Goodhart, G. J. (1976).
Factor analysis: Limitations and alternatives.
Cambridge, MA: Marketing Science Institute.
Chiang, F. (2005). A critical examination of Hofstede’s thesis and its application to international
reward management. International Journal of
Human Resource Management, 16(9), 1545-1563.
Chin, W. W. (1998). Issues and opinion on structural equation modeling. Management Information
Systems Quarterly, 22(1), vii–xvi.
Chin, W. W. (2001). PLS-Graph user’s guide.
Houston, TX: Soft Modeling Inc.
Eppler, M., & Mengis, J. (2004). The concept of
information overload: A review of literature from
organization science, accounting, marketing, MIS,
and related disciplines. The Information Society,
20(5), 325–344. doi:10.1080/01972240490507974
Evaristo, R. (1993). An empirical investigation
of the impact of information characteristics and
information technology on individual information load. Ph.D. Dissertation. Minnesota, MN:
University of Minnesota.
175
The Information Overload Paradox
Foley, J. (1995, October 30). Managing information - infoglut - new tools can help tame an ocean
of data. InformationWeek, pp. 30-33.
Johnsson, J. (1991). Information overload: CEOs
seek new tools for effective decision making.
Hospitals, 65(20), 24–28.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. JMR,
Journal of Marketing Research, 18(1), 39–50.
doi:10.2307/3151312
Jones, Q., Ravid, G., & Rafaeli, S. (2004). Information overload and the message dynamics of online
interaction spaces: A theoretical model and empirical exploration. Information Systems Research,
15(2), 194–211. doi:10.1287/isre.1040.0023
Glazer, R., Steckel, J. H., & Winer, R. S. (1992).
Locally rational decision making: The distracting effect of information on managerial performance. Management Science, 38(2), 212–227.
doi:10.1287/mnsc.38.2.212
Kiley, K. (1995). The cyberspace database information overload. Catalog Age, 12(9), 56–59.
Hair, J. F., Anderson, R. E., & Tatham, R. L.
(1987). Multivariate data analysis. New York,
NY: Macmillan.
Hall, E. T. (1976). Beyond culture. Garden City,
NY: Anchor Press.
Hofstede, G. (1980). Culture’s consequences:
International differences in work-related values.
Beverly Hills, CA: Sage.
Hofstede, G. (1991). Cultures and organizations: Software of the mind. London, England:
McGraw-Hill.
Hofstede, G. (2001). Culture’s consequences:
Comparing values, behaviors, institutions, and
organizations across nations. Thousand Oaks,
CA: Sage.
Hunter, M. G. (2006). Experiences conducting
cross-cultural research. Journal of Global Information Management, 14(2), 75–89. doi:10.4018/
jgim.2006040104
Iselin, E. (1989). The impact of information
diversity on information overload effects in
unstructured managerial decision making. Journal of Information Science, 15(3), 163–174.
doi:10.1177/016555158901500304
176
Kline, R. B. (1998). Principles and practice of
structural equation modeling. New York, NY:
The Guilford Press.
Kock, N. (2000). Information overload: A
process-centered view. Knowledge and Process
Management, 7(4), 256–264. doi:10.1002/10991441(200010/12)7:4<256::AIDKPM79>3.0.CO;2-U
Kock, N., Del Águila-Obra, A. R., & PadillaMeléndez, A. (2009). The information overload
paradox: A structural equation modeling analysis
of data from New Zealand, Spain and the U.S.A.
Journal of Global Information Management,
17(3). doi:10.4018/jgim.2009070101
Lindgren, R., Henfridsson, O., & Schultze, U.
(2004). Design principles for competence management systems: A synthesis of an action research
study. Management Information Systems Quarterly, 28(3), 435–473.
Lippert, S. K., & Volkmar, J. A. (2007). Cultural
effects on technology performance and utilization:
A comparison of U.S. and Canadian users. Journal
of Global Information Management, 15(2), 56–90.
doi:10.4018/jgim.2007040103
Losee, R. M. Jr. (1989). Minimizing information
overload: The ranking of electronic messages.
Journal of Information Science, 15(3), 179–189.
doi:10.1177/016555158901500306
The Information Overload Paradox
Mani, R. (2007). Global mindset, Indian roots: The
experience of a small Indian company--application
of Hofstede scores. ICFAI Journal of Management
Research, 6(11), 20–31.
Mano, R., & Mesch, G. (2010). E-mail characteristics, work performance and distress. Computers
in Human Behavior, 26, 61–69. doi:10.1016/j.
chb.2009.08.005
Meyer, M. E., Sonoda, K. T., & Gudykunst, W.
B. (1997). The effect of time pressure and type
of information on decision quality. The Southern
Communication Journal, 62(4), 280–292.
Nunnally, J. C. (1978). Psychometric theory. New
York, NY: McGraw Hill.
Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory. New York, NY: McGraw-Hill.
O’Reilly, C. A. (1980). Individuals and information overload in organizations: Is more necessarily
better? Academy of Management Journal, 23(4),
684–696. doi:10.2307/255556
Pearlson, K. E., & Saunders, C. S. (2001). There’s
no place like home: Managing telecommuting paradoxes. The Academy of Management Executive,
15(2), 117–129. doi:10.5465/AME.2001.4615008
Robert, L. P., & Dennis, A. R. (2005). Paradox
of richness: A cognitive model of media choice.
IEEE Transactions on Professional Communication, 48(1), 10–21. doi:10.1109/TPC.2004.843292
Rosenthal, R., & Rosnow, R. L. (1991). Essentials of behavioral research: Methods and data
analysis. Boston, MA: McGraw Hill.
Schick, A. G., Gordon, L. A., & Haka, S. (1990).
Information overload: A temporal approach.
Accounting, Organizations and Society, 15(3),
199–220. doi:10.1016/0361-3682(90)90005-F
Schultze, U., & Vandenbosch, B. (1998). Information overload in a groupware environment: Now
you see it, now you don’t. Journal of Organizational Computing and Electronic Commerce, 8(2),
127–148. doi:10.1207/s15327744joce0802_3
Sivakumar, K., & Nakata, C. (2001). The stampede toward Hofstede’s framework: Avoiding
the sample design pit in cross-cultural research.
Journal of International Business Studies, 32(3),
555–574. doi:10.1057/palgrave.jibs.8490984
Søndergaard, M. (1994). Research note-Hofstede’s
consequences: A study of reviews, citations, and
replications. Organization Studies, 15, 447–456.
doi:10.1177/017084069401500307
Speier, C., Valacich, J. S., & Vessey, I. (1997).
The effects of task interruption and information presentation on individual decision
making. Decision Sciences, 30(2), 337–360.
doi:10.1111/j.1540-5915.1999.tb01613.x
Teo, T. S. H. (2007). Organizational characteristics, modes of Internet adoption and their impact:
A Singapore perspective. Journal of Global Information Management, 15(2), 91–117. doi:10.4018/
jgim.2007040104
Thompson, B. (2004). Exploratory and confirmatory factor analysis: Understanding concepts and
applications. Washington, DC: American Psychological Association. doi:10.1037/10694-000
Toffler, A. (1970). Future shock. New York, NY:
Bantam Books.
Turetken, O., & Sharda, R. (2004). Development
of a fisheye-based information search processing
aid (FISPA) for managing information overload
in the Web environment. Decision Support
Systems, 37(3), 415–434. doi:10.1016/S01679236(03)00047-2
177
The Information Overload Paradox
Waarts, E., & van Everdingen, Y. M. (2006).
Fashion retailers rolling out across multicultural Europe. International Journal of Retail
& Distribution Management, 34(8), 645–657.
doi:10.1108/09590550610675958
Wainfan, L., & Davis, P. K. (2004). Challenges in
virtual collaboration: Videoconferencing, audioconferencing and computer-mediated communications. Santa Monica, CA: RAND Corporation.
Whitley, E. A., & Darking, M. (2006). Object lessons and invisible technologies. Journal of Information Technology, 21(3), 176–184. doi:10.1057/
palgrave.jit.2000065
178
ENDNOTE
This chapter builds upon the ideas first
presented in Kock, N., Del Águila-Obra,
A.R., Padilla-Meléndez, A. (2009). The
Information Overload Paradox: A Structural
Equation Modeling Analysis of Data from
New Zealand, Spain and the U.S.A., Journal
of Global Information Management, 17(3),
1-17.
179
Chapter 9
The Influence of Organizational
Communication Openness
on the Post-Adoption
of Computers:
An Empirical Study in Saudi Arabia
Said S. Al-Gahtani
King Khalid University, Saudi Arabia
Hung-Pin Shih
Hsuan Chuang University, Taiwan
ABSTRACT
This study adopts social identity theory (SIT) to examine the post-adoption of computers using a research model that extends the theory of planned behavior (TPB) with two organizational cultural factors. Individual attitudes toward using computers and perceived behavioral control are TPB personal
factors, while subjective norms can be viewed as the social factor. Empirical findings from 400 Arab
end-users show that openness to superior-subordinate relationships (reducing organizational boundaries)
significantly influences current computer usage only through personal factors. In contrast, openness to
superior-subordinate relationships significantly influences continued use of computers through personal
and social factors. However, openness to work communication (reducing communicative boundaries)
does not significantly influence either current computer usage or continued use of computers through
TPB beliefs. The implications for research and practice, and the limitations of this study, are discussed
accordingly.
DOI: 10.4018/978-1-60960-605-3.ch009
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
INTRODUCTION
An important issue in innovation diffusion is
whether the usage behavior of information technologies (IT) in less developed countries is similar to that in industrialized countries (Berkhart,
Goodman, Mehta, & Press, 1998; Brown, Hoppe,
Mugera, Newman, & Stander, 2004; Goodman &
Green, 1992; Loch, Straub, & Kamel, 2003; Zhao,
Kim, Suh, & Du, 2007). The diffusion (adoption
and use) of IT in Arab society is a good example
for addressing this question. According to Rogers
(1995), the diffusion of IT generally starts from
industrialized countries such as those of North
America or Western Europe, and then expands
across less developed countries such as Arab nations. Therefore, this study addresses whether a
well-developed theory based on Western contexts
can explain the adoption and use of IT in Arab
society. Cultural differences or cultural boundaries
might cause inconsistent findings of IT diffusion
between industrialized and less developed countries. Rose and Straub (1998) applied rationalization processes to explain the adoption and use
of IT in the Arabic context. However, Elbeltagi,
McBride, and Hardaker (2005), in a survey of Arab
senior managers, found that although some organizational factors (e.g., top management support
and organizational characteristics) may facilitate
IT adoption, others (e.g., task and environmental
characteristics) may inhibit user acceptance of IT,
even where the IT was considered user-friendly
in the adoption process. Rationalization processes
cannot completely explain these findings. In contrast, an emerging cultural influence school adopts
social processes and social influence to explain
IT diffusion and transfer in the Arabic context
(Loch, Straub, & Kamel, 2003; Straub, Loch, &
Hill, 2001). Although the cultural influence on IT
diffusion in Arab nations is now being increasingly
addressed, no generalized theory yet exists to
explain user behavior in organizational contexts.
The impact of cultural factors, such as socialpolitical control, on the common bond of computer
180
use in Arab society cannot be ignored (Goodman & Green, 1992). A cultural boundary (bias)
is likely to create cultural and social obstacles
for less developed countries in transferring IT
into practice. As the cultural boundary between
Western and non-Western countries affects the
success of IT transfer, the perceived boundary
within groups or among users may drive personal
computer usage for coordination and communication at work. Socio-cultural factors, such as social
class and degree, create cultural boundaries that
may support or impede the transfer of IT from
non-Arab to Arab cultures (Hill, Loch, Straub, &
El-Sheshai, 1998). In particular, the hierarchical
structure of Arab society is likely to strengthen
the strong “identification” perception among Arab
people. Cultural influence implies that people
often perceive social identification in terms of
their interaction with others. The social identity
theory (SIT) is a well-developed theory of the
influence of culture on IT usage (Straub, Loch,
Evaristo, Karahanna, & Strite, 2002), employed
in both Western (Gefen & Ridings, 2003) and
non-Western (Gefen, Rose, Warkentin, & Pavlou,
2005) contexts.
Kluckhohn and Strodbteck (1961) defined
culture as the shared beliefs and values that
simultaneously drive desirable and undesirable
behaviors in a society. Hofstede (1980) defined
culture as “the collective programming of the
mind which distinguishes the members of one
human group from another” (p. 21). Tichy (1983)
argued that culture is often implicit, implying
that individuals are not aware of its influences
as they are of political and technical dynamics.
In summary, culture is a multi-faceted concept
connecting nations, societies, and organizations
(Gallivan & Srite, 2005). Whereas Hasan and Ditsa
(1999) addressed the influence of cultural identity
and values on IT adoption, this study finds that
organizational culture is more likely than national
or social cultures to influence computer adoption
and use by office workers in the workplace. Organizational culture refers to the common norms
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
and values that are accepted and followed by the
majority of members of an organization (Kats &
Kahn, 1978). Moreover, organizational culture
acts as a “filter” that embeds shared history and
experience to distinguish between members and
non-members of an organization (Weber & Pliskin,
1996). Organizational culture is conceptualized
in terms of specific norms, values, assumptions,
and social structures to shape members’ beliefs
and behaviors in organizations (Gallivan & Srite,
2005). Thus, organizational culture often drives
the formation of social beliefs and norms regarding individual behaviors, such as IT adoption and
use in a specific organizational context (Davison
& Martinsons, 2003).
The globalization of business has highlighted
the need to understand computer applications that
span different nations (Niederman, Boggs, & Kundu, 2002; Shin, Ishman, & Sanders, 2007). Multinational and trans-cultural organizations have a
growing need to apply IT to achieve economies of
scale, coordinate global operations, and facilitate
collaborative work across distributed locations and
diverse cultures (Ives & Jarvenpaa, 1991). The
globalization of IT means that cultural differences
in user evaluations of information systems significantly influence the post-adoption of computers.
Cultural differences, rather than technological
benefits, determine the success of adoption and
implementation of information systems (Png, Tan,
& Wee, 2001; Straub, Keil, & Brenner, 1997).
For research communities, this study extends an
existing well-developed theory based on Western
cases by incorporating organizational culture to
assess the post-adoption of computers by Arab endusers in the workplace. Both user acceptance and
continuance must be considered, because they are
both important measures for assessing the success
of IT implementation (DeLone & McLean, 2003).
For practitioners, multinational and trans-cultural
enterprises could apply the findings of this study to
help them understand how organizational cultures
can motivate/inhibit Arab end-users to adopt and
continue using computers at work.
TECHNOLOGICAL VERSUS
SOCIAL VIEWS
Many previous studies of IT tend to assess end-user
behavior in the technology-orienting countries
(Ein-Dor, Segev, & Orgad, 1992). For instance,
drawing upon the “theory of reasoned action
(TRA)” (Fishbein & Ajzen, 1975), Davis (1989)
proposed a technology acceptance model (TAM)
to predict the adoption of new IT. TAM defines
perceived usefulness (PU) and perceived ease
of use (PEOU) as the two major rational beliefs
that influence the adoption of IT. To examine the
influence of culture on IT adoption, a series of
TAM-related studies based on Hofstede’s work
was conducted across industrialized and less developed countries (Elbeltagi, McBride, & Hardaker,
2005; Gefen, Rose, Warkentin, & Pavlou, 2005;
Straub, 1994; Straub, Keil, & Brenner, 1997;
Veiga, Floyd, & Dechant, 2001). For instance,
Straub (1994) adopted Hofstede’s uncertainty
avoidance and TAM beliefs to examine the diffusion process of e-mail and fax in the U.S. and
Japan. Straub, Keil, and Brenner (1997) found that
culture affects e-mail use differently in U.S. and
Japanese companies. Japanese office workers view
e-mail as a poor communication medium, because
of the high uncertainty of carrying messages in
their social interactions. In contrast, American
workers perceive e-mail as a useful medium for
improving work productivity. Rose and Straub
(1998) examined IT use in the Arabic world using
TAM beliefs, noted that over-emphasis on rational
factors based on technological viewpoints, such
as TAM beliefs, may lead to a cultural backlash
rather than cultural acceptance. Although social
influences (e.g., social presence and social identification) on IT adoption are important, few studies
have examined the social process of IT diffusion in
less developed countries. As noted by Mathieson
(1991), TAM does not explicitly include social
factors for predicting IT usage in organizations.
Thus, a new direction to address the influence of
“social norms” on Internet diffusion in the Arab
181
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
world has been widely discussed recently (Loch,
Straub, & Kamel, 2003). TAM was originally
developed to assess the adoption of computers
underlying an individual-oriented context, but
not the diffusion of computers in a social-oriented
context, such as the Arab society. In contrast to
previous studies of IT adoption based on rational
beliefs (e.g., PU and PEOU), this study focuses
simultaneously on assessing personal and social
influences on the post-adoption of computers by
Arab end-users.
CULTURE AND IT DIFFUSION
IN THE ARAB SOCIETY
Arabs are heavily attached to each other by family
bonds and obligations, limiting their geographic
and occupational mobility (Palmer, Al-Ghofaily,
& Alnimir, 1984). Hill et al. (1998) contend that
Arab culture is not a monolithic structure or a
mosaic of peoples, but a complex system that is
always changing. They suggest that Arab culture
and history, while selectively borrowing ideas
and materials from the west, is an independent
complex system infused with contradictions and
opposing forces. In summary, Arab culture seems
to exert a stronger social influence than Western
culture on its society through the development of
social norms and beliefs.
Hofstede (1980, 1991) initially defined national culture in four dimensions, namely uncertainty avoidance, individualism, masculinity, and
power distance. Uncertainty avoidance denotes the
level of tolerance for uncertainty and ambiguity
within the society. Individualism is the degree to
which the society reinforces individual or collective achievement and interpersonal relationships.
Masculinity is the degree to which “masculine”
values, like assertiveness, performance, success,
and competition, prevail over “feminine” values,
including quality of life, maintaining warm personal relationships, service, caring, and solidarity.
Power distance refers to the degree of equality or
182
inequality among people in the society. As noted
by Hofstede (1991), Arab culture is characterized
by more uncertainty avoidance and power distance
than American culture, but less individualism and
masculine values. In comparison, Arab society is
a social-oriented culture, unlike the individualoriented culture prominent in the USA and other
Western countries. In addressing the interaction
between organizational culture and IT from the
social identity perspective (Tajfel, 1978), Gallivan
and Srite (2005) argue that in-group relationships
among members would initially cause fragmented
and differentiated interpretations of their identities, which would finally shape their beliefs and
behaviors of IT in the cognitive process.
Although Saudi organizational leaders regard
computers as signs of modernization and automation compared with manual practice, many of their
systems are incompatible with each other (Abdul
Ghani & Al-Sakran, 1988; Atiyyah, 1989). Most
users have not been aware of this incompatibility,
or are unwilling to accept it. Such problems are
compounded by fear of and alienation from computers, especially among some Saudi executives
(Yavas, Liqmani, & Quraeshi, 1992). In facing
the impact of new IT from Western countries, the
top executives may worry about lack of control
over their political and economic benefits, and
the threat from Western values to the existing
Arab society. Saudi Arabia is a rather culturally
conservative society, where Islamic teachings
and Arab cultural values are dominant. The
country plays vital political and economic roles
for Arabs and Muslims all over the world. Saudi
Arabia has tried to balance modernization with
its Islamic identity. Al-Farsy (1996) assessed the
progress of technological development including
IT in Saudi Arabia, and provided an overview of
the most ambitious development program in the
history of the country, thus setting Saudi Arabia
in a global political and economic context. He
described how rapidly progress has been achieved
without diminishing the distinctive Islamic identity of a country that employs the Quran as its
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
constitution. In summary, Arab social and cultural
characteristics define organizational culture, and
call for a survey of their roles as driving forces
in IT adoption.
IT adoption in Saudi Arabia is influenced by explicit government policy in the attempt to enhance
national and organizational productivity. Saudi
Arabia occupies an area of 2.15 million square
kilometers, with a population estimate of 24.07
million, and Saudi Internet users were estimated to
number 4.7 million in 2007 (Internet World Stats,
2007). The ratio of PCs per 1,000 persons in 2005
was increased to 354 (World Bank Group, 2007).
Furthermore, Saudi Arabia ranks third among the
22 Arab Nations in total IT market penetration.
Thus, some observers are expecting strong growth
in the Saudi IT market for the foreseeable future.
To enhance computer acceptance and diffusion, the
government has implemented a motivation policy
offering a bonus of 25% of basic salary to Saudi
nationals who are specialists in IT or have careers
in computers. The advent of the Internet, and the
impetus from high authority toward e-commerce
and e-government, are essential catalysts for individuals and organizations toward IT adoption for
their competitive advantage. However, religious
values and political environments still implicitly
control Arab society, and govern the development
of organizational culture.
RESEARCH MODEL
TPB Beliefs
Based on TRA (Fishbein & Ajzen, 1975), Ajzen
(1985) proposed the theory of planned behavior
(TPB) to predict goal-directed human behavior.
According to TPB (Ajzen, 1985; Ajzen & Madden,
1986; Ajzen, 1991), an individual’s behavior is
determined by his or her behavioral intention (BI)
to perform it. The BI is determined by individual
attitudes (A) toward behavior, subjective norms
(SN) and perceived behavioral control (PBC).
Additionally, PBC is another determinant of
behavior. From TPB, BI refers to the subjective
probability that a person will perform a particular
behavior in the near future (Fishbein & Ajzen,
1975, p. 12). Attitude is considered as a personal
(or “attitudinal”) factor, and denotes “a person’s
general feeling of favorableness or unfavorableness toward some stimulus object” (Fishbein &
Ajzen, 1975, p. 216). Subjective norms, that is,
the social (or “normative”) factor, refers to “the
person’s perception that most people who are
important to him think [that] he should or should
not perform the behavior in question” (Fishbein
& Ajzen, 1975, p. 302). Perceived behavioral
control, which is a personal factor, refers to “[a]
person’s belief as to how easy or difficult [the]
performance of the behavior is likely to be” (Ajzen
& Madden, 1986, p. 457). TPB encompasses those
personal and social factors that are particularly
suited to assessing the adoption and use behavior
of computers underlying a social-oriented culture.
Thompson, Higgins, and Howell (1991) argued
that BI should be excluded if actual behavior (system usage) has taken place. Thus, this study applies
TPB beliefs to predict end-users’ current usage
(i.e., adoption) and continued use (i.e., adoption
confirmation) of computers at work by omitting
the BI construct in accordance with our study
and survey context (Figure 1). In explaining the
association between attitude toward a particular
behavior and the behavior, this study focuses on
the attitudinal process in human behavior. In the
course of a person’s attitude formation, attitude is
determined by salient beliefs about the behavior
of interest (e.g., behavioral beliefs) and outcome
evaluations (Ajzen, 1985; Ajzen & Madden, 1986).
When a person believes that his or her behavior
leads to a particular outcome of interest, he or she
wishes to take real action and continue for it. This
attitude-usage link has been found by Thompson,
Higgins, and Howell (1991) and Davis (1993),
while the link between attitude and continued
use can be deduced similar to the link of attitude
with current use behavior. Regarding the adoption
183
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Figure 1. Research model
and use of computers by Arabic end-users, this
study posits that:
H1a: An individual’s attitude toward computer
use positively affects his or her current use
of computers.
H1b: An individual’s attitude toward computer
use positively affects his or her continued
use of computers
In addressing the association between subjective norms and behavior, this study focuses on the
normative formation underlies human behavior.
The social factor (i.e., subjective norms) is determined by the normative expectations of relevant
referents (e.g., normative beliefs) and the motivation to comply with the referent (Ajzen, 1985;
Ajzen & Madden, 1986). People who believe that
most important referents think they should or
should not perform a particular behavior would
feel pressure to comply with these referents. Arab
office workers under social-oriented contexts are
easily influenced by social norms or values from
colleagues in the adoption and use of computers.
Thus, TPB beliefs, such as subjective norms, are
more suitable than TAM beliefs (e.g., PU and
PEOU) for assessing the post-adoption of comput-
184
ers by Arabic end-users. That is, Arabic end-users
who tolerate the influence of subjective norms
would use computers and continue the behavior
at work. An association between subjective norms
and usage has been found (Thompson, Higgins, &
Howell, 1991; Thompson & Rose, 1994), while
the link between subjective norms and continued
use is logically reasonable and innovatively hypothesized in this study for examination. Thus,
this study posits that:
H2a: Subjective norms positively affect an individual’s current use of computers.
H2b: Subjective norms positively affect an individual’s continued use of computers.
PBC refers to a person’s perception of the
presence or absence of requisite resources and
opportunities to perform the behavior of interest
(Ajzen & Madden, 1986). This behavioral control
belief is determined by internal factors, such as
personal skills, abilities, and knowledge, as well
as external factors, such as resources and opportunities required in performing goal-directed
behaviors. In summary, PBC is a function of
the products of control beliefs about available
resources and opportunities, and the perceived
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
facilitation of resources and opportunities for
achieving outcomes. Thus, TPB argues that PBC
is a key determinant of actual behavior (Ajzen
& Madden, 1986; Ajzen, 1991). People who are
confident that they can control computer applications at work are likely to use the computer, and
continue to use them. The PBC-usage link has
been identified from empirical support (Taylor &
Todd, 1995), while the PBC-continued use link
tends to be valid for experienced end-users. Two
hypotheses based on TPB have been proposed for
examining computer adoption and use behavior
in an Arab context:
H3a: Perceived behavioral control positively
affects an individual’s current use of computers.
H3b: Perceived behavioral control positively
affects an individual’s continued use of
computers.
SIT and Organizational
Communication
SIT explains how people perceive their belonging
to groups based on their recognition of self-identity
(Tajfel, 1978). Self-identity refers to a person’s
perception of self-identification as part of the same
group as others (in-group), or not as a member of
the group (out-group). SIT adopts personal and
social identity to address inter-group relationships
in social categorizations (Tajfel & Turner, 1979;
Turner, 1982). Personal identity tells people their
self-identity within groups, while social identity
defines their memberships of certain groups.
According to SIT, in-group members are more
likely to share values, and to have similar beliefs
and consistent behaviors. In contrast, out-group
members are less likely to generate close perceptions of thinking and acting.
Social categorization is a self-identification
process to create inter-group boundaries, and thus
shape members’ values, attitudes, and behaviors.
Inter-group boundaries often exist among IT us-
ers from different departments, who have distinct
views about the application of IT at work. Intergroup boundaries often increase the time and
costs of work, impeding cross-group members
from cooperating and communicating with others. Therefore, this study extends the concept of
inter-group boundaries to address how to reduce
organizational and communicative boundaries in
social interactions (Tushman & Scanlan, 1981).
Organizational boundaries often exist in the
categorization process, but can be reduced when
individuals identify their “in-group” relationships
with others. In contrast, organizational boundaries
can be increased when individuals perceive their
“out-group” relationships with others. People
tend to have inconsistent or conflict rationality
boundary owing to gaps in their knowledge and
competency. The categorization process thus involves two opposite scenarios. From the positive
viewpoint, people can reduce their communicative
boundaries to achieve effective coordination and
communication by expanding their in-group memberships with others. From the negative viewpoint,
people can increase their communicative boundaries to impede valuable information from crossing
benefit-conflict departments by expanding their
out-group memberships with certain groups. In
social identification process, re-categorization and
de-categorization are two effective methods for
reducing boundaries (Brown, 1996). Re-categorization places out-group members into an extended
in-group. Thus, all members have common goals,
reducing organizational boundaries across groups.
De-categorization emphasizes the interaction of
members in joint activity, so that they can easily
share values and perceptions with others, which
reduces communicative boundaries across groups.
Organizational culture has been found to influence IT adoption and use behaviors via personal
or social factors (Kedia & Bhagat, 1988). Thus,
this study applies SIT to explain the potential
influence of organizational culture, and how it
is related to individuals’ beliefs and behaviors
regarding computers in the workplace. Arab
185
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
office workers under social-oriented contexts
would have an organizational culture different
from American office workers, whose beliefs and
behaviors are formed under individual-oriented
contexts, particularly in the context of organizational communication (Goodman & Green, 1992).
Regarding the use of computers for office information or communication, this study focuses on
using openness in organizational communication
to approach organizational culture. Beyond the
concept of organizational proximity in addressing
the effective use of communication technologies
(Monge, Rothman, Eisenberg, Miller, & Kirste,
1985), openness is an appropriate measure for
assessing organizational structures and communication networks at virtual offices, particularly
in a social-oriented context.
Eisenberg and Witten (1987) described
openness in three different ways. First, openness is treated as personal disclosure to support
superior-subordinate relationships. Second,
openness is considered as the free flow of taskrelated, non-personal information for effective
organizational communication. Third, openness
refers to clear and unambiguous communication
in language. In approaching the culture around
organizational communication, this study assumes
that all members under a social-oriented context
would use and can use the same language at work,
thus significantly alleviating the concern of communication ambiguity. This study thus defines
the openness of organizational communication
in terms of (1) openness to superior-subordinate
relationships (OSSR) and (2) openness to work
communication (OWC). Openness to superiorsubordinate relationships can be employed in
the re-categorization to assess the intensity of
interactions among members across organizational
boundaries. The influence of an open organization has been addressed in the literature (Steele,
1975). An open organizational structure with
mutual respect and trust relationships could help
members reduce organizational boundaries, and
easily strengthen their relationships with others.
186
Openness to superior-subordinate relationships
encourages in-group members, such as managers
and subordinates, to strengthen their interactions
by creating an integral family-like bond in the recategorization process, leading them to have favorable self-assessment on common goals. In-group
members who work under an open organization
with mutual respect and trust relationships tend
to have positive attitudes toward using computers
to achieve common goals. Thus, the following
link between openness to superior-subordinate
relationships and attitude toward using computers is posited:
H4a: Openness to superior-subordinate relationships positively affects individual attitudes
toward using computers.
In the de-categorization, openness to work
communication can be employed to assess information flows across communicative boundaries.
Openness to work communication helps in-group
members to create an appropriate work context
to ‘fit’ the de-categorization process and support
their self-enhancement of thoughts and actions
in social processes. According to SIT (Tajfel &
Turner, 1979; Turner, 1982), openness to work
communication expands in-group members’ social identities, thus reducing their communicative
boundaries through interaction with others. An
open communicative context with well-defined
rules, cooperation, and shared values not only
motivates in-group members to develop cohesive
memberships, but also encourages them to form
positive attitudes toward using computers for
communication. The positive association between
openness to work communication and attitude is
thus hypothesized as follows:
H4b: Openness to work communication positively
affects individual attitudes toward using
computers.
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Although unable to see culture, individuals can
strongly feel cultural constraints on their thoughts
and actions in daily life. In a social-oriented context
such as Arab society, organizational culture often
guides individual behavior via shared values or
beliefs (Eisenberg & Riley, 1991; Geertz, 1973).
Islam is the dominant religion among all social
groupings, and sets constraints on beliefs and
actions in Arab society. The use of Islam as the
major organizing principle for Arab thoughts and
actions has been criticized. For instance, Hill et
al. (1998) concluded that the influence of Islam is
always changing as people “practice” their daily
life. This can be a creative force that negotiates
the meaning of Arab’s actions, while simultaneously forming the basis for transformation of their
beliefs. Owing to the differences between Arab
culture and Western culture, human behavior in
Arab organizations is more suited to be explained
through cultural characteristics and cultural constraints. Generally, similar cultural characteristics
lead individuals to identify their in-group memberships; while different cultural constraints lead
them to perceive their out-group memberships in
the categorization process. Sub-cultural factors,
such as openness to superior-subordinate relationships, are often infused with major cultural
characteristics, such as religious values. These
factors influence individuals’ thoughts and actions, particularly in a social-oriented context
like Arab society. Straub et al. (2002) argue that
cultural similarity enables in-group members to
have proactive psychological process in social
categorization, enabling them to rely on “referent norms” to guide their behaviors. An open
organization can weaken the impact from cultural
constraints to reduce inter-group boundaries in
the re-categorization process. In-group members
with high similarity of cultural characteristics and
low difference of cultural constraints would easily
develop consistent perception to group norms. An
open organization facilitates the development of
group norms, such as consistent normative ex-
pectations and motivations when using computer
applications. Thus, this study posits that:
H5a: Openness to superior-subordinate relationships positively affects an individual’s
subjective norms regarding computer use.
Culture represents the actions, practices, stories, and artifacts in human behaviors (Eisenberg
& Goodall, 1998). The culture of an organization
can be developed by constructing it symbolically
around human interactions with the environment.
Organizational culture thus evokes its social
influence on the beliefs and actions of members
when they try to interpret the meanings of symbolic constructions in communication processes.
Cultural constraints often become barriers when
in-group members try to reduce communicative
boundaries by touting out-group members to join
the same group. According to an extended view
of Triandis’ (1972) subjective culture, openness
to work communication facilitates Arab end-users
to create similar patterns of thinking and understanding about the role of IT in organizations, as
well as to approach a consensus on well-defined
rules, cooperation and shared values for interpreting information in computer applications. Thus,
in-group members under an open communication
context are most likely to achieve consensus on
group norms, and to take it as the “referent” for
guiding their behaviors. This study extends the
subjective culture concept to predict the adoption and use of computers by Arab end-users by
positing that:
H5b: Openness to work communication positively
affects an individual’s subjective norms
regarding computer use.
In contrast to the pre-Internet era, the diffusion
of the Internet enables Arab culture to become
more “open” in a rapidly growing information
society than in the past, because Arab end-users
have more opportunities to access a wealth of
187
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
information in the internalization environment.
Thus, the increasing openness in current IT context reduces the formalization and centralization
of work, thus increasing the positive personal
and social beliefs of Arab end-users concerning the adoption and use of computers for work
productivity. Considering cultural constraints on
control beliefs and perceived facilitation, an open
organization would enable in-group members
to develop flexible institutional-based rules to
reduce their conflicts in values, beliefs, and behaviors (Eisenberg & Goodall, 1998). Openness
to superior-subordinate relationships drives ingroup members to build flexible institution-based
memberships in group interactions, so that they
can easily adjust themselves to fit the environment.
The congruence between the expected values
of an in-group and the organizational culture
creates a “person-culture fit” in the cooperation
and coordination process with others (O’Reilly,
Chatman, & Caldwell, 1991). In-group members
can control their actions for particular outcomes,
provided that their interactions are constituted
under an open organization with high levels of
“person-culture fit.” Thus, this study posits that:
H6a: Openness to superior-subordinate relationships positively affects an individual’s
perceived behavioral control regarding
computer use.
Openness to work communication could help
in-group members to build interpersonal trust
around them. Beyond the parallel argument of
trust-control (Das & Teng, 1998), this study considers confidence-control instead of trust-control
as the causal association for two reasons. First,
personal confidence enables in-group members
to trust the abilities of others (Mayer, Davis, &
Schoorman, 1995). Second, personal confidence
leads in-group members to trust strong support
from others (Mayer, Davis, & Schoorman, 1995).
The development of confidence relies on an open
communicative context that facilitates individuals
188
to believe in their personal control over computer
applications in the workplace. The causal link
between openness to work communication and
PBC can thus be hypothesized as follows:
H6b: Openness to work communication positively
affects an individual’s perceived behavioral
control regarding computer use.
METHODOLOGY
Data Collection
A list of governmental ministries with their
branches and major companies in the main four
provinces of Saudi Arabia was collected with the
aid of the Chamber of Commerce in each region.
A letter was sent to each of the 136 private and
public organizations across the country seeking
their participation in the study. Those organizations that accepted the invitation to participate
were asked to nominate a contact person to liaise
in distributing and collecting the paper-and-pencil
questionnaires. Through that procedure, 1,900
end-users were surveyed at offices, and 1,190 usable responses were obtained, achieving a response
rate of 62.63%. Participants in this study were
end-users from 56 private and public organizations in Saudi Arabia. The participating organizations were distributed throughout the country
and represented various types of institutions such
as banking, merchandizing, manufacturing, and
petroleum industries, as well as educational,
health, and public services. Based on one rule of
thumb, a sample size with at least ten times (the
number of measurement items + the number of
hypothesized links) is required to analyze both
measurement and structural models simultaneously (Muthén & Muthén, 2002). Table 1 shows
400 participants were randomly selected out of
the 1190 responses for examining the research
model in order to relax some concerns on statistical outputs from a large sample.
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Table 1. Profile of the participants (N=400)
Characteristics
Statistics
Gender
Male: 316 (79%)
Female: 84 (21%)
Age
18-30
31-40
41-50
51 or more
Mean = 38.2 Years, Range 18-58 Years
155 (38.75%)
171 (42.75%)
67 (16.75%)
7 (1.75%)
Saudi/Non-Saudi
Saudi: 366 (91.5%)
Non-Saudi: 34 (8.5%)
Education levels
€€€Less than High School
€€€High School
€€€Some College
€€€College Graduates
22 (5.5%)
64 (16%)
100 (25%)
214 (53.5%)
Instrument Development
As shown in Appendix A, openness to superiorsubordinate relationships and openness to work
communication were measured based on Eisenberg and Witten (1987). Attitude, subjective norms
and perceived behavioral control were measured
using Mathieson’s (1991) scales. Current and
continued usages are two good measures used to
assess the success of implementing an innovation,
particularly in the process from adoption decision to adoption confirmation (Rogers, 1995).
Current usage was measured using the four-item
scale proposed by Igbaria, Guimaraes, and Davis
(1995) to meet computer use context, covering (1)
perceived daily use of computers, (2) perceived
frequency of computer use, (3) the number of
computer applications used by participants and
(4) the number of business tasks supported by the
computer. Continued use was measured in terms
of the willingness and the possibility of using
computers for work in the near future.
Data Analysis
A structural equation modeling tool, partial least
squares (PLS), was used to examine the proposed
research model (Chin, 2001). PLS-Graph was em-
ployed to simultaneously assess the psychometric
properties of the measurement model, including
the reliability and validity of all constructs, and to
estimate the parameters of the structural model,
including the strength of the path relationships
among research constructs (Fornell, 1982; Lohmoller, 1989).
RESULTS
Measurement Model
This study assessed measurement validity in terms
of unidimensionality, reliability, and construct
validity. Table 2 shows that all observed indicators intended to measure the same latent construct
exhibited higher factor loadings (i.e., more than
0.7) on the posited correspondent construct than
on other constructs (Yoo & Alavi, 2001), indicating that the unidimensionality of each construct
was achieved. Table 3 shows that the composite
reliability of the seven constructs ranged between
0.78 and 0.96, exceeding the threshold of 0.7
recommended by Nunnally (1978). The AVEs of
all constructs exceeded 0.5 (Fornell & Larcker,
1981), indicating that the measurement model
exhibited satisfactory convergent validity. From
189
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Table 2. Analysis of unidimensionality (factor loadings (bolded) and cross loadings)
Items/Factor
Current
Use
Continued
Use
Attitude
SN
PBC
OSSR
OWC
CURNTUSE1
0.80
0.44
0.26
0.12
0.21
0.12
0.10
CURNTUSE2
0.78
0.35
0.32
0.06
0.23
0.17
0.11
CURNTUSE3
0.78
0.45
0.24
0.08
0.27
0.19
0.17
CURNTUSE4
0.70
0.36
0.26
0.07
0.26
0.26
0.14
CONTUSE1
0.27
0.85
0.28
0.28
0.41
0.28
0.21
CONTUSE2
0.61
0.79
0.31
0.18
0.34
0.26
0.21
ATT1
0.31
0.32
0.90
0.13
0.27
0.28
0.23
ATT2
0.33
0.34
0.91
0.12
0.34
0.27
0.17
ATT3
0.33
0.32
0.91
0.10
0.33
0.29
0.22
ATT4
0.33
0.33
0.89
0.09
0.28
0.23
0.23
ATT5
0.29
0.29
0.89
0.07
0.30
0.26
0.23
SN1
0.12
0.28
0.11
0.95
0.24
0.19
0.17
SN2
0.12
0.26
0.08
0.96
0.22
0.18
0.15
SN3
0.07
0.25
0.12
0.91
0.21
0.24
0.21
PBC2
0.11
0.30
0.24
0.12
0.74
0.18
0.19
PBC3
0.36
0.41
0.25
0.21
0.80
0.11
0.07
PBC4
0.17
0.27
0.26
0.18
0.70
0.25
0.20
OSSR1
0.22
0.30
0.28
0.20
0.17
0.81
0.54
OSSR2
0.22
0.28
0.25
0.14
0.19
0.85
0.53
OSSR3
0.16
0.23
0.18
0.18
0.21
0.78
0.50
OWC1
0.21
0.24
0.23
0.18
0.24
0.57
0.87
OWC2
0.12
0.21
0.21
0.14
0.12
0.58
0.90
OWC3
0.11
0.22
0.20
0.18
0.13
0.56
0.89
Note: PBC1 loaded weakly and was discarded from final analysis
Table 4, the square root of the AVE for each
construct exceeded the correlation between every
pair of constructs, ensuring adequate discriminant validity (Fornell, Tellis, & Zinkhan, 1982).
Consequently, the measurement model exhibited
acceptable construct validity.
Structural Model
The PLS results from the structural model in Table
5 show that attitudes toward using computers and
perceived behavioral control have significant
and positive effects on current use of computers
(direct effects = 0.281 and 0.223, respectively),
190
supporting hypotheses H1a and H3a, respectively.
In contrast, the effect of subjective norms on current computer usage is insignificant, meaning that
H2a is not supported. However, attitudes toward
using computers, subjective norms, and perceived
behavioral control all have significant and positive effects on continued use of computers (direct
effects = 0.223, 0.177 and 0.344, respectively),
supporting hypotheses H1b, H2b and H3b, respectively. In comparison, perceived behavioral
control is the largest determinant and predictor
of continued use of computers. Moreover, the
explained variance of continued use of computers (28.24%) by the three TPB beliefs is greater
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Table 3. Analysis of reliability and convergent validity
Latent Variables
Composite Reliability
(Internal Consistency Reliability)
Average Variance
Extracted/Explained
(AVE)
OSSR
0.85
0.659
OWC
0.92
0.784
ATT
0.96
0.810
SN
0.96
0.886
PBC
0.78
0.544
Continued Use
0.81
0.678
Current Use
0.85
0.584
than that of current computer usage (17.03%).
From Table 5, the PLS results also support the
three hypotheses (H4a, H5a, and H6a) for the
significant and positive effects of openness to
superior-subordinate relationships with attitudes
toward using computers, subjective norms, and
perceived behavioral control (direct effects =
0.246, 0.155 and 0.185, respectively). In contrast,
openness to work communication does not significantly influence individual attitudes toward
using computers, subjective norms, and perceived
behavioral control, showing hypotheses H4b, H5b
and H6b are not supported in the current empirical
survey. Overall, organizational communication
openness accounted for 9.24%, 5.14%, and 5.79%
of variance in attitude, subjective norms, and
perceived behavioral control, respectively. Path
analysis was also used to examine the indirect
effects of OSSR and OWC on the adoption and
adoption confirmation of computers. The indirect
effects of OSSR on current use and continued
use of computers were (0.114, 0.146), whereas
the indirect effects of OWC on current use and
continued use of computers were (0.023, 0.062),
respectively. Overall, the tests of the structural
model show that openness to superior-subordinate
relationships is more influential than openness
to work communication in driving the adoption
and adoption confirmation of computers by Arab
end-users via TPB beliefs.
Table 4. Analysis of discriminant validity and intercorrelations
Latent Variables
Mean
SD
1
OSSR
5.90
1.23
.81
2
3
4
5
6
OWC
6.43
1.02
.65
.89
ATT
6.12
1.00
.30
.24
.90
SN
5.54
1.46
.22
.19
.11
.94
PBC
5.29
0.87
.23
.20
.34
.23
.74
Continued Use
4.43
1.22
.33
.25
.36
.28
.46
.82
Current Use
6.18
0.96
.25
.17
.35
.11
.32
.52
7
.76
Note: The bolded diagonals represent the square root of the AVE from each construct, while the off-diagonal elements represent the correlations between different constructs
191
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Table 5. Results of PLS analysis
Causal Paths
Path Coefficient
T-Statistic
Current Use ←
ATT
SN
PBC
0.281**
0.026
0.223**
4.82
0.46
4.01
Continued Use ←
ATT
SN
PBC
0.223**
0.177**
0.344**
3.79
3.59
6.89
ATT ←
OSSR
OWC
0.246**
0.082
3.72
1.07
SN ←
OSSR
OWC
0.155*
0.091
2.12
1.19
PBC ←
OSSR
OWC
0.185**
0.080
2.74
0.95
Explained Variance (R2)
17.03%
28.24%
9.24%
5.14%
5.79%
Hypothesis Testing
H1a is supported
H2a is not supported
H3a is supported
H1b is supported
H2b is supported
H3b is supported
H4a is supported
H4b is not supported
H5a is supported
H5b is not supported
H6a is supported
H6b is not supported
* Significant at (p<0.05) ** Significant at (p<0.01)
DISCUSSION AND IMPLICATIONS
This study integrates organizational communication openness with TPB beliefs (personal and
social factors) to assess current computer usage
and predict continued use of computers. Consistent with TPB, empirical findings show that Arab
end-users with positive attitudes toward using
computers perceive strong social norms from
colleagues about the use of computers, and feel
strong control when using computers are likely
to continue to use computers for future work.
That is, Arab end-users would continue to use
computers if they feel that their current use of
computers is interesting, they believe that they
must achieve the expectations of computer use
from colleagues, and they are confident in their
skills in computer use. Partly consistent with
TPB, Arab end-users’ current usage of computers
can be explained in terms of their interests and
personal control over computers, but not social
pressures. Our empirical findings contribute different insights on social pressure from two previous
studies that were conducted in western contexts.
Thompson, Higgins, and Howell (1991) identi-
192
fied a positive association between social norms
and utilization from a survey of computer use
by knowledge workers in a large multinational
firm. Taylor and Todd (1995) found that all TPB
beliefs have significant influence on behavioral
intention from the usage survey of a computing
resource center by business school students in
Canada. This study shows that attitude is the greatest factor influencing current computer usage. In
particular, the insignificant effect of subjective
norms on current computer usage indicates that
the social factor does not significantly change
the decision to use computers by Arab end-users.
This phenomenon can be explained based on Hill
et al.’s (1998) observations that many Arab endusers tend to ignore social norms initially in the
current use of computers at work when they fail
to observe unanimous recognition among their
colleagues. Another reason may be attributed to
fear among some executives that computers might
replace their existing jobs, meaning that they did
not strongly push employees to currently adopt
and use computers in the workplace. As noted by
Loch, Straub, and Kamel (2003), technology is not
force-fed through social mechanism, but depends
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
on whether managerial levels recognize they can
receive the benefits of adoption. Moreover, the
findings indicate that the influence of subjective
norms increases in the process from adoption to
adoption confirmation of computers, revealing that
the influence of social factors becomes significant
in predicting Arab end-users’ post-adoption of
computers, rather than the adoption decision. Thus,
social influence begins to work when most Arab
office workers continue to spend time running
computer applications, thus producing a “critical
mass” of end-users in the process from adoption to
adoption confirmation (Markus, 1990). Additionally, perceived behavioral control is the greatest
determinant and predictor of continued use of
computers and achieved higher effect compared
with its effect on current computer usage. That
is, Arab end-users are more concerned with their
control of resources and opportunities, and the
governance of knowledge and ability, than with
other factors when they decide to continue to use
computers for future work. In summary, our empirical findings show that personal factors (e.g.,
attitude and perceived behavioral control) influence the adoption and post adoption of computers,
while the social factor (i.e., subjective norms)
only influences the post adoption of computers.
Our empirical findings show that openness
to superior-subordinate relationships drives significant personal and social influences on Arab
end-users’ beliefs about computers than openness
to work communication does. Thus, reducing
organizational boundaries is more effective than
reducing communicative boundaries to develop
personal and social beliefs of computer adoption
and use. The identified associations between
openness to superior-subordinate relationships and
TPB beliefs confirm the arguments in the research
model. That is, an open organizational structure
is likely to create mutual respect and trust relationships around Arab end-users, which motivate
them to form favorable attitudes, comply with the
expectations from colleagues, and believe of their
control abilities regarding computer adoption and
use in the workplace. In contrast, the insignificant
associations between openness to work communication and TPB beliefs reveal the ignorance
of an open communicative context within Arab
organizations. Such a context with well-defined
rules, cooperation, and shared values around Arab
end-users did not encourage their interests and
give them greater control in using computers, or
even force them to use computers at work. This
phenomenon might be attributed to the lack of
social processes in achieving organizational consensus and confidence regarding computer use for
communication by Arab end-users. Inconsistent
with SIT (Tajfel & Turner, 1979; Turner, 1982),
Arab end-users in an open communicative context
cannot necessarily reduce their communicative
boundaries through interaction with others. The
survey of Arab end-users indicates that openness
to superior-subordinate relationships has a stronger effect than openness to work communication
in social categorization, because it can reduce
perceived boundaries among in-group members
in social processes. A prior survey of media use
for work communication among technical and
administrative employees in a large U.S. telecommunications firm by Hinds and Kiesler (1995)
concluded that organizational boundaries can be
reduced by strengthening horizontal communication, particularly in the communicative structure
of technical workers. In contrast, this study suggests that Arab end-users are more inclined to
vertical communication (open organization) than
horizontal communication (open communication)
when they form their personal and social beliefs
of computer adoption and use. In other words, an
organizational structure is more influential than
a communication network to expand “boundarycrossing” by Arab end-users in the formation of
favorable attitudes, subjective norms, and perceived behavioral control regarding the adoption
and use of computers in the workplace.
193
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Implications for Academic Research
Implications for Practice
Computer use behavior in Saudi Arabia based
on social factors has seldom been addressed
(Al-Khaldi & Wallace, 1999; Loch, Straub, &
Kamel, 2003). Moreover, the impact of cultural
boundaries on IT diffusion in Arab contexts has
seldom been explored as well. Therefore, this
empirical survey in Saudi Arabia helps improve
our understanding of the impact of organizational
and communicative boundaries on computer use
behavior in less developed countries. The proposed
extended TPB model can provide a theoretical
basis to assess the effects of organizational culture
on personal and social beliefs regarding IT adoption, implementation, and confirmation. Social
influence is often produced and expanded from the
interaction and communication among in-group
members (Gefen & Ridings, 2003). Therefore,
the hierarchical structure of Arab organizations
should be reshaped to meet the social process (e.g.,
formal and informal interactions) in IT diffusion
and transfer. Cultural values are implicit beliefs
(Tichy, 1983). Therefore, the influence of organizational culture on computer use behavior can be
posited and identified through particular personal
and social factors (i.e., explicit beliefs). Culturespecific beliefs, such as the Arab sense of time,
can be used to predict the outcomes of IT transfer
(Straub, Loch, & Hill, 2001). Thus, we believe
that a small subset of organizational culture can
explain computer adoption and use in the complicated Arab context. A wider set of organizational
culture can be considered to improve understanding of computer adoption and use in this scope.
In contrast to TAM, which predicts pre-adoption
decisions under individual-oriented contexts, the
proposed extended TPB is a comprehensive model
for assessing the post-adoption behavior of IT
in social-oriented contexts. In addition to TAM
beliefs (PU and PEOU), our empirical findings
suggest that further cultural factors pertaining to
TPB beliefs should be assessed to explain the IT
diffusion processes.
This study will hopefully help managers to develop
on-the-job training plans for the adoption and use
of new computer applications in less developed
countries. The empirical survey reveals that onthe-job training program should be designed by
motivating particular personal and social factors
pertaining to the diffusion of computers in socialoriented contexts, such as the Arabic world. Social
influence may not push knowledge workers to
use IT at Western contexts (Lewis, Agarwal, &
Sambamurthy, 2003), but our empirical findings
of computer usage from Arab end-users imply that
the social influence can spread across the interaction of in-group members (social processes). Most
Arab office workers are willing to use computers if managers can help them understand how
computers can satisfy their special interests, and
if managers can develop group norms for encouraging them to try new applications. Managers
should also recognize that Arab office workers
are likely to adopt computers if they are given
the requisite resources and opportunities. Creating a social-oriented context to fit the organizational culture around Arab end-users can reduce
organizational and communicative boundaries
over the adoption and adoption confirmation of
computers. Unlike Western end-users, who are
trained to act independently, Arab end-users do
not easily form open communicative contexts,
because they often consider an integral group as
a strong in-group boundary (Palmer, Al-Ghofaily,
& Alnimir, 1984). According to Straub’s (1994)
diffusion phase theory, media users with cultural
differences are likely to have different perceptions of social presence and information richness
of electronic media. The empirical findings of
this study imply that social presence (reducing
in-group boundaries) is more influential than
information richness (reducing communicative
boundaries) if top management wants to motivate
Arab end-users’ personal and social beliefs of
computer adoption and use.
194
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
LIMITATIONS
FUTURE RESEARCH
This study has four notable limitations. First, organizational culture is defined in terms of openness
to superior-subordinate relationships and openness
to work communication. Some researchers may
be concerned that this study only examines two
dimensions of organizational culture, thus possibly restricting the understanding of computer
use behavior. However, this study suggests an
extensive direction to address social influence
on IT diffusion by incorporating SIT and TPB to
explain computer usage behavior of Arab endusers. Second, careful application of this study is
necessary when generalizing the empirical findings to assess or predict computer use behavior in
other Arab countries. In particular, the R2 values
of current and continued use of computers are sufficient, which can be enhanced by incorporating
some rational factors such as TAM beliefs (PU
and PEOU) into this research model. Moreover,
additional dimensions of organizational culture,
such as autonomy, work climate, and social
memberships (Gallivan & Srite, 2005; O’Reilly,
Chatman, & Caldwell, 1991), should be considered in future research. Third, Arab and Western
computer end-users were not compared because
of research scopes in this study. Cross-cultural
studies can be considered as an extension of this
study. Fourth, organizational culture is assumed
to affect computer user behavior via personal and
social beliefs, but not vice versa. This assumption is widely accepted in previous literature
(Elbeltagi, McBride, & Hardaker, 2005; Gefen,
Rose, Warkentin, & Pavlou, 2005; Straub, 1994;
Straub, Keil, & Brenner, 1997; Straub, Loch, &
Hill, 2001; Veiga, Floyd, & Dechant, 2001). The
potential influence of computer usage behavior on
organizational culture is not examined because of
the focus of particular research scopes in this study.
Arab end-users may understand the usefulness
and ease-of-use of computers, but they still have
other concerns about personal and social influences on computer use. Putting it into context, this
study adopts an extended TPB model to explain
computer use behavior in Arab organizations.
Computer usage in the workplace is not only a
personal-purpose behavior, but is also an organizational-purpose behavior. The mix-purpose
user behavior can be driven by some particular
cultural factors. The influence of organizational
culture, as a multi-dimensional concept, on computer use behavior needs to be further studied.
Other researchers are encouraged to generalize
this model in other social-oriented cultures, and
examine its influence on different diffusion processes. For instance, the proposed research model
can be combined with Straub’s (1994) diffusion
phase theory to assess the adoption of new IT in
less developed countries. Future research can also
expand this model to assess the social process for
transferring new IT from industrialized countries
to less developed ones (Kedia & Bhagat, 1988).
ACKNOWLEDGMENT
The authors would like to thank three anonymous
reviewers and the editor-in-chief (Professor Tan)
for their invaluable comments and suggestions on
earlier version of this paper. Extended thanks go to
King Abdul-Aziz City for Science and Technology
(KACST), Saudi Arabia for financially supporting this project and the Taiwan National Science
Council (NSC 93-2416-H-364-004) for partially
supporting this cooperative research.
195
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
REFERENCES
Abdul Ghani, J., & Al-Sakran, S. (1988). The
changing data processing environment in Saudi
Arabia. Information & Management, 14, 61–66.
doi:10.1016/0378-7206(88)90049-3
Ajzen, I. (1985). From intentions to actions: A
theory of planned behavior. In Kuhl, J., & Beckman, J. (Eds.), Action-control: From cognition
to behavior (pp. 11–39). Heidelberg: Springer.
Ajzen, I. (1991). The theory of planned behavior.
Organizational Behavior and Human Decision
Processes, 50(2), 179–211. doi:10.1016/07495978(91)90020-T
Ajzen, I., & Madden, T. J. (1986). Prediction of
goal-directed behavior: Attributes, intentions,
and perceived behavioral control. Journal of
Experimental Social Psychology, 22, 453–474.
doi:10.1016/0022-1031(86)90045-4
Al-Farsy, F. (1996). Modernity & tradition: The
Saudi equation. London: Knight Communications Ltd.
Al-Khaldi, M. A., & Wallace, R. S. O. (1999).
The influence of attitudes on personal computer
utilization among knowledge workers: The case of
Saudi Arabia. Information & Management, 36(4),
185–204. doi:10.1016/S0378-7206(99)00017-8
Atiyyah, H. S. (1989). Determinants of computer
system effectiveness in Saudi public organizations. International Studies of Management and
Organization, 19(2), 85–103.
Berkhart, G. E., Goodman, S. E., Mehta, A., &
Press, L. (1998). The Internet in India: Better
times ahead? Communications of the ACM, 41(11),
21–26. doi:10.1145/287831.287835
196
Brown, I., Hoppe, R., Mugera, P., Newman, P.,
& Stander, A. (2004). The impact of national
environment on the adoption of Internet banking:
Comparing Singapore and South Africa. Journal
of Global Information Management, 12(2), 1–26.
doi:10.4018/jgim.2004040101
Brown, R. (1996). Tajfel’s contribution to the
reduction of intergroup conflict. In Robinson, W.
P. (Ed.), Social groups and identities: Developing the legacy of Henri Tajfel (pp. 69–190). UK:
Butterworth-Heinemann.
Chin, W. W. (2001). PLS-Graph User’s Guide,
v. 3.0.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. Management Information Systems
Quarterly, 13(3), 319–339. doi:10.2307/249008
Davis, F. D. (1993). User acceptance of information technology: System characteristics, user
perceptions and behavioral impacts. International
Journal of Man-Machine Studies, 38(3), 475–487.
doi:10.1006/imms.1993.1022
Davison, R., & Martinsons, M. (2003). Cultural
issues and IT management: Past and present. IEEE
Transactions on Engineering Management, 50(1),
3–7. doi:10.1109/TEM.2003.808249
DeLone, W. H., & McLean, E. R. (2003). The
DeLone and McLean model of information
systems success: A ten-year update. Journal of
Management Information Systems, 19(4), 9–30.
Ein-Dor, P., Segev, E., & Orgad, M. (1992). The
effect of national culture on IS: Implications for
international information systems. Journal of
Global Information Management, 1(1), 33–44.
Eisenberg, E. M., & Goodall, H. L. (1998). Organizational communication: Balancing creativity
and constraints. New York: St. Martin’s Press.
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Eisenberg, E. M., & Riley, P. (1991). A communication approach to organizational culture. In
Putnam, L., & Jablin, F. (Eds.), New handbook
of organizational communication. Newbury Park,
CA: Sage Publications.
Gallivan, M., & Srite, M. (2005). Information
technology and culture: Identifying fragmentary
and holistic perspectives of culture. Information
and Organization, 15(4), 295–338. doi:10.1016/j.
infoandorg.2005.02.005
Eisenberg, E. M., & Witten, M. G. (1987).
Reconsidering openness in organizational communication. Academy of Management Review,
12(3), 418–426.
Geertz, C. (1973). The interpretation of cultures.
New York: Basic Books.
Elbeltagi, I., McBride, N., & Hardaker, G. (2005).
Evaluating the factors affecting DSS usage by
senior managers in local authorities in Egypt.
Journal of Global Information Management,
13(2), 42–65. doi:10.4018/jgim.2005040103
Fishbein, M., & Ajzen, I. (1975). Belief, attitude,
intention, and behavior. Reading, MA: AddisonWesley.
Ford, D. P., Connelly, C. E., & Meister, D. B.
(2003). Hofstede’s culture’s consequences and
MIS research. IEEE Transactions on Engineering Management, 50(1), 8–25. doi:10.1109/
TEM.2002.808265
Fornell, C. R. (1982). A second generation of
multivariate analysis. New York: Praeger Special
Studies.
Fornell, C. R., & Larcker, D. F. (1981). Structural
equation models with unobservable variables and
measurement error. JMR, Journal of Marketing
Research, 18(1), 39–50. doi:10.2307/3151312
Fornell, C. R., Tellis, G. L., & Zinkhan, G. M.
(1982). Validity assessment: A structural equation
approach using partial least squares. In Walker,
B. J. (Eds.), An assessment of marketing thought
and practice (pp. 405–409). Chicago: American
Marketing Association.
Gefen, D., Rose, G. M., Warkentin, M., & Pavlou,
P. A. (2005). Cultural diversity and trust in IT
adoption: A comparison of potential e-voters in the
USA and South Africa. Journal of Global Information Management, 13(1), 54–78. doi:10.4018/
jgim.2005010103
Goodman, S. E., & Green, J. D. (1992). Computing in the Middle East. Communications of the
ACM, 35(8), 21–25. doi:10.1145/135226.135236
Hasan, H., & Ditsa, G. (1999). The impact of
culture on the adoption of IT: An interpretive
study. Journal of Global Information Management, 7(1), 5–15.
Hill, C., Loch, K., & Straub, D. W., & EI-Sheshai,
K. (1998). A qualitative assessment of Arab culture
and information technology transfer. Journal of
Global Information Management, 6(3), 29–38.
Hinds, P., & Kiesler, S. (1995). Communication
across boundaries: Work, structure, and use of
communication technologies in a large organization. Organization Science, 6(4), 373–393.
doi:10.1287/orsc.6.4.373
Hofstede, G. (1980). Culture’s consequences:
International differences in work-related values.
Newbury Park, CA: Sage.
Hofstede, G. (1991). Cultures and Organizations.
London: McGraw-Hill.
Hofstede, G. (1993). Cultural constraints in management theories. The Academy of Management
Executive, 7(1), 81–94.
197
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Igbaria, M., Guimaraes, T., & Davis, G. B. (1995).
Testing the determinants of microcomputer usage
via structural equation model. Journal of Management Information Systems, 11(4), 87–114.
Internet World Stats. (2007). Retrieved from http://
www.internetworldstats.com.
Ives, B., & Jarvenpaa, S. (1991). Wiring the stateless corporation: Empowering the drivers and
overcoming the barriers. SIM Network, 6, 5–8.
Kats, D., & Kahn, R. (1978). The social psychology of organizations. New York: Wiley.
Kedia, B. L., & Bhagat, R. S. (1988). Cultural
constraints on transfer of technology across nations: Implications for research in international and
comparative management. Academy of Management Review, 13(4), 559–571.
Kluckhohn, R. R., & Strodtbeck, F. (1961).
Variation in value orientations. Westport, CT:
Greenwood.
Lewis, W., Agarwal, R., & Sambamurthy, V.
(2003). Sources of influence on beliefs about
information technology use: An empirical study
of knowledge workers. Management Information
Systems Quarterly, 27(4), 657–678.
Loch, K. D., Straub, D. W., & Kamel, S. (2003).
Diffusing the Internet in the Arab world: The role
of social norms and technological culturation.
IEEE Transactions on Engineering Management,
50(1), 45–63. doi:10.1109/TEM.2002.808257
Lohmoller, J. B. (1989). Latent variable path
modeling with partial least squares. Heidelberg:
Physica-Verlag.
Markus, M. L. (1990). Toward a critical mass
theory of interactive media. In Fulk, J., & Steinfield, C. (Eds.), Organization and communication
technology (pp. 194–218). Newbury Park, CA:
Sage.
198
Mathieson, K. (1991). Predicting user intentions:
Comparing the technology acceptance model
with the theory of planned behavior. Information
Systems Research, 2(3), 173–191. doi:10.1287/
isre.2.3.173
Monge, P. R., Rothman, L. W., Eisenberg, E. M.,
Miller, K. I., & Kirste, K. K. (1985). The dynamics
of organizational proximity. Management Science,
31(9), 1129–1141. doi:10.1287/mnsc.31.9.1129
Muthén, L. K., & Muthén, B. O. (2002). How
to use a Monte Carlo study to decide sample
size and determine power. Structural Equation Modeling, 9(4), 599–620. doi:10.1207/
S15328007SEM0904_8
Niederman, F., Boggs, D., & Kundu, S. (2002).
International business and global information
management research: Toward a cumulative tradition. Journal of Global Information Management,
10(1), 33–47. doi:10.4018/jgim.2002010104
Nunnally, J. C. (1978). Psychometric theory (2nd
ed.). New York: McGraw-Hill.
O’Reilly, A. A. III, Chatman, J., & Caldwell, D.
F. (1991). People and organizational culture: A
profile comparison approach to assessing personorganization fit. Academy of Management Journal,
34(3), 497–516.
Palmer, M., Al-Ghofaily, I., & Alnimir, S. (1984).
The behavioral correlates of rentier economies: A
case study of Saudi Arabia. In Stookey, R. (Ed.),
Arabian Peninsula: Zone of ferment. Stanford,
CT: Hoover Institute Press.
Png, I. P., Tan, B. C., & Wee, K. L. (2001).
Dimensions of national culture and corporate
adoption of IT infrastructure. IEEE Transactions
on Engineering Management, 48(1), 36–45.
doi:10.1109/17.913164
Rogers, E. M. (1995). The diffusion of innovation.
New York: Free Press.
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Rose, G., & Straub, D. (1998). Predicting general
IT use: Applying TAM to the Arabic world. Journal
of Global Information Management, 6(3), 39–46.
Shin, S. K., Ishman, M., & Sanders, G. L. (2007).
An empirical investigation of socio-cultural factors of information sharing in China. Information
& Management, 44(2), 165–174. doi:10.1016/j.
im.2006.11.004
Steele, F. (1975). The open organization: The
impact of secrecy and disclosure on people and
organizations. Reading, MA: Addison-Wesley.
Straub, D., Loch, K., Evaristo, R., Karahanna,
E., & Strite, M. (2002). Toward a theory-based
measurement of culture. Journal of Global Information Management, 10(1), 13–23. doi:10.4018/
jgim.2002010102
Straub, D., Loch, K. D., & Hill, C. E. (2001).
Transfer of information technology to the Arab
World: A test of cultural influence modeling.
Journal of Global Information Management, 9(4),
6–28. doi:10.4018/jgim.2001100101
Straub, D. W. (1994). The effect of culture on IT
diffusion: E-mail and fax in Japan and the U.S.
Information Systems Research, 5(1), 23–47.
doi:10.1287/isre.5.1.23
Straub, D. W., Keil, M., & Brenner, W. H. (1997).
Testing the technology acceptance model across
cultures: A three country study. Information &
Management, 33(1), 1–11. doi:10.1016/S03787206(97)00026-8
Tajfel, H. (1978). Differentiation between social
groups. Cambridge, UK: Cambridge University
Press.
Tajfel, H., & Turner, J. (1979). An integrative
theory of intergroup conflict. In Austin, W. G.,
& Worchel, S. (Eds.), The social psychology of
intergroup relations. Monterey, CA: Brooks/Cole.
Taylor, S., & Todd, P. A. (1995). Understanding
information technology usage: A test of competing models. Information Systems Research, 6(2),
144–176. doi:10.1287/isre.6.2.144
Thompson, R. L., Higgins, C. A., & Howell,
J. M. (1991). Personal computing: Toward a
conceptual model of utilization. Management
Information Systems Quarterly, 15(1), 125–143.
doi:10.2307/249443
Thompson, R. L., & Rose, G. (1994). Information
technology adoption and use. In Proceedings of
the Administrative Sciences Association of Canada
(ASAC) Annual Conference (pp. 16-26).
Tichy, N. (1983). Managing strategic change:
Technical, political, and cultural dynamics. New
York: Wiley.
Triandis, H. C. (1972). The analysis of subjective
culture. New York: Wiley.
Turner, J. C. (1982). Toward a cognitive redefinition of the social group. In Tajfel, H. (Ed.), Social
identity and intergroup relations (pp. 1–40). UK:
Cambridge University Press.
Tushman, M. L., & Scanlan, T. J. (1981).
Boundary spanning individuals: Their role in
information transfer and their antecedents. Academy of Management Journal, 24(2), 289–305.
doi:10.2307/255842
Veiga, J. F., Floyd, S., & Dechant, K. (2001).
Towards modeling the effects of national culture
on IT implementation and acceptance. Journal
of Information Technology, 16(3), 145–158.
doi:10.1080/02683960110063654
Weber, Y., & Pliskin, N. (1996). The effects of information systems integration and organizational
culture on a firm’s effectiveness. Information &
Management, 30(2), 81–90. doi:10.1016/03787206(95)00046-1
World Bank Group. (2007). Saudi Arabia data
profile. World Development Indicators Database.
199
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Yavas, U., Liqmani, M., & Quraeshi, Z. (1992).
Facilitating the adoption of information technology in a developing country. Information &
Management, 23(2), 75–82. doi:10.1016/03787206(92)90010-D
Yoo, Y., & Alavi, M. (2001). Media and group
cohesion: Relative influences on social presence,
task participation, and group consensus. Management Information Systems Quarterly, 25(3),
371–390. doi:10.2307/3250922
200
Zhao, H., Kim, S., Suh, T., & Du, J. (2007). Social institutional explanation of global Internet
diffusion: A cross-country analysis. Journal of
Global Information Management, 15(2), 28–55.
doi:10.4018/jgim.2007040102
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
APPENDIX: THE MEASUREMENT SCALES
Table A1. Post-Adoption Behavior of Computers
Continued Use (CONTUSE)
CONTUSE1: I predict I will use computers on a regular basis in the future (seven point Likert scale anchored with strongly disagree to
strongly agree).
CONTUSE2: What are the chances in 100 that you will continue as a computer user in the future? (1) Zero; (2) 1-10%; (3) 11-30%; (4)
31-50%; (5) 51-70%; (6) 71-90%; or (7) More than 90%.
Current Use (CURNTUSE)
CURNTUSE1: On an average working day, how much time do you spend using computers (choose one)?: (1) Almost never; (2) Less than
½ hour; (3) From ½ to 1 hour; (4) From 1 to 2 hours; (5) From 2 to 3 hours; (6) More than 3 hours.
CURNTUSE2: On average, how frequently do you use computers?: (1) Less than once a month; (2) Once a month; (3) A few times a month;
(4) A few times a week; (5) About once a day; (6) Several times a day.
CURNTUSE3: How many different computer applications have you worked with or used in your job (choose one)?: (1) None; (2) One;
(3) Two; (4) Three to five applications; (5) Six to ten applications; (6) More than ten applications.
CURNTUSE4: According to your job requirements, please indicate each task you use computers to perform (count of all that apply)?: (1)
Letters and memos; (2) Producing reports; (3) Data storage and retrieval; (4) Making decisions; (5) Analyzing trends; (6) Planning and
forecasting; (7) Analyzing problems and alternatives; (8) Budgeting; (9) Controlling and guiding activities; (10) Electronic communications
with others; (11) Others (please indicate. . .).
201
The Influence of Organizational Communication Openness on the Post-Adoption of Computers
Table A2. Organizational Communication Openness and TPB Beliefs
Please declare how important would it be to you:
Of very little or no importance
……….…
€€€€€€€€€€€€€
€1
2
3
4
5
6
Of utmost important
7
Openness to superior-subordinate relationships (OSSR)
OSSR1: Have a good working relationship with your direct superior.
OSSR2: Be consulted by your direct superior in his/her decision.
OSSR3: Feel free to express disagreement with your superiors.
Openness to work communication (OWC)
OWC1: It is very important to work in a well-defined job situation where the requirements are clear.
OWC2: Work with people who cooperate well with one another.
OWC3: Work in an environment with values like assertiveness, performance, success, and competition prevail among people.
Attitude (ATT): All things considered, my using computers is:
(On a Semantic Differential Scale)
Extremely
Quite To a certain Extent
Neither To a certain Extent
Anchored with 5 attributes:
Quite
Extremely
ATT1: (Bad/Good).
ATT2: (Foolish/Wise).
ATT3: (Unfavorable/Favorable).
ATT4: (Harmful/Beneficial).
ATT5: (Negative/Positive).
Subjective Norms (SN)
SN1: Most people who are important to me think I should use computers.
SN2: Most people who are important to me would want me to use computers.
SN3: People whose opinions I value would prefer me to use computers.
Perceived Behavioral Control (PBC)
PBC1: Using the computer or other alternatives is entirely within my control. “Control” refers to the freedom you feel you have to make
a choice
PBC2: I would be able to use the computer.
PBC3: I have the resources, the knowledge, and the ability to make use of the computer.
PBC4: Given the resources, opportunities, and knowledge it takes you to use computers; it would be easier for me to choose computers
rather than any other means available.
This work was previously published in International Journal of Global Information Management, Volume 17, Issue 3, edited
by Felix B. Tan, pp. 20-41, copyright 2009 by IGI Publishing (an imprint of IGI Global).
202
203
Chapter 10
Chronism Theory, Culture,
and System Delay:
A Longitudinal Study of PostApartheid South Africa
Gregory M. Rose
Washington State University, USA
Carina DeVilliers
University of Pretoria, South Africa
Detmar W. Straub
Georgia State University, USA
ABSTRACT
System response delay has been cited as the single most frustrating aspect of using the Internet and
the most worrisome aspect of Web application design. System response time (SRT) research generally
concludes that delay should be eliminated where possible to as little as a few seconds, even though
delay reduction is costly. Unfortunately, it is not clear if these conclusions are appropriate outside of
the developed world where nearly all of the SRT research has taken place. Cultural effects have been,
hence, generally missing from SRT research. The one SRT study to date outside of the developed world
did report differences using the theoretical construct of cultural chronism, and this finding could limit
the generalizability of SRT research findings from developed countries to many economically developing
nations. However, limitations and potential confounds in this single study render those findings tentative.
The end of Apartheid in South Africa allowed an opportunity to conduct a longitudinal free simulation
experiment that overcomes the critical limitations of this previous research. Subjects were members of
historically polychronic and monochronic groups who had been segregated by Apartheid and now live
in an integrated society with shared infrastructure and computer access. Results find that members of the
historically polychronic group are more accepting of longer delays and are more willing to trade longer
delays for improved functionality than are their historically monochronic counterparts. Furthermore,
tests find that members of the historically monochronic population that came of age in a desegregated,
DOI: 10.4018/978-1-60960-605-3.ch010
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chronism Theory, Culture, and System Delay
majority-polychronic culture appear to be polychronic themselves and to differ significantly from the
older monochronic generation. Results from this study can be applied to design culturally-sensitive applications for users in the developing economies of the world.
INTRODUCTION AND BACKGROUND
A generally accepted rule in software design
is that users do not want to wait for systems to
respond. System response delay has been cited
as the most irritating aspect of using the Internet
(Ewalt, 2002) and the most worrisome aspect of
Web application design (Khosrowpour, 2000).
System Response Time (SRT) research has repeatedly found that users have negative attitudes and
reactions toward waiting as little as 2-4 seconds
for systems to respond (Galletta, Henry, McCoy,
& Polak, 2004; Nah, 2004)
Delay is a byproduct of network-based,
database-intensive, and/or multimedia-intensive
software. Many application designs are impossible
without long delays and can only be mitigated via
some combination of: (a) expensive hardware; (b)
expensive network connections; or (c) the elimination of preferred content and services. None of
these alternatives are attractive to software owners
/ service providers (henceforth referred to simply
as service providers) and each option is costly.
The vexing question for service providers is
how much delay is tolerable in which situations,
how much should be spent on reducing delay,
and how much content should be eliminated in
order to limit delay. Because solutions for reducing delay are costly, understanding when to do
so is most important for those with the fewest
resources. As a result, understanding how and
when to manage delay is critical for the developing world where computing resources such as
network infrastructures are less robust and capital
is scarce. For example, in Brazil, the government
is rolling out heavily subsidized computing and
Internet connectivity for its poor (Benson, 2005).
204
For these millions of Brazilians, low bandwidth
dialup computing will be the standard means of
connectivity for the foreseeable future (Benson,
2005) and long download delays will be commonplace.
What makes this question of knowing when
to eliminate delay so difficult is that delay is still
not a well-understood phenomenon. While it is
generally accepted that delay is to be avoided, it
is unclear that this is true in all cases. Research
to date has concluded that while attitudes toward
delay are predominantly negative, the negative
consequences of delay are not well delineated
(Otto, Najdawi, & Caron, 2000; Rose, Meuter, &
Curran, 2005; Rose & Straub, 2001) and many
scientific findings appear to be counterintuitive
(Davis & Hantula, 2001; Dellaert & Kahn, 1999;
Rajala & Hantula, 2000; Rose, Meuter & Curran
2005).
Among the plethora of such SRT studies, one
study questioned whether SRT was as important
a factor in the developing world as in developed
economies where nearly all SRT research has taken
place thus far. Specifically, Rose et al. (2003)
identified a possible link between the theoretical
construct of cultural chronism and SRT delay
attitudes. Chronism is a cultural characteristic
describing a group’s relationship to time (Hall,
1989, 1990). Monochronism is a cultural trait
where members of a culture conceive of time as
linear and tangible. Where this cultural trait prevails, time moves in a set sequence (A leads to B
leads to C) and time is an asset that can be spent
or wasted. Polychronism, by way of contrast, is a
cultural trait where time is malleable; life is felt to
be less linear than it is a movement of many things
in parallel. Members of polychronic cultures, liv-
Chronism Theory, Culture, and System Delay
ing in predominantly developing economies (Hall,
1989; van Everdingen & Waarts, 2003), appear to
be more tolerant of waiting longer than members
of monochronic cultures, living predominantly
in economically developed nations. However,
potential confounds in Rose et al. (2003) leave it
unclear as to whether cultural differences related
to SRT are scientifically valid or artifactural.
Furthermore, there is no evidence that chronism
differences translate into differences in outcomes
such as design preferences.
The IT market in South Africa is the largest in
Africa and the 20th in the world in overall market
size. It is considered to be 8th world wide in terms
of IT spending as a proportion of Gross Domestic
Product (Bayo, Ekene, Kenneth, & Idowu, 2007).
According to Mohammed and Miller (Mohammed & Miller, 2002) “ … the South African ICT
market was valued at US$4.1 billion, establishing
the country’s position as the ICT leader on the
continent…..For a middle-income, developing
country with unreliable mail and an expensive
courier service, it is noteworthy that 33 percent
of South Africa’s online population has used the
Internet to purchase goods. As for locally relevant
content, at least twenty-seven newspapers have
an online presence; they also serve the South
African expatriate community. The diffusion of
ICT into major industries can be seen primarily
in retailing and financial services;…..”. This indicates that South Africa has a strong ICT industry
and response time is therefore an issue for South
Africans.
In this context, the end of Apartheid in South
Africa offered a unique opportunity to study chronism in a manner that overcomes the limitations
of Rose et al. (2003). We chose to conduct a longitudinal free simulation experiment that confirms
that members of a historically polychronic group
are more accepting of longer delays and are willing
to trade longer delays for improved functionality
than are their historically monochronic counterparts. Furthermore, tests reveal that members of
a historically monochronic population that came
of age in a desegregated, majority-polychronic
culture appear to display characteristics of polychronism and to differ significantly from the older
monochronic generation. Implications are that
chronistic differences related to SRT are indeed
cultural and that software designs for polychronic
populations in much of the developing world
should differ from those traditionally prescribed
for monochronic-dominated cultures.
Most of the research on system response time
has been conducted in Western societies. Culture
may diminish the undesirable effects of system
delay, but it is unlikely that it will eliminate it
entirely. The research question addressed in this
paper is intended to reify the scientific research
to date and, at the same time, explore the dividing line for when cultural chronism matters. It
is: Irrespective of culture, do users greatly prefer
faster system response times?
In this paper, a literature review focusing specifically on SRT and cultural chronism theory is
given. The research methodology is discussed, after which the results of the research are explained.
The contribution of this research, limitations and
future research are presented in the last paragraphs.
LITERATURE REVIEW
Research has found that attitudes toward delay
may be related to cultural perceptions of time.
In monochronic cultures such as the USA, Scandinavia, Germany, etc., lateness is considered to
be slightly offensive and the difference in a few
seconds can be seen as a loss of meaning and
value. Monochronism is primarily found in developed economies of the world (van Everdingen &
Waarts, 2003). In the polychronic cultures of Latin
America, the Arab world, and Sub-Saharan Africa,
the passage of time is not seen as important in and
of itself. Attitudes toward passage of an hour are
not dissimilar to the passage of a day, month or
year for members of these groups (Hall, 1989).
Large portions of the less developed countries of
205
Chronism Theory, Culture, and System Delay
the world are also polychronic (van Everdingen
& Waarts, 2003).
Because these cultural groups relate to the
passage of time in such different ways, Rose et
al. (2003) posited that members of these groups
would respond differently to the download delays they experienced through Web applications.
This lab experiment found evidence that, indeed,
polychronic Peruvians and Egyptians were less
troubled by increases in Web delay than monochronic US and Finnish subjects. Their conclusions
suggest that developers should tailor content to
groups based on readily identifiable traits correlating with cultural chronistic characteristics
such as language and nationality.
While Rose, et al. (2003) does break new
ground and hints at profound ramifications if
its conclusions are substantiated, there are two
shortcomings or potential confounds noted by the
authors. First, whereas subjects were all university
students with access to university laboratories,
the monochronic countries in the study enjoyed
superior infrastructures to the polychronic countries studied. As a result, researchers could not rule
out the possibility that polychronic subjects were
simply accustomed to slow throughput rates due to
weak backbones and poor final mile connections.
This shortcoming begs an important question
about research findings of general culture differences in preferences. Namely, are these differences
in responses to software design cultural or circumstantial? Would Peruvian software users tolerate
delay less if they had been living in Finland for
several years? Would American software users
become more patient with delay if they lived in
Egypt over an extended period of time and had to
share the same wait times as Egyptians? This is a
critical question for researchers since, if preferences and attitudinal differences are merely the
result of individual differences, then prescriptions
for software design need not take culture into
account at all.
With system response time (SRT), this is
clearly an issue. Rose et al. (2003) assumed that
206
the differences were cultural and suggest that
software designers for traditionally-recognized
polychronic populations “will have a freer rein
to include rich content for polychronic cultures”
(p. 40). Basically, they advise designers for polychronic audiences to diverge from commonly
accepted “Western” standards with respect to
delay speeds because “polychronics [are] more
willingly sacrifice speed for other functionality
when compared with monochronic users” (p. 39).
However, if the effects they found from chronism
were not truly cultural, but rather artifactual, the
Peruvian and Egyptian subjects might have been
willing to tolerate longer delays only because
they were accustomed to longer online waits. As a
result, their actual preferences may be no different
from monochronic users in that they would prefer
not to wait any longer than accustomed. Thus by
designing systems that allowed delays exceeding such norms, developers would be increasing
them beyond what those who were theorized to be
polychronic would actually tolerate. This advice,
therefore, would not just be incorrect, but would
likely be punitive to the users and damaging to
the service provider. Lee et al. (2007) found in
their study on mobile Internet users, that “a tendency to monochronic time perception led users
to attribute greater usefulness, greater enjoyment,
greater ease of use, and greater monetary value
to the mobile Internet” (p. 38).
This problem highlights the second acknowledged shortcoming in Rose et al. (2003). Rose et al.
(2003) only tested differences in attitudes toward
SRT. The study did not test for whether there are
differences in preferences for trading longer delays for better functionality between the cultural
groupings. As a result, even if differences in delay
attitudes exist and are cultural, we still do not know
where there are prescriptive differences for building software for polychronic versus monochronic
populations. While these posited differences in
preferences would seem logical, SRT research
has shown that predicted outcomes of delay are
often not supported by empirical research (Otto,
Chronism Theory, Culture, and System Delay
Najdawi & Caron, 2000; Rose, Meuter & Curran
2005; Rose & Straub, 2001). Therefore, without
this empirical support, it is perhaps not prudent
for software designers to presume any differences
in preferences for tradeoffs.
The purpose of the current research is to examine a new setting where these two limitations can
be ruled out in the research design. In the process,
the present study validates and extends the work of
Rose et al. (2003), advancing research on culture
and SRT. Specifically, data was collected over a
three-year period from members of historically
polychronic and monochronic subgroups in South
Africa in order to test for differences in download
delay attitudes and preferences. Additionally,
culture effects were compared among members
of the same ethnicity raised after a transitional
period where their national culture differed from
their predecessors.
During Apartheid (1948-1994) “whites” and
“blacks” were separated by law (apartheid translates into “apartness” in English) and “forbade
most social contacts between races, authorized
segregated public facilities, established separate school systems with lower standards for
non-whites, and restricted each race to certain
jobs” (Dowling, 2002). The cultural setting of
blacks was a segregated environment generally
recognized as polychronic (Prime, 1999; van
Everdingen & Waarts, 2003) while the setting
for whites was monochronic (Morrison, Conway,
& Douress, 1999; Prime, 1999; van Everdingen
& Waarts, 2003). After 1994, in what is known
as “the Transition” (M. Wines, 2003), historically monochronic whites were integrated into
a majority-black nation whose population was
historically polychronic (Wines & LaFraniere,
2004). Because of these historical developments
in South Africa, individuals who grew up prior to
1994 in their separate ethnic groups experienced
different cultural chronisms. Since 1994, they now
share exactly the same access to infrastructure in
their daily lives by law and have so for years now
(Wines & LaFraniere, 2004).
South Africans who grew up after 1994 share
the benefits of that common information and communications infrastructure as well. Unlike those
older South Africans, however, they spent their
formative years in an integrated society. As a result,
younger whites and younger blacks came of age in
a majority-black culture with integrated schools,
neighborhoods, and shopping areas (Wines &
LaFraniere, 2004). Thus, culturally-chronistic
segregation was likely not a phenomenon experienced by these younger South Africans.
All South Africans are now free to attend
integrated Universities and work in integrated
workplaces with shared computer access and
network infrastructure. Furthermore, South Africa
has slow and prohibitively expensive “pay per
minute” home Internet connectivity that dissuades
the use of home network connections even by the
professional class (Goble, 2002) and encourages
the use of fast and free broadband connections at
work and school. Major university network connections in particular are world-class broadband
connections with modern computing equipment
(as indicated by the system configurations in our
methods description below). As a result, members
of South Africa attending a University are likely
to share identical network access. Tests among
this population would eliminate the circumstantial
differences in bandwidth that could not be ruled
out in Rose et al. (2003).
There are two relevant literature streams to
examine cultural chronism and download delay.
These streams support a theoretical distinction
that separates cultural chronism from circumstances. The first of these is the system response
time literature and the second is the literature on
chronism.
System Response Time Literature
System response time (SRT) research has a long
tradition in the Information Systems and Computer
Science communities. A reference list of 108 SRT
articles had been cataloged at the “Time Design”
207
Chronism Theory, Culture, and System Delay
research portal (www.timedsn.net) ranging from
1966 through 2004. SRT research to date is rich
and varied, and the effects of SRT delay are “more
complicated than originally thought” (Davis &
Hantula, 2001) (p. 260).
The literature is diverse with regards to metrics
and outcomes. Measures of delay can be classified
into four categories. The first is perceived wait
time (Hui & Tse, 1996; Ranganathan & Ganapathy,
2002; Straub, Hoffman, Weber & Steinfield, 2002;
Tom, Burns, & Zeng, 1997; Weinberg, 2000),
which is a subject’s perception of how much time
has elapsed. The second is actual or controlled
delay (Davis & Hantula, 2001; Galletta, Henry,
McCoy & Polak, P., 2004; Nah, 2004; Rajala &
Hantula, 2000; Rose, Evaristo & Straub 2003;
Rose, Meuter & Curran 2005), where delay is
either controlled by the researcher or the passage
of actual time is measured and collected. Third is
attitude toward delay (Palmer, 2002; Rose, Meuter
& Curran 2005), where some attitudinal measure
in response to the length of the delay is captured.
Finally, attributable delay (Jacko, Sears, & Borella,
2000; Rose, Meuter & Curran 2005) is a measure
of a subject’s perception of the cause of the delay.
In this last case, where delay is attributed to the
object of study, long delays are theorized to cause
more negative attitudes or intentions toward that
object than if the delay is attributed to something
beyond that object’s control. Outcomes of delay are
diverse as well and include: attitude toward a Web
page (Dellaert & Kahn, 1999; Ramsay, Barbesi,
& Preece, 1998; Rose, Meuter & Curran 2005);
aborting of a page load (Nah, 2004; Rose & Straub,
2001); system satisfaction (Rushinek & Rushinek,
1986; Wirtz & Bateson, 1995); frustration (Barber
& Lucas, 1983); anxiety (Guynes, 1988; Schleifer
& Amick, 1989); effectiveness of and time spent
on material (Davis & Hantula, 2001); patronage
(Rajala & Hantula, 2000); online purchase intent
(Ranganathan & Ganapathy, 2002); and number
of tasks completed (Galletta et al., 2004).
While the measures of download delay and
impacts are various and sundry, the general
208
thrust of these studies is the same. Namely, as
delay increases, there are predominantly negative user responses. This was also illustrated in
research done on waiting for online services,
where it was found that waiting has a significant
impact on the commercial development of the
web (Ryan & Valverde, 2006). Similarly, Devaraj
et al. (Devaraj, Fan, & Kohli, 2006) found that
time responsiveness of the online transaction is
important for customer satisfaction. While not all
studies have found significance (Otto, Najdawi
& Caron, 2000; Rose & Straub, 2001), and some
of the effects are non-linear (Davis & Hantula,
2001; Galletta et al., 2004; Rajala & Hantula,
2000), these studies show consistently that increased delay has negative impacts. Since Rose
et al. (2003) found this relationship was true for
both theorized monochronics and polychronics,
the following hypothesis is proposed:
H1: Irrespective of culture, attitudes toward longer
system response time will be more negative
than toward shorter system response time.
Cultural Chronism Theory
In the search for literature on cultural differences
and evaluation of processing speed, only one article deals with cultural differences in the developing world (2003). Thus existing system response
time (SRT) and Web download time research has
been almost exclusively set in the economicallydeveloped monochronic world (e.g., U.S.A.,
Northern Europe). But in many lesser-developed
countries, polychronism is prevalent (e.g., South
America, Africa) and, given the dearth of research
into the reactions to download delay in these
countries, it is fair to say that the needs of these
system users are not currently well understood.
Unless their unique needs are taken into account,
these users will be subjected to assumed design
preferences based on the science conducted in
monochronic cultures.
Chronism Theory, Culture, and System Delay
This lack of investigations in polychronic
populations should be worrisome to those trying
to adapt conventional wisdom from monochroniccentric research in their software designs for polychronic users. Chronism differences are not trivial
matters of preferences or built up tolerances. The
relationships toward time itself differ greatly. For
example, monochronics: like Scandinavians and
North Americans, prefer to do one thing at a time.
For instance, they do not book several meetings at
the same time. Time is compartmentalised: there’s
time for everything and everything has its time
(Tella, 2000, p. 89).
Hall (1990, p. 6) suggests that monochronic
“Americans think of time as a road [that] has
segments or compartments that are to be kept
discrete.”
In contrast, time in polychronic cultures are
loosely coupled to antecedents and are seen as
occurring mostly in parallel. Polychronic groups
handle multiple tasks and processes concurrently,
like jugglers (Hall, 1966) and show a priority
for personal relationships over timeliness. Tella
(2000) suggests that polychronics: tend to do
several things at the same time or in parallel time
segments. They do not think it odd to answer
their phones while having a videoconference
with foreign partners, or talk to a passing student
by leaving the other videoconference partners to
simply wait (p. 89).
Across sub-Saharan Africa, the cultural tendency to be polychronic is commonly known
as “Africa Time.” Africans find time delineated
more by events than from clocks. Compared to
monochronic Northern Europe or the USA, “in
Africa, time takes on a different meaning: minutes
stretch into hours and timetables are casually discarded” (Katz, 2003). An excerpt of a moderated
discussion by BBC News dealing with African
vs. British senses of time highlights the profound
differences between the cultures in the following
way (Anonymous, 2003):
We Africans exist in time, not for time. Our
life is not defined by seconds, minutes and hours
like machines or robots. Our values are different
from the so-called “developed” world. Time isn’t
money for us. If a friend turns up late for a date,
most likely we won’t be on time either, so we
smile and make the best of the situation. What
we don’t understand is why other people, with
different values and lifestyles, try to impose their
views and call “problems” what we see as natural
and a part of us.
Cultural chronism is a well-understood
characteristic but it has not been definitively
identified to translate into preference and attitude
differences toward SRT. However, sources such
as Hall (Hall, 1989, 1990; van Everdingen &
Waarts, 2003) give no evidence that chronism is
not cultural and therefore we are assuming that
it is cultural and not circumstantial. If there are
indeed cultural effects as they relate to SRT, the
following hypothesis should be true:
H2a: Members of a historically monochromic
culture growing up in a majority monochromic environment will hold more negative
attitudes toward increases in delay than
members of a historically polychromic culture growing up in a majority-polychronic
environment, even if members of both groups
are now living in a majority-polychronic
environment.
Time should be seen as more valuable to
monochronics than polychronics. Per Hall (1989),
monochronics view time as a currency that can
be “saved, spent, wasted, [and] lost” (p. 19). As a
currency, it is valuable and would be spent judiciously on other goods and services. In the case of
software, it could be traded for better functionality. Polychronics are likely to see time as having
less value than monochronics and should be more
willing to trade it for other features. As a result,
if there is variance based on cultural chronism,
a difference in attitudes should be evident when
polychronics and monochronics are offered a
209
Chronism Theory, Culture, and System Delay
tradeoff between delay and content improvements.
The clear, derived hypothesis from this logic is:
H2b: Members of a historically monochronic culture growing up in a majority-monochronic
environment will hold more negative attitudes toward trading increases in delay for
improved functionality than will members of
a historically polychromic culture growing
up in a majority –polychronic environment,
even if members of both groups are now living in a majority-polychronich environment.
Birth with a certain skin pigment or in a certain
household does not negate the impact of the surrounding culture in which a person lives during
her formative years. In fact, if chronism is indeed
a cultural phenomenon, someone who has grown
up in a polychronic environment should exhibit
more tolerance toward increased delay than those
who grow up in a monochronic environment, even
if both are from a historically common subculture.
That is because monochronism must be learned
by experience and it is not a natural state. Per Hall
(1989), growing up within a monochronic culture
is a critical aspect of being monochronic because:
monochronic time is arbitrary and imposed; that
is learned. Because it is so thoroughly integrated
in [a monochronic] culture, it is treated as though
it were the only natural and ‘logical’ way of organizing life. Yet it is not inherent in man’s own
rhythms and creative drives, nor is it existential
in nature (p.20)
As a result, the following hypotheses are
suggested:
H3a: Members of historically monochromic cultures growing up in a majority polychromic
environment will hold more positive attitudes
toward increases in delay than members of
historically monochronic cultures growing
up in a majority monochronic environment,
even if members of both groups are now living in a majority-polychronic environment.
210
H3b: Members of historically monochronic cultures growing up in a majority-polychronic
environment will hold more positive attitudes toward trading increases in delay for
improved functionality than will members of
historically monochromic cultures growing
up in a majority-monochronic environment,
even if members of both groups are now living in a majority-polychronic environment.
Generational differences in attitudes should
not be seen for groups that experienced a common
culture during their formative years. Growing up
in the same cultural chronism conditions, there
should be no significant differences in attitudes
toward increases in delay for members of historically polychronic groups that differ only by age.
Similarly, groups that would have differed historically but instead were integrated during their
formative years should also have no differences
in attitudes toward delay.
H4a: Generational difference in attitudes toward
increases in delay will not be seen within a
historically polychromic culture growing
up in a majority-polychronic environment.
H4b: Generational difference in attitudes toward
trading increases in delat for omproved
functionaliy will not be sen within a historically polychromic culture growing up in a
majority-polychronic environment.
H5a: Members of a historically monochromic
culture growing up in a majority-polychronic
environment will hold similar attitudes
toward increases in delay to members of
a historically polychronic culture growing
up in a majority-polychronic environment.
H5b: Members of a historically monochronic
culture growing up in a majority-polychronic
environment will hold similar attitudes toward trading increases in delay for improved
functionality to members of a historically
polychronic culture growing up in a majoritypolychronic environment.
Chronism Theory, Culture, and System Delay
While we predict generational differences
within groups, there should be no temporal effect
for members of cultural groups in H1-H5. Namely,
once a member of a group takes on cultural characteristics, those characteristics should remain
stable. Culture is a strong influence in people’s
lives, and is particularly resistant to changes over
time (Hofstede, 1980, p. 475). Therefore, we
hypothesize that each of the relationships argued
thus far will hold up over a multi-year study.
Research Model
The research model shown in Figure 1 below
graphically depicts our predictions regarding the
key unresolved issues with respect to chronism
and system response delay.
METHODOLOGY
The hypotheses were tested via a free simulation
experimental method, where the experimental set-
ting duplicates as closely as possible, a real world
situation (Fromkin & Streufert, 1976), (Gefen &
Straub, 2004). The central characteristic of the
free simulation method is to expose participants
to a stimulus of “real-world-like events” (p. 423)
where they are allowed to interact naturally based
on their experience. In a free simulation experiment, variables are not manipulated. They are only
observed and measured (Gefen & Straub, 2004).
Most of the Web system SRT research to date has
been fixed group, controlled experiments using
mock Web sites and browsers with varying degrees
of realism (Ryan & Valverde, 2003). This bias
toward contrived delay environments led (2003)
to conclude that “while it is important to have
absolute control of the variables in experimental
design, a more naturalistic setting might be more
appropriate in order to elicit the true reactions of
subjects” (p. 201).
It is possible that simulated Web browsing may
be the cause of some of the counterintuitive results
in SRT research to date such as non-significance
(Otto, Najdawi & Caron, 2000; Rose, Meuter &
Figure 1. Research Model for Cultural Chronism and System Response Delay
211
Chronism Theory, Culture, and System Delay
Curran 2005; Rose & Straub, 2001), low explained
variation (Galletta et al., 2004; Rose, Meuter &
Curran 2005); and unexpected non-linear relationships (Davis & Hantula, 2001; Galletta et
al., 2004; Otto, Najdawi & Caron, 2000; Rajala
& Hantula, 2000; Rose, Meuter & Curran 2005;
Rose & Straub, 2001). As such, the current design
was selected to stimulate subjects through use of
actual browsers and visits to actual Web sites with
natural delays, similar to Palmer (2002). Because
of the naturalistic methodology chosen, we opted
to measure download delay through estimated and
perceive wait time measures, consistent with other
delay studies (Hui & Tse, 1996; Ranganathan &
Ganapathy, 2002; Rose, Meuter & Curran 2005;
Rushinek & Rushinek, 1986; Straub, Hoffman,
Weber & Steinfield, 2002; Tom et al., 1997;
Weinberg, 2000). As a predictor variable, Davis
et al. (1998) found “actual waits [and] perceived
waits [to be] equally useful” (p. 72). In order to
maximize data sample sizes, a repeated measures
design was adopted, consistent with Rose et al.
(2003). Each subject was exposed to three Web
pages for which a research instrument was completed. These websites were from three different
categories including: a commerce site (Toshiba.
com); a news site (BBC.com); and an entertainment site (Hollywood.com).
For each page, subjects were asked immediately to indicate how many seconds they believed
the page took to load. The purpose of collecting
the perceived wait time (PWT) was to give a
baseline for attitudinal scores and also to look
for outliers that might need to be investigated or
omitted. The plan was to include in our analyses
only those page views with a short response time.
After the PWT was collected, participants were
instructed to answer five attitudinal questions
about delay. For each question, there was a sevenpoint semantic differential scale with anchors of
“not bad” to “very bad.”
The first of the five questions measured the
attitude toward the delay experienced (noted below
as “Att PWT”). This attitude toward the delay was
included to get an anchor point for the subsequent
four questions. The next four questions were designed to be aggregated as a construct measuring
attitude preferences for increases in delay (hereafter referred to as the “Increased Delay Attitude
Construct” or “IDAC”). The items are listed in
Table 1 (in addition to the notation that is used
for each throughout the remainder of the paper).
The IDAC construct includes two items that
measure attitude toward hypothesized increases
in delay of fifteen and sixty seconds. Two additional items measure those increased wait times
in trade for better functionality. The type of functionality was intentionally not defined since that
is beyond the scope of the present project. Subjects
needed to be able to imagine that whatever they
felt could legitimately be categorized as “much
better.” Results would identify different tolerances for tradeoffs in functionality, not prescribe
what the different functionality should be.
Table 1. Items of the Increased Delay Attitude Construct (IDAC)
Notation
Measurement Component
Attitude PWT+15
Consider how long it took for the page to load. If the time it took for the Web page to load were an additional
15 seconds longer, the total wait would then be:
Attitude PWT+60
Consider how long it took for the page to load. If the time it took for the Web page to load were an additional
60 seconds longer, the total wait would then be:
Att trade +15 for better
If the Web page took 15 seconds longer to load, but it offered much better services as a result, the total
wait would then be:
Att trade +60 for better
If the Web page took 60 seconds longer to load, but it offered much better services as a result, the total
wait would then be:
212
Chronism Theory, Culture, and System Delay
Delay times of fifteen and sixty seconds were
chosen for IDAC based on the treatment delay time
of other studies (Dellaert & Kahn, 1999; Ramsay
et al., 1998; Rose, Evaristo & Straub 2003; Rose,
Lees, & Meuter, 2001; Rose, Meuter & Curran
2005; Rose & Straub, 2001; Selvidge, 1999) and
because they captured attitudes and preferences
at both modest and long delay levels. The hope
was to tease out differences between theorized
chronistic groups. Discussions with a group
of older, white South African IT professionals
and academics prior to building the instrument
indicated that these times were long enough to
elicit a change in attitudes from older white South
Africans while still being plausibly long delays.
These IDAC attitudinal questions were then
followed with a scenario asking subjects to find
two pieces of information within the Web site in
a five-minute period. After the tasks were completed or allowed time had elapsed, participants
were asked to evaluate the page using a subset of
eleven items from Palmer’s (2002) Web site assessment instrument. The purpose of the scenario
and evaluation items was twofold. First, it was
included to counteract common methods bias,
and, at the same time provide variety to hopefully
avoid fatigue and hypothesis guessing (Cook &
Campbell, 1979). Second, the items allowed for
a factor analytical test to nomologically validate
the four-item increased delay attitude construct.
Attitudinal data for each of the three pages were
collected and subsequent to this, participants were
asked to share demographic information.
Data were collected in July of 2002 and
February of 2005. Participants were students at
a large, public urban university in South Africa.
Students enrolled in a masters-level informatics
course provided data in 2002 and 2005. First year
students enrolled in an informatics class provided
additional data in 2002. Sample sizes were the
following: Time 1 (2002): older whites (N=24);
older blacks (N=16); younger whites (N=93).
Time 2 (2005): older whites (N=26); older blacks
(N=16); younger whites (N=35). For the testing of
the hypotheses, we set up 5 different subgroups:
younger blacks; younger whites; older blacks;
older whites; and all blacks combined. Younger
groups were 11 years or younger at the Transition. Older groups were 18 years or older at the
Transition. The group of all blacks included any
participant regardless of year of birth (i.e., those
who were 12 through 17 years old at the time of
the Transition were included in addition to the
older and younger participants). There were sufficient data in the 2002 set for analyses for each
of the five subgroups. In 2005, there were not
enough younger black participants for them to be
a separate group in the analyses. The average ages
of members of each group are noted in Table 2.
Machines in the computer lab where the data
were collected were up-to-date, with robust network throughput rates. In fact, machines had been
newly installed when the first data collection in
2002 took place. Since equipment is replaced on
a three-year cycle, the same machines were still
in place for the tests in 2005, which helps to rule
Table 2. Average Age of Participants in 2002 and 2005 Samples
Average Age of Participants
Group
2002
2005
Younger Blacks
18.39
n/a
Younger Whites
18.60
21.35
Older Blacks
33.67
32.80
Older Whites
35.38
34.86
All Blacks
21.19
30.96
213
Chronism Theory, Culture, and System Delay
out an equipment change confound. Configurations in the labs were identical for each station.
ProLine brand computers were used with 1.8 MHz
Intel processors, 40 GB 7200 rpm hard drives,
100 Mbps Intel Ethernet network cards with a
connection to the switch at 100 Mbps, between
switches at 1000 Mbps, between servers at 1000
Mbps, and to the Internet with a 3GB connection.
Each computer had a 17” monitor and was
loaded with Windows XP Professional and Internet Explorer Version 6.
RESULTS
For the analyses below, only South African-born
subject data were included. Of those, only selfreported delays of less than eight seconds were
included in the reported analyses. This cutoff point
was chosen to limit responses to those people
who received a relatively short delay relative to
the IDAC items of fifteen and sixty additional
seconds. Based on this set of conditions, total
sample sizes reported do not equal three page
views per participant. The actual number of valid
data points is proportionately less (roughly 7585% of data points were less than 8 seconds of
perceived wait time).
Reported PWT averages are all less than four
seconds and the differences between mono- and
polychronic groups tested are all less than .67
seconds. These wait times are dwarfed by the
queried IDAC increases of fifteen and sixty
seconds. However, to eliminate the possibility
that differences in PWT were biasing the results,
alternate tests were run to check for any impact
of PWT on the hypothesized outcomes.
In the first alternate tests, PWT thresholds for
groups with significantly higher values were lowered in order to make the PWTs comparable. The
second alternate tests were with all PWTs included.
The third alternate tests flipped which group had
the higher PWT by changing the threshold value
for both groups in different directions.
214
In each of the alternate tests, the directional
hypotheses were confirmed. Likewise, as the
analysis below shows, regardless of which group
has a larger reported PWT in each test, the theorized
monochronic group always has a more favorable
attitude toward the short, initially-reported delay
and the theorized polychronic group always has
a significantly more favorable attitude toward
proposed increases in delay measures. Collectively, differences in reported PWT herein do not
appear to impact the analyses. For parsimony and
clarity, only those with less than eight seconds
are included.
Validation of the Construct
The IDAC was validated with the master’s data set
in 2002. A Principal Component Analysis factor
analysis with a Varimax rotation was performed.
Items included were the four IDAC items and the
eleven items from Palmer (2002). A total of five
components were extracted with eigenvalues > 1.0
(see Table 3). A rotated component matrix found
the IDAC items loaded cleanly in one component
and no other items loaded on that component (see
Table 3). A reliability analysis was run on the four
items to validate their internal consistency. The
Cronbach’s alpha of 0.83 was in excess of Nunnaly’s (1978) recommended threshold of 0.70.
These results indicated the measure was valid and
it was adopted for the entire dataset.
Validation of the Chronism
Manipulation
To validate the groups in our tests each had the
chronism characteristics attributed to them, a
pilot test was run to validate this manipulation.
A ten-item, validated instrument for measuring
cultural chronism was adapted (Bluedorn, Kalliath, Strube, & Martin, 1999) and applied to a
pilot group of South Africans. The instrument
uses a Likert scale from 1 to 7.
Chronism Theory, Culture, and System Delay
Table 3. Factor Analysis Rotated Component Matrix and Eigenvalues
Component
1
Attitude PWT+15
.811
Attitude PWT+60
.829
Att trade +15 for better
.772
Att trade +60 for better
.841
2
3
4
ATTpage A
.775
ATTpage B
.949
ATTpage C
.934
ATTpage D
.682
ATTpage E
.626
ATTpage F
.777
ATTpage G
.625
ATTpage H
.753
ATTpage I
.927
ATTpage J
.909
ATTpage K
Eigenvalues
5
.656
4.017
2.734
1.535
1.481
1.048
Cronbach’s alpha = 0.83
In a confirmatory factor analysis, two items
(items 2 and 10) did not align well with the others and yielded a low Cronbach’s alpha (= .58)
for the reliability of items. Removing these two
items gave clean loadings and an acceptable alpha
(.73). Because of the previously rigorous validation of the instrument (Bluedorn et al., 1999), we
believed elimination of two of ten items was a
modest change and the instrument was still useful
for its current purpose.
The instrument was developed such that higher
scores indicate monochronism and lower scores
indicate relative polychronism. With eight items
and a midpoint of 4 for those items, the mean
chronism score for this instrument was a 32 (=
8 * 4). In our validation test, it was found that
older South African whites (>= 18 years old at
the Transition) were well above this mean with
a chronism score of 37.87 (N = 15). In contrast,
whites who came of age after Apartheid (those
<= 11 years old at the Transition) had a score
below the midpoint with a value of 29.90 (N =
50). An ANOVA comparing these two groups
found significant differences at the .001 level.
These results support our contention that older
whites are more monochronic than their younger
counterparts. Likewise, a test comparing blacks
to older whites found statistical significance at
the .013 level with a relatively polychronic value
of 32.38 for blacks (N = 69) versus the significantly more monochronic 37.87 for older whites.
Collectively, these results validate the chronism
treatment assigning those whites who were 18
years or older at the Transition as monochronic
and blacks and those whites 11 years or younger
at the Transition as polychronic.
215
Chronism Theory, Culture, and System Delay
Table 4. 2002 Attitudes toward Longer SRT by Group
Younger = 19 or less (in 1994 they were 11 or younger)
Older = 26 or more (in 1994 they were 18 or older)
Group
Sample
Size
Mean
Attitude
PWT
Mean
Attitude
PWT+15
Mean
Attitude
PWT+60
ANOVA
p-value
All Subjects
664
2.520
4.400
5.760
0.000***
All Blacks
282
2.730
4.570
5.600
0.000***
All Whites
382
2.370
4.280
5.870
0.000***
Older Blacks
33
2.270
4.000
5.730
0.000***
Older Whites
39
1.900
4.600
6.250
0.000***
Younger Blacks
135
2.770
4.540
5.630
0.000***
Younger Whites
213
2.490
4.170
5.830
0.000***
Hypothesis Tests
Test of Hypothesis H1
Tests of this hypothesis were conducted with
the 2002 data set. ANOVAs were run to test for
significant differences between attitudes toward
PWT and attitudes toward delay if it were increased
by either fifteen or sixty seconds for the page
viewed. All groups held more negative attitudes
toward increases in delay as the proposed delay
increased to an additional fifteen seconds and an
additional sixty seconds. For each of the tested
groups, differences in attitudes were significant
at the .000 level, thus supporting H1. Results of
the analyses are shown in Table 4.
Tests of Hypothesis H2a and H2b
In 2002 older whites had more negative attitudes
toward increases in delay than blacks at the chosen
.05 alpha level. The IDAC measure was 18.27 for
the group of blacks who were 11 or younger at the
Transition (N=135), 17.64 (N=33) for those who
were 18 years old at the Transition, and 18.37 for
blacks of any age combined (N=282). Each was
significantly lower than for those whites who were
18 or older at the Transition (N=39) with a mean
of 21.46, and therefore shows a more negative
216
attitude toward increased delay for older whites
over any category of blacks (at the .001, .003,
and .001 level respectively as shown in Table 5).
In addition, when asked specifically about a
tradeoff for better functionality, black subjects
held more positive attitudes at the alpha level
about trading better functionality for delay than
the older whites. Young blacks, older blacks and
all blacks averaged 3.65, 3.36, and 3.66 respectively for fifteen extra seconds and 4.59, 4.55,
and 4.58 for sixty extra seconds respectively
compared with 4.46 for whites at fifteen seconds
(p-values = .009, .012, and .008) and 6.0 for
sixty seconds (p-values = .000 for each of the
three). It is worth noting that the attitudes of blacks
at a sixty second level is practically the same as
it is for older whites at the fifteen second level.
This level is very close to the middle of the sevenpoint scale and indicates a moderate attitude toward a one-minute delay for improved functionality. Meanwhile, at the sixty-second level, older
whites are near the extreme end of the seven-point
scale and show a strong negative feeling toward
this length of wait.
Differences are more pronounced if the
baseline attitude toward the actual delay is taken
into account. In each case, black groups had less
favorable attitudes (i.e., were more indifferent)
than the older whites for the very short actual
Chronism Theory, Culture, and System Delay
Table 5. 2002 Attitude toward Increased Delay for Older Whites vs. Blacks
Younger = 19 or less (in 1994 they were 11 or younger)
Older = 26 or more (in 1994 they were 18 or older)
Means
Younger
Blacks
Older
Whites
P-value
Older
Blacks
Older
Whites
P-value
All
Blacks
Older
Whites
P-value
Average PWT
3.530
3.950
0.162
3.650
3.950
0.464
3.580
3.950
0.181
Attitude PWT
2.770
1.920
0.001***
2.270
1.920
0.169
2.730
1.920
0.001***
Att trade +15 for better
3.650
4.460
0.009***
3.360
4.460
0.012**
3.660
4.460
0.008***
Att trade +60 for better
4.590
6.000
0.000***
4.550
6.000
0.000***
4.580
6.000
0.000***
IDAC
18.270
21.460
0.001***
17.640
21.460
0.003***
18.370
21.460
0.001***
Net trade +15 for better
0.870
2.540
0.000***
1.090
2.540
0.002***
0.930
2.540
0.000***
Net trade +60 for better
1.810
4.080
0.000***
2.270
4.080
0.000***
1.840
4.080
0.000***
Net IDAC
7.280
13.770
0.000***
8.550
13.770
0.000***
7.480
13.770
0.000***
N=135
N=39
N=33
N=39
N=282
N=39
delay. These differences are significantly so for
young and all-blacks categories at the .001 level
(but not significant for older blacks). Attitudes
toward PWT indicate that short delay was more
favorable to whites and less important to blacks.
Collectively these differences indicate that
black subjects rated various levels of delay in a
narrower band, hovering in the middle of the scales
compared to older whites. This means simply that
black subjects were less concerned with delay at
either end of the attitude scale. Namely, the older
whites viewed the shortest delay with a better attitude than blacks but viewed longer delays more
negatively than blacks. The narrower change in
attitude differences for blacks when compared to
the older whites can also be seen in the net attitude
change measures in Table 5. In each case, the net
change in attitudes between the initial PWT and
proposed increased delays were significantly
smaller for the presumed polychronic subjects than
for the monochronic group. This result is logically
consistent given that polychronics view delay as
a less important phenomenon than monochronics.
Polychronic subjects are apparently less excited
about very short delays and are more tolerant
of very long delay than are their monochronic
counterparts.
The basic patterns of relationships in the 2002
data set were also found in the 2005 data set (see
Table 6). Sample sizes for blacks were too small
for the younger black group (N=11) and as a
result, only older black (N=35) and all black (N
=46) subcategories can be analyzed and reported.
Significant differences were seen in the IDAC
17.85 for older blacks, 18.06 for all blacks, and
21.35 for older whites (p-values = .002 and .001).
Differences were also found for preferences for
trading functionality for extra delay.
Older blacks and all blacks averaged attitudes
of 3.63 and 3.78 respectively for fifteen extra
seconds, and 4.51 and 4.59 for sixty extra seconds
in trade for better functionality respectively.
Older whites averages were 4.50 for an extra
fifteen seconds (p-values = .015 and .027) and
5.94 for an extra sixty seconds (p-values = .000
and .000). Together with the 2002 data results,
these data strongly support H2a and H2b.
The basic patterns of relationships in the 2002
data set were also found in the 2005 data set (see
Table 6). Sample sizes for blacks were too small
for the younger black group (N=11) and as a
result, only older black (N=35) and all black (N
=46) subcategories can be analyzed and reported.
Significant differences were seen in the IDAC
217
Chronism Theory, Culture, and System Delay
Table 6. 2005 Attitude toward Increased Delay for Older Whites vs. Blacks
Younger = 22 or less (in 1994 they were 11 or younger)
Older = 29 or more (in 1994 they were 18 or older)
Means
Older
Blacks
Older
Whites
P-value
All
Blacks
Older
Whites
P-value
Average PWT
2.290
2.700
0.129
2.200
2.700
0.044*
Attitude PWT
2.110
1.720
0.126
2.020
1.720
0.193
Att trade +15 for better
3.630
4.500
0.015**
3.780
4.500
0.027**
Att trade +60 for better
4.510
5.940
0.000***
4.590
5.940
0.000***
IDAC
17.850
21.350
0.002***
18.060
21.350
0.001***
Net trade +15 for better
1.500
2.830
0.002***
1.760
2.830
0.006***
Net trade +60 for better
2.400
4.300
0.000***
2.560
4.300
0.000***
9.400
14.770
0.000***
9.970
14.770
0.000***
N=35
N=69
N=46
N=69
Net IDAC
17.85 for older blacks, 18.06 for all blacks, and
21.35 for older whites (p-values = .002 and .001).
Differences were also found for preferences for
trading functionality for extra delay.
Tests of Hypothesis H3a and H3b
In both 2002 and 2005, our analyses suggest that
cultural chronism has an impact and that the data
support H3a and H3b. Whites who came of age
during Apartheid held significantly more nega-
tive attitudes toward delay than those who were
eleven years old or younger during the Transition.
As indicated in Tables 7 and 8, older whites had
an IDAC score of 21.46 and 21.35 in 2002 and
2005 respectively. Younger whites averaged significantly lower attitudes of 18.31 (p-value = .000)
and 19.29 (p-value = .009) for 2002 and 2005.
Significantly different preferences in tradeoffs
of delay for improved software services were also
seen. Older whites were less favorable to a trade
of an extra fifteen seconds (in 2002 and 2005
Table 7. 2002 Attitude toward Increased Delay for Older Whites vs. Younger Whites
Younger = 19 or less (in 1994 they were 11 or younger)
Older = 26 or more (in 1994 they were 18 or older)
Means
Younger
Whites
Older
Whites
P-value
Average PWT
3.990
3.950
0.884
Attitude PWT
2.490
1.920
0.020***
Att trade +15 for better
3.490
4.460
0.001***
Att trade +60 for better
4.860
6.000
0.000***
IDAC
18.310
21.460
0.000***
Net trade +15 for better
1.000
2.540
0.000***
Net trade +60 for better
2.370
4.080
0.000***
Net IDAC
8.360
13.770
0.000***
N=213
N=39
218
Chronism Theory, Culture, and System Delay
Table 8. 2005 Attitude toward Increased Delay for Older Whites vs. Younger Whites
Younger = 22 or less (in 1994 they were 11 or younger)
Older = 29 or more (in 1994 they were 18 or older)
Means
Younger
Whites
Older
Whites
P-value
Average PWT
3.350
2.700
0.008***
Attitude PWT
1.990
1.720
0.141
Att trade +15 for better
3.500
4.500
0.000***
Att trade +60 for better
5.320
5.940
0.014**
IDAC
19.290
21.350
0.009***
Net trade +15 for better
1.510
2.833
0.000***
Net trade +60 for better
3.333
4.300
0.002***
11.350
14.770
0.001***
N=78
N=69
Net IDAC
respectively: older whites = 4.46 and 4.50;
younger whites = 3.49 and 3.50; p-values = .001
and .000). Likewise, they viewed trading improved
services for an extra sixty-second delay more
negatively (in 2002 and 2005 respectively: older
whites = 6.00 and 5.94; younger whites = 4.86
and 5.32; p-values = .000 and .014). As in comparing blacks to older whites, the differences are
more pronounced when the baseline attitude toward the perceived wait time are considered.
Tables 7 and 8 show a narrower band of attitudes for young whites and a wider difference
for older whites. Once again, the older whites held
more extreme attitudes toward short and proposed
long delays than the hypothesized polychronic
group. Further, it is worth noting that the mean
attitude at a sixty-second level for younger whites
is relatively close to those of older whites at the
fifteen-second level (albeit less so in the 2005
data than in the 2002 data). As was the case with
blacks, attitudes for younger whites for a sixtysecond tradeoff is relatively close to the middle
of the seven-point scale and indicates a moderate
attitude toward a one minute delay for improved
functionality.
Tests of Hypothesis H4a and H4b
Table 9 shows no significant differences between
younger and older blacks and, thus, provides support for both H4a and H4b. In the 2002 dataset,
the IDAC variable averages 18.27 for younger
blacks and 17.64 for older blacks (p-value = .544).
Attitudes toward trading delay for functionality
were also insignificantly different. Tradeoffs at
fifteen seconds evoked an attitude score of 3.65
for younger and 3.36 for older blacks (p-value
.384) and at sixty seconds, scores of 4.59 and
4.55 respectively (p-value.894). Unfortunately,
there were not enough young blacks in the 2005
sample to examine this group.
Tests of Hypothesis H5a and H5b
As shown in Tables 10 and 11, no significant
differences were found between the young white
subjects and any category of black subjects for
the IDAC measure. In 2002, the averages were
18.31 for younger whites, 18.27 for younger
blacks, 17.64 for older blacks, and 18.37 for the
combination of all black subjects (p-values of
.940, .439, and .902 respectively). Similarly, in
2005, the values were 19.29 for younger whites,
219
Chronism Theory, Culture, and System Delay
Table 9. 2002 Attitude toward Increased Delay for Older Blacks vs. Younger Blacks
Younger = 19 or less (in 1994 they were 11 or younger)
Older = 26 or more (in 1994 they were 18 or older)
Means
Younger
Blacks
Older
Blacks
P-value
Average PWT
3.530
3.650
0.695
Attitude PWT
2.770
2.270
0.087
Att trade +15 for better
3.650
3.360
0.384
Att trade +60 for better
4.590
4.550
0.894
IDAC
18.270
17.640
0.544
Net trade +15 for better
0.870
1.090
0.577
Net trade +60 for better
1.810
2.270
0.283
7.280
8.550
0.363
N=135
N=33
Net IDAC
17.85 for older blacks, and 18.06 for all blacks
(p-values of .174 and .207). As stated above,
there were not enough younger black subjects to
conduct tests for that group.
When asked to trade functionality for delay,
no difference is found at the fifteen-second level.
In the 2002 dataset, attitude scores were 3.49 for
younger whites, 3.65 for younger blacks (p-value
= .360), 3.36 for older blacks (p-value = .676),
and 3.66 for all blacks (p-value = .250). In the
2005 data, younger whites averaged an attitude
score of 3.5, while older blacks averaged 3.63
(p-value = .702) and all blacks averaged 3.78
(p-value = .357).
For the sixty-second tradeoff, there are no significant differences in the 2002 dataset, but there
Table 10. 2002 Attitude toward Increased Delay for Younger Whites vs. Blacks
Younger = 19 or less (in 1994 they were 11 or younger)
Older = 26 or more (in 1994 they were 18 or older)
Means
Younger
Blacks
Younger
Whites
P-value
Older
Blacks
Younger
Whites
Pvalue
All
Blacks
Younger
Whites
P-value
Average PWT
3.530
3.990
0.012*
3.650
3.990
0.287
3.580
3.990
0.006***
Attitude PWT
2.770
2.490
0.096
2.270
2.490
0.422
2.730
2.490
0.072
Att trade +15 for
better
3.650
3.490
0.360
3.360
3.490
0.676
3.660
3.490
0.250
Att trade +60 for
better
4.590
4.860
0.114
4.550
4.860
0.261
4.580
4.860
0.063
IDAC
18.270
18.310
0.940
17.640
18.310
0.439
18.370
18.310
0.902
Net trade +15 for
better
0.870
1.000
0.521
1.090
1.000
0.747
0.930
1.000
0.669
Net trade +60 for
better
1.810
2.370
0.016**
2.270
2.370
0.794
1.840
2.370
0.006**
7.280
8.360
0.146
8.550
8.360
0.879
7.480
8.360
0.154
N=135
N=213
N=33
N=213
N=282
N=213
Net IDAC
220
Chronism Theory, Culture, and System Delay
Table 11. 2005 Attitude toward Increased Delay for Younger Whites vs. Blacks
Younger = 22 or less (in 1994 they were 11 or younger)
Older = 29 or more (in 1994 they were 18 or older)
Means
Older
Blacks
Younger
Whites
P-value
All
Blacks
Younger
Whites
P-value
Average PWT
2.290
3.350
0.000***
2.200
3.350
0.000***
Attitude PWT
2.110
1.990
0.654
2.020
1.990
0.892
Att trade +15 for better
3.630
3.500
0.702
3.780
3.500
0.357
Att trade +60 for better
4.510
5.320
0.018*
4.590
5.320
0.019*
IDAC
17.850
19.290
0.174
18.060
19.290
0.207
Net trade +15 for better
1.514
1.513
0.997
1.760
1.510
0.481
Net trade +60 for better
2.400
3.333
0.038*
2.560
3.330
0.065
Net IDAC
9.400
11.350
0.176
9.970
11.350
0.306
N=35
N=78
N=46
N=78
are significant differences in the 2005 data set.
For 2002, attitude scores were 4.86 for younger
whites, 4.59 for younger blacks (p-value = .114),
4.55 for older blacks (p-value = .261), and 4.58
for all blacks (p-value = .063). In the 2005 data,
younger whites averaged an attitude score of
5.32, while older blacks averaged 4.51 (p-value
= .018) and all blacks averaged 4.59 (p-value =
.019). Likewise, the net changes in attitude at the
sixty-second level are significantly different for
two of three groups in 2002 and one group in 2005.
Overall, therefore, it appears that attitudes
between the samples differ when it comes to
trading a very long wait for better functionality.
Analyses indicate that the younger South African
whites may be more polychronic in general than
older whites, but are slightly more monochronic
in their preferences at extreme levels of delay than
South African blacks.
CONTRIBUTIONS AND DISCUSSION
This experiment produces evidence that indeed
chronism impacts attitudes and preferences toward
SRT. Each of the proposed hypotheses in this study
was confirmed in both 2002 and 2005 datasets.
Contributions for Practice
Results from this study can be applied to make
culturally-sensitive application designs in both the
developed and developing economies of the world.
Specifically, it appears there are real cultural differences in preferences for tradeoffs of functionality
for increased delay. The currency of time that is so
valuable in monochronic cultures and often noted
in USA software design guidelines (Galletta et al.,
2004; Nah, 2004; Shneiderman, 1998; Tedeschi,
1999) appears to be less significant in polychronic
cultures. Given that many polychronic cultures are
in lesser-developed economies, there are fewer
resources and poorer access to speedy computers
and networks. When governments or service providers in these countries build applications, they
should be wary of adopting USA design standards.
Instead, the objective appears to be to offer better services even if it means delays of more than
sixty seconds based on the results above. This is
strongly supported by the data, which indicate that
polychronic attitudes toward trading functionality
for an additional sixty second delay is relatively
moderate (a mean of near 4.5). Furthermore, our
results suggest that the barriers to entry to offering
viable service provision are lower in polychronic
221
Chronism Theory, Culture, and System Delay
cultures than in a monochronic cultures. This is
because many of the remedies for slow SRT are
expensive and require speedy servers and broadband connectivity. These expenses are mandatory
based on monochronic specifications. However,
service providers in polychronic cultures apparently could suffice with more affordable narrowband connections and less responsive hardware.
Likewise, it should be noted that there appears to
be fewer benefits for reducing speeds to very low
levels for polychronics relative to monochronics.
Results of the tests herein indicate that attitudes
toward near-zero delay are not as positive for
polychronics as they are for monochronics. As a
result, it seems that not only are there more degrees
of freedom for increasing delay for polychronics,
but also that there is less to be gained by reducing
delays to USA standards of very low levels for
polychronics. Taken collectively, it would seem
that developers should think about content first
and foremost when designing for polychronic
populations. Monochronic-focused applications
in contrast should continue to follow the advice
of the traditional SRT research.
Contributions for Research
Beyond prescriptive benefits to practitioners,
results of this study advance the understanding
of cultural chronism in the academic community.
Research in chronism has been advanced by showing that chronism is not a trivial attribute that is
discarded as circumstances change. Over time,
older whites retained their monochronism even as
the world around them and younger whites turned
polychronic. The fact that younger whites do differ
from older whites shows that a cultural attribute can
change over a single generation within an ethnic
group. It is clear from the data analyses conducted
here that younger South African whites after the
Transition have cultural responses to chronism that
differ from their elders, but are remarkably similar
to those of South African blacks. It is extraordinary that this change would have occurred within
222
a single generation for so many in our samples.
While this possible cultural change reflects only
one cultural value among the many that are fully
experienced by humans (McCoy, 2005; Straub,
Hoffman, Weber & Steinfield, 2002), it does hint
that cultural exposure during formative years can
result in very rapid change from traditional norms
within a subculture.
The final contribution from this research is
specific to South Africans. This research provides
insights into the culture of the new South Africa.
Cultural perspectives from sources such as Hofstede are clearly outdated since they took place
prior to the Transition. This new South Africa is
currently an unknown culture. The current research
project participates in the nascent but important
research into understanding the new “Rainbow
Nation” (Hugo, 2000). In doing so, it contributes to the call to arms by Hugo (2000; 2002)
to understand how to create culturally-sensitive
software applications for the various subcultures
of post-Apartheid South Africa. South Africa can
“no longer afford to exclude any individual or any
sector of society from access to, and benefiting
from information technology” (Hugo, 2000).
While appreciation of the link between culture
and information systems (IS) has been recognized
as important throughout the IS community (see
such papers as Ford et al. (Ford, Connelly, & D.
B. Meister, 2003) or Gallupe and Tan (1999) for
an extensive review of culture and IT literature),
it is all the more critical in South Africa because
of the unique history and scars left by Apartheid.
Specifically, “without proper understanding of the
cultural variables involved, [information systems
and technology] threaten to expand, rather than
resolve, certain cultural conflicts” (Hugo, 2000).
LIMITATIONS AND
FUTURE RESEARCH
The advantage of free simulation experiments
is the realism of the setting for subjects and the
Chronism Theory, Culture, and System Delay
ability of subject responses to range freely over
the independent variables of interest (Fromkin
& Streufert, 1976). We chose to provide a real
Web browsing experience and capture delay
with the PWT construct. Our method did so at
the expense of controlling delay. As indicated
in Rose et al. (Rose, Meuter & Curran 2005;
Rose & Straub, 2001), findings based on single
measures of delay likely need to be repeated with
alternative measures (such as attributable delay or
controlled delay) to validate and understand the
studied phenomena. A lab or field experiment that
controlled the delay time (as in (Davis & Hantula,
2001; Galletta et al., 2004; Nah, 2004; Rajala &
Hantula, 2000; Rose, Meuter & Curran 2005))
or one that capture attributable delay should be
conducted to validate these findings.
In addition for varying the measures of delay,
future research should vary the means of identifying chronism. Researchers interested in chronism
should not only control SRT, but should also consider direct measures of cultural characteristics.
The latter is an area that is still underdeveloped
and cross-cultural IT researchers are now being challenged to go beyond Hofstede and Hall
in their conceptualizations of culture (McCoy,
2005; Straub, Loch, Evaristo, Karahanna, & Srite,
2002). Regardless of how chronism is identified,
research should also be conducted to identify
where pockets of mono and polychronism exist
in target populations. This will allow practitioners
to target software designs appropriately based on
SRT standards.
A question that may arise is whether economic
status confounds chronism. This is possible, but
results herein make them appear unlikely. One
of the key points of the findings of this research
is that young whites, which are still living with a
high economic status in South Africa, have turned
polychronic and stayed that way between 2002
and 2005. This may, however, be a question for
future research to refine.
Future research should also begin to look into
the tradeoffs suggested by this study. If polychron-
ics are indeed more willing to trade delay for some
improvement in services, it is important to find out
what those services are for the targeted groups.
Software developers should offer screens with fast
downloads, for example without the graphics, for
monochronics and another option to download the
full function screen for polychronics (Hoxmeier &
DiCesare, 2000). One needs to look at how much
work needs to be done by software developers to
make noticeable differences in the download time
relative to different software applications. Galetta
et al. (2004) found that attitudinal effects of delay
were alleviated during long delays.
This need for software specification research
outside of the developed economies of the USA
and Northern Europe are made clear by the findings herein. More research needs to be done to
identify design preferences for developing nations.
Future research also needs to look at the fact that
polychronics are naturally good at multitasking and may not mind a longer download time
because they can do other tasks while waiting.
Monochronics are not good at multitasking and
will get frustrated by the longer download times.
CONCLUSION
The current study examines the impact of cultural
chronism on responses to download delay. Knowledge of possible cultural effects can aid designers
in intelligently planning the trade-off between
content size and delay effects. For those cultures
that are more accepting of delay, richer websites
can be created to attract and retain customers.
The vast majority of prior work in this critical area has been in developed countries where
monochronism is the dominant cultural tendency.
Therefore, before the current study, we have had
little scientific evidence for the presence of such
effects in the developing world, which is overwhelmingly polychronic.
Using a robust free simulation experimental design, the present work examined monochronic and
223
Chronism Theory, Culture, and System Delay
polychronic cultural effects in an unconfounded
single network setting. This design allowed us to
rule out the possible confound of infrastructural
differences. Findings were supportive and predicted differences were found between mono- and
polychronics in both the initial data gathering and
in the replicated tests three years later.
Research in the developing world is lagging
in many areas, but this study is an addition to this
small but growing pool. Over time, it is hoped that
an expanding tradition of work will allow us to
learn ways in which systems can be better designed
and networks can be configured to accommodate
cultural features of these regions of the world.
REFERENCES
Anonymous. (2003, October 28). Can Africa keep
time? BBC News. Retrieved from http://news.bbc.
co.uk/1/hi/world/africa/3211923.stm
Barber, R. E., & Lucas, H. C. J. (1983). System
response time, operator productivity and job satisfaction. Communications of the ACM, 26(11),
972–986. doi:10.1145/182.358464
Bayo, M. I., Ekene, N. S., Kenneth, A., & Idowu,
S. F. (2007). Software development: An attainable
goal for sustainable growth in developing nations.
International Journal of Physical Sciences, 2(12),
318–323.
Benson, T. (2005, March 28). Brazil: Free
software’s biggest and best friend. NYTimes
Online. Retrieved from http://www.nytimes.
com/2005/2003/2029/technology/2029computer.
html
Bluedorn, A. C., Kalliath, T. J., Strube, M. J.,
& Martin, G. D. (1999). Polychronicity and the
Inventory of Polychronic Values (IPV): The development of an instrument to measure a fundamental
dimension of organizational culture. Journal
of Managerial Psychology, 14(3/4), 205–230.
doi:10.1108/02683949910263747
224
Cook, T. D., & Campbell, D. T. (1979). Quasi
experimentation: Design and analytical issues
for field settings. Chicago, IL: Rand McNally.
Davis, E. S., & Hantula, D. A. (2001). The effects
of download delay on performance and end user
satisfaction in an Internet tutorial. Computers in
Human Behavior, 17(3), 249–268. doi:10.1016/
S0747-5632(01)00007-3
Davis, M. M., & Heineke, J. (1998). How disconfirmation, perception and actual waiting times
impact customer satisfaction. International Journal of Service Industry Management, 9(1), 64–73.
doi:10.1108/09564239810199950
Dellaert, B. G. C., & Kahn, B. E. (1999). How tolerable is delay? Consumers’ evaluations of Internet
Web sites after waiting. Journal of Interactive Marketing, 13(1), 41–54. doi:10.1002/(SICI)15206653(199924)13:1<41::AID-DIR4>3.0.CO;2-S
Devaraj, S., Fan, M., & Kohli, R. (2006). Examination of online channel preference: Using the
structure-conduct-outcome framework. Decision
Support Systems, 42, 1089–1103. doi:10.1016/j.
dss.2005.09.004
Dowling, M. (2002). The electronic passport to
Apartheid. Retrieved from http://www.mrdowling.com/610-apartheid.html
Ewalt, D. M. (2002, February 19). Count to
10, then read this. Information Week. Retrieved
from http://www.informationweek.com/story/
IWK20020219S20020013
Ford, D. P., Connelly, C. E., & Meister, D. B.
(2003). Information Systems research and Hofstede’s culture’s consequences: An uneasy and
incomplete partnership. IEEE Transactions on Engineering Management, 50(1), 8–25. doi:10.1109/
TEM.2002.808265
Fromkin, H. L., & Streufert, S. (1976). Laboratory
experimentation. In Handbook of industrial and
organizational psychology (pp. 415–465). Chicago, IL: Rand McNally Publishing Company, Inc.
Chronism Theory, Culture, and System Delay
Galletta, D., Henry, R., McCoy, S., & Polak, P.
(2004). Sensitivity to Web delays: A contingency
analysis of users’ tolerance for slow Web sites.
Journal of AIS, 5(1), 1–28.
Hugo, J. (2002). HCI and multiculturalism in
Southern Africa. Retrieved from http://www.
chi-sa.org.za/articles/HCIculture.htm
Gallupe, R. B., & Tan, F. (1999). A research manifesto for global information management. Journal
of Global Information Management, 7(1), 5–18.
Hui, M. K., & Tse, D. K. (1996). What to tell
consumers in waits of different lengths: An integrative model of service evaluation. Journal of
Marketing, 60(2), 81–90. doi:10.2307/1251932
Gefen, D., & Straub, D. W. (2004). Consumer
trust in B2C e-commerce and the importance of
social presence: Experiments in e-products and
e-services. Omega, 32, 407–424. doi:10.1016/j.
omega.2004.01.006
Jacko, J. A., Sears, A., & Borella, M. S. (2000).
The effect of network delay and media on
user perceptions of Web resources. Behaviour
& Information Technology, 19(6), 427–439.
doi:10.1080/014492900750052688
Goble, C. E. (2002). The Internet – An elitist luxury
or the people’s necessity? South African Journal
of Information Management, 4(3). Retrieved
from http://general.rau.ac.za/infosci/raujournal/
student19.14nr13.asp?print=11
Katz, L. (2003, January 16). Off the back of
a truck. Guardian Unlimited. Retrieved from
http://travel.guardian.co.uk/activities/wildlife/
story/0,10234,874764,874700.html
Guynes, J. L. (1988). Impact of system response
time on state anxiety. Communications of the
ACM, 31(3), 342–347. doi:10.1145/42392.42402
Hall, E. T. (1966). The hidden dimension. Garden
City, NY: Doubleday.
Hall, E. T. (1989). Beyond culture (2nd ed.). New
York, NY: Anchor Books.
Hall, E. T. (1990). The silent language (2nd ed.).
Garden City, NY: Anchor Books.
Hofstede, G. (1980). Culture’s consequences:
International differences in work-related values.
Beverly Hills, CA: Sage.
Hoxmeier, J. A., & DiCesare, C. (2000). System
response time and user satisfaction: An experimental study of browser-based applications. Paper presented at the Association of Information
Systems Americas Conference.
Hugo, J. (2000). South Africa’s first HCI Conference: CHI-SA 2000 - A rainbow of opportunity.
Paper presented at the First Conference on Human Computer Interaction in Southern Africa,
South Africa.
Khosrow-Pour, M., & Herman, N. (2000). Webenabled technologies assessment and management: Critical issues, challenges and trends. In
Khosrow-Pour, M. (Ed.), Managing Web-enabled
technologies in organizations: A global perspective (1st ed., pp. 1–22). Hershey, PA: Idea Group
Publishing. doi:10.4018/9781878289728.ch001
Lee, I., Choi, B., Kim, J., & Hong, S. (2007).
Culture-technology fit: Effects of cultural characteristics on the post-adoption beliefs of mobile
Internet users. International Journal of Electronic
Commerce, 11(4), 11–51. doi:10.2753/JEC10864415110401
McCoy, S., Galetta, D. F., & King, W. R. (2005).
Integrating culture into IS research: The need for
current individual-level measures. [CAIS]. Communications of the Association for Information
Systems, 15, 211–224.
Mohammed, T., & Miller, J. (2002). South African
sample country profile: The global competitiveness report 2001-2002.Unpublished manuscript.
Morrison, T., Conway, W. A., & Douress, J. J.
(1999). Dun & Bradstreet’s guide to doing business around the world. Prentice-Hall.
225
Chronism Theory, Culture, and System Delay
Nah, F. F.-H. (2004). A study on tolerable waiting
time: How long are Web users willing to wait?
Behaviour & Information Technology, 23(3),
153–163. doi:10.1080/01449290410001669914
Nunnaly, J. C. (1978). Psychometric theory (2nd
ed.). New York, NY: McGraw Hill.
Otto, J. R., Najdawi, M. K., & Caron, K. M.
(2000). Web-user satisfaction: An exploratory
study. Journal of End User Computing, 12(1),
3–10. doi:10.4018/joeuc.2000100101
Palmer, J. (2002). Web site usability, design,
and performance metrics. Information Systems Research, 13(2), 151–167. doi:10.1287/
isre.13.2.151.88
Prime, N. (1999). Cross-cultural management in
South Africa: Problems, obstacles, and agenda for
companies. Paper presented at the Seventh Cross
Cultural Research Conference, Cancun.
Rajala, A. K., & Hantula, D. A. (2000). Toward
a behavioral ecology of consumption: Delayreduction effects on foraging in a simulated Internet mall. Managerial and Decision Economics,
21(3-4), 145–158. doi:10.1002/mde.979
Ramsay, J., Barbesi, A., & Preece, J. (1998).
A psychological investigation of long retrieval
times on the World Wide Web. Interacting with
Computers, 10(1), 77–86. doi:10.1016/S09535438(97)00019-2
Ranganathan, C., & Ganapathy, S. (2002). Key
dimensions of business-to-consumer Web sites.
Information & Management, 39(6), 457–465.
doi:10.1016/S0378-7206(01)00112-4
Rose, G. M., Evaristo, R., & Straub, D. (2003).
Culture and consumer responses to Web download time: A four-continent study of mono and
polychronism. IEEE Transactions on Engineering Management, 50(1), 31–44. doi:10.1109/
TEM.2002.808262
226
Rose, G. M., Lees, J., & Meuter, M. (2001).
A refined view of download time impacts on
e-consumer attitudes and patronage intentions
toward e-retail. International Journal of Media
Management, 3(2), 105–111.
Rose, G. M., Meuter, M., & Curran, J. (2005).
Online waiting: The role of download time and
attitudinal variables on attitude toward e-retailers.
Psychology and Marketing, 22(2), 127–151.
doi:10.1002/mar.20051
Rose, G. M., & Straub, D. (2001). The effect of
download time on consumer attitude toward the
e-service retailer. e-Service Journal, 1(1), 55-76.
Rushinek, A., & Rushinek, S. F. (1986). What
makes users happy? Communications of the ACM,
29(7), 594–598. doi:10.1145/6138.6140
Ryan, G., & Valverde, M. (2003). Waiting online:
A review and research agenda. Internet Research:
Electronic Networking Applications and Policy,
13(3), 195–205. doi:10.1108/10662240310478213
Ryan, G., & Valverde, M. (2006). Waiting in line
for online services: A qualitative study of user’s
perspective. Information Systems Journal, 16,
181–211. doi:10.1111/j.1365-2575.2006.00214.x
Schleifer, L. M., & Amick, B. C. (1989). System
response time and method of pay: Stress effects
in computer-based tasks articles. III International
Journal of Human-Computer Interaction, 1(1),
23–39. doi:10.1080/10447318909525955
Selvidge, P. (1999). How long is too long for
a Website to load. Usability News, 1(2). Retrieved from http://psychology.wichita.edu/surl/
usabilitynews/1s/time_delay.htm
Shneiderman, B. (1998). Designing the user interface: Strategies for effective human-computer interaction (3 ed.). Reading, MA: Addison-Wesley.
Chronism Theory, Culture, and System Delay
Straub, D. W., Hoffman, D., Weber, B., &
Steinfield, C. (2002). Toward new metrics for
net-enhanced organizations. Information Systems Research, 13(3), 227–238. doi:10.1287/
isre.13.3.227.80
Straub, D. W., Loch, K. D., Evaristo, R., Karahanna, E., & Srite, M. (2002). Toward a theory-based
measurement of culture. Journal of Global Information Management, 10, 13–23. doi:10.4018/
jgim.2002010102
Tedeschi, B. (1999). Good Web site design can
lead to healthy sales. New York Times. Retrieved
from http://www.nytimes.com/library/tech/99/08/
cyber/commerce/30commerce.html
Tella, S. (2000). Achronos: Reflections on timeless time, media and communication. In Tella,
S., & de Vries, J. (Eds.), Media, mediation, time
and communication: Emphases in network-based
media education (Vol. 9, pp. 83–100). Helsinki,
Finland: University of Helsinki.
Tom, G., Burns, M., & Zeng, Y. (1997). Your life
on hold: The effect of telephone waiting time
on customer perception. Journal of Direct Marketing, 11(3), 25–31. doi:10.1002/(SICI)15227138(199722)11:3<25::AID-DIR5>3.0.CO;2-Z
van Everdingen, Y. M., & Waarts, E. (2003).
The effect of national culture on the adoption of
innovations. Marketing Letters, 14(3), 217–232.
doi:10.1023/A:1027452919403
Weinberg, B. D. (2000). Don’t keep your customers waiting at the (virtual) front door. Journal of
Interactive Marketing, 14(1), 30–39. doi:10.1002/
(SICI)1520-6653(200024)14:1<30::AIDDIR3>3.0.CO;2-M
Wines, M. (2003,April 12).Amean scrum on playing
fields of South Africa. New York Times. Retrieved
from http://www.nytimes.com/2003/2009/2012/
international/africa/2012AFRI.html
Wines, M., & LaFraniere, S. (2004, April 26). Decade of democracy fills gaps in South Africa. New
York Times. Retrieved from http://www.nytimes.
com/2004/04/26/international/africa/26AFRI.ht
ml?hp=&pagewanted=print&position=
Wirtz, J. B., & Bateson, J. E. (1995). An experimental investigation of halo effects in satisfaction measures of service attributes. International
Journal of Service Industry Management, 6(3),
84–102. doi:10.1108/09564239510091358
227
228
Chapter 11
A Cross-National Study of
Mobile Internet Services:
A Comparison of U.S. and Korean
Mobile Internet Users
Dong Hee Shin
Sung Kyung Kwan University, South Korea
ABSTRACT
This study surveyed mobile users in the United States and Korea to determine the key differences between
the two countries. Survey questions, developed in two languages, were presented in each country to
explore the influences of informativeness, entertainment, interactivity, and availability on mobile user
dimensions. The study design methods were based on the revision of a uses and gratifications approach,
and a relational model of antecedents and consequences was tested with a structural equation modeling
approach. Mobile Internet service uses and gratifications were analyzed cross-nationally in a comparative fashion focusing on the differences in the composition of motives in the two countries. Based on
the results of this study, practical implications for marketing strategies in mobile service markets and
theoretical implications for cross-country studies are recommended accordingly.
INTRODUCTION
Mobile Internet services have become a major
interest for the information system research community. Current mobile devices provide users
with various advanced services, including mobile
DOI: 10.4018/978-1-60960-605-3.ch011
television service with additional audio and data
services that can be viewed on cell phones, portable
receivers, or vehicle terminals (Shin, 2008). Recent
technological convergence allows cell phone and
personal digital assistant users to watch terrestrial
digital television on their portable communication
devices. Through advanced mobile devices, users
can tune into regular TV programming or watch
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Cross-National Study of Mobile Internet Services
content-on-demand through portable terminals
that include mobile handsets and mini-TVs installed in their cars. Various data services based
on two-way communication capability are also
available. For example, users watching a movie on
their mobile devices can retrieve the background
data of one of the movie’s stars by clicking on
a certain part of the screen. While watching a
cooking program, users can store the recipe in a
computer or get a print-out. When other software
applications are in place, mobile devices will also
enable users to pay for purchases while watching
a TV home shopping program on mobile handsets.
This mobility increases users’ control over mobile
services, allowing them to enjoy interactive services. Industry and academia alike wonder how
users utilize mobile device, what they watch, and
with what gratifications (Shin, 2007, 2008).
Even though the literature on the adoption and
the use of media and the Internet is quite extensive,
few studies have explored the motivations for using the recent convergence mobile services, such
as satellite mobile TV, telematics, and IPTV, and
the associated antecedents and consequences from
a comparative perspective. Traditional models of
media uses and gratifications (U&G) can be applied to convergence technologies, improving our
understanding of U&G of these new services. The
U&G theory claims that users are seen as active and
focuses on the explanations for users’ motivations
and associated behaviors (Eighmey & McCord,
1998; Ruggiero, 2000). The key research question
of the present study is to investigate user attitudes
toward mobile services in a two-country context
in order to investigate differences that may exist
for U&G of mobile services. Although there might
be no universal measurements of user activities,
motivations, and cultural values that is applicable
to different countries, this information is basic
to understanding why certain mobile services
are adopted in some countries and not in others.
Shin (2008) and Kim, Lee, and Lee (2004) urged
researchers to conduct cross-country studies to
determine if U&G were universals or if they serve
different functions in different societies. The innovative and global nature of mobile services has
fostered many visions of comparative understanding among countries, although the research in this
area is still at a very early, exploratory stage. As
mobile services become more and more global,
a cross-national comparison would be useful in
providing practical implications for the industry
for developing global markets. This comparative
study can also be useful in academia by providing theoretical implications for the cross-cultural
studies of technology adoption and usage.
The relational model of the antecedents and
consequences of attitude toward mobile services
is tested by a structural equation modeling (SEM)
analysis. The SEM approach is adopted because
this study vigorously tests the convergent, discriminant, and nomological validity of U&G
constructs or the extent to which predictions
of the model are verified. SEM as compared to
multiple regression has advantages: inclusion of
more flexible assumptions (particularly allowing
interpretation even in the face of multicollinearity),
use of confirmatory factor analysis to reduce measurement error by having multiple indicators per
latent variable, the desirability of testing models
overall rather than coefficients individually, the
ability to test models with multiple dependents,
and the ability to model mediating variables rather
than be restricted to an additive model. Moreover,
where regression is highly susceptible to error
of interpretation by misspecification, the SEM
strategy of comparing alternative models to assess
relative model fit makes it more robust.
The study applies the attitude scales toward
mobile service (Stafford & Gilleson, 2004) to
recently developed mobile services. Consumers’
attitudes toward mobile services have been considered a key indicator of service effectiveness
and consumers’ belief in mobile services (Tsang,
Ho, & Liang, 2004), just as attitude to services has
been supported as a key predictor of subscriptions
in the literature (e.g., Laughlin, 2001). Thus, the
explanatory effects of U&G can be generalized
229
A Cross-National Study of Mobile Internet Services
to a mobile conceptual model. This model guides
the research questions and measurement instruments. When exploring the relationship between
mobile U&G, this study addresses the following
research questions:
RQ1: What are the U&G of mobile services among
users in the two countries?
RQ2: Which variables most significantly affect
satisfaction in mobile services in the two countries?
RQ3: What cross-national differences exist for
the U&G of mobile services? Is there any difference in the structural relations of factors across
the two countries?
With the RQs in place, the goal of this study is
to compare the U&G patterns in the two countries’
users. Shin (2007) argues that greater mobile experience and usage confidence generally broaden
the scope of users’ mobile activities. The present
study examines this premise in a two-country
context, with the underlying assumption that
differing stages of mobile diffusion would be
reflected in the range of activities pursued. The
two countries have in common that both countries
represent one of the highest mobile diffusions in
the world and both countries take the leads in
mobile TV standards, while the two standards are
competing globally to be adapted and evolved for
use in mobile handsets.
This study differs from other descriptions or
comparisons of mobile activities in several ways.
First, it develops a specific attitude and behavior on
mobile service (particularly in convergence technologies) representing the range of user interactions with mobile Internet. Second, to capture both
quantity and quality of online audience activity, it
explores consumer activity participation in terms
of exposure (time and frequency) and gratifications
(cognitive and emotional). Third, its comparison
of the U.S. and Korean mobile users provides a
230
cross-country perspective on user activity at different stages of mobile proliferation. Finally, the
study also addresses the paucity of mobile service
adoption research in the international arena. The
uniqueness of local mobile markets along with the
increasing trend for global mobile-business has
led to a growing need for cross-national studies
on the mobile Internet.
As to contributions, the findings should be
of interest to both academics and practitioners.
From a theoretical perspective, drawing upon
the modified U&G, this study provides a model
to identify antecedents of user intention to use
mobile Internet. The modified model seems well
suited for developing an evaluative framework for
services that are adopted for functional reasons
and services that are directed specifically at innovative user attitudes. Several researchers have
explored U&G applications in the mobile context.
Extensive studies in mobile services have been
conducted by the management of information system fields using a Technology Acceptance Model,
or usability approach. Mobile services from a
media perspective remain an under-researched
area. Although the platform of mobile Internet is
a telecommunication infrastructure, its content
over wireless networks is still broadcasting.
Therefore, it is worthwhile to examine mobile
users’ behavioral aspects from the media usage
perspectives. The present research is intended to
address this literature deficiency by linking the
well-established U&G framework to mobile user
behaviors. Specifically, variables based on U&G
theory are considered the antecedents of attitude
toward mobile Internet services, while the usage
and satisfaction are modeled as the consequences
of attitude toward mobile services.
From a practical standpoint, the findings
of this study provide a good basis for industry
developing a service evaluation framework to
determine the adoption potential of new mobile
services. Mobile service developers are facing the
challenge for how to create an environment with
ease to play and fun to enjoy. Yet, the interface
A Cross-National Study of Mobile Internet Services
designs for related service elements as qualities
are rarely discussed in the context of U&G. The
findings in this study should be useful for mobile
developers to improve their works.
LITERATURE REVIEW AND
HYPOTHESIS DEVELOPMENT
Few studies have taken a U&G approach in studying the mobile services, and even fewer have
narrowed their focus to look at it in a comparative
perspective. This research gap―a lack of studies
applying traditional U&G theory to the motivation
of new mobile services―presents this study with
a research opportunity.
Uses and Gratifications Theory
U&G as a media use theory from mass communications research guides the assessment of user
motivations for media usage and access. Recent
adaptations of U&G research to new convergence
technologies broaden the capability of U&G to
assess new technologies (Shin, 2008). Many studies of technology have extended the U&G theory
to new technologies, including the predicting and
assessing of convergence technologies. Stafford’s
(2004) and Nysveen, Pedersen, and Thorbjørnsen’s (2005) studies of motivations in the use of
the Internet offer examples of the extension of the
U&G approach to information system research.
These pioneering interdisciplinary studies have
been followed by numerous other studies that have
applied a U&G approach to emerging technologies
(Shin, in press). Since the results of Internet U&G
studies based on scales from television research
have subsequently not been very predictive of
Internet use (Lin, 1999), there is a clear need to
extend the process of developing U&G measures
specific not only to the Internet but also to the
unique user interface of mobile devices when
using U&G to understand mobile device users’
motivations. This extension can be a meaningful
task considering the convergence trends.
Hypotheses
Based on the U&G literature, the present study
made a list of possible motives related to the
convergence service via mobile device use such
as entertainment, informativeness, usefulness,
irritation, and interactivity. In addition, possible
gratifications from mobile services, such as
mobility, immediate access, relaxation, escape,
killing time, and expression of identity/fashion/
status, were collected. This study conducted pilot
studies via three focus-group sessions in each
country and in-depth interviews with 10 mobile
Internet users in the two countries respectively.
The results from the two countries were compared and contrasted, and six dimensions emerge:
entertainment, informativeness, interactivity,
usefulness, connectedness, and irritation. These
six dimensions are also recommended by the
experts in mobile communications from the two
countries. Two groups of mobile telecom experts
advised this study on the possible dimensions,
which are also almost identical to the suggestions
by a group of researchers in academia. This study
sought professional advice on the possible dimensions to 23 researchers in the areas of information systems, technology adoption research, and
human-computer interaction. For triangulation
of the dimensions, academia suggestions were
compared with those from industry. Based on a
final list of dimension, exploratory factor analysis
identifies four dimensions (entertainment, informativeness, interactivity, and availability), which
by large confirm previous literature on Internet
and mobile devices.
Entertainment
The entertainment construct has been referred to
as motivation seeking pleasure and enjoyment,
or escapism (Shin, 2007; McQuail, 2000; Eigh-
231
A Cross-National Study of Mobile Internet Services
mey & McCord, 1998; Eighmey, 1997). While
users seem to seek habitual pleasures, such as
environmental reasons of background noise and
regulative uses for the punctuation of time and
activity (Lull, 1990), mobile users appear to
seek occasional entertainment with the ability to
watch short programs whenever the user wants
(Sordegard, 2005). This difference is also found in
viewing pattern and time spent on mobile services.
According to Shin’s (2008) survey, the average
time session using mobile services is less than
five minutes in a commuting time (morning and
evening), and typical usages are short games and
traffic/weather information.
Previous research suggests that providing
higher entertainment value is likely to lead to an
advantage for users and to motivate them to use
technologies more often (Leung & Wei, 2000).
For example, people use media either for the
content (enjoyment) carried by a medium or for
the simple experience and enjoyment of the actual
usage process (Stafford et al., 2004). Coursaris,
Hassanein, and Head (2003) further developed the
relation between entertainment and mobile service
and found that entertainment is positively related
to the mobile media value and attitude to mobile
service. This finding is corroborated by Stafford
and Gilleson’s study (2004) that entertainment
is positively associated with the motivation for
mobile services, although their study has not
vigorously tested (e.g., using the SEM approach)
the scales of attitude toward the mobile Internet
and U&G underlying dimensions. Following this
stream of research, the following hypothesis is
proposed:
H1: Entertainment offered by mobile Internet
service is positively associated with the attitude
toward mobile service.
Informativeness
McQuail (2000) defines information uses as utilizing media to educate users in certain areas, such
232
as learning more about the world, seeking advice
on practical matters, or fulfilling user curiosity.
While information uses in media are generally
broad, information seeking in mobile services
tends to be more specific than those in media.
Leung and Wei (2000) define informativeness in
mobile service as the extent to which the mobile
service provides users with pertinent and useful
information. Leung and Wei (2000) argue that
users consider a mobile phone’s functionality to
provide timely information as the most fundamental reason for adopting mobile services. Similarly,
Stafford et al. (2004) show that the informational
feature in mobile devices is its major function
that draws customers’ attention. Without the time
and space barriers in the mobile era, the mobile
application can provide users with instant and
valuable content. Chen and Wells (1999) find
that informativeness and attitude to the Web site
are positively related, and similarly, Shin (2007)
identifies a substantial and positive correlation
between informativeness and the mobile service
value and attitude to mobile service. Based on this
body of research, it is hypothesized:
H2: Informativeness of mobile Internet is positively associated with attitude toward mobile service.
Interactivity
Media researchers began to pay attention to
interactive media and have studied interactivity.
McQuail (2000) defines interaction as a motivation
to gain insight into the situations of other people
in order to achieve a sense of belonging. Livaditi
and Vassilopoulou (2003) argue that interactivity
is a key factor in adopting interactive multimedia applications. Therefore, it can be reasonably
thought that high elaboration and more information
processing through a high degree of interactivity
on a mobile device might result in better attitudes
toward and evaluations of the mobile service. In
light of this literature, it is hypothesized:
A Cross-National Study of Mobile Internet Services
H3: Interactivity of mobile device is positively
associated with attitude toward mobile service.
Consequences of Attitude
Toward Mobile Services
Availability
Previous research has shown that the attitude
and satisfaction toward the service of technology
are the two most noteworthy indicators of new
technology diffusion and outcomes (e.g., Aaker
& Stayman, 1990; Haley & Baldinger, 1991).
For example, Palmgreen and Rayburn (1985)
discover the significant relation between attitude
and satisfaction of TVs. Kwon and Chidambaram
(2000) also find out that the attitude toward the
technology influences brand attitudes and purchase intentions. Jee and Kim (2005) use a seminal
scale—mobile users’ attitudes toward the mobile
services. Attitude toward a mobile service is considered a key determinant of consumer adoption
and usage of the mobile service and its diffusion,
just as attitude toward technology is a key predictor of emerging mobile service. It is believed that
consumers who have a positive attitude toward
the mobile service would spend more time using
the mobile device for fun or information, and they
feel satisfied with the convenient and resourceful
mobile services. From this line of research, it is
hypothesized (see Figure 1):
Reflecting the feature of advanced mobile services,
this study adds new gratifications related to the
interactivity variable to the analysis. Angleman
(2000) researches the intended uses of the Internet and the expected and latent gratifications.
Latent gratifications are different from manifest
gratifications, which can be obtained from an
actual medium’s content (e.g., watching a specific program); instead, they are gratifications
whereby users feel psychological readiness to
access content or service at any time. Or latent
gratification can be unconscious gratification:
users’ perception of connectedness, that they are
emotionally connected to the world, its resources
and people. In other words, users can be gratified
or comforted with psychological connectedness;
they can enjoy content at their convenience that
used to be available only through traditional media. Shin (2007) investigates users’ perception of
availability in wireless broadband and concludes
that the perception of availability depends not
only on the system’s characteristics, but also on
the user’s behavior. Similarly, Gokhale and Lu
(2006) find the Web-based e-commerce system
and report that users are more influenced by their
perception of the availability of the system than
its actual availability. Recently, this perceived
availability has been applied to mobile devices
(Shin, 2007, 2008). Based on the previous studies, this study proposes perceived synchronicity
(Shin, 2007; Rauh & Renfro, 2004), perceived
connectedness (Shin, in press), and perceived
ubiquity (Shin, 2008; Peters & Allouch, 2005)
as possible variables for latent gratifications or
availability.
H4: Latent gratification of mobile Internet is
positively associated with attitude toward mobile
service.
H5a: Attitude toward mobile Internet is positively associated with users’ mobile usage.
H5b: Attitude toward mobile Internet is positively
associated with users’ mobile satisfaction.
RESEARCH METHODOLOGY
Sample and Data Collection
This study collected data of mobile users (especially for those who use convergence services,
such as mobile TV and wireless broadband) from
Korea and the United States. Respondent samples
were obtained from commercial survey firms
located in the U.S. and Korea. A representative
233
A Cross-National Study of Mobile Internet Services
Figure 1. Result of the research model for Korean and the U.S. users
sample from each country was developed from
these survey firms. The firms developed panels
of representative users who have given permission to be contacted, so called opt-in permission. Trained telephone interviewers carried out
extensive telephone surveys among a randomly
selected 462 people between May 2005 and June
2006. The telephone interviews asked the selected
respondents about their attitudes, satisfaction, and
experience on convergence services via mobile
devices. To refine and increase the validity of
survey data, responses that contained answers
with systematic errors and those with inconsistent
information were excluded.
Measurements
Pilot studies were conducted to ensure consistency
and reliability of measurements of the survey and
remove similar wordings and logically duplicative
items. The initial questions, which consisted of
234
30 questions, were pilot tested in a Web-based
survey with 72 college students who had used
mobile Internet services. Through the pilot tests, 18
items were eliminated because of not meeting the
criteria, such as sufficient correlation coefficients
and reliability. The final 12 measurement scales are
Likert-type with a seven-point format, anchoring
at 1―strongly disagree and 7― strongly agree.
As reported in Table 1, the 12 items measuring the
U&G dimensions in this article are derived from
previous studies (Chen & Wells, 1999; Korgaonkar
& Wolin, 1999). In particular, each of the scales
is measured by five separate items.
To cover the entertainment constructs, a fouritem scale was developed collecting items from
U&G scales. The first of the items covered the
“enjoyment” conception (Leung & Wei, 2000);
the second covered the “relaxation” conception
(Leung & Wei, 2000); the third covered the “excitement” conception, which is also found in the
studies of videogame and TV gratifications
A Cross-National Study of Mobile Internet Services
Table 1. Measurement items
Entertainment
Informativeness
Interactivity
Availability
(latency)
Items
Coefficient
Alpha
Having a mobile Internet is helpful for me to enjoy the pleasure of watching.
0.71
Having a mobile Internet is helpful for me to pass the time.
0.67
Having a mobile Internet is helpful for me because using mobile services relaxes me.
0.59
Mobile Internet gives me quick and easy access to large volume of information.
.88
Information obtained from the mobile is useful.
0.71
I learned a lot from using the mobile service.
0.69
I hope the mobile service to be interactive.
0.59
I like to increase my control over mobile service.
0.68
Using mobile, I like to interactively communicate with others.
0.82
I am gratified with the ubiquity of mobile Internet that I can watch content anytime with
mobile TV.
0.89
Because of mobile Internet, I feel like that I am in connection with my friends and family.
0.71
With mobile Internet, I can enjoy several applications synchronously or I can access realtime news synchronously.
0.69
(Sherry, 2001); and the final item was a general
item covering fun-seeking gratification (Leung
& Wei, 1998).
The interactivity constructs included humandevice (content) interaction (Weilenmann &
Larsson, 2000) and human-human interaction
(Palen, Salzman, & Youngs, 2001). In addition,
the five-item informativeness scale is similar to
Chen and Wells’s study (1999). The informativeness of a Web site is defined by elements such as
informativeness, intelligent contents, knowledge,
resourcefulness, and timeliness. These factors
build upon the informative scales that have
emerged in previous studies of mobile applications. The latency constructs are measured with
perceived synchronicity (Rauh & Renfro, 2004),
perceived connectedness, and perceived ubiquity
(Peters & Allouch, 2005).
Attitude toward the mobile services is measured by the scale modified from a variety of
published sources (Rhee & Kim, 2004; LaRose,
Mastro, & Eastin, 2001; Torkzadeh & Van Dyke,
2001). Examples of this scale include awareness,
usability, and overall impressions. The reliability
and validity of this scale were also confirmed
in their study. Satisfaction is measured by five
Likert-type items used by Lee, Kim, and Chung
(2002), who studied the customer satisfaction
of the mobile Internet services provided by the
mobile telecommunications providers in Korea.
Examples of the items include: “I feel satisfied
with the convenient use of mobile services, such
as mobile TV”; “I am satisfied with information
on the mobile Internet services”; “I am satisfied
with mobile products and services”; “I feel satisfied with the prices on mobile Internet services”;
“Overall, I am satisfied with mobile Internet.”
Finally, mobile usage is measured by one item,
the number of hours spent on mobile services
(Korgaonkar & Wolin, 1999). Instead of asking
respondents to recall the number of hours per
week spent on mobile services, this study used
a scale with 1=rarely to 5=very often. Evidence
of the internal consistency of the constructs was
confirmed in this study. All the items in the scale
were determined to be reasonably reliable, pro-
235
A Cross-National Study of Mobile Internet Services
ducing overall alpha coefficients (Cronbach’s
alpha) of 0.80 for the entertainment factor, 0.64
for the informativeness factor, and 0.69 for the
interactivity factor. Attitude toward the mobile
services and satisfaction of the mobile services
also possessed sufficient reliability, as Cronbach’s
alphas were 0.82 and 0.84 for attitude toward the
mobile services and satisfaction with the mobile
services, respectively. All the measures in the
present study are based upon previously validated measures (Venkatesh & Morris, 2000) and
are considered reliable. The result of correlation
(Pearson’s r) test confirms the validity of each
variable (see Table 2).
RESULTS
Descriptive
On average, the U.S. respondents were younger
(26 years) than Korean respondents (29 years).
The U.S. sample showed a higher representation
of females (64%) as compared to males (36%),
while the Korean sample showed a higher representation of males (62%) as compared to females
(38%). Among the U.S. respondents, a little over
half (50.7%) were college students, 11% had a
bachelor’s degree, 5.7% had a postgraduate degree (master’s degree and in some cases doctoral
degree). Only 2.5% reported having some high
school or completing high school. Among Korean
respondents, education levels were clearly higher,
with a majority indicating that they were graduates
or higher (31% bachelor’s, 20.7% postgraduate);
35.6% were college students, a little over 12% had
some high school or had completed high school.
Mean annual income in U.S. dollars was $29,898
for the U.S. respondents and $28,190 for Korean
respondents. This placed the U.S. respondents in
this study within an average U.S. income group
and Korean respondents in a slightly higher Korean income group. The U.S. respondents reported
about one year of mobile Internet usage and Korean
respondents about two years (see Tables 3 and 4).
Thus, Korean mobile users in this study were older,
more educated, and consisted of more males than
females. The U.S. users were also relatively well
educated but mostly in college, younger, consisted
of more females than males, had average incomes,
and had been online (fixed and mobile Internet)
for about seven years (Koreans had been online
for about five years). Consistently, over 90% of
the sampled users in both countries reported using the mobile devices for communication and
information search activities. While 82% of the
Korean sample had used the mobile device for
information sources (weather information, etc.),
only 62% of the U.S. sample reported mobile use
for this activity. The lowest mobile use was for
entertainment activities, with about 75% of U.S.
Table 2. Summary statistics and correlation among variables
Mean
SD
INFORM
ENTERTA
INTERA
ATTITUD
SATISF
MOBIUSE
INFORM
6.19
0.91
1.00
ENTERTA
5.46
1.20
0.65**
1.00
INTERA
2.60
1.38
0.47*
0.46**
1.00
ATTITUD
5.60
0.99
0.67*
0.78*
0.50**
1.00
SATISF
5.40
1.08
0.58*
0.58**
0.44**
0.63**
1.00
MOBIUSE
8.12
1.07
0.15*
0.26**
0.11
0.23**
0.17*
1.00
LATEN
8.42
1.23
0.32**
0.22*
0.31**
0.11*
0.10*
0.35**
* p<0.05; ** p< 0.01
236
LAT
1.00
A Cross-National Study of Mobile Internet Services
Table 3. The result of hypothesis testing: Parameter estimates for causal paths of Korean users
Hypotheses
Regression Weights
Standardized Parameter
Estimates
t-value
Support
H1
ATTITUDE ← ENTERTA
0.43**
7.50
Yes
H2
ATTITUDE ← INTERACT
0.51**
3.02
Yes
H3
ATTITUDE ← INFORM
0.33*
2.91
Yes
H4
ATTITUDE ← LATENCY
0.61**
3.21
Yes
H5a
SATISF ← ATTITUDE
0.29*
7.58
Yes
H5b
MOBILUSE ← ATTITUDE
0.23
3.39
No
Goodness-of-fix statistics: x (87)=196.97; CFI=0.938; GFI=0.906; AGFI=0.902; RMSEA=0.068; * p<0.05; ** p<0.001.
2
Table 4. The result of hypothesis testing: Parameter estimates for causal paths of U.S. users
Hypotheses
Regression Weights
Standardized Parameter
Estimates
t-value
Support
H1
ATTITUDE ← ENTERTA
0.28*
2.50
Yes
H2
ATTITUDE ← INTERACT
0.24*
2.01
Yes
H3
ATTITUDE ← INFORM
0.51**
7.61
Yes
H4
ATTITUDE ← LATENCY
0.17
1.21
No
H5a
SATISF ← ATTITUDE
0.39**
5.62
Yes
H5b
MOBILUSE ← ATTITUDE
0.11
1.91
No
Goodness-of-fix statistics: x (87)=187.78; CFI=0.826; GFI=0.811; AGFI=0.882; RMSEA=0.052; * p<0.05; ** p<0.001
2
respondents and 68% of Korean respondents
reportedly using mobile for entertainment.
Analysis and Findings
The results indicate that all variables of this
research achieved more than 0.82 reliability
scores. Exploratory factor analysis (EFA) was
conducted to see how U&G variables are grouped.
The coefficients in rotated factor analysis matrix
of all media use variables are more than 0.75;
entertainment (0.82), informativeness (0.81),
interactivity (0.87), and latency (0.71). Next,
EFA examined correlations between the usage
variables and gratification variables. All correlations are significant in p<0.05 and p<0.01. The
correlations with gratification (as measured by
attitude, satisfactions, and mobile use) are 0.85
(entertainment), 0.81 (informativeness), 0.87
(interactivity), and 0.69 (latency). This research
also measured the usage time and frequency to
study users’ behaviors. Using these variables,
the relationship between gratification and mobile
services use is studied (correlation coefficient:
0.72). Finally, the result of SEM indicated that
the overall fit of structural model was acceptable. The results (x2 (87) =196.97; CFI=0.938;
GFI=0.906; AGFI=0.902; RMSEA=0.068)
uncovered significant relationships: between
entertainment and informativeness; and between
interactivity and frequency of accessing mobile
services (r=0.59, p<0.05). These findings suggest
that interactivity may be considered as one of the
important elements for mobile services. Overall,
the findings reveal that national differences are
evident in terms of attitudes to mobile Internet
service and use. And that these differences exist
principally in how individuals perceive and use
mobile Internet services.
237
A Cross-National Study of Mobile Internet Services
Measurements Validation
Since entertainment, informativeness, interactivity, and latency are the dimensions of U&G theory
in this study, the items of these constructs are
included in one measurement model to test the
validity rigorously. A separate measurement model
includes the scales of attitude toward the mobile
services satisfaction. Based on the study of Gerbing and Anderson (1988), it is appropriate to adopt
the two-step procedure of SEM in this study. That
is, one should estimate the measurement model
separately before a simultaneous estimation of
measurement and structural models. All measurement models were evaluated on multiple criteria
such as unidimensionality, reliability, convergent
validity, and discriminate validity.
U&G Theory Measurement Models
Before a confirmatory factor analysis (CFA)
of the U&G measurement model, an EFA was
conducted by a maximum likelihood extraction
method with varimax rotation. In order to decide
the number of factors to be extracted and rotated
in the U&G model, three methods were used: (1)
a cut point of .4 and no significant cross loading
criteria; (2) screen plot tests, and (3) consideration
of eigenvalue magnitude and discontinuity (Hair,
Anderson, Tatham, & Black, 1998). EFA results
of the U&G model suggest a clean four-factor
solution corresponding to informativeness, entertainment, interactivity, and latency (with item
loading > 0.70 and small cross loading). The
total variances explained by the three factors are
69.44% for the Korean sample and 62.31% for
the U.S. sample. Then, a three-factor model with
all indicators of these three constructs of U&G
theory was estimated using CFA, which shows
that both measurement models showed acceptable
fits. All items’ loadings on their corresponding
construct were significant at p<0.05 (i.e., t >
2.0), demonstrating adequate convergent valid-
238
ity. Since the modification indices and estimated
residuals of the U&G model were small, unidimensionality was also achieved (Sujan, Weitz, &
Kumar, 1994). In addition, convergent validity of
the U&G model was supported by checking the
pair-wise correlations in Table 2. As expected,
the factor correlations ranged from -0.46 to 0.65
and significantly different from one, establishing
discriminant validity. For these U&G measurement models, the goodness-of-fit (GFI), adjusted
goodness-of-fit (AGFI), root-mean-square error
of approximation (RMSEA), and comparative fit
index (CFI) were 0.916, .903, 0.069, and 0.949
for the Korean sample, respectively; and 0.902,
0.900, 0.071, and .911 for the U.S. sample, therefore indicating an adequate model fit.
Attitude Toward Mobile Services and
Satisfaction Measurement Model
As in the U&G measurement model, both CFA
and EFA were used with SAS/STAT software
(version 8.1) to test this two-factor model. First,
exploratory factor analysis using maximum likelihood with varimax rotation results clearly show
two factors of attitude toward mobile service and
satisfaction. In addition, CFA was performed on
all variables, and the results support the convergent, discriminant validity of attitude toward the
mobile and satisfaction. Overall, model goodnessof-fit indexes also support this measurement
model (x2 (43)=152.83; CFI=0.919; GFI=0.882;
AGFI=0.863; RMSEA=0.079). It should be noted
that although Stafford and Gillenson (2004) and
Tsang et al. (2004) developed the attitude toward
the mobile service scale, their studies did not
test this scale with confirmatory factor analysis.
Thus, the present study extends their research and
confirms that the attitude toward the mobile scale
achieves convergent and discriminant validity as
well as content validity, which was evidenced in
the previous effort (Stafford & Gillenson, 2004).
A Cross-National Study of Mobile Internet Services
STRUCTURAL PATHS AND
HYPOTHESE TESTS
To test the structural relationships, the hypothesized causal paths were estimated and the two
sets of hypotheses in each case show different
results. While five hypotheses (H1, H2, H3, H4,
and H5a) were supported in the Korean case,
only four hypotheses were supported in the U.S.
case (H1, H2, H3, and H5a). The results showed
noticeable differences in path formation and
composition of items (see Tables 3 and 4). The
overall fit of the each model is acceptable because
the goodness-of-fix statistics (CFI = 0.912, GFI
=0.876, AGFI = 0.847, and RMSEA = 0.074; CFI
= 0.819, GFI =0.795, AGFI = 0.831, and RMSEA
= 0.163; CFI=0.938; GFI=0.906; AGFI=0.902;
and RMSEA=0.068) are satisfactory, with the x2
/df ratio close to 2.0.
Hypothesis 1 states that entertainment is positively related to attitude toward mobile services.
The entertainment−attitude toward Korean mobile
services path loading was 0.68 (p<0.01), supporting H1 for Korea. The entertainment−attitude
toward the U.S. mobile service path loading was
0.42 (p<0.01), supporting H1 in a lesser extent for
the United States. In addition, the results support
H2, as informativeness is positively related to attitude toward mobile services (Korea, loading =
0.29, p<0.05; the U.S. loading = 0.15, p<0.05).
As presumed, interactivity leads to a positive attitude toward mobile services (Korea, loading =
0.26, p<0.05; the U.S. loading = 0.19, p<0.05),
supporting hypothesis H3. A comparison of the
estimated coefficients of all independent variables
shows that entertainment is the most important
determinant for Korean users’ behaviors, whereas
informativeness is the most significant determinant for the U.S. users.
While the Korean users’ latent gratifications are
positively associated with attitude toward mobile
services (H4), which is consistent with a study by
Shin (in press), the U.S. users’ latent gratifications
are not significantly associated with attitude or
satisfaction. Overall, entertainment, informativeness, interactivity, and latency explain 87% of the
variance in attitude toward mobile service. The
final hypothesis states that attitude toward mobile
service is positively related to mobile usage and
user satisfaction. The attitude toward mobile usage path loading was 0.79 (p<0.01) in Korea, 0.62
(p<0.01) in the U.S., while the attitude toward
mobile user satisfaction path estimates is 0.11
for Korea and 0.09 for the U.S., rejecting H5b
for both cases because of the path estimates and
p values of 0.82 and 0.79 respectively.
While users’ attitudes toward mobile services
explain 63% of the variance of mobile satisfaction,
it is interesting to find both countries’ users are
not greatly satisfied with the mobile convergence
services. Overall, the two models of the U.S. and
Korea had good fits with the data, but each model
shows an apparent different pattern.
T-Test and Factor Analysis
As the results of SEM indicated differences, further
analytical tools were used with t-test and factor
analysis. With the t-test, means and standard deviations were used to examine country differences
in each variable (see Table 5). While there was no
significant country differences in entertainment
and informativeness, users did differ on interactivity, with the U.S. users being considerably less
interactive and Korean users indicating fairly high
interactivity levels (interactivity t[235]= -13.04,
p<0.01). In addition, the result of the t-test was
significant for latent gratification, with Korean
users being more gratified than the U.S. users
(t[193]= -9.08, p<0.01). However, the t-test was
not significant for the dependent variables, suggesting that there were no significant differences
between U.S. and Korean users in the extent of
usage time and satisfaction. This is an intriguing
finding that contradicts previous studies: Park
and Jun’s (2003) study found the period/time of
Internet usage was significantly longer in Korea
than the U.S.
239
A Cross-National Study of Mobile Internet Services
Table 5. Difference test results
Variables
t
df
Sig
(2-tailed)
Mean
difference
Std. error
difference
95% C.I.
Lower
95% C.I.
Upper
Entertainment
-13.041
249.44
0.000***
-0.401
0.032
-0.500
-0.349
Informativeness
-10.191
252.92
0.000***
-0.417
0.041
-0.524
-0.310
Interactivity
-13.042
218.23
0.000***
-0.131
0.043
-0.208
-0.042
Latency
-9.083
211.54
0.000***
-0.481
0.039
-0.513
0.293
Attitude
-3.301
201.34
0.000**
0.395
0.037
-0.113
-0.155
Usage
-0.962
231.33
0.338
-0.041
0.041
-0.121
0.039
Satisfaction
1.322
291.41
0.294
0.103
0.041
0.029
0.183
* p< 0.10; ** p< 0.05; ***, p< 0.01
Meanwhile, factor analysis shows further interesting findings. A principal components factor
analysis with varimax rotation of gratifications
showed a different pattern of factor structure for
each country, as summarized in Table 6. The
structure for the combined sample consists of six
out of 12 factors with eigenvalues greater than
one. These factors accounted for 71.6% of the
variance for mobile gratifications. Loadings and
alpha coefficients are reported for each factor.
In previous studies for the U.S. Internet users,
the informational factor was the first and largest
factor (Charney & Greenberg, 2002). In a study
of Korean Web users, interaction was the first
factor loading for gratification obtained (GraceFarfaglia, Dekkers, Sundararajan, Peters, & Park,
2006). In this study, information was the strongest
factor for the U.S. users, with interactivity the
second most important gratification, whereas
entertainment was the primary factor for Korean
users followed by availability and interactivity.
These three factors represent the primary motivations to use mobile service as shown by factor
analysis.
Table 6. Results of principle components factor analysis
Items
Loading
Combined
U.S.
Korea
Variance α/eigenvalues
Entertainment 1
0.886
1
3
1
26.4%/2.89
Entertainment 2
0.859
1
3
1
Entertainment 3
0.832
1
3
1
Information 1
0.617
4
1
4
Information 2
0.612
4
1
4
Information 3
0.603
4
1
4
Interactivity 1
0.721
2
2
3
Interactivity 2
0.732
2
2
3
Interactivity 3
0.747
2
2
3
Availability 1
0.689
3
4
2
Availability 2
0.701
3
4
2
Availability 3
0.676
3
4
2
*Number means the factor number in each rotated component matrix
240
9.3%/0.87
18.4%/1.10
14.5%/0.92
A Cross-National Study of Mobile Internet Services
Usages of Mobile Internet Services
In the survey, respondents were asked to state
which mobile Internet services they currently use.
These additional data were collected to identify
preferred mobile Internet services in each country
and to complement the findings from the SEM
and t-test. As shown in Figure 2, different services
were preferred in the United States and Korea.
This difference also confirms the findings from the
SEM and t-test. The U.S. users clearly express that
their preferences are information-related services
such as e-mail, news, and personal information
management. On the other hand, Korean users in
general prefer hedonic purposes such as downloading, games, and mobile content. This difference
implies that Korean users see mobile Internet as
a hedonic device, whereas the U.S. users tend to
see it as a functional service tool. The different
preferences of the two countries may attribute to
different infrastructure, content, and services―
that Korea has much better infrastructure, quality
of contents, and ranges of services than those of the
U.S. It may be that U.S. users prefer informationoriented services to data-related or entertainmentrelated services because they cannot find satisfying
entertainment services. Thus, the difference may
not be caused by the users’ characteristics but
the mobile Internet infrastructure, content, and
services. However, many comparative studies
on technology adoption support the argument
of different users’ characteristics contributing
Figure 2. Mobile Internet usage (PIM―personal information managing, schedule, calendar, etc.; Information―stock, weather, traffic, etc.)
241
A Cross-National Study of Mobile Internet Services
to different patterns of usage (Shin, 2007, 2008;
Kim et al., 2004; Sun & Su, 2006). It may be
true that different external factors may affect users’ adoption, but users’ characteristics are also
affected by such external factors like pervasive
availability of infrastructure, wide variation of
services, and quality of enjoyable contents. Thus,
such external factors should be considered as a
part of whole contextual factors constituting users’ characteristics and thus contributing to users’
intentions, which are greatly influenced by such
external factors. In other words, external factors
and users’ characteristics are inseparable entities
because they are co-evolving and influencing each
other. For parsimony, this study assumes users’
characteristics embed such external factors. Future
studies may further investigate the relationship
between users’ characteristics and external factors. It may be interesting how user differences
are influenced by the external environment and
to what extent such external environment affects
users’ decisions to adopt.
DISCUSSION
Summary
The continuing rapid convergence of telecom and
Internet presents new opportunities for research
to analyze the ways in which individuals interact
with and act upon new convergence technologies.
This study attempts to investigate the user experience of mobile service in the U.S. and Korea. To
analyze the user dimension from a cross-country
perspective, this study used the U&G framework that was composed of four dimensions of
gratifications. It investigated the influences of
informativeness, entertainment, interactivity, and
latency on various mobile user constructs such as
the attitude toward mobile services and the usage/satisfaction of mobile services. Particularly,
the mobile service usage and satisfaction were
explored as consequences of attitude toward the
242
mobile, while informativeness, entertainment,
interactivity, and latency are the constructs of attitude toward the mobile. This nomological model
was tested with a firm theory testing methodology
of the SEM approach.
The SEM results implied that the U&G theory
effectively explains users’ attitudes toward mobile
services across the samples from both countries. It
is found in both countries that users who perceive
mobile services as entertaining and informative
generally like mobile services and show a positive attitude toward them. In addition, those who
perceive mobile services as interactive are more
likely to report a positive attitude. Attitude then
affected mobile use and satisfaction: users who
have a positive attitude toward the mobile are more
likely to access mobile services for content and
feel more satisfied. This study also shows different
levels of interactivity and latent gratifications in
the two countries.
The results also showed that the users in the
two countries did differ in the way they thought
about and preferred to interact with mobile Internet
service in terms of U&G structures. Results of
the difference tests show that each component of
gratification is different, which implies that the
needs and values of mobile users between the two
countries may be different. The result shows that
Korean users are more influenced by entertainment and interactivity than information, whereas
the U.S. users are more influenced by information
than entertainment and interactivity. The survey
result of mobile service preferences confirms this
difference in that Korean users use entertainment
services more often, such as downloading services
or playing games, while the U.S. users use information services more frequently. It can be inferred
from this difference that Korean users tend to
perceive mobile devices as a functional tool but
also an entertaining gizmo. On the contrary, the
U.S. users tend to see mobile devices as a more
functional than entertaining tool.
In both countries, the effect of attitude on satisfaction is significant, and interestingly, the effect
A Cross-National Study of Mobile Internet Services
of attitude on mobile use is not that significant.
This contradicts previous studies that show the
significant effect of attitude on use. Also, industry
tends to assume the direct link between attitude
and usage. Thus, the finding of the insignificant
effect raises debatable topics as well as important
implications. It may be interpreted in reference to
Shin’s (2007) finding, which shows that customers
become pickier than ever in using and adopting
technologies, and their intention to use/adopt
should be reinforced/mediated or moderated by
special constructs. Given that Shin’s (2007) study
was based on convergence service (wireless broadband), this argument is very much applicable in
mobile Internet because mobile services become
converging integrating data, visual, and voice.
The insignificant effect further implies that
mobile users in these days are becoming more
discriminating in using their mobile services.
Many advanced services over mobile devices
carry a usage-based charge (per access, per usage
time, or per song, etc.), and users may be more
cautious about their usage in mobile Internet services and want to find more distinct usefulness and
enjoyment. As shown, while the users’ attitudes
are very positive, actual use of mobile Internet
services is rather discouraged or moderated by
the usage-based charging system. This explanation is nicely suited to the finding that the effect
of the U.S. users (0.11) is lower than the effect of
Korean users (0.23), because a fixed-based rate
is generally adopted in a Korean mobile market
whereas a usage-based charge is common in the
U.S. market (Shin, in press). Customers become
more discriminating between attitude and actual
use of mobile technologies: to have good attitudes
toward mobile service is one thing and to use the
service is another. To know the usefulness of mobile service is one thing, but to know and intend to
use may be different and may have further steps to
lead customers to use/adopt mobile services. That
is what mobile Internet service truly is, because
almost everybody knows the usefulness of the
mobile Internet, but they may also understand
the actual adoption and use are different dimensions. They may seek specific gratifications and
novel enjoyment. For discretionary use, customers
may want a technology that targets their specific
interests, rather than giving them general options.
Overall, entertainment, informativeness, interactivity, and latency explain 87% of the variance
in attitude toward mobile services for Korean
users and 72% for the U.S. users. While this
finding lends strong support for the nomological
validity of the U&G theory and attitude toward
the mobile scale, the findings also suggest the
different perceptions of mobile services held by
users: Korean users tend to see the mobile phone
as more than just a communications device, and
U.S. users tend to see it as an extension of fixedphones. This implication is conceptually consistent
with previous findings; for example, Leung and
Wei (2000) found that the cell phone is for more
than just talking. A follow-up question is why
U.S. users perceive it differently. This may be
due to the fact that wireless infrastructure is more
widely available in Korea, and wireless spurred
rapid adoption and satisfaction with the mobile
TV (Shin, 2008). It is generally accepted that
the mobile infrastructure in the U.S. is relatively
unstable, and service offerings are limited compared to Asian countries, which would certainly
affect their attitudes and satisfaction (Shin, 2007).
More importantly, the different U&G may be attributed to the cultural and social fabric of media
uses (Grace-Farfaglia et al., 2006). For example,
studies found that U.S. users use mobile service
to enhance individualism like enjoying games
by themselves, whereas Korean users use it as
an interactive tool with friends and peers (Shin,
2008; Leung & Wei, 2000).
Limitations
This study, however, does have its methodological and interpretive limitations, and some of the
findings require further discussion. First, the
responding users might not represent the whole
243
A Cross-National Study of Mobile Internet Services
population because mobile convergence is still
in its early stages. That is, the subjects of the
study were recruited as a representative of early
adopters of advanced mobile services. Thus, this
study does not provide comprehensive comparisons of the two countries, rather just a snapshot
of a subset of subscribers (see Figure 3). It would
have been better to examine the user motivations
from different groups of users with a longitudinal
investigation.
Second, the current study did not include involvement as a study variable, which has been
the common variable in the U&G study. Future
studies may combine the involvement and interactivity variables to examine the role of involvement in the structural relations among motivation,
interactivity, and attitude. At the same time, future
studies may delete some especially skewed items
and report the multicollinearity diagnostics.
Third, this study put satisfaction as a consequence of U&G. This endeavor can be a new
approach, but at the same time it calls for further
research. Most U&G research or research using
Rogers’s (1995) Diffusion of Innovation―decision to adopt, use, and, subsequently, gratifications
obtained from the technology used―is usually the
consequence of attitude toward that technology.
Rogers called this the persuasion stage, which
is an important component in the innovationdecision process―the individual forms a favorable
or unfavorable attitude toward the innovation.
The more positive the technology developed
from these attributes, the more gratifications
users will seek and/or obtain from the use of the
technology. Furthermore, attitudes will also be
influenced by peers, opinion leaders, and trend
setters, and in turn affect their adoption and uses
and gratifications of that technology. Therefore,
putting attitudes as consequences of U&G leaves
room for further discussion. There may be many
other factors influencing the adoption and use of
mobile services, especially in the case of advanced
multimedia convergence services. Future studies
can expand the scope of this study by examining
244
the inhibiting, limiting, and enabling factors influencing mobile service adoption and use at the
individual, social, and system levels.
Finally and most importantly, a key limitation of this study may be that it did not consider
external factors (different infrastructure, service
provisions, and content quality). This limitation
poses a challenge for the analysis, particularly
the different usage and gratification patterns. The
differences can be largely attributed to differences
between the two countries’ infrastructure, industry
structure, and market. Thus, future studies can
investigate the differences further incorporating
such external factors.
CONCLUSION
Practical and Theoretical
Implications
The findings of this study offer several practical
implications to mobile service providers. First,
the most apparent difference between Korean and
U.S. users would be different kinds of gratifications: latent and manifest gratifications. As shown
in the latent gratifications, Korean users tend
to see a mobile device as a tool that is “always
connected” (Peters & Allouch, 2005, p. 239).
Koreans tend to expect the new mobile communication technology to be accessible at all times
and places, leading technology-enabled people to
adapt the new mobile communication technology
almost automatically into their daily lives (Shin,
2007). On the other hand, U.S. users tend to see
manifest gratifications from mobile services such
as entertaining content or informative services.
While Katz and Aakhus (2002) argue that both
manifest and latent functions are required for a
full understanding of the role of personal communication technologies in people’s daily lives,
latent and manifest gratifications influence uses
and adoption differently in this case.
A Cross-National Study of Mobile Internet Services
Figure 3. Profile of respondents by country
This difference of latent and manifest gratification may be associated with different mobile
infrastructure. Mobile users in Korea, for example,
have been able to use their mobile phone for
years, whereas users in the U.S. perhaps have a
rare opportunity to see nice smart phones, and
therefore mainly explore basic functionalities.
In other words, subscribers in less mature mobile
markets do not utilize advanced functions on a
regular basis. Although U.S. mobile operators have
spent a great deal of resources in promoting new
advanced services, the usage levels may have not
caught up with the leading market of Korea yet.
Second, mobile service providers may consider providing infotainment mobile services,
combining information with entertainment. This
recommendation is based on the findings that
both information and entertainment are found to
245
A Cross-National Study of Mobile Internet Services
be reasonably significant antecedents of attitudes.
Possible infotainment services for mobile Internet
may include user polls, quizzes, and contests for
education-related contents. Indeed, demand for
mobile data/visual services grows, and providers are aggressively seeking new infotainment
mobile services that possibly become killer applications. Further, mobile services have become
more versatile and more multi-functional, and this
study confirms that mobile entertainment value
was found to be important determinant of users’
attitudes toward mobile services, which may lead
to more satisfied users and repeated use of mobile
services. The insignificant different satisfactions
between the U.S. and Korean users from the t-test
analysis imply the lack of compelling content. The
insignificant difference of usage time also implies
that U.S. users and Korean users commonly feel
that there is a lack of compelling content and
services. While mobile service providers may be
disappointed by their lack of subscribers, users
may be more dissatisfied with the content, as
much of the video offerings available currently
are limited to clips. This finding implies a topic
for future study of how to remake mobile content
so that it is optimally suited to mobile devices.
Third, given the different formation of path
estimates in two countries, mobile carriers may
focus on localization of mobile services. The
two models show interesting contrasts: (1) the
H1 and H2 of Korean users are supported at the
0.001 significance level, whereas those of U.S.
users are supported at the 0.05 level; (2) while the
H3 and H5a of Korean users are supported at the
0.05 level, those of U.S. users are supported at
the 0.001 level; and (3) the H4 of Korean users is
supported at the .001 level, but that of U.S. users
is rejected. These contrasts imply that the mobile
users in the two countries have different extent
and expectation on mobile Internet services. The
different formations further suggest mobile carriers adopt localization strategies for a particular
country to optimally exploit local markets. As
mobile services become global, mobile carriers
246
may pursue global strategies for the global markets
and they may adopt different localization strategies
for different markets to export mobile service. The
unique characteristics of local mobile markets
along with the increasing trend for global markets
have led to a growing need for better strategies.
In addition to the practical implications, the
present study also contributes to the scholarly
literature in a number of ways. First, it is a new
approach intended to investigate simultaneously
antecedents and consequences of attitude toward
the increase in innovative mobile services. By
using the SEM method, this study supports the
convergent and discriminant validity of various
scales, such as attitude toward convergence services and U&G. These scales and constructs will
be useful for future convergence service usage
motivation and diffusion factor research. SEM
has been regarded as a more promising approach
than multiple regression, which is commonly
used in mass communications research (Cheng,
2001). Issues in convergence media are more
complicated, in that independent variables are
still unknown and many more latent variables
need to be uncovered. A SEM is a good tool for
identifying relationships among manifest and
latent variables. Future studies may use SEM to
advance theory development and testing in the
convergence media by identifying more latent
variables of convergence media.
Second, this study supports an application of
U&G theory to emerging convergence technology. Dickinger, Haghirian, Murphy, and Scharl
(2004) argue that the convergence media uses
and effects process is a complex one that requires
careful attention to antecedent, mediating, and
consequent conditions. In this new, convergence
environment, in which the presence of the mobile is becoming as ubiquitous as television, it is
critical to know why and how people use mobile
phones or wireless Internet to watch broadcasting
content. Furthermore, as users become more and
more proactive, it is important to figure out how
they utilize a variety of mobile services. For this
A Cross-National Study of Mobile Internet Services
purpose, the present study provides a theoretical
model of the relations among motivations for using
mobile service such as interactivity, entertainment,
and informativeness. Subsequently, the results of
this study may help predict and evaluate mobile
service effectiveness for mobile users based on
their motivations and preferred options.
In addition, based on this result, this study
proposes a new gratification specific to mobile Internet, latent gratification or embedded gratification―gratifications that are different from actual
gratifications, which can be obtained from an actual medium’s content accompanied by immediate
pleasure (e.g., watching a specific program), and
are, instead, gratifications that users feel psychological readiness to access Internet resources at
any time. Convergence services via mobile devices
represent a crucial test of the importance of manifest vs. latent gratifications of mobile services.
The results show that even if mobile service has
been designed to provide users with the functional
needs of mobility, latent motivations of “always
connected” are just as important as perceived
usefulness to the individual end user’s adoption/
use of the service. So the latent gratification can
be unconscious gratification―users’ perception
of connectedness, being emotionally connected
with the world, its resources and people. In other
words, users can be gratified or comforted with
psychological connectedness that they can enjoy
at their convenience that used to be available only
through traditional media or technologies.
FUTURE RESEARCH: DIRECTIONS
AND POSSIBILITIES
The strengths of this study lie in the investigation
of new convergence mobile services with U&G
frame and in a cross-country comparison. The
present study sheds light on positive potentials
of the U&G theory in emerging mobile technologies. This underlines that new services should be
rooted in known user interfaces and cultural dif-
ferences. Therefore, any attempt to speculate on
the future direction of social technology theory
should include a U&G approach. Among emerging technologies, convergence services provided
by mobile devices give U&G researchers some
interesting possibilities for verification of their
previous results. This research could be useful to
the U&G field, as it provides a picture of how users attempt to put their media use in the best light.
These findings could then be used in U&G research
where the results are not so readily verifiable; the
findings could provide useful insight into how users responded to the initial survey. This could lead
to a more comprehensive view of how people use
the mobile media, and more importantly, how they
perceive their use of mobile media. In this regard,
future studies should investigate user perceptions
on new concepts such as self-gratification. For
example, convergence media may provide self
gratification to the users who adopt and use the
media. Users may give themselves pleasure or
satisfy other gratifications offered by media. In
addition, the insignificant effect of attitude on
usage is a noteworthy topic for future studies to
delve into possible multi-processes facilitating
customers to adopt technologies.
Future research topics might include: the additional latent and manifest gratifications served
by the mobile Internet; and how individuals make
sense of content from new convergence technologies compared to the cognitions, emotions, and
predispositions people derive from counterpart
legacy technologies. Researchers must also be
willing to explore the direction of causality by
examining changes over time with a longitudinal design (because convergence service is in a
still early stage of diffusion). Future studies may
proceed with a broader inquiry on cultural factors, such as cultural ethnocentrism and cultural
value structure. The emphasis on a cross-country
approach in this study comes essentially from
the intention to avoid cultural ethnocentrism in
building the argument. A longitudinal study of the
dimensions of this study can be undertaken, using
247
A Cross-National Study of Mobile Internet Services
a wider sample of cultures. Finally, future studies may investigate comparative data with other
types of service usage, for example comparisons
between mobile TV and IPTV can provide additional insights on the social and cultural impact
of new technologies.
ACKNOWLEDGMENT
This work was supported by grant No. R31-10062
from the World Class University (WCU) project
of the Korean Ministry of Education, Science &
Technology (MEST) and the Korea National Research Foundation (NRF) through Sungkyunkwan
University (SKK Univ.). The author sincerely
thanks MEST and NRF for proving valuable
resources to this research project. The author is
also very grateful to SKK University for their
administrative support.
REFERENCES
Cheng, E. (2001). SEM being more effective than
multiple regression in parsimonious model testing
for management development research. Journal
of Management Development, 20(7), 650–667.
doi:10.1108/02621710110400564
Coursaris, C., Hassanein, K., & Head, M. (2003).
M-commerce in Canada: An interaction framework for wireless privacy. Canadian Journal of
Administrative Studies, 20(1), 54–73.
Dickinger, A., Haghirian, P., Murphy, J., & Scharl,
A. (2004). An investigation and conceptual model
of interactive marketing. Proceedings of the 37th
Hawaii International Conference on System Sciences.
Eighmey, J. (1997). Profiling user responses to
commercial Web sites. Journal of Advertising
Research, 37(3), 59–67.
Eighmey, J., & McCord, L. (1998). Adding value
in the information age: Uses and gratifications of
sites on the World Wide Web. Journal of Business Research, 41, 187–194. doi:10.1016/S01482963(97)00061-1
Aaker, D. A., & Stayman, D. M. (1990). What
mediates the emotional response to advertising? The case of warmth. In P. Cafferata & A.
Tybout (Eds.), Cognitive and affective reactions
to advertising (pp. 287-304). Lexington, MA:
Lexington Books.
Gerbing, W., & Anderson, J. (1988). An updated
paradigm for scale development incorporating
unidimensionality and its assessment. JMR,
Journal of Marketing Research, 25, 186–192.
doi:10.2307/3172650
Angleman, S. (2000). Uses and gratifications and
Internet profiles: A factor analysis. Is Internet use
and travel to cyberspace reinforced by unrealized
gratifications? Proceedings of the Western Science
Social Association 2001 Conference, Reno, NV.
Gokhale, S., & Lu, J. (2006). Performance and
availability: Analysis of an e-commerce Site.
Proceedings of the 30th Annual International
Computer Software and Applications Conference
(pp. 495-502).
Charney, T., & Greenberg, B. S. (2002). Uses and
gratifications of the Internet. In C.A. Lin & D.J.
Atkin (Eds.), Communication technology and society (pp. 379-407). Cresskill, NJ: Hampton Press.
Grace-Farfaglia, P., Dekkers, A., Sundararajan,
B., Peters, L., & Park, S.-H. (2006). Multinational
Web uses and gratifications: Measuring the social
impact of online participation across national
boundaries. Electronic Commerce Research, 6,
71–96. doi:10.1007/s10660-006-5989-6
Chen, Q., & Wells, W. D. (1999). Attitude toward
the site. Journal of Advertising Research, 39(5),
27–37.
248
A Cross-National Study of Mobile Internet Services
Hair, J. F., Jr., Anderson, R. E., Tatham, R. L., &
Black, W. C. (1998). Multivariate data analysis.
Englewood Cliffs, NJ: Prentice Hall.
Haley, R. I., & Baldinger, A. L. (1991). The ARF
copy research validity project. Journal of Advertising Research, 31(2), 11–32.
Jee, K. Y., & Kim, M. G. (2005). Korean user attitude for adoption of portable Internet services.
Proceeding of the Conference on Communication
Systems and Applications.
Katz, J. E., & Aakhus, M. A. (2002). Perpetual
contact: Mobile communication, private talk,
public performance. Cambridge: Cambridge
University Press.
Kim, J., Lee, I., & Lee, Y. (2004). Exploring
e-business implications of the mobile Internet:
A cross-national survey in Hong Kong, Japan
and Korea. International Journal of Mobile
Communications, 2(1), 1–21. doi:10.1504/
IJMC.2004.004484
Korgaonkar, P. K., & Wolin, L. D. (1999). A
multivariate analysis of Web usage. Journal of
Advertising Research, 39(2), 53–68.
Kwon, H., & Chidambaram, L. (2000, January).
A test of the technology acceptance model the
case of cellular telephone adoption. Proceedings
of the 33rd Hawaii International Conference on
System Sciences.
LaRose, R., Mastro, D., & Eastin, M. (2001).
Understanding Internet usage: A social-cognitive approach to uses and gratifications. Social
Science Computer Review, 19(4), 395–414.
doi:10.1177/089443930101900401
Laughlin, Z. (2001). Mobile phone users and
diffusion rate: A small-scale observational study.
Retrieved from http://www.aber.ac.uk/media/
Students/zgl9901.html
Lee, W. J., Kim, T., & Chung, J. (2002). User acceptance of the mobile Internet. Working paper, IT
Management Research Center, Graduate School
of Business, Sungkyunkwan University, Korea.
Leung, L., & Wei, R. (1998). The gratifications
of pager use: Sociability, information-seeking,
entertainment, utility, and fashion and status.
Telematics and Informatics, 15(4), 253–264.
doi:10.1016/S0736-5853(98)00016-1
Leung, L., & Wei, R. (2000). More than just talk
on the move: Uses and gratifications of the cellular phone. J&MC Quarterly, 77(2), 308–320.
Lin, C. (1999). Online service adoption likelihood.
Journal of Advertising Research, 39, 79–89.
Livaditi, J., & Vassilopoulou, K. (2003). Needs
and gratifications for interactive TV applications.
Proceedings of the 36th Annual Hawaii International Conference on System Sciences.
Lull, J. (1990). Inside family viewing. London:
Comedia.
McQuail, D. (2000). Mass communication theory.
Thousand Oaks, CA: Sage.
Nysveen, H., Pedersen, E., & Thorbjørnsen, H.
(2005). Intentions to use mobile services. Journal of the Academy of Marketing Science, 33(3),
330–346. doi:10.1177/0092070305276149
Palen, L., Salzman, M., & Youngs, E. (2001). Discovery and integration of mobile communications
in everyday life. Personal and Ubiquitous Computing, 5(2), 109–122. doi:10.1007/s007790170014
Palmgreen, P., & Rayburn, J. D. II. (1985). A
comparison of gratification models of media
satisfaction. Communication Monographs, 52,
334–346. doi:10.1080/03637758509376116
Park, C., & Jun, J. (2003). A cross-cultural
comparison of Internet buying behavior. International Marketing Review, 20(5), 534–553.
doi:10.1108/02651330310498771
249
A Cross-National Study of Mobile Internet Services
Peters, O., & Allouch, S. (2005). Always connected: A longitudinal field study of mobile communication. Telematics and Informatics, 22(3),
239–256. doi:10.1016/j.tele.2004.11.002
Rauh, C., & Renfro, S. (2004). Feedback delay
effects in video monitor communication. Proceedings of the Conference of the International
Communications Associations.
Rhee, K., & Kim, W. (2004). The adoption and
use of the Internet in South Korea. Journal of
Computer-Mediated Communication, 9(4). Retrieved from http://jcmc.indiana.edu/vol9/issue4/
rhee.html
Rogers, E. M. (1995). Diffusion of innovations
(4th ed.). New York: The Free Press.
Sherry, J. (2001). The effects of violent video
game on aggression. Human Communication
Research, 27, 409–431.
Shin, D. (2007). User acceptance of mobile Internet: Implication for convergence technologies.
Interacting with Computers, 19(4), 472–483.
doi:10.1016/j.intcom.2007.04.001
Shin, D. (2008). What people do with digital
multimedia broadcasting? Path analysis of
structural equation modeling. Journal of Mobile
Communications, 6(1), 258–275. doi:10.1504/
IJMC.2008.016580
Shin, D. (in press). Virtual gratifications of wireless
Internet: Is wireless portable Internet reinforced
by unrealized gratifications? Telematics and
Informatics.
Sordegard, C. (2005). Mobile television: Technology and user experiences. Retrieved October 2005
from http://www.vtt.fi/inf/pdf
250
Stafford, T. F. (2004). Determining uses and gratifications for the Internet. Decision Sciences, 35(2),
259–288. doi:10.1111/j.00117315.2004.02524.x
Stafford, T. M., & Gillenson, M. L. (2004, December 10-11). Motivations for mobile devices: Uses
and gratifications for m-commerce. Proceedings
of the 3rd Annual Workshop on HCI Research in
MIS, Washington, DC.
Sujan, H., Weitz, B. A., & Kumar, N. (1994).
Learning orientation, working smart, and effective selling. Journal of Marketing, 58, 39–52.
doi:10.2307/1252309
Sun, S., & Su, T. (2006). A comparative study
of value-added mobile services in Finland and
Taiwan. International Journal of Mobile Communications, 4(4), 436–458.
Torkzadeh, G., & Van Dyke, T. P. (2001). Development and validation of an Internet self-efficacy
scale. Behaviour & Information Technology, 20(4),
275–280. doi:10.1080/01449290110050293
Tsang, M., Ho, S., & Liang, T. (2004). Consumer
attitudes toward mobile advertising: An empirical
study. International Journal of Electronic Commerce, 8(3), 65–78.
Venkatesh, V., & Morris, M. G. (2000). Why don’t
men ever stop to ask for directions? Gender, social
influence, and their role in technology acceptance
and usage behavior. MIS Quarterly, 24, 115–139.
doi:10.2307/3250981
Weilenmann, A., & Larsson, C. (2000). On doing
being teenager: Applying ethno-methodology
to the analysis of young people’s use of mobile
phones. In L. Svensson, U. Snis, C. Sørensen,
H. Fägerlind, T. Lindroth, M. Magnusson, & C.
Östlund (Eds.), Proceedings of IRIS 23, Trollhättan, Sweden.
A Cross-National Study of Mobile Internet Services
APPENDIX: A SAMPLE OF SURVEY QUESTIONNAIRE
Part 1. Profiling Questions
Gender: Male or Female
My age:
My highest level of education is:
____Below High School
____High School
____Attended College
____Undergraduate Degree
____Graduate School
My annual household income is:
____Under $20,000
____$20,000-$45,000
____$45,000-$65,000
____$65,000-$90,000
____$90,000-$125,000
____$125,000 plus
____Prefer not to say
My occupation is:
____Professional
____Owner (self-employed)↜____Technician
____Secretarial
____Student
____Housewife
____Retired/unemployed
____Others
Part 2. Mobile Internet Service Questions
Entertainment
1.
2.
3.
Having a mobile Internet is helpful for me to enjoy the pleasure of watching.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
Having a mobile Internet is helpful for me to pass the time.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
Having a mobile Internet is helpful for me because using mobile services relaxes me.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
Informativeness
1.
Mobile Internet gives me quick and easy access to large volume of information.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
251
A Cross-National Study of Mobile Internet Services
2.
3.
Information obtained from the mobile is useful.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
I learned a lot from using the mobile service.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
Interactivity
1.
2.
3.
I like the mobile service to be interactive.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
I like to increase my control over mobile service.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
Using mobile, I like to interactively communicate with others.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
Availability
1. I am gratified with the ubiquity of mobile Internet that I can watch content anytime with
mobile Internet service.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
2. Because of mobile Internet, I feel like that I am in connection with my friends and family.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
3. With mobile Internet, I can enjoy several applications synchronously or I can access
real-time news synchronously.
Strongly Disagree____ Disagree____ Neutral____ Agree____ Strongly Agree____
Part 3. Actual Use
How many years have your been using mobile Internet services?
How many times do you believe you use mobile Internet service during a week?
____ Not at all
____ Less than about 2 or 3 a week
____ Several times a week
____ About once a day
____ Several times each day
How many hours do you believe you use mobile Internet service every week?
____ Less than 1hr.
____ Between 1-5 hrs.
____ Between 5-10 hrs.
____ Between 10-15 hrs.
____ Between 15-20 hrs.
____ Between 20-25 hrs.
____ More than 25 hrs.n
This work was previously published in International Journal of Global Information Management, Volume 17, Issue 4, edited
by Felix B. Tan, pp. 29-54, copyright 2009 by IGI Publishing (an imprint of IGI Global).
252
Section 3
Trends and Techniques
254
Chapter 12
Flexibility in Offshoring:
Paradoxical Concepts of Control,
Communication and Facilitation
Vanita Yadav
Institute of Rural Management Anand (IRMA), India
Monica Adya
Marquette University, USA
Varadharajan Sridhar
Sasken Communication Technologies, India
Dhruv Nath
Management Development Institute, India
ABSTRACT
Globalization of software development has resulted in a rapid shift away from the traditional collocated,
on-site development model, to the offshoring model. Emerging trends indicate an increasing interest in
offshoring, even in early phases like requirements analysis. Additionally, the flexibility offered by the
agile development approach makes it attractive for adaptation in globally distributed software work. A
question of significance then is what impacts the success of offshoring earlier phases, like requirements
analysis, in a flexible and globally distributed environment? This chapter incorporates the stance of
control theory to posit a research model that examines antecedent factors such as requirements change,
facilitation by vendor and client site-coordinators, control, and computer-mediated communication.
The impact of these factors on success of requirements analysis projects in a “flexible” global setting is
tested using two quasi-experiments involving students from Management Development Institute, India
and Marquette University, U.S.A. Results indicate that formal modes of control significantly influence
project success during requirements analysis. Further, facilitation by both client and vendor site coordinators positively impacts requirements analysis success.
DOI: 10.4018/978-1-60960-605-3.ch012
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Flexibility in Offshoring
INTRODUCTION
Globalization has resulted in software development being outsourced to emerging and developing nations (Edwards & Sridhar, 2005). An
increasing range of services and processes are
being delivered by global vendors as per quality,
price, and requirements independent of geography,
suggesting a growing capability and acceptance
of global service delivery (NASSCOM, 2007).
Outsourcing is the largest and fastest growing
category within worldwide IT services spending.
In 2006 the total spending on IT outsourcing was
estimated at over USD 170 billion (more than 36
percent of the total) with an above average growth
at 7.3 percent (NASSCOM, 2007). Accordingly,
software development has moved away from the
traditional co-located model, often called on-site
development, to the offshoring model (Edwards &
Sridhar, 2006) in which global virtual teams collaborate across national borders (Carmel, 1999).
Global software development (GSD) presents
abundant business opportunities as well as challenges in terms of control, coordination, communication, culture, and technology. To address
these challenges many researchers propose that
firms must have ambidextrous capabilities (Lee,
Delone & Espinosa, 2006) and combine the
flexibility offered by the growing agile development approaches with the traditional plan-based
approaches (Lee, Banerjee, Lim, Hillegersberg
& Wei, 2006; Agerfalk & Fitzgerald, 2006; Ramesh, Cao, Mohan & Xu, 2006). As organizations
become more virtual, distributed development
will become increasingly apparent throughout
the entire software development life-cycle, particularly so in early stages such as requirements
analysis (Evaristo, Watson-Manheim & Audy,
2005). Despite the abundance of literature on
globally distributed virtual teams (see Powell,
Piccoli & Ives, 2004) and IT outsourcing (see
Yadav & Gupta, 2008; Dibbern, Goles, Hirschheim
& Jayatilaka, 2004), very few studies address
the critical requirements analysis phase of GSD
(Yadav, Nath, Adya & Sridhar, 2007).
Requirements analysis refers to that stage of
the system development life cycle wherein the
information and information processing services
needed to support select objectives and functions
of the organization are (i) determined and (ii) coherently represented using well defined artifacts
such as entity-relationship diagrams, data flow
diagrams, use cases, and screen prototypes (Hoffer, George & Valacich, 1999). Typically in GSD
this phase is conducted at the client location since
this phase requires significant interaction between
users and developers. Business and systems analysts are physically located at the client site to
perform this activity. Depending on the nature of
the project, high-level design is conducted in both
on-site and off-shore mode due to comparatively
lower interaction needs with the client. Detailed
design, coding, and testing are executed at the
off-shore site (Carmel & Tijia, 2005).
Damian and Zowghi (2002) report that in
global projects consultant teams from the offshore location travel to the user site to gather and
analyze requirements in face-to-face meetings.
The consultants then communicate the requirements to the development staff at the offshore
locations. An emerging stream of research, on
the other hand, puts forward the phenomenon
of distributed requirements engineering (Bhat,
Jyoti, Gupta & Murthy, 2006; Nath, Sridhar,
Adya & Malik, 2006; Edwards & Sridhar, 2005;
Evaristo, Watson-Manheim & Audy, 2005). An
interesting alternative being considered by software companies is the possibility of off-shoring a
larger part of the software development process.
Specifically, is it possible to effectively conduct
the requirements analysis phase from offshore
location which is traditionally done on-site? In
such a scenario, analysts and developers located
at the off-shore location would interact in a virtual
mode with the clients located at their premises to
determine and structure the requirements. Such a
shift could potentially improve the cost arbitrage
255
Flexibility in Offshoring
of the projects for instance, by cutting down the
travel costs incurred for sending analysts to the
client site for face-to-face meetings and reduced
staffing needs at the client end. It would also
provide an opportunity to build client and developer relationships using computer-mediated
communication.
Recent years have also witnessed growth of
the agile movement that focuses on producing a
working solution in conjunction with changing
user requirements. The flexibility and responsiveness of the agile approach makes it attractive for
adaptation in globally distributed software work.
Flexibility in GSD can be incorporated by adapting some of the principles of agile development
like simplified project planning, acknowledging
requirements change, lesser emphasis on processes
and documentation, and supporting informal as
well as formal communication (Yadav et. al.,
2007).
In the requirements analysis phase of offshore
GSD projects, the absence of analysts and developers at customer premises is likely to create a
need to exercise control even in a flexible environment to ensure that the project meets defined
goals. Offshore vendors often deploy liaisons
who coordinate activities between on-site users
and offshore development team. These liaisons
are critical for effective communication and coordination between users and developers (Battin,
Crocker, Kreidler & Subramanian, 2003).
This study proposes to examine two research
questions related to flexible GSD: what are the
antecedents of requirements analysis success in a
flexible GSD environment? How do these antecedents impact success? Founded on control theory,
this paper posits a research model examining
relationships between process facilitation (by client/vendor site-coordinators), computer-mediated
communication, control, change in requirements
and requirements analysis success.
Our interactions with managers in client and
vendor firms engaged in GSD indicate that ‘total’
offshoring of requirements engineering is still
256
uncommon. However, they assert that in some
smaller projects, up to 75% of the requirements
analysis is carried out in offshore mode. For this
reason, it might not be feasible to analyze ‘total’
offshoring of requirements analysis phase in a
real-life setting. Furthermore, as client nations
face a growing shortage of business and systems
analysts, organizations may be compelled to
consider offshoring of early GSD phases. Given
these arguments, we designed exploratory quasiexperimental research studies in an academic
setting involving management students enrolled
in a graduate level information systems course
at Management Development Institute (MDI),
India, and management students enrolled in a
graduate level IT Project Management course at
Marquette University (MU), U.S.A. MU students
role-played clients while MDI students role-played
systems analysts.
The paper is organized as follows. In the next
section we review the background literature.
Subsequently, the theoretical foundation, research
hypotheses and conceptual model are presented,
followed by research methodology, and an overview of the findings. The paper concludes with
implications and directions for future research.
REQUIREMENTS ANALYSIS IN
FLEXIBLE GSD PROJECTS
One of the most challenging aspects of system
development is ascertaining ‘what the system
should do’, that is in determining the system
requirements (Crowston & Kammerer 1998, p.
227). Globally distributed requirements analysis generally includes a team of analysts and
users working together using technologies like
computer-mediated conferencing, instant messaging, emails, teleconferencing and web based
group support systems.
There is a growing debate on what can be and
what cannot be offshored? One school of thought
suggests that certain activities, like coding, are a
Flexibility in Offshoring
better fit for offshore locations while other activities, like requirements gathering, are better to be
carried out onshore within the client’s country
(Carmel & Tijia, 2005). On the other hand, there
is a growing stream of researchers who reason
in favor of distributed requirements engineering.
Few studies have examined the use of virtual
and globally distributed teams for requirements
analysis. Edwards and Sridhar (2005) studied the
effectiveness of virtual teams in a collaborative
requirements analysis practice. In this study virtual
GSD teams at near and far locations participated
in requirements analysis phase of the project.
This typically is applicable in collaborative global
product development exercises as described in
Battin et al. (2003). However, in our research
we study the requirements analysis phase of offshored software projects consisting of (i) users of
the client who specify the requirements, and (ii)
developers/analysts of the vendor located at an
offshore development center who determine and
document these requirements. We define a virtual
GSD team to comprise of these two protagonists
who rarely meet face-to-face and who work together using computer mediate communications.
Damian and Zowghi (2002) studied the interplay between culture and conflict and the impact
of distance on the ability to reconcile different
viewpoints with respect to “requirements negotiation” processes. They find that lack of a common
understanding of requirements, together with
reduced awareness of local context, trust level,
and ability to share work artifacts significantly
challenge effective collaboration among remote
stakeholders in negotiating a set of requirements
that satisfies geographically dispersed customers.
Damian et al. (2000) examined the effect of the
distribution of various stakeholders in requirements engineering process. They found that highest group performance occurred when customers
were separated from each other and collocated
with the facilitator or system analyst. Our study
aims to contribute to the literature on globally
distributed virtual teams engaged in off-shored
software requirements analysis.
FLEXIBILITY IN GSD
Continued dissatisfaction with the traditional
plan-driven (heavyweight) software development methodologies have led to the introduction
of various agile (lightweight) methodologies,
like eXtreme programming, Scrum, Crystal etc.
(Fruhling & Vreede, 2006; Lindstrom & Jeffries,
2004). Practice-led agile methods have been
proposed as a solution that addresses problems,
such as budget/schedule overruns and poor quality levels, by promoting communication, flexibility, innovation and teamwork (Agerfaulk &
Fitzgerald, 2006; Augustine, Payne, Sencindiver
& Woodcock, 2005). The agile alliance movement
was motivated by the observation that software
teams in many corporations are entrapped in an
ever-increasing amount of process and documentation (Fruhling & Vreede, 2006). Agile approaches
focus on fast deliverables, dynamic management
of requirements, and fast iterations and increments
(Fruhling & Vreede, 2006). While many benefits
of these newer approaches have been proposed,
very few field studies have empirically operationalized agile GSD (Fruhling & Vreede, 2006)
and developed theories in this area (Agerfaulk &
Fitzgerald, 2006).
Our informal interactions with client and vendor organizations in US and India also indicate that
in reality what exits is something in between the
spectrum of the traditional and agile approaches.
Though industry continues to debate whether or
not agile processes are appropriate for distributed
teams, let alone large and offshore distributed
teams, organizations like Sapient have been successful in tailoring the agile approach to incorporate flexibility using a mixed focus on people,
process, and tools (Barnett, 2006). Therefore on
a spectrum, flexible GSD can be visualized as
257
Flexibility in Offshoring
Figure 1. Flexibility spectrum
an ‘agile-rigid’ approach that lies in between the
traditional and agile approaches (see Figure 1).
To highlight the differences, the key characteristics of the traditional, agile and flexible GSD
environments adapted from a current stream of
research (Holmstrom, Fitzgerald, Agerfalk &
Conchuir, Eoin, 2006; Lee, Delone & Espinosa,
2006; Ramesh et al., 2006; Lee et al., 2006; Furhling et al., 2006) are presented in Table 1. Flexible GSD offers ‘rigor’ of the traditional approaches and ‘flexibility’ of the agile approaches
within the teams (Yadav et al., 2007). Rigor is
provided by incorporating formal structures of
the traditional approach, such as, development of
a project plan, communication plan and project
status tracking. Agility is allowed through simplified project planning. Elaborate project management techniques are tailored to make them ‘lightweight’. ‘Simple rules’ (Augustine et al., 2005)
are adopted. Formal as well as informal channels
of communication are encouraged. Additionally,
it adopts the agile philosophy of embracing requirements change. The agile principle states that
we should welcome changing requirements in
software projects as they harness change for the
customer’s competitive advantage (Lindstrom &
Jeffries, 2004). However, Fruhling and Vreede
(2006) indicate that the impact of requirements
change has not been studied empirically.
Table 1. Characteristics of the traditional, agile and flexible approaches
Traditional Development
Approach
Agile Development
Approach
Flexible GSD
Approach
Fundamental Assumption
Systems are fully specifiable,
predictable and can be built
through meticulous and extensive
planning.
High-quality, adaptive software can
be developed by small teams using
principles of continuous design improvement and testing based upon
rapid feedback and change.
High-quality, adaptive software can
be developed by globally distributed
teams using principles of continuous
improvement based upon feedback
and change having some amount of
planning and control.
Communication
Formal
Informal
Formal and informal
Project Management
-Process-centric
-Processes over people
-Extensive milestone planning
- Extensive documentation
-People-centric
-People over processes
-Respond to change over following
a plan
- Lack of documentation
-Equal importance to people and
processes
- Medium project planning
-Medium documentation
Requirements
-Knowable early; largely stable
-Detailed specification of requirements
-Largely emergent; rapid change
- Iterative development that produce
working solutions at the end of
each iteration to capture emerging
requirements
- Emergent
- Use prototypes or incremental
working solutions to capture emerging requirements
Size
Larger teams (>10 team members)
Smaller teams (2-8 team members).
Smaller teams or large teams broken
down to small sub-teams (<10 team
members).
258
Flexibility in Offshoring
UNDERLYING THEORETICAL
FOUNDATION
Global software development is not just a technical process of building software or information systems but also a social process involving
stakeholders from multiple organizational units.
Our paper draws upon control theory to study the
impact of antecedents on success during requirements analysis in a flexible GSD setting. Academic
(Kirsch & Cummings, 1996) and practitioner
(PMBOK, 2000) literature suggests that control
plays an effective role in managing projects. Control theory attempts to explain how one person or
group ensures that another person or group works
toward and attains a set of organizational goals.
Aligned with prior research on control (Kirsch,
1997; Choudhury & Sabherwal, 2003), our study
views control broadly as attempts to ensure that
individuals act in a manner consistent with achieving desired project goals. Control modes can be
“formal or “informal” (Crisp, 2003) in nature,
where former are documented and initiated by
management, and the latter are often initiated by
employees themselves.
Control theories suggest that controllers utilize
two modes of formal control: behavior and outcome (Eisenhardt, 1985; Kirsch et al., 2002). In
behavior control, appropriate steps and procedures
for task performance are defined by controllers
and then controllees’ performance is evaluated
according to their adherence to the prescribed
procedures. In outcome control, controllers define
appropriate targets and allow controllees to decide
how to meet those output targets. Controllees’
performance is evaluated on the degree to which
targets were met, and not the processes used to
achieve the targets (Kirsch et al., 2002). In this
study, we focus on the impact of formal modes
of control (outcome and behavior) to on success
of GSD projects during the requirements analysis
phase.
Kirsch et al. (2002) extended the control theory
to the role of client liaisons/coordinators exercis-
ing control of IS project leaders to ensure that IS
projects meet their goals. Lee et al. (2006) also
proposed assigning ‘point persons’/ coordinators
to offshore sites for effective management of GSD
projects. We draw upon this literature to study the
effect of process facilitation by both the client and
vendor site coordinators.
RESEARCH MODEL
To reiterate, this paper proposes to examine
the following research questions - what are the
antecedents of requirements analysis success
in a flexible GSD environment? How do these
antecedents impact requirements analysis success? Specifically, we explore how incorporating discipline through formal modes of control,
process facilitation by site-coordinators (at both
the client and vendor sites), and task related
computer-mediated communication in a flexible
GSD environment impacts requirements analysis
success. We also explore how change in requirements, which is an inherent assumption behind the
agile philosophy, impacts requirements analysis
success. Control theory guides our hypotheses
and model development process (see Figure 2).
The research model variables and hypotheses
specifying relationships between these variables
are presented in the subsequent sections.
Control
Outsourced projects in GSD pose unique problems
that make the task of controlling them particularly
challenging (Choudhury & Sabherwal, 2003). In
the case of outsourced GSD projects, the controller
and controllee may not be single individuals but
teams of individuals representing the client and
vendor organizations at globally distributed locations. Lee, Delone and Espinosa (2006) suggest
that agile methods should be tailored to embrace
more discipline in GSD. Derived from control
theory, we hypothesize that incorporating disci-
259
Flexibility in Offshoring
Figure 2. Research model
pline by using formal modes of control (outcome
and behavior) during requirements analysis in
flexible GSD projects is likely to help in achieving success (Yadav, Nath, Adya & Sridhar, 2007).
H1:Formal modes of control are positively related
to requirements analysis success in a flexible
GSD environment.
Computer-Mediated Communication
Computer-mediated communication uses computers to structure and process information, and
uses telecommunication networks to facilitate its
exchange (e.g. e-mails, computer conferencing,
e-groups). Rice (1987) indicates that computermediated communication is preferred in crosslocation interdependency tasks because of greater
freedom from temporal and geographic constraints
(e.g. offshoring). Computer-mediated communication allows group members to collaboratively
create meaning out of diverse sources of information leading to better outcomes (DeSanctis &
Gallupe, 1987).
260
The virtual GSD environment presents considerable challenges to effective communication
including time delays in sending feedback, lack
of a common frame of reference for all members,
differences in salience and interpretation of written
text, and assurance of participation from remote
team members (Crampton, 2001). Hulnick (2000,
pp. 33) noted that “if technology is the foundation
of the virtual business relationship, communication is the cement”. Information processing
perspective of communication indicates that task
uncertainty and work flow interdependence lead
to higher frequency of interaction between work
units (Putnam & Cheney, 1985). Extending this
to a GSD scenario during requirements analysis
there exits work flow interdependence between
the remote client and the vendor teams for accurately capturing and documenting requirements.
This is likely to lead to frequent task related
computer-mediated communication between
globally distributed team members for successful
completion of requirements analysis. Thus we
hypothesize that:
Flexibility in Offshoring
H2: Task-related computer-mediated communication is positively related to requirements
analysis success in a flexible GSD environment.
Process Facilitation
Lee, Delone and Espinosa (2006) indicate that
assigning ‘point persons’ in offshore software
development plays pivotal role in sensing and
responding to emergent problems on a real time
basis. Borrowing from IS Literature on Group
Support Systems (GSS) process facilitation is
defined as the provision of procedural structure and
general support to groups (Miranda & Bostrom,
1999). Our research acknowledges Crisp’s (2003)
view on structuring borrowed from control theory
and applies it in the context of GSD process facilitation where structuring refers to “any explicit
or implicit means of developing structures for
control”. In the case of outsourced GSD projects,
process facilitation can be provided by assigning
point persons/liaisons/site-coordinators at both
the client and vendor sites. We hypothesize that
process facilitation provided by site-coordinators
at offshore sites (client/vendor) can be a considered
as a structure that is more likely to assist productive outcomes (Yadav et al., 2007).
H3a: Process facilitation by vendor site-coordinator is positively related to requirements
analysis success in a flexible GSD environment.
H3b: Process facilitation by client site-coordinator is positively related to requirements
analysis success in a flexible GSD environment.
Structures are formal and informal procedures,
techniques, skills, rules, and technologies that
organize and direct group behavior and processes
(Anson, Bostrom & Wynne, 1995). We therefore
hypothesize that process facilitation provided by
site-coordinators (client/vendor) at offshore sites
can be a considered as a structure that is more
likely to assist in formal modes of control:
H4a: Process facilitation by vendor site-coordinator is positively related to formal modes
of control during requirements analysis in
a flexible GSD environment.
H4b: Process facilitation by client site-coordinator is positively related to formal modes
of control during requirements analysis in
a flexible GSD environment.
Ramesh et al. (2006) report that a primary
‘point of contact’/ a project lead, for each location in GSD helped in facilitating communication
across the teams. Griffith, Fuller and Northcraft
(1998) assert the fundamental role of a process
facilitator is to improve the effectiveness and
efficiency of communication and interaction of
group members in order to help the group achieve
outcomes. Therefore, we hypothesize that process
facilitation by vendor site-coordinator and also by
client site-coordinator is likely to lead to increased
computer-mediated communication:
H5a: Process facilitation by vendor sitecoordinator is positively related to taskrelatedcomputer-mediated communication
during requirements analysis in a flexible
GSD environment.
H5b: Process facilitation by client site-coordinator is positively related to task-related
computer-mediated communication during
requirements analysis in a flexible GSD
environment.
Requirements Change
The task of specifying requirements has ‘high
dynamic complexity’ (Briggs & Gruenbacher,
2002). This complexity stems from the evolutionary nature of requirements, which are clarified
only through multiple iterations of information
gathering (Evaristo et al., 2005). As organizations
261
Flexibility in Offshoring
become more global and stakeholders more distributed, getting the requirements right will pose
a greater challenge (Damian et al. 2000).
Flexible perspective borrowing from Agile
philosophy states that “changing requirements
are not necessarily bad but are welcomed as an
opportunity to satisfy customer needs even better
than inflexibly sticking to old requirements” (Turk
et al., 2005). Although many positive benefits
have been speculated for dynamic management
of requirements and fast iterations few have been
empirically examined (Fruhling & Vreede, 2006).
Founded on the agile philosophy of considering
requirements change as good opportunity to satisfy
customer needs, we hypothesizeH6a: Members of teams that have changes in
requirements will perceive higher level of
requirements analysis success than those
who have no changes.
When requirements change, it is assumed that
client team members are likely to experience a
greater need to communicate and monitor vendor
team members’ behavior to ensure changes are
incorporated. Therefore, it is likely that changes
in requirements would probably lead to increase
in control and task-related communication.
H6b: Members of teams that have changes in
requirements will perceive higher level of
control than those who have no changes.
H6c: Members of teams that have changes in
requirements will perceive higher level of
task related communication than those who
have no changes.
Tan & Teo (2007) recently pointed out that
project team using agile methodology could be
effective in responding to change in user requirements if it stressed collaboration among members
and users. Thus it is likely that changes in requirements leads to increased process facilitation by
site coordinators (client/vendor).
262
H6d: Members of teams that have changes in requirements will perceive higher level of process facilitation by vendor site-coordinator
than those who have no changes.
H6e: Members of teams that have changes in
requirements will perceive higher level of
process facilitation by client site-coordinator
than those who have no changes.
RESEARCH METHODOLOGY
Faculties in many universities and business schools
have set up distributed software engineering laboratories for conducting virtual team exercises in
their courses (Edwards & Sridhar, 2006; Nath et al.,
2007). Powell et al. (2004) have listed a number of
studies involving students in global virtual teams.
A controlled experimental approach provides three
benefits. Firstly, it makes available several teams
that work in parallel thereby generating rich data
for drawing conclusions. Secondly, it permits
researchers to experiment with newer approaches
which may not yet have been explored by the
industry. Finally, it equips and trains software
engineering students to understand and to handle
the challenges of working in global software teams
(Favela & Pena-Mora, 2001).
We conducted a quasi-experiment in a globally distributed academic setting involving MBA
students from two countries- India and USA.
Students from MDI, India posed as analysts from
vendor side while those from MU, USA posed as
clients. Vendor role was assigned based upon the
rationale that India is still the preferred sourcing
destination with a 58 percent share in worldwide
offshore IT-BPO market in spite of the expansion
of global sourcing arena (NASSCOM, 2007).
Similarly, client role was assigned based upon
the rationale that US alone accounts for about
two-thirds of the software and services exports
from India (NASSCOM, 2007).
Defining quasi-experimental designs, Campbell and Stanley (1966, pp. 34) state that “there are
many natural settings in which a research person
Flexibility in Offshoring
Table 2. ANOVA results
Variable
Levene Test (p>.05)
F-value
Significance*
€€€€€Age (years)
€€€€€€.908
€€€€€0.782
€€€€€€0.726
€€€€€Total Work Experience
€€€€€€.286
€€€€€1.592
€€€€€€0.908
€€€€€IT Work Experience
€€€€€€.083
€€€€€0.490
€€€€€€0.964
* Significance >.05 indicates no difference between the GSD teams for the variables that were controlled
can introduce something like experimental design
into his scheduling of data collection procedures
(e.g., the when and to whom of measurement), even
though he lacks full control over the scheduling
of experimental stimuli (the when and to whom
of exposures) which makes a true experiment
possible.” We designed a post-test control group
quasi-experiment design of the following form:
Mâ•…â•… Xâ•…â•… O1
Mâ•…â•… â•…â•… O2
‘M’ stands for matching (a priori equalization
of the two groups for the factors that have to be
controlled), ‘X’ stands for treatment and ‘O’ stands
for observation or measurement.
Marquette University has a service learning
office which obtains IS development projects from
non-profit organizations and small businesses in
and around Milwaukee. These real life projects
at Marquette University were used to create the
simulated flexible GSD requirements analysis
projects. This enabled the projects to closely
mirror real business environments. Examples of
these projects include a donation management
system for a non-profit organization, a volunteer management system, an alumni website, a
tracking system for battered and abused women,
and a book inventory management system. Only
high level requirements were provided, such as,
the system must be secure and accurate; it must
track certain information etc. Many of the detailed
level requirements were expected to emerge only
through remote team member communications for
requirements gathering and analysis.
The Experiment
The clients in US enrolled for a course in IT
Project Management and the analysts in India
enrolled for Management Information Systems
(MIS) course, having comprehensive coverage
of systems analysis and design, in Jan 2007. This
quasi-experiment was designed as a part of the
course project and its duration was 8 weeks. Students developed project artifacts iteratively using
structured software development methodology. A
flexible offshore GSD project environment was
simulated based upon characteristics highlighted
in Table 1. Each client team was paired with an
analyst team. The teams were controlled in terms
of age and work experience of team members and
team size (see Table 2).
MDI teams elicited project requirements from
MU teams using web-based communication
technology like e-groups (Google/yahoo groups),
text/voice/video chat (Skype/msn/yahoo) and
email (see Table 3 and Figure 3). The gathered
requirements were then structured using the process modeling tools such as Context Analysis
Diagram (CAD), Data Flow Diagrams (DFDs)
and Process Specifications. MDI teams also modeled the data and associated relationships using
Entity Relationship Diagrams (ERDs). Further,
to give the users a feel of what the final system
would look like, MDI teams also created screen
based prototypes as part of the requirements
analysis exercise. All these artifacts were submitted by the MDI teams to MU user teams in two
iterations (see Table 4).
263
Flexibility in Offshoring
Table 3. Experiment setting and treatment
Setting
Non-control Group
(Treatment: Changes in Requirements)
Control Group
(No Treatment)
Flexible GSD
All teams matched in
terms of age, size, work
experience, technology,
standard development
methodology
Sample Size= 90
Analysts=59, Clients=33
10 client-analyst GSD teams, each team having 5-6
analysts (1 analyst appointed, by consensus, as MDI
site-coordinator) and 3-4 clients (1 client appointed,
by consensus, as MU site-coordinator)
Sample Size= 91
Analysts=56, Clients=33
10 client-analyst GSD teams, each team having 5-6
analysts (1 analyst appointed, by consensus, as MDI
site-coordinator) and 3-4 clients (1 client appointed,
by consensus, as MU site-coordinator)
Figure 3. Experiment design
Table 4. Project artifacts
MDI Analyst Project Deliverables
MU Client Project Deliverables
Week 1: Simplified Project Management Plan (to MU clients with
a copy to MDI faculty and researcher). No formal resource allocation at the analyst end.
Week 1: Simplified Project Charter, Project Schedules, Resource
Allocation and Communication Plans (to the MU faculty).
Week 3: Simplified Project Status Reports to MU Clients.
Week 3: Simplified Risk Assessment and Contingency Plans (to
the MU faculty).
Week 4: First Iteration (Context Analysis Diagrams, Data Flow
Diagrams, Entity Relationship Diagrams, Process Specifications
and Screen-based Prototypes of the business IS) to MU Clients.
Week 4: Feedback to MDI analysts.
End of Week 4
Main Experiment: TREATMENT- Changes in Requirements for the Non-control Group
Week 6: Simplified Project Status Reports to MU Clients.
Week 6: Simplified Project Status Reports to MU faculty.
Week 8: Second Iteration (Context Analysis Diagrams, Data Flow
Diagrams, Entity Relationship Diagrams, Process Specifications
and Screen-based Prototypes of the business IS) to MU Clients.
End of Week 8: Simplified Project Closure Report to the MU
faculty.
264
Flexibility in Offshoring
All the GSD teams had appointed site-coordinators at both the client (USA) and vendor (India)
sites. The quasi-experimental design was a posttest control group design. The treatment for this
experiment was ‘requirements change’ where
non-control groups had major changes in requirements and control groups did not have changes
in requirements. The analysts in the non-control
group developed the first iteration artifacts based
on a set of high level and ambiguous requirements.
A second set of more detailed requirements were
then given to the MU client teams in the noncontrol group by the course faculty and the analysts
then created the second iteration incorporating
the changed set of requirements. The control group
teams also developed the projects in two iterations
but they were given detailed and clearly specified
requirements at the start of the project.
Measures
Requirements Analysis Success:Mahaney and
Lederer (2006) developed a comprehensive instrument for measuring IS project success based on
three dimensions- client satisfaction, perceived
quality of the project and success with the implementation process. Baroudi and Orlikowski (1988)
presented a short-form measure of User Information Satisfaction (UIS). Extending the dimensions
of project success to the success of a particular
phase of a project (requirements analysis), we
define requirements analysis success in terms of
client satisfaction with the requirements analysis
phase, perceived quality of the requirements
analysis deliverables and perceived success of
the requirements analysis process. This research
refers to the items developed by Mahaney and
Lederer (2006), and Baroudi and Orlikowski
(1988) to measure requirements analysis success.
Specifically, this study proposes to measure team
members’ perception of success in flexible GSD
requirements analysis projects.
Control: Items to measure control for this study
have been adapted from literature on formal modes
of control (behavior and outcome) in information
systems development projects (Kirsch, 1996;
Kirsch et al., 2002; Piccoli et al., 2004).
Computer-mediated communication: We
extend the task related communication items
developed by Espinosa (2002) to measure task
related computer-mediated communication for
this study.
Process Facilitation: Items to measure process
facilitation for this study have been adapted from
GSS literature on process facilitation (Miranda
et al., 1999; Anson et al., 2004). The items on
process facilitation were used twice. First, the
items were used to measure process facilitation
by the client site-coordinator and then they were
used to measure process facilitation by the vendor
site-coordinator.
Requirements Change: This variable was
introduced as a treatment in the experiment to
study whether there is an impact of changing
requirements on the proposed model variables.
Requirements change was thus treated as a dichotomous variable (1=changes in requirements
and 0=no changes).
ANALYSIS
A survey instrument was used to collect data
pertaining to the above measures at the end of the
quasi-experiments. Two separate versions were
developed for client and vendor team members.
Both versions included the same items for each
construct but were worded differently to conform
to the participant roles. The items were derived
from available literature as described earlier and
adapted for this study. Questions were randomized prior to instrument administration to counter
possible order effects in the responses. All items
were measured on a seven point Likert-type scale,
where one indicated strong disagreement and
seven indicated strong agreement with the item.
Items of the vendor version are given in Appen-
265
Flexibility in Offshoring
Table 5. Pilot study setting
Setting
Sample
Flexible GSD Requirements Analysis
All teams matched in terms of age, size, work experience, technology,
standard development methodology
Total Sample Size= 102
Analysts=52, Clients=50
(16 client-analyst GSD teams. Each having 3-4 analysts and
2-3 clients)
dix 1 for reference. Demographic data was also
collected through direct questions and analyzed.
Our unit of analysis was at the individual level.
We measured the effect of predictor variables on
the outcome variable as perceived by the individual
team members. A majority of research in organizational behavior has been conducted at individual
level of analysis (Schnake & Dumler, 2003). For
example, leadership style has been examined at
both individual and group levels in leadership
research, but primarily at the individual level
in organizational citizenship behavior research
(Schnake & Dumler, 2003). Similarly, task scope
(Griffin, 1982) and work context (Comstock &
Scott, 1977) have individual and group level effects. Our view is consistent with the assertion
by Choudhury and Sabherwal (2003) that in an
outsourced software project although the overall
context is the contract between the two firms (client and vendor), the focus is still on individual(s)
evaluating and influencing the actions of other
individual(s).
Standard psychometric techniques were employed to validate measures. For construct validity
Cronbach alpha was used and all constructs that
had Cronbach alpha closer to or greater than 0.7
confirmed construct validity (Cheung & Lee,
2001). Factor analyses was conducted to examine
convergent and discriminant validity. Principle
component method of extraction with varimax
rotation was used. The items that did not load well
were removed (see Appendix 1). For ensuring
convergent and discriminant validity we retained
the indicators that loaded onto their proposed
factors for the study.
266
Pilot Testing
As a first step, we carried out a pilot study to gain
an initial understanding and to pilot test the questionnaire items. Subsequently, we conducted the
main experiment to test our hypothesized model.
The pilot study was designed as a part of MU and
MDI course projects and its duration was 8 weeks
(see Table 5). The client teams in US enrolled for
an undergraduate course in IT Project Management and the analyst teams in India enrolled for a
graduate course in Systems Analysis and Design
in Oct 2006. Each client team was given a set of
requirements and the analyst team was required to
develop project artifacts and screen-based prototypes of a business information system requested
by the client team. This study was a simple posttest quasi-experiment design intended to pilot test
the data collection instrument and to comprehend
the flexible GSD environment.
The Experiment
Subsequently in our main experiment, we estimated the complete hypothesized structural model
using Arbuckle’s (2006) AMOS 7.0 program. A
common practice used in conducting SEM analyses with latent variables involves creating “item
parcels” based on sums or means of responses to
individual items and then using scores on these
parcels in the latent variable analysis (Russell,
1998). We created item parcels for success and
control based upon rationale grounds (Kline,
2005) for our structural model analysis. For
success (total 7 questionnaire items) we created
three item parcels- client satisfaction (2 items),
Flexibility in Offshoring
had Cronbach Alpha values above 0.70 indicating
construct reliability. The dependent variable perceived success showed significant correlations
with all the antecedent variables proposed in the
model, i.e. control, communication, process facilitation vendor, and process facilitation client.
There are significant correlations between the
antecedent variables themselves which needs to
be explored further.
perceived quality (three items) and success of
implementation process (2 items). For control,
measured by total 6 questionnaire items, we created two parcels- behavior control (3 items) and
outcome control (3 items).
RESULTS
Survey responses for 20 items were generated
from 181 respondents (client team members and
vendor analysts) for the experiment. Demographic
data was also collected through direct questions
and examined. Four items to measure process
facilitation and two additional items to measure
control were added to the same instrument used in
pilot study. The descriptive statistics is outlined in
Table 6 and Pearson’s product-moment correlation
matrix and reliability analysis is shown in Table 7.
Reliability of the measures of (i) success (ii)
control (iii) communication (iv) process facilitation (vendor) and (iv) process facilitation (client)
Multigroup Analysis
As stated earlier, our experiment was a control
group quasi-experiment design. One of the methods to incorporate group membership (treatment
vs. control) into the model involves separating the
data from members of the treatment and the control
groups and conducting a multiple-group analysis
(Russell, 1998; Sorbom, 1981). We referred to the
multigroup analysis specified by Byrne (2001, pp.
226-43) to test for invariant latent mean structures and Ho (2006, pp. 321-56) to estimate our
Table 6. Descriptive statistics
Total
Std. Dev.
Analyst
Client
Sample Size (Control + Non-control)
181
0.48
115
66
Age (mean value in years)
22.8
1.9
23.5
21.6
Total Work Experience (mean value in years)
2
2
1.2
3.3
IT Work Experience (mean value in years)
0.7
1.3
0.72
0.76
Table 7. Correlation matrix and reliability
Items
1
2
3
4
1. CONTROL
6
(0.837)***
2. COMMUNICATION
3
.178*
(0.828)***
3. PROCESS FACILITATION
€€€€€(CLIENT)
2
.168*
.464**
(0.755)***
4. PROCESS FACILITATION
(VENDOR)
2
.584**
.207**
.178*
(0.789)***
5. SUCCESS
7
.612**
.337**
.584**
.504**
5
(0.790)***
*** Reliability Analysis (Cronbach alpha) on the diagonal
** Correlation is significant at the 0.01 level (2-tailed)
* Correlation is significant at the 0.05 level (2-tailed)
267
Flexibility in Offshoring
hypothesized structural equation model for the
control group and non-control groups.
Byrne (2001) suggests that the usual test for
multigroup comparisons typically focuses on
the extent to which differences are statistically
significant among observed means (calculable
from raw data) representing the various groups.
In contrast, means of latent variables, as in our
case, are unobservable. Thus our focus is on testing
for differences in the latent means for hypotheses
6a-e, i.e. team members having changes in requirements will have higher perceptions of the latent
variables than team members having no changes
in requirements. Specifically, we test for differences in the latent means of control, computermediated communication, process facilitation by
vendor site-coordinator, process facilitation by
client site-coordinator and requirements analysis
success across control and non-control groups.
In testing for differences in latent means our
baseline measurement model for each group is
shown in Figure 4. The variances of the five latent
factors are freely estimated in each group. Means
of the error terms are not estimated and remain
constrained to zero. Except for those fixed to 1.00,
all factor loadings are constrained equal across
groups. All intercepts for the observed measures
are constrained equal across groups. The five
factor means are freely estimated for non-control
group and constrained equal to zero for the control
group. The latent mean estimates indicate that
team members having changes in requirements
have significantly higher perceptions of control
(H6b), computer-mediated communication (H6c),
process facilitation by vendor site-coordinator
(H6e). But there appears to be little difference in
perception for requirements analysis success (H6a)
and process facilitation by client site-coordinator
(H6d). These results are summarized in Table 8.
For our multigroup analysis there were two
data sets (control and non-control groups), each
having 11 measurement variables. The two covariance matrices generated from the two data sets
contained 132 sample moments. In multigroup
Figure 4. Structured means model for control and non-control groups
268
Flexibility in Offshoring
Table 8. Results summary (latent mean estimates)
Hypothesis
Latent Variable
Estimate
Critical Ratio
(CR>+1.96)
Sig.
(p<.05)
Hypothesis
Supported?
H6a
Requirements analysis success
.232
1.760
.078
Not Supported
H6b
Control
.364
2.337*
.019*
Supported
H6c
Computer-mediated communication
.510
2.227*
.026*
Supported
H6d
Process facilitation (vendor site-coordinator)
.334
2.186*
.029*
Supported
H6e
Process facilitation (client site-coordinator)
-.036
-.217
.828
Not Supported
confirmatory factor analysis (measurement)
model, the critical ratio test for control and noncontrol group differences among regression
weights yielded no significant difference for the
16 regression weights. Therefore, we constrained
16 regression weights to equality in the multigroup
path analysis model. The computation of degrees
of freedom and chi-square goodness-of-fit statistics for the group-invariant and group-variant
model are outlined in Appendix 2. The baseline
comparison fit indices of NFI, RFI, IFI, TLI and
CFI for both the models are close to or are above
0.90 (see Table 9). These values show the improvement in fit of both models relative to the null
model. Root mean square error of approximation
(RMSEA) fit index values for group-invariant
(0.074) and group-variant path models (0.077)
indicated adequate fits for both the models. RMSEA values ranging from 0.05 to 0.08 are deemed
acceptable (Ho, 2006, pp. 349).
The nested model comparisons statistics indicate that chi-square difference value for the two
models is 8.847. This value is not significant (p<
.05) with 8 degrees of freedom (see Table 10).
Thus the two models do not differ significantly
in their goodness-of-fit. The AIC measure for
group-invariant model (261.380) is lower than
that for the group-variant model (268.532), indicating that group-invariant model is more parsimonious and better fitting than the group-variant
model. Hence we refer to the estimates of the
group-invariant model for our analysis.
Table 9. Baseline comparisons
Model
NFI
Delta1
RFI
rho1
IFI
Delta2
TLI
rho2
CFI
Group Invariant
.859
.811
.925
.897
.923
Group Variant
.867
.802
.927
.887
.924
Saturated model
1.000
Independence model
.000
1.000
.000
1.000
.000
.000
.000
Table 10. Nested model comparisons (assuming model Group Variant to be correct)
Model
DF
CMIN
P
NFI
Delta-1
IFI
Delta-2
RFI
rho-1
TLI
rho2
Group Invariant
8
8.847
.355
.008
.008
-.009
-.010
269
Flexibility in Offshoring
Figure 5. Non-control group (req. change) structural path model *Standardized estimates and significant
relationships (p<.05, CR>+.96)
Figure 5 and 6 present the path models for the
control and non-control groups together with
standardized regression weights (beta coefficients)
associated with the hypothesized paths. First, we
analyzed critical ratios for differences test for
experimental treatment impact on the path coefficients. Table 11 shows results of the individual
hypotheses for both control and non-control
Figure 6. Control group (no req. change) structural path model *Standardized estimates and significant
relationships (p<.05, CR>+.96)
270
Flexibility in Offshoring
groups. Appendix 2 presents the control and noncontrol group estimates in detail. H1 was supported which posits that formal modes of control
are positively related to perceived success during
requirements analysis in a flexible GSD environment (control group β= .55 and non-control group
β= .43). Surprisingly, as proposed in hypothesis
2, frequent task-related communication was not
found to be significantly related to perceived
success (control group β= -.13, non-control group
β= -.13). Though process facilitation by vendor
site-coordinator did not have a positive impact
on success (H3a: control group β= .08, noncontrol group β= .05), the positive impact of
process facilitation by client site-coordinator was
found to be significant (H3b: control group β=
.60, non-control group β= .71).
The proposed positive relationship between
process facilitation by vendor site-coordinator
and control was found to be significant (H4a:
control group β= .70, non-control group β= .60)
but was insignificant for process facilitation by
client site-coordinator and control (H4b: control
group β= .09, non-control group β= .13). Again,
Table 11. Experiment 2 Results Summary
Hypothesis
Path
Hypothesized
Relationship
H1
control → req analysis success
Control Group:
Non-control Group:
+
H2
computer-mediated communication → req analysis success
Control Group:
Non-control Group:
+
process facilitation(vendor) →
req analysis success
Control Group:
Non-control Group:
+
process facilitation (client) →
req analysis success
Control Group:
Non-control Group:
+
process facilitation (vendor) →
control
Control Group:
Non-control Group:
+
process facilitation (client) →
control
Control Group:
Non-control Group:
+
process facilitation (vendor) →
computer-mediated communication
Control Group:
Non-control Group:
+
process facilitation (client) →
computer-mediated communication
Control Group:
Non-control Group:
+
H3a
H3b
H4a
H4b
H5a
H5b
Path Coefficient
(Standardized
beta)
Critical Ratio
(CR>+1.96)
Sig.
(p<.05)
.547
.434
4.079*
4.079*
.000*
.000*
Hypothesis
Supported?
Supported
Not Supported
-.131
-.131
-1.746
-1.746
.081
.081
Not Supported
-.079
-.054
-.607
-.607
.544
.544
Supported
.599
.710
6.754*
6.754*
.000*
.000*
Supported
.702
.603
6.509*
6.509*
.000*
.000*
Not Supported
.088
.132
1.274
1.274
.203
.203
Not Supported
.177
.120
1.768
1.768
.077
.077
Supported
.399
.471
4.631*
4.631*
.000*
.000*
271
Flexibility in Offshoring
process facilitation by vendor site-coordinator did
not have a positive impact on frequent task-related communication (H5a: control group β= .18,
non-control group β= .12) but the positive impact
of process facilitation by client site-coordinator
was found to be significant (H5b: control group
β= .40, non-control group β= .47). Based on the
results displayed in Table 11, it can be concluded
that for both the control and non-control groups,
process facilitation by vendor site-coordinator is
related indirectly to perception of success, being
mediated by formal modes of control. Furthermore, the greater the process facilitation by client
site-coordinator, the greater is task-related communication, and perception of success.
DISCUSSION
This study was driven by the need to better
understand which antecedent factors impact
requirements analysis success in flexible GSD
projects and how. We proposed a conceptual model
grounded in control theory to find preliminary
answers to our research questions- what are the
factors that are of importance in the requirements
analysis phase of flexible GSD projects? How
do they relate to requirements analysis success?
We find that control (both behaviour and
outcome) positively impacts success during
requirements analysis. Prior studies have primarily focused on behavior and outcome controls
in internal software projects. Few studies, such
as Choudhury and Sabherwal (2003), reported
that outcome control in outsourced IS projects
resembled that of internal IS development projects. They also state that behavior control entailed
monitoring behavior that was ‘explicitly’ as well
as ‘not explicitly’ prescribed and requires further
investigation in other contexts. Consistent with
their view, in a flexible GSD context our study
reports that having some amount of structure in
the form of formal modes of controls positively
impacts success.
272
Applying the information processing perspective of communication (Putnam & Cheney, 1985)
to a GSD scenario, we suggest that there exits work
flow interdependence between the remote client
and the vendor teams for accurately capturing
and documenting requirements. This is likely to
lead to frequent task related computer-mediated
communication for successful completion of requirements analysis. Surprisingly, the results show
that increased task-related communication did not
positively impact success. A likely explanation
for such a finding can be that informal means
of communications across the teams could have
probably sufficed the need of task-related online
information exchange.
Consistent with prior literature and practice,
we find that increased process facilitation by client
site-coordinators in a flexible GSD environment
increases task-related communication and also
leads to greater success of requirements analysis
projects. However, increased process facilitation
by vendor site-coordinators did not lead to greater
task-related communication. Rather, increased
process facilitation by vendor site-coordinators
lead to increased control which further impacted
requirements analysis success. Consequently,
the effect of process facilitation by vendor sitecoordinators on requirements analysis success
is found to be mediated by control whereas process facilitation by client site-coordinators has a
direct impact on requirements analysis success.
Further, increased process facilitation by client
site-coordinators did not lead to increased control.
An inherent assumption behind flexible (agile) philosophy is changes in requirements are
good since requirements evolve over time and
are best clarified through multiple information
gathering iterations. In our experiment we introduced ‘changes in requirements’ as a treatment
for the non-control group. Our findings suggest
that team members who experienced changing
requirements also experienced greater control,
greater computer-mediated communication, and
greater process facilitation by vendor site-coor-
Flexibility in Offshoring
dinator. However, these team members did not
experience greater process facilitation by client
site-coordinator. Since changes in requirements
are client initiated, it is likely that the increased
role of the client site-coordinator was perceived
to be less significant. The latent mean scores also
indicated lower difference in perception of requirements analysis success. A probable explanation in
this regard could be that changes in requirements
might not have a direct impact on the success
of requirements analysis phase. However, it is
likely that the changes have greater impact on
subsequent phases of software development and
hence on the complete project. Also, there is likely
to be an indirect impact via mediating factors like
control, communication and process facilitation.
This needs to be further explored by including
requirements change as a model variable.
LIMITATIONS AND FUTURE
PROPOSITIONS
Use of Experiments
Literature in the area of virtual teams has mainly
followed three research methodologies– case
studies, industry survey, and experiments. Experimental methods make possible the careful
observation and precise manipulation of independent variables, allowing for greater certainty with
respect to cause and effect, while holding constant
other variables that would normally be associated
with it in field settings (Damian, Eberlein, Shaw
& Gaines, 2000). They also encourage the investigator to try out novel conditions and strategies
in a safe and exploratory environment before
implementing them in the real world (McGrath,
1984). The industry is yet to adopt off-shoring of
the requirements analysis phase. This precludes
the use of case study or industry survey for this
research. Hence, we used experiments where we
can try out this new method. While this limits
the generalizablity of our findings, our approach
provides a foundation from which to build a future
empirical industry assessment as the time is ripe.
Use of Students as Surrogates
There are criticisms for the use of students in
academic experiments as surrogates. However,
MBA students have been used as surrogate users
in experiments conducted by Hazari (2005), and
Briggs, Balthazard and Dennis (1996). Even in
requirement negotiation phase, students with work
experience were taken as users for developing a
small system (Damian et al., 2000). Remus (1986)
argued that graduate students could be used as
surrogates for managers in experiments on business decision making. Students often represent a
typical working professional and organizational
member due to the variety of backgrounds and
goals (Dipboye & Flanagan, 1979). Studies in
industrial organization psychology and organization behavior suggest that results obtained from
students are similar to those from managers (see
for example, Locke, 1986). Despite the fact that
clients and analysts in our experiments had 2-4
years of work experience, limitations of using
students as surrogates are still applicable in our
study.
The potential lack of realism in laboratory
experiments using student surrogates can be addressed through multiple methods (McGrath,
1984) so that strengths of some compensate weaknesses of others (Jarvenpaa, 1988). Simulated
laboratory negotiations could be complemented
by field studies or validations, if the lack of realism is an issue. As a next step in our research, we
plan to complement the findings of our laboratory
experiments with field validations.
Project Complexity
We acknowledge that requirements analysis is
an intensive phase and hence is not possible to
completely replicate it in student experiments.
However, our objective was to study the research
273
Flexibility in Offshoring
questions on comparable relatively well-defined
small projects in which complexity of requirements analysis is not high. Though the experiments
were carefully designed, the projects done were
limited in scope and size compared to large scale
industrial projects. However, no formal measures
of complexity were used in the study so that we
could compare the projects used in the experiments with real world industrial projects. Further
research is needed to assess the impact of these
findings on large scale industrial projects with
complex requirements.
Communication Technology
The communication technology used in our
experiment was mainly freely available internet
based information and communication technology
like chat, email, egroups and web conferencing.
Moreover, in industry other technologies like
teleconferencing and video conferencing are also
used. Further research is required to study the
impact of different communication technologies
during requirements analysis.
IMPLICATIONS FOR PRACTICE
The use of GSD in organizations is becoming
increasingly commonplace as corporations seek to
take advantage of geographically dispersed talent
for multi-location operations. This study yields
several interesting implications for practice that
can assist organizations in managing their offshore
GSD projects more effectively.
Despite evidence of successful agile software
development, its application in GSD warrants
some planning. Although there exists some
preliminary research on applications of Extreme
Programming (XP) in GSD (Nago-The, Hoang,
Nguyen & Mai, 2005), it is a common perception
that agile methods are not applicable in GSD. There
is a need for increased understanding of the characteristics of agile methods and how they can be
274
applied to mitigate negative influence of distance
(Holmstrom et al., 2006). There are emerging
examples of organizations like Sapient that have
demonstrated the ability to run complex, largescale distributed projects and have leveraged the
benefits that agile processes offer (Barnett, 2006).
Prior studies indicate that creation of flexible
environments by incorporating the principles of
agile development can help organizations mitigate
communication and control related risks inherent
in GSD. Our study also finds that client as well as
vendor organizations need to pay adequate attention to incorporating discipline even in flexible
GSD projects, specifically during requirements
analysis. Our paper makes an important contribution of delineating the differences of the traditional,
agile and flexible approaches. In an attempt to
portray reality, we explain the hybrid ‘flexible
GSD’ approach which most organizations are
adopting. This hybrid approach incorporates the
discipline offered by the traditional approaches
and the flexibility offered by the agile approaches.
Companies that are engaged in offshore GSD
have developed strong processes around their
global delivery model. However, whether the
same processes and project monitoring discipline (control) will lead to success of projects
conducted in ‘flexible and pure offshore mode’
in virtual team setting during the early stages of
system development work has not been explored.
Hence, we examined the antecedents of success
during requirements analysis in such an environment. Our research indicates that client sitecoordinators play an important role in increasing
task related computer-mediated communication
and requirements analysis success. Further vendor
site-coordinators play a critical role in increasing
control which indirectly impacts requirements
analysis success.
Agile philosophy advocates that requirements
change is a business world reality. Our study
provides empirical support for the impact of
requirements change even in the early phases of
software development like requirements analysis.
Flexibility in Offshoring
The results indicate that changes in requirements
resulted in greater control, greater computermediated communication, and greater process
facilitation by vendor site-coordinator. These
factors are likely to further impact requirements
analysis success in a GSD setting.
Another important message that this study conveys is that site-coordinators need not be project
managers or team leads. Any experienced team
member who gets nominated by consensus can
facilitate project processes and impact success of
distributed projects. Further research is needed to
confirm our exploratory findings.
IMPLICATIONS FOR RESEARCH
Contributing to existing research, this study
empirically demonstrates the direct and indirect
relationships between antecedent factors (control,
computer-mediated communication, process facilitation by vendor site-coordinator and process
facilitation by client site-coordinator) and success
in flexible offshore GSD projects. It may not always be feasible to make experimental and control
groups adhere to experimental requirements in a
classroom setting, hence a flexible approach is
needed in experimental design.
The findings highlight the key role that formal modes of control play even in a flexible
GSD environment. The scope of our research
was limited to examining only formal modes of
control whereas agile philosophy can probably
also support informal modes of control, such as,
self and clan control. Future research is needed
to understand the conditions under which self and
clan control is used in flexible GSD projects, and
hence their impact on success.
By implementing dedicated client as well as
vendor site-coordinators at each distributed site
we also empirically determined the direct and
indirect (via control) effects of process facilitation
on success. Contrary to our belief we found that
there was no significant impact of task-related
computer-mediated communication on success.
Informal communication and socialization is one
probable explanation that could have met the need
for such information exchange. Also, given the
fact that students were used as surrogates, informal
online interaction is more likely to occur rather
than planned formal interaction. This needs further investigation by researchers in field settings.
Although several benefits have been speculated, our research is one of the first studies to
empirically validate the impact of changes in
requirements, which resulted in greater perception
of control, computer-mediated communication,
and process facilitation by vendor site-coordinator.
However, requirements change calls for more
detailed investigation as we studied this using a
dichotomous variable in our multigroup analysis.
Future research can involve measuring the level
of requirements change and further adding it as
a variable in our research model. Moreover, to
further our knowledge about success of flexible
offshore GSD projects and their sub-phases, additional studies are needed that move beyond presently conceptualized variables, such as, impact of
motivation, cohesion and trust between offshore
GSD team members, and emotional intelligence
of individual team members.
REFERENCES
Agerfalk, P. J., & Fitzgerald, B. (2006). Flexible
and distributed software processes: Old petunias
in new bowls? Communications of the ACM,
49(10), 27–35.
Anson, R., Bostrom, R., & Wynne, B. (1995). An
experiment assessing group support system and
facilitator effects on meeting outcomes. Management Science, 41(2), 189–208. doi:10.1287/
mnsc.41.2.189
Arbuckle, J. L. (2006). AMOS 7.0 computer software. Chicago, IL: SmallWaters.
275
Flexibility in Offshoring
Augustine, S., Payne, B., Sencindiver, F., & Woodcock, S. (2005). Agile project management: Steering from the edges. Communications of the ACM,
48(12), 85–89. doi:10.1145/1101779.1101781
Barnett, L. (2006). Scaling agile worldwide: Sapient’s distributed agile methodology. Agile Journal.
Retrieved October 23, 2007, from: http://www.
agilejournal.com
Baroudi, J. J., & Orlikowski, W. J. (1988). A shortform measure of user information satisfaction: A
psychometric evaluation and notes on use. Journal
of Management Information Systems, 4(4), 44–59.
Battin, R., Crocker, R., Kreidler, J., & Subramanian, K. (2003). Leveraging resources in global
software development. IEEE Software, (March/
April): 70–77.
Beath, C. M., & Orlikowski, W. J. (1994). The
contradictory structure of systems development
methodologies: Destructuring the IS user relationship in information engineering. Information
Systems Research, 5(4), 350–377. doi:10.1287/
isre.5.4.350
Bhat, J., Gupta, M., & Santhosh, N. (2006). Overcoming requirements engineering challenges: Lessons from offshore outsourcing. IEEE Software,
(Sept): 38–43. doi:10.1109/MS.2006.137
Briggs, R. O., Balthazard, P. A., & Dennis, A. R.
(1996). Graduate business students as surrogates
in the evaluation of technology. Journal of End
User Computing, 8(4), 11–17.
Briggs, R. O., & Gruenbacher, P. (2002). Easy
win-win: Managing complexity in requirements
negotiation with GSS. Proceedings: 35th Annual
Hawaii International Conference on Systems Science. Hawaii.
Byrne, B. M. (2001). Structural equation modeling with AMOS. London, UK: Lawrence Erlbaum
Associates.
276
Campbell, D. T., & Stanley, J. C. (1966). Experimental and quasi-experimental designs for
research. Chicago, IL: Rand McNally.
Carmel, E. (1999). Global software teams: Collaborating across borders and time zones. Upper
Saddle River, NJ: Prentice Hall.
Carmel, E., & Tjia, P. (2005). Offshoring Information Technology: Sourcing and outsourcing to a global workforce. Cambridge, UK:
Cambridge University Press. doi:10.1017/
CBO9780511541193
Cheung, C., & Lee, M. (2001). Trust in Internet
shopping: Instrument development and validation
through classical and modern approaches. Journal
of Global Information Management, 9(3), 23–35.
doi:10.4018/jgim.2001070103
Choudhury, V., & Sabherwal, R. (2003). Portfolios
of control in outsourced software development
projects. Information Systems Research, 14(3),
291–314. doi:10.1287/isre.14.3.291.16563
Cockburn, A., & Highsmith, J. (2001). Agile software development: The business of innovation.
IEEE Computer, 120-122.
Comstock, D. E., & Scott, W. R. (1977). Technology and the structure of subunits: Distinguishing individual and workgroup effects.
Administrative Science Quarterly, 22, 177–202.
doi:10.2307/2391955
Crampton, C. (2001). The mutual knowledge
problem and its consequences for dispersed collaboration. Organization Science, 12(3), 346–371.
doi:10.1287/orsc.12.3.346.10098
Crisp, C. B. (2003). Control enactment in global
virtual teams. UMI published doctoral dissertation. University of Texas, Austin.
Crowston, K., & Kammerer, E. E. (1998). Coordination and collective mind in software requirements development. IBM Systems Journal, 37(2),
227–241. doi:10.1147/sj.372.0227
Flexibility in Offshoring
Damian, D. E., Eberlein, A., Shaw, M. L. G., &
Gaines, B. R. (2000). Using different communication media in requirements negotiation. IEEE
Software, (May/June): 28–36.
Espinosa, A. J. (2002). Shared mental models and
coordination in large-scale, distributed software
development. UMI published doctoral dissertation.
Carnegie Mellon University.
Damian, D. E., & Zowghi, D. (2002). An insight
into interplay between culture, conflict and distance in globally distributed requirement negotiations. Proceedings: 36th Hawaii International
Conference on System Sciences. Hawaii.
Evaristo, R., Watson-Manheim, M. B., & Audy,
J. (2005). E-collaboration in distributed requirements determination. International Journal
of e-Collaboration, 1(2), 40–55. doi:10.4018/
jec.2005040103
DeSanctis, G., & Gallupe, R. B. (1987). A foundation for the study of group decision support
systems. Management Science, 35(5), 589–609.
doi:10.1287/mnsc.33.5.589
Favela, J., & Pena-Mora, F. (2001). An experience in collaborative software engineering
education. IEEE Software, (March/April): 47–53.
doi:10.1109/52.914742
Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004). Information Systems outsourcing: A survey and analysis of the literature. The
Data Base for Advances in Information Systems,
35(4), 6–102.
Fruhling, A., & de Vreede, G.-J. (2006). Field
experiences with eXtreme programming: Developing an emergency response system. Journal of
Management Information Systems, 22(4), 39–68.
doi:10.2753/MIS0742-1222220403
Dipboye, R. L., & Flanagan, M. F. (1979). Research
setting in industrial and organization psychology:
Are findings in the field more generalizable than
in laboratory. The American Psychologist, 32,
141–150. doi:10.1037/0003-066X.34.2.141
Griffin, R. W. (1982). Task design: An integrated
approach. Glenview, IL: Scott Foresman.
Edwards, K., & Sridhar, V. (2005). Analysis of
software requirements engineering exercises in a
global virtual team setup. Journal of Global Information Management, 13(2), 21–41. doi:10.4018/
jgim.2005040102
Edwards, K., & Sridhar, V. (2006). Collaborative
software requirements engineering exercises in a
distributed virtual team environment. In Hunter,
G., & Tan, F. (Eds.), Advanced topics of global
information management (Vol. 5, pp. 178–197).
Hershey, PA: Idea Publishing.
Eisenhardt, K. M. (1985). Control: Organizational
and economic approaches. Management Science,
31(2), 134–149. doi:10.1287/mnsc.31.2.134
Griffith, T. L., Fuller, M. A., & Northcraft, G.
B. (1998). Facilitator influence in group support systems: Intended and unintended effects.
Information Systems Research, 9(1), 21–35.
doi:10.1287/isre.9.1.20
Hazari, S. I. (2005). Perceptions of end-users on
the requirements in personal firewall software: An
exploratory study. Journal of Organizational and
End User Computing, 17(3), 47–65. doi:10.4018/
joeuc.2005070103
Ho, R. (2006). Handbook of univariate and
multivariate data analysis and interpretation
with SPSS. Boca Raton, FL: Chapman & Hall.
doi:10.1201/9781420011111
Hoffer, J., George, J., & Valacich, J. (1999). Modern systems analysis and design. Addison Wesley.
277
Flexibility in Offshoring
Holmstrom, H., & Fitzgerald, B., Agerfalk, Par,
J., & Conchuir, E. O. (2006). Agile practices
reduce distance in global software development.
Information Systems Management, (Summer):
7–18. doi:10.1201/1078.10580530/46108.23.3.
20060601/93703.2
Hulnick, G. (2000). Doing business virtually.
Communication World, 17(3), 33–36.
Jarvenpaa, S. (1988). The importance of laboratory experimentation in IS research. Communications of the ACM, 31(12), 1502–1505.
doi:10.1145/53580.374700
Kirsch, L. J. (1997). Portfolios of control modes
and IS project management. Information Systems
Research, 8(3), 215–239. doi:10.1287/isre.8.3.215
Kirsch, L. J., & Cummings, L. L. (1996). Contextual influences on self-control of IS professionals
engaged in systems development. Accounting.
Management Information Technology, 6(3),
191–219.
Kirsch, L. J., Sambamurthy, V., Dong-Gil, K.,
& Purvis, R. L. (2002). Controlling Information
Systems development projects: The view from
the client. Management Science, 48(4), 484–498.
doi:10.1287/mnsc.48.4.484.204
Kline, R. B. (2005). Principles and practice of
structural equation modeling (2nd ed.). New
York, NY: Guilford.
Lee, G., Delone, W., & Espinosa, J. A. (2006).
Ambidextrous coping strategies in globally distributed software development projects.
Communications of the ACM, 49(10), 35–40.
doi:10.1145/1164394.1164417
Lee, O.-K., Banerjee, P., Lim, K. H., Hillegersberg,
J. V., & Wei, K. K. (2006). Aligning IT components
to achieve agility in globally distributed system
development. Communications of the ACM,
49(10), 49–54. doi:10.1145/1164394.1164419
278
Lindstrom, L., & Jeffries, R. (2004). Extreme
programming and agile software development
methodologies. Information Systems Management, (Summer): 41–52. doi:10.1201/1078/444
32.21.3.20040601/82476.7
Locke, E. A. (1986). Generalizing from laboratory
to field setting: Research finding from industrial
organization, organization behavior, and human
resource management. Lexington, MA: Lexington
Books.
Mahaney, R. C., & Lederer, A. L. (2006). The effect
of intrinsic and extrinsic rewards for developers
on Information Systems project success. Project
Management Journal, 37(4), 42–54.
McGrath, J. (1984). Groups: Interaction and
performance. New Jersey: Prentice-Hall.
Meso, P., & Jain, R. (2006). Agile software development: Adaptive systems principles and best
practices. Information Systems Management,
(Summer): 19–30. doi:10.1201/1078.10580530
/46108.23.3.20060601/93704.3
Nago-T., A., Hoang, K., Nguyen, T., & Mai, N.
(2005). Extreme programming in distributed
software development: A case study. Proceedings
of the International Workshop on Distributed
Software Development. Paris.
Nath, D., Sridhar, V., Adya, M., & Malik, A.
(2006). The effect of user project monitoring on
the performance of virtual teams in the requirements analysis phase of off-shored software projects. Proceedings of the INFORMS Conference
on Information Systems and Technology (CIST).
Pittsburgh, PA, USA.
National Association of Software and Service
Companies (NASSCOM). (2007). Strategic review: The IT industry in India. Retrieved March
19, 2007, from http://www.nasscom.org/
Flexibility in Offshoring
PMBOK®. (2000). A guide to project management
body of knowledge (PMBOK). Newtown Square,
PA: Project Management Institute.
Powell, A., Piccoli, G., & Ives, B. (2004). Virtual
teams: A review of current literature and directions
for future research. The Data Base for Advances
in Information Systems, 35(1), 6–36.
Putnam, L. L., & Cheney, G. (1985). Organizational communication: Historical development
and future directions. In Benson, T. W. (Ed.),
Speech communication in the 20th century (pp.
130–156). Carbondale, IL: Southern Illinois
University Press.
Ramesh, B., Cao, L., Mohan, K., & Xu, P. (2006).
Can distributed software development be agile?
Communications of the ACM, 49(10), 41–46.
doi:10.1145/1164394.1164418
Remus, W. E. (1986). An empirical test of the use
of graduate students as surrogates for managers in
experiments on business decision making. Journal
of Business Research, 14(1), 1986, 19–25.
Rice, R. E. (1987). Computer-mediated communication and organizational innovation.
The Journal of Communication, 37(4), 65–94.
doi:10.1111/j.1460-2466.1987.tb01009.x
Russell, D. W., Kahn, J. H., & Altmaier, E. M.
(1998). Analyzing data from experimental studies:
A latent variable structural equation modeling approach. Journal of Counseling Psychology, 45(1),
18–29. doi:10.1037/0022-0167.45.1.18
Schnake, M. E., & Dumler, M. P. (2003). Levels
of measurement and analysis issues in organizational citizenship behavior research. Journal of
Occupational and Organizational Psychology,
76, 283–301. doi:10.1348/096317903769647184
Shaila, M., & Bostrom, R. P. (1999). Meeting
facilitation: Process versus content interventions.
Journal of Management Information Systems,
15(4), 89–114.
Sorbom, D. (1981). Systems under indirect observation: Causality, structure and prediction. In
Joreskog, K. G., & Wald, H. (Eds.), Structural
equation models with structured means. Amsterdam, The Netherlands: North-Holland.
Tan, C., & Teo, H. (2007). Training future software
developers to acquire agile development skills.
Communications of the ACM, 50(12), 97–98.
doi:10.1145/1323688.1323715
Yadav, V., & Gupta, R. (2008). A paradigmatic and
methodological review of research in outsourcing. Information Resources Management Journal,
21(1), 27–43. doi:10.4018/irmj.2008010102
Yadav, V., Nath, D., Adya, M., & Sridhar, V. (2007).
Investigating an agile-rigid approach in globally
distributed requirements analysis. Proceedings:
11th Pacific-Asia Conference on Information Systems (PACIS). Auckland, New Zealand.
279
Flexibility in Offshoring
APPENDIX A. QUESTIONNAIRE ITEMS
Two separate versions of the same questionnaire were created having identifiers, such as ‘MU’ for the
client questionnaire and ‘MDI’ for the vendor questionnaire. The items were the same only the identifiers
(MU/MDI) were different for the client and vendor team members. The items presented in the appendix
are from the MDI vendor questionnaire.
Response Scale: “Please answer each of the following questions related to the globally distributed development project by encircling the appropriate response”
Seven point scale, with 1= “Strongly Disagree”, 4= “Neutral” and 7= “Strongly Agree”
Process Facilitation
Process Facilitation- Vendor
1.
2.
3.
The MDI site-coordinator helped coordinate the workflow between MDI and MU team members.
My team members could have prepared as good project deliverables even if the MDI site-coordinator
had not been present.*
The MDI site-coordinator constructively responded to our team’s needs for assistance.
Process Facilitation- Client
1.
2.
3.
The MU site-coordinator helped coordinate the workflow between MDI and MU team members.
My team members could have prepared as good project deliverables even if the MU site-coordinator
had not been present.*
The MU site-coordinator constructively responded to our team’s needs for assistance.
Computer-Mediated Communication
1.
2.
3.
We had frequent online-meetings with MU team members for coordination and planning.
We had frequent online-meetings with MU team members for requirements analysis.
We had frequent online formal review meetings with MU team members. 4. I participated actively
in the on-line discussions with MU team members.*
Control
Behavior Control**
1.
2.
280
The MU team members insisted on complete and on-time submission of project status reports.
The MU team members insisted on complete and on-time submission of intermediate project
deliverables.
Flexibility in Offshoring
3.
The MU team members insisted on complete and on-time submission of final project deliverables.
Outcome Control**
4.
5.
6.
The MU team members regularly monitored the project progress.
A detailed project management plan was developed between our MDI team members and MU team
members.
The communication process between our MDI team members and MU team members was well
defined.
Success
Perceived Quality**
1.
2.
3.
4.
5.
MDI team members have been able to come out with the best possible deliverables for capturing
MU client requirements.
The final project deliverables were readily accepted by the MU team members.
The project deliverables clearly specified MU client requirements. Client Satisfaction**
The MU team members clearly understood the project deliverables submitted by MDI team members.
The commitment of the MU team members in favor of the project directed goals and tasks were
positive.
Success of Implementation Process**
6.
7.
The virtual team project was completed within its original schedule.
MU client was satisfied with the process by which this project was completed.
* Item dropped from analysis
** Entered as item parcels in the model for analysis
APPENDIX B. RESULTS OF MULTIGROUP ANALYSIS
Computation of degrees of freedom and chi-square goodness-of-fit statistics for the models
Model (Group-Invariant)
Model (Group-Variant)
Computation of degrees of freedom (Group-Invariant)
€€Number of distinct sample moments :132
€€Number of distinct parameters to be estimated: 50
€€Degrees of freedom (132 - 50) : 82
Computation of degrees of freedom (Group-Variant)
€€Number of distinct sample moments :132
€€Number of distinct parameters to be estimated: 58
€€Degrees of freedom (132 - 58) : 74
Result (Group-Invariant)
Minimum was achieved
Chi-square = 161.380
Degrees of freedom = 82
Probability level = .000
Result (Group-Variant)
Minimum was achieved
Chi-square = 152.532
Degrees of freedom = 74
Probability level = .000
281
Flexibility in Offshoring
Estimates (group invariant)
CONTROL GROUP (No Req. Change)
NON-CONTROL GROUP (Req. Change)
Scalar Estimates (Maximum Likelihood Estimates)
Regression Weights
Scalar Estimates (Maximum Likelihood Estimates)
Regression Weights
Estimate
S.E.
C.R.
P
Label
Estimate
S.E.
C.R.
P
Label
Com
<---
Fac
Vendor
.238
.135
1.768
.077
nc1
Com
<---
Fac
Vendor
.238
.135
1.768
.077
nc1
Contrl
<---
Fac
Client
.102
.080
1.274
.203
nc6
Contrl
<---
Fac
Client
.102
.080
1.274
.203
nc6
Contrl
<---
Fac
Vendor
.653
.100
6.509
***
nc3
Contrl
<---
Fac
Vendor
.653
.100
6.509
***
nc3
Com
<---
Fac
Client
.672
.145
4.631
***
nc4
Com
<---
Fac
Client
.672
.145
4.631
***
nc4
Success
<---
Contrl
.476
.117
4.079
***
nc7
Success
<---
Contrl
.476
.117
4.079
***
nc7
Success
<---
Com
-.078
.045
-1.746
.081
nc8
Success
<---
Com
-.078
.045
-1.746
.081
nc8
Success
<---
Fac
Client
.605
.090
6.754
***
nc5
Success
<---
Fac
Client
.605
.090
6.754
***
nc5
Success
<---
Fac
Vendor
-.064
.105
-.607
.544
nc2
Success
<---
Fac
Vendor
-.064
.105
-.607
.544
nc2
fac2
<---
Fac
Vendor
1.002
.124
8.075
***
ncv2
fac2
<---
Fac
Vendor
1.002
.124
8.075
***
ncv2
outcnt
<---
Contrl
.717
.085
8.426
***
ncv3
outcnt
<---
Contrl
.717
.085
8.426
***
ncv3
fac1
<---
Fac
Client
.984
.110
8.924
***
ncv1
fac1
<---
Fac
Client
.984
.110
8.924
***
ncv1
fac5
<---
Fac
Client
1.000
fac5
<---
Fac
Client
1.000
fac6
<---
Fac
Vendor
1.000
fac6
<---
Fac
Vendor
1.000
behcnt
<---
Contrl
1.000
behcnt
<---
Contrl
1.000
com4
<---
Com
.992
com4
<---
Com
.992
.115
8.652
***
ncv6
com3
<---
Com
1.000
com3
<---
Com
1.000
uis
<---
Success
.684
.067
10.225
***
ncv4
uis
<---
Success
.684
.067
10.225
***
ncv4
proc
<---
Success
.967
.058
16.565
***
ncv5
proc
<---
Success
.967
.058
16.565
***
ncv5
qlty
<--
Success
1.000
qlty
<---
Success
1.000
.115
8.652
***
Standardized Regression Weights
ncv6
Standardized Regression Weights
Estimate
Estimate
Com
<---
Fac Vendor
.177
Com
<---
Fac Vendor
.120
Contrl
<---
Fac Client
.088
Contrl
<---
Fac Client
.132
Contrl
<---
Fac Vendor
.702
Contrl
<---
Fac Vendor
.603
Com
<---
Fac Client
.399
Com
<---
Fac Client
.471
Success
<---
Contrl
.547
Success
<---
Contrl
.434
Success
<---
Com
-.131
Success
<---
Com
-.131
continued on following page
282
Flexibility in Offshoring
Estimates (group invariant), continued
CONTROL GROUP (No Req. Change)
NON-CONTROL GROUP (Req. Change)
Success
<---
Fac Client
.599
Success
<---
Fac Client
.710
Success
<---
Fac Vendor
-.079
Success
<---
Fac Vendor
-.054
fac2
<---
Fac Vendor
.819
fac2
<---
Fac Vendor
.717
Out cnt
<---
Contrl
.717
Out cnt
<---
Control
.742
fac1
<---
Fac Client
.761
fac1
<---
Fac Client
.824
fac2
<---
Fac Client
.726
fac5
<---
Fac Client
.788
fac6
<---
Fac Vendor
.877
fac6
<---
Fac Vendor
.742
Beh cnt
<---
Control
.797
Beh cnt
<---
Control
.831
com4
<---
Com
.864
com4
<---
Com
.904
com3
<---
Com
.892
com3
<---
Com
.925
sat
<---
Success
.611
sat
<---
Success
.691
proc
<---
Success
.962
proc
<---
Success
.923
qlty
<---
Success
.808
qlty
<---
Success
.926
Squared Multiple Correlations
Squared Multiple Correlations
Estimate
Estimate
Com
.216
Com
.270
Control
.522
Control
.427
Success
.649
Success
.735
proc
.925
proc
.852
com3
.795
com3
.856
Out cnt
.514
Out cnt
.551
Beh cnt
.635
Beh cnt
.690
sat
.373
sat
.478
qlty
.652
qlty
.858
com4
.747
com4
.817
fac2
.672
fac2
.514
fac6
.769
fac6
.551
fac1
.580
fac1
.680
fac5
.527
fac5
.621
283
284
Chapter 13
Taking Information
Systems Business Process
Outsourcing Offshore:
The Conflict of Competition and Risk
Georgia Beverakis
University of New South Wales, Australia
Geoffrey N. Dick
University of New South Wales, Australia
Dubravka Cecez-Kecmanovi
University of New South Wales, Australia
ABSTRACT
As Business Process Outsourcing (BPO) moves offshore and now includes Information Systems (IS)
Processes, there is a need to consider a combination of the two. This article explores the factors that
a multinational organisation considered when it “offshored” its IS business processes to lower-cost
destinations. It focuses on determining the driving factors and challenges faced during the offshore
sourcing project. A single, in-depth interpretive case study approach was used to explore this research
topic. The results of this study show that the organisation under investigation was primarily driven to
offshore its IS business processes in order to become more competitive in the marketplace. This was
assisted by the organisation reducing its operational costs, and establishing a global presence in many
lower-cost locations offshore. A model was developed, which illustrates the interrelationships that exist
between these concepts.
INTRODUCTION
Offshore sourcing (the purchase of services
from overseas) is not a new phenomenon; it has
DOI: 10.4018/978-1-60960-605-3.ch013
existed for the last 2 decades in many industries,
particularly in the manufacturing industry, and
more recently in the financial services industry.
Despite being active for a number of years, offshore sourcing only gained momentum during
Y2K when there was an abundance of capable
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Taking Information Systems Business Process Outsourcing Offshore
professionals offshore, more “than those available
in the first world” (Dibbern, Goles, Hirschheim,
& Jayatilaka, 2004, p. 13; Hirschheim, George,
& Wong, 2004, pp.12-13). Since then, the phenomenon has gained increasing popularity in
many varied industries. Offshore sourcing in
Information Systems is defined as the handing
over of “responsibility for [the] management and
delivery of information technology services” to a
vendor located in another country (Pfannenstein
& Tsai, 2004, p. 72; Sabherwal, 1999).
Business Process Outsourcing (BPO) is an additional outsourcing concept, which has developed
in recent years. It is an outsourcing agreement
“where a third party provider is responsible for
performing an entire business function for the
client organization” (Dibbern et al., 2004, p.
11). BPO, like offshore sourcing, is a concept
familiar to both the manufacturing and financial
services industries. Business processes that have
typically been outsourced are IS/IT enabled business processes and not the actual IS/IT business
processes themselves, making it apparent that the
commonality of offshore sourcing and BPO is that
the business processes and services targeted for
outsourcing are those that are supported by IS/IT
(Willcocks, Hindle, Feeny, & Lacity, 2004). As
an example, loan approvals, debt collection, and
data input are often sent offshore, but related IS/
IT processes of reporting, modification of output,
and database administration generally have not
been. A diagrammatic representation of the evolution of these practices is included a little later
in the article after some further explanation, as
in Figure 2.
In recent years, there has been a significant
increase in the attention paid to BPO and offshore
sourcing. While the concept of offshore BPO has
been given some consideration, there is little
literature on the newer offshoring of IS business
processes. There is, however, some research that
has been conducted into the offshoring of other
business processes, for example, human resources services, finance and accounting services, and
customer support functions, to name a few (Whinston, 2004). The offshoring of these business
processes has typically been enabled by IS/IT
(Hirschheim et al., 2004, p. 23). But, there is a
further development—the offshoring of IS business processes themselves (such as customising
and modelling SAP reports, changing management, and modifying work roles and tasks by
sending certain components offshore). The research reported here has the aim of providing an
in-depth understanding of its drivers and motivations and is based on an intensive case study of
IS business processes offshoring by an Australian
arm of a multinational organisation—ComputerInc (a pseudonym, as are the names of staff), a
leading supplier of IT hardware, software, and
services.
This study identifies both the drivers (expected
benefits) and challenges of offshoring IS BPO.
It is perhaps relevant that one of the sites being
considered for taking on some of the work was
in fact on-shore—in Australia, but removed from
the main office. This was seen as significant at
the time as ComputerInc had several clients who
were expected to have concerns about data and
data interpretation going offshore. The resulting
framework grounded in empirical data contributes
to better understanding of the offshoring IS business processes which may aid organisations in their
decision-making surrounding offshore sourcing. It
is hoped that this framework will be employed in
future research to develop a more general theory
into offshore BPO. The authors firmly believe
that the interplay between the benefits and challenges explored here will be useful for managers
considering similar decisions.
BACKGROUND
Outsourcing
The outsourcing phenomenon has today evolved
from arrangements, which involve one client
285
Taking Information Systems Business Process Outsourcing Offshore
and one vendor where the vendor is responsible
for providing all IS-related services to the client;
to arrangements that involve multiple vendors
and clients and encompass more complex tasks.
Moreover, we now see “significant partnerships
and alliances … where client and vendor share risk
and reward” (Dibbern et al., 2004, p. 8). Furthermore, outsourcing deals now entail “value-based
outsourcing, equity based outsourcing, eBusiness
outsourcing, and business process outsourcing”
emphasising the evolution that has taken place in
the outsourcing arena (Dibbern et al., 2004, p. 8).
Further highlighting this evolution, IS outsourcing
used to typically focus on “single-system contracts
comprising a small portion of the IS budget”
and now IS outsourcing spans multiple systems
and embodies the “transfer of assets, leases, and
staff to a vendor that assumes a profit and loss
responsibility” (Lacity & Hirschheim, 1993a, p.
74). Additionally, there are no signs that indicate
that this growth in IS outsourcing will cease, in
fact it is likely to continue well into the future
(Willcocks et al., 2004, p. 7).
Motivations for outsourcing include cost
savings and strategic benefits (Costa & Beaumont, 2001; Dibbern et al., 2004; Hirschheim
et al., 2004; Jurison, 1995; King & Malhotra,
2004; Martinsons, 1993; McLellan, Marcolin, &
Beamish, 1995; Quelin & Duhamel, 2003; Sobol &
Apte, 1995, p. 270). Other commonly recognised
motivations include the ability to leverage the IS
expertise of its vendors (Lacity & Hirschheim,
1993b, p. 13; Martinsons, 1993, pp. 19-20) and
the ability to focus more attention on its core
competencies, making the organisation more
efficient and effective in its operations (Grover,
Cheon, & Teng, 1996; Harris, Giunipero, & Holt,
1998). Challenges include the irreversibility of
the outsourcing decision, loss of control, hidden
costs, challenges associated with the vendor, and
a loss of skills/knowledge/expertise (Apte et al.,
1997; Aubert, Rivard, & Patry, 2001; Earl, 1996;
Jurison, 1995; King & Malhotra, 2000; Lacity &
Hirschheim, 1993b; Lacity, Willcocks, Feeny,
286
1996; Martinsons, 1993; Quelin & Duhamel,
2003).
Offshore Sourcing
Offshore sourcing, commonly known as offshoring, refers to the outsourcing of services to a
third-party vendor in another country “as well as
offshore insourcing to an internal group within a
global corporation” (Carmel & Agarwal, 2002, p.
65). It thus does not necessarily mean “outsourcing” in the typical sense of the word, because it
does encompass a wide range of options, including
offshore insourcing, joint venture/cosourcing, and
outsourcing (Bhide, 2005, p. 39).
Offshoring grew in significance during the
1990s when organisations outsourced Y2K compliance work to offshore vendors (Pfannenstein
& Tsai, 2004, p. 73). Since then, the offshoring
phenomenon has continued to grow as it offers
companies several benefits, including significant
cost savings and access to a larger supply of more
sophisticated skills than those available onshore
(Dibbern et al., 2004, p.90; Hirschheim et al., 2004;
Pfannenstein & Tsai, 2004; Tas & Sunder, 2004,
p. 51). The term onshore refers to the location of
the organisation from which the services are being
sent. Typically, developed countries such as the
United States of America, the United Kingdom,
and even Australia offshore their services to
lower-cost destinations in more developing nations, such as India and China (Devata, Kumar,
& Stratopoulos, 2005, p. 102).
The growth of offshore sourcing has not
diminished and does not look likely to. In 2003,
offshore sourcing contracts made up a mere 1.4%
of all total outsourcing contracts, however, in 2004
“the value of offshore outsourcing contracts rose
890% from the previous year to $1.66 billion”
(Hirschheim et al., 2004, p. 8). Furthermore, the
literature identifies that this growth is set to continue, with offshore sourcing growing in both use
and popularity (Pfannenstein & Tsai, 2004, p. 75).
Taking Information Systems Business Process Outsourcing Offshore
There have been several factors that have
enabled the move offshore to take place. The
communications infrastructure available offshore
has significantly improved and is being provided
to organisations at a lower cost than is available
onshore. Additionally, the availability of welleducated and talented staff in countries such as
India and China provide companies with a large
supply of vendors and significant costs savings of
30% - 50% (Tas & Sunder, 2004, p. 51). Moreover,
the costs associated with coordinating the onshore
client and the offshore vendor have significantly
decreased, and there are technologies available to
assist organisations in managing this relationship;
which have also matured (Carmel & Agarwal,
2002, p. 66).
In summary, an organisation offshores its
services to achieve cost reductions, have access
to more sophisticated skills and labour markets,
improve its operational performance, achieve
flexibility and operating efficiency, and to gain a
strategic advantage in the marketplace (Aron &
Singh, 2005, pp.135-136; Dibbern et al., 2004,
p. 90; Gopal, Mukhopadhyay, & Krishnan, 2002,
p. 193; Krishna, Sahay, & Walsham, 2004, p. 64;
Pfannenstein & Tsai, 2004, p. 73; Tas & Sunder,
2004, p. 51).
There are significant challenges too, which
affect the risk associated with the offshoring project. Privacy and security can become problematic
adding an extra dimension to the management
process, as it is difficult to control and monitor the
relevant activities of offshore vendors (Davison,
2004; Kleim, 2004; Tafti, 2005). There are a range
of hidden costs associated with such arrangements,
including, vendor selection, establishment of contracts, transitioning the work offshore as well as
bringing it back onshore at the conclusion of the
contract (Pfannenstein & Tsai, 2004; Tafti, 2005).
A loss of control over factors associated with the
project can affect quality of work, loss of business knowledge as experienced employees leave
and take that knowledge with them, and resulting
inability to re-build should the work come back
onshore, all add to the risk (Herbsleb & Moitra,
2001; Pfannenstein & Tsai, 2004; Sobol & Apte,
1995; Tafti, 2005;). Furthermore, cultural differences (Davison, 2004; Hirschheim et al., 2004),
geographical distance, employee morale, and the
political environment of the offshore location
(Gupta & Raval, 2000; Krishna et al., 2004) are
also of concern.
Offshore Business Process
Outsourcing (BPO)
BPO is an outsourcing agreement which sees a
vendor perform an entire business function for
a client organisation (Dibbern et al., 2004, p.
11). The premise behind BPO is to outsource IT
enabled, noncore, largely back-office processes
to a vendor who has “superior structural and human capital in the areas of business process and
specific expertise” (Willcocks et al., 2004, p. 11).
Business processes appropriate for offshoring are
“well-defined, self-contained, and measurable,” as
well as being stable processes with little variance
(Tas & Sunder, 2004, p. 51). The BPO market has
experienced significant growth in recent years,
as an example in the UK and Europe and it was
estimated that revenues from BPO will rise to
72 billion Euros (from 43 billion Euros) during
the period from 2002 to 2005 (Willcocks et al.,
2004, p. 7).
Offshore BPO is simply a BPO agreement
with a vendor located in different country to that
of the client (Dibbern et al., 2004, p. 11). Offshore
BPO has been “made possible by the dramatic
fall in telecommunications costs and the ability to
transform paper-based activities into digital ones
requiring only a telephone and a computer” (Agarwal, Farrell, & Remes, 2003). Although it is now
common for business processes to be offshored
to lower-cost destinations, the literature identifies
that there has been little focus on the offshoring
of IS business processes, such as SAP functions,
database administration, as well as problem and
287
Taking Information Systems Business Process Outsourcing Offshore
Figure 1. Comparison of US and Indian wges (adapted from Devata et al., 2005, pg. 103)
change management processes, for instance (Tas
& Sunder, 2004, p. 51).
Motivations for such offshoring are of an
economic nature. First, a drastic difference in salaries—for instance, U.S. vs. Indian annual salaries
are graphically illustrated by Figure 1—motivates
organisations to undertake BPO offshoring.
Second, many organisations find offshore BPO
a desirable solution to become more efficient
because it enables the offshoring of noncore
business processes and thus lets the organisation
focus on its core-competencies, thus facilitating
the delivery of better products and services for its
customers (Devata et al., 2005, p. 103). It should
also be noted that the offshoring of BPO assists
organisations in making fixed costs variable,
which gives the organisation greater flexibility
in regards to the changing economy (Devata et
al., 2005, p. 102).
In addition to the challenges mentioned, an
organisation looking to offshore its business
processes is faced with extra problems, which are
primarily focused on costs, as well as the loss of
knowledge and expertise. Many organisations are
in such a rush to partake in business process
offshoring to remain on par with the competition,
288
that these organisations do not realise there are
greater benefits than simply reducing costs, such
as opportunities to improve the quality of the
organisation’s services. For the reason that reducing costs is often cited as the primary driver of
offshore BPO, vendor organisations often focus
on delivering a service for the clients at the
lowest-possible rate, as opposed to providing the
client with the most innovative and up-to-date
solution, because the clients provide the vendor
organisations with no incentive to do so. This can
lead to challenges regarding a reduction in the
quality of service, as well as additional costs for
any amendments that need to be made (Devata et
al., 2005, p. 117).
Additionally, an organisation also risks losing
its knowledge and expertise in the areas for which
it has offshored business processes, because the
vendor has assumed responsibility for providing
those services (Willcocks et al., 2004, p. 9). As
with offshore sourcing and IS outsourcing, this
can prove troublesome when the organisation
brings the business processes back onshore, and
can prove detrimental to the future health of the
organisation (Tafti, 2005, p. 556).
Taking Information Systems Business Process Outsourcing Offshore
Figure 2. The evolution of outsourcing concepts
The evolution outlined above, in particular, as
suggested by Hirschheim et al. (2004), Dibbern et
al. (2004), Carmel and Agarwal (2002), and Tas
and Sunder (2004), of the outsourcing concepts as
well as the motivations behind these concepts can
be illustrated as in Figure 2, showing the movement from outsourcing to parallel development
of offshore sourcing and BPO to the eventual
offshoring of the IS business processes themselves.
At this point, it maybe useful to further distinguish between traditional business processes
and IS business processes. Traditional business
processes are those that are typically enabled by
IS/IT (Hirschheim et al., 2004, p. 23), such as human resources services, finance and accounting
services, and customer support functions (Whinston, 2004), whereas IS business processes are
the actual IS/IT business processes themselves,
such as customising and modelling ERP reports,
database administration, and modifying roles
and tasks. While offshoring traditional business
processes has been well researched, offshoring
IS BPO as the most recent outsourcing concept
is still quite unknown.
As the processes of IS BPO offshoring are not
well understood, the specific challenges and risks
that an organisation is likely to face are largely
unknown. Both the paucity of research in this
domain and the relevance of these issues for IS
practice motivated us to examine:
1.
2.
What are the motivations and driving forces
involved in an organisation’s decision making to offshore its Information Systems
business processes?
What are challenges and risks encountered
during such decision making?
To answer these research questions (notwithstanding that the first may be driven by a management decree to do so) required an in-depth study
of IS BPO offshoring decision making. To this
end, we selected a case organisation that has just
began its IS BPO offshoring decision making and
where such offshoring phenomenon was present
in its exemplary form (complex IS/IT operations
managed globally). Such an in-depth case study,
the first to authors’ knowledge in relation to IS
BPO offshoring, enabled us to gain insights into
managerial thinking and decision making and to
achieve a deeper understanding of the interplay
289
Taking Information Systems Business Process Outsourcing Offshore
between different motivations and forces as well
as challenges and risks..
Research Methodology
Our choice of the case organization ComputerInc—a multinational company with over 300,000
people, operating in over 70 countries worldwide—was motivated by several key reasons.
First, as ComputerInc competes and manages its
IS/IT operations globally with clients ranging in
size and vary across a number of industries, it
experiences a full measure of global competition
and pressures to lower costs. Second, at the end of
2005, ComputerInc made a decision to offshore its
IS business processes to lower-cost destinations.
They were aware of the long term importance of
this decision and devoted the following 8 months
of 2006 to determine how to do it and which
processes to offshore. As such, ComputerInc’s
decision making regarding offshoring IS business
processes was an exemplar of the phenomenon we
aimed to study. We were also fortunate that one
of the authors gained access to ComputerInc and
was granted permission to conduct an in-depth,
intensive field study of its decision making processes that led to determining what IS business
processes were suitable to be offshored (during
6 months Feb-Aug 2006).
The methodology adopted for this study was
an interpretivist case study (Klein & Myers, 1999;
Walsham, 1995). Data were collected from multiple sources, including semistructured interviews,
documentary materials, and notes from field observation. The interview protocol followed was
the preparation of a range of discussion questions
(piloted and tested) which provided the interviewer
with the opportunity of addressing certain topics
in more depth. The transcriptions of the interviews
were provided to the interviewees to ensure authenticity. Using multiple sources of information
provided the authors with different interpretations
of the same phenomenon, addressing the problem
of construct validity, which is inherent in the use of
290
case studies (Benbasat, Goldstein, & Mead, 1987,
p. 374; Yin, 2003). The use of multiple methods
of data collection has ensured the production of a
high quality case study (Yin, 2003, p. 99).
Semistructured interviews were conducted
with a range of managerial staff covering the
areas of IS management, Projects Operations,
Service, International Programs, and Database
Management in ComputerInc (10 in total) lasted
between half an hour and 2 hours. Collected documents regarding the IS business process offshoring
project were also examined as part of the research.
These included spreadsheets, presentations, and
meeting minutes. Most of these documents were
confidential and available only on the premises
of the company. The researcher in the field also
made notes on events and impressions about the
meetings and the people involved. The notes were
useful in interpreting data and reconstructing the
story afterwards.
The collection and analysis of empirical data
were inspired and governed by grounded theory.
Although there are many relevant concepts and
frameworks to analyse and explain processes of
IS-enabled BPO outsourcing, they do not necessarily apply to IS BPO offshoring. Without an
obvious conceptual framework available from the
literature our in-depth study led of necessity to
grounded theory (Strauss & Corbin, 1990, 1998).
While grounded theory is broadly understood as
an approach to developing a theory from the data
and be “faithful to the evidence”, where “the researcher compares unlike phenomena with a view
toward learning similarities” (Neuman, 2006, p.
60), the adoption of grounded theory as a method
differs across studies. In this study, grounded
theory was adopted in line with the principles
and analytic guidelines proposed by Strauss and
Corbin (1990) and reinterpreted by Charmaz
(2000). Theory development is grounded in data
in a particular way: through the observation and
interpretation of researchers engaged in lives of
subjects studied. Namely, by interacting with
the subjects and by analysing and comparing the
Taking Information Systems Business Process Outsourcing Offshore
collected data, researchers develop understanding
of subjects’ actions and meanings, which evolve
into further, more abstract conceptual categories
and interpretations. By defining (and refining)
categories and deriving relationships between
them, researchers develop a substantive theory of
a particular phenomenon grounded in the data. As
the research progresses, the researcher continuously interprets the collected data, which is then
used to refine the proposed theory being developed
(Charmaz, 2000, p. 509).
In this study, the empirical data were gathered
and analysed to identify themes, patterns, and common categories. The coding process involved three
stages, open, axial and selective coding (Strauss &
Corbin, 1998). Open coding included line-by-line
examination and interpretation of texts (interviews
and documents) during which interesting themes
and ideas were identified and named (i.e., coded).
Open coding enabled the authors to become familiar with the views of the research participants
“rather than assume that we share the same views
and worlds” (Charmaz, 2000, p. 515). Open codes
reflected both the terms people in the field used
(these are called “in vivo” codes) and the terms
found in the literature. This approach to coding
in grounded theory recognizes that researchers do
not enter the field with a “blank slate” and that
they are necessarily sensitised by the concepts
and findings from the literature. While we aim to
ground codes and categories in the empirical texts
the coding process does not and cannot happen in
a conceptual vacuum and is therefore inevitably
linked to knowledge in the field of study. This is
in fact beneficial when the codes are grounded in
the empirical data as well as are related to concepts
from the literature. This allows comparisons of
a derived theory with literature or in some cases
testing theories from the literature.
It is important to emphasize that open codes
were identified in close relation to the text and
only later they had been compared, redefined, and
restructured. Furthermore, as the open codes began
to accumulate, they were grouped and regrouped
under higher order categories (Strauss & Corbin,
1998, p. 113). To have a better overview of the
open codes and how they can be interrelated a
particular technique of graphical representation
was used in this study. Each code and associated
text was printed on colored paper (colors corresponding to different sources of texts) and arranged
on a wall. Grouping and regrouping of the codes
(and associated texts) under different categories
on the wall provided a visual presentation and
assisted in the sharing of ideas and discussion
among researchers.
During the next stage, axial coding, categories
were analysed and constantly compared in terms
of properties and dimensions, thus enabling the
researchers in exploring the relationships between
categories and identifying their similarities and
differences. Having the codes and categories arranged on the wall was even more useful in this
stage as it allowed hypothesizing and exploration
of different relationships among the categories. By
moving and re-organising the codes and categories
around the wall, the discussion easily focused on
their properties and dimensions thus enabling a
grounded testing of axial codes, categories, and
their relationships. As categories and their relationships emerged, the empirical data were seen
in a new way, with each step going further from
the raw empirical data and towards a substantive
theory (Blaikie, 2000; Strauss & Corbin, 1998).
This was followed by selective coding where
the aim was to identify a central category or a
main theme of the research. Strauss and Corbin
(1998) define selective coding as the “process of
integrating and refining theory” (p. 143). During
the process of integration, a central category is
decided upon, which represents the main theme
of the research. This category must appear regularly in the data and as this category is related to
other categories, the evolving explanation must
be logical and consistent (Strauss & Corbin,
1998, pp.146-147). To assist the researchers in
identifying a central category, a few techniques
may be employed. One such technique, which
291
Taking Information Systems Business Process Outsourcing Offshore
was adopted for this article is that of writing a
storyline, which involves writing a few sentences
about “what seems to be going on here” (Strauss
& Corbin, 1998, p. 148). The result of relating
categories to the central category is illustrated in
Figure 3. This process was employed for each of
the higher-order categories that surfaced during
open and axial coding. From this, two central
categories emerged. As a result, the authors were
able to develop an understanding of how each
of the higher-order categories were interrelated
and how they related to the central categories.
By identifying the central categories as well as
the interrelationships between them and other
categories, we developed the substantive theory of
IS business processes offshoring in ComputerInc.
While the proposed substantive theory is context
bound and applicable in a single setting, it may be
a starting point for the subsequent development
of a more general, formal theory applicable in a
variety of settings.
Findings
Table 1 gives the axial codes and categories that
emerged from the open coding.
An example of how a category is developed,
starting from the comments and open coding,
through the axial codes is given in Appendix A.
Table 1. Emerging categories
Axial Codes
Category
24 Hour organisation
Future offshoring
Expand globally
Global capability
Virtual teams
Establish a Global Capability
Region driven
Contractual obligations
Existing infrastructure
Low cost
Location Choice
Research driven
Market research
Past experience
Research
Management driven
Management’s Decision
Behind competition
Create competition
Efficiency/effectiveness
Remain competitive
Become More Competitive
Cost driven
Increase profit
Reduce Costs
Risk mitigation
Employee support and changes
Public opinion issues
Challenges
Customer impact
Team impact/morale
Challenges / Risks
Type of work
Skills availability
Improve onshore skills
Offshore skills
Access to more sophisticated skills
Inferior skills
Skills & Type of Work Available & Targeted
292
Taking Information Systems Business Process Outsourcing Offshore
Through the analysis of these categories and
their interrelationships, the authors were able
to understand why ComputerInc was driven to
offshore its IS business processes to lower-cost
destinations; and also understand the challenges
that the organisation faced during the offshoring
process.
Becoming more competitive in the marketplace
was the key finding relating to Research Question
1. Other key findings were that ComputerInc was
also driven by reducing its operational costs and
establishing a global capability. Although drivers
themselves, these concepts enable ComputerInc
to achieve its primary aim of becoming more
competitive in the marketplace. Furthermore,
there were a number of factors identified that had a
significant influence on these drivers. These were
management’s overriding decision to offshore the
IS business processes, the skills and the type of
work available in the offshore locations and the
decisions surrounding the offshore location choice.
It is evident that central to the offshore sourcing
project is ComputerInc’s aim of becoming more
competitive in the marketplace, that is, to hold
the majority of the market share. our competitors
are still holding more of the market share than
what we are… so in order to remain competitive
and be a leading force, then we need to go down
that path and make it happen. (Janet, personal
communication)
The company saw that in order to become
more competitive, it must remain competitive
and, further, that by reducing its operational costs,
expanding globally and improving the efficiency
and effectiveness of its operations. The organisation considered that offshoring its IS business
processes would enable the organisation to achieve
this goal as is highlighted through the statements
of the respondents.
ComputerInc has historically been the leading and dominant force within its industry. As
such, it is imperative that the organisation at
least maintains this status to ensure its success;
this has been recognised by many of the service
managers, who identify that “we need to be, as
an organisation, competitive” (Andrew, Service
Manager, personal communication) and “we need
to remain competitive in a very cost competitive
business” (David, Service Manager). Janet, Service Manager (personal communication), further
highlights this need as well as describing the
reasons underlying it:
the rest of the world is doing it [offshoring] so
in order to remain competitive and be a leading
force then you need to go down that path and I
guess make it happen.
Improving the efficiency and effectiveness
of the organisation’s operations, which entails
establishing a global set of processes, tools, and
standards for the global organisation has also
made it possible for ComputerInc to become more
competitive in the marketplace for the reason
that now there is only one way to operate and
complete functions, the organisation has become
more consistent, enabling the improvement and
refinement its processes:
If we can get it right and we get a global set of
processes, then obviously we are going to be much
more efficient and effective at what we do… and
if we are more effective and we are more efficient,
then that would mean we are more competitive
in the marketplace. (Janet, Service Manager,
personal communication)
Reducing the operational costs of the organisation is not only a means to becoming more
competitive, but it is also a key driver in itself,
with all of the service managers identifying it as
a core motivation for the organisation offshoring
its IS business processes. For instance, Service
Manager Peter went so far as to suggest that “the
bottom line… is to reduce costs” (personal communication). Furthermore, Craig, Project Owner,
293
Taking Information Systems Business Process Outsourcing Offshore
identified that this offshore sourcing project
enables the organisation to be successful in that
respect, that it “allows us [ComputerInc] to reduce
cost” (personal communication). These efforts
are predominately focused on reducing operating
costs and in particular, salaries and labour costs.
[x] is a location where we have a series of centralised functions coming out of there and so if
those functions that we are looking at up here
could be centralised …. and the cost of living is
cheaper down there and free up resources up here.
(Janet, personal communication)
by spreading our the processes and the knowledge
base across various countries, obviously… this is
meant to drive the costs down because the work
can be done at a lesser cost. (Vijay, personal
communication)
These countries, the salaries and cost to live is
much lower than in other European countries as
well as America and Australia. (Vijay, personal
communication).
For this particular project, the offshore locations that were chosen are India, Chin, and a
lower-cost destination in Australia. Craig (personal communication) highlights the importance
of establishing this global capability and electing
to offshore to growing markets:
where we see our strengths in the future, is supporting Shenzhen… China is very much a growing
market, and the organisation needs to be able to
demonstrate to the big businesses in China that
from a service perspective that we have a capability in China.
As observed by one of the authors, ComputerInc’s executive management team was directly
involved in making the highly essential decisions
294
for this project. The reduction of the organisation’s
operational costs and becoming more competitive
in the marketplace came as a decree from the
executive management team. Furthermore, Craig
(personal communication) highlights that “it’s not
just an Australian decision… competitors are doing it; it’s a management decision, worldwide.”
The skills that were being sourced and the
skills that were available in the offshore locations
worked in both ways to influence the key drivers
of the offshore sourcing project, directly influencing the organisation becoming more competitive
and establishing a global capability. ComputerInc
has moved many processes offshore that were
identified by a number of characteristics; some of
these characteristics include “highly repetitive and
standardised” processes (Janet, Service Manager,
personal communication). However, the skills and
the type of work targeted for offshoring directly
influenced where the organisation was able to
establish its global capabilities. These locations
were dependent on many factors, including where
the growing markets were and what locations had
the correct skill sets available.
ComputerInc decided on appropriate offshore
locations based on a number of factors, one being the type of work these offshore locations
specialised in and the skills they had available.
ComputerInc’s research identified that the chosen
locations, India, China, and the lower-cost onshore
location in Australia are endowed with talented
and educated resources, and these locations were
advertising their skill sets to the world.
The key findings relating to Research Question 2 were that during the offshoring of its IS
business processes, ComputerInc were faced
with a number of challenges. Employee changes,
impact and support onshore affected staff—it not
only impacted the employees who lost their roles,
but the team also felt the impact of the changes
because “a lot of the team members are nervous
about what it would mean for them” (Andrew,
Service Manager, personal communication).
Many of the remaining team members struggled
Taking Information Systems Business Process Outsourcing Offshore
with “the survivor syndrome, when they say, why
wasn’t it me? And they’re constantly looking over
their shoulders” (Janet, Service Manager, personal
communication). Furthermore, the overall team
morale was impacted, which has been very difficult for the service managers to control (Janet,
Service Manager).
The geographic distance between the onshore
and offshore locations, cultural barriers, and
connectivity and infrastructure were challenges,
too, in that relationship management became difficult, the language barrier was problematic, and
if the network connectivity in the offshore location failed, there was no mitigation technique or
backup plan in place. As David, Service Manager
(personal communication), explains:
no I don’t know of any other backup if we lose
connectivity, the only thing is probably still having
a number of people back in country to avert that.
ComputerInc also faced difficulties in terms
of security and privacy (some customers were
reluctant to, or prohibited from, allowing data
offshore), service delivery, and reduced quality
of service (there was the possibility that during
the early stages of the offshoring project, there
would be dissatisfied customers and that the
quality of service would diminish), the social
and political environments of the offshore locations (potentially less stable than might be the
case in Australia) and the impact of offshoring
on the customer (some degree of dissatisfaction
was to be expected). The following factors were
identified as having a significant influence on the
above challenges: the unavailability of skills or
the substandard skills available in the offshore
locations (there was not a complete match with
what was desired), the research conducted during the pre-implementation phases of the project,
and the decisions made surrounding the offshore
location choices, in that tasks were chosen to fit
predetermined locations.
Discussion
The selective coding and the in-depth analysis
described above led to a substantive theory of IS
BPO offshoring in ComputerInc, which we present
in a form of a substantive framework in Figure
3. The substantive framework emerged through
coding, analysis, interpretation, and constant
Figure 3. A substantive framework of ComputerInc IS BPO offshoring
295
Taking Information Systems Business Process Outsourcing Offshore
comparisons of the data collected (interviews,
observations and documents). The framework in
Figure 3 below describes specific relationships
between the key eight categories that emerged
from the data: Become More Competitive, Challenges/Risks, Reduce Costs, Establish a Global
Capability, Skills & Work Targeted & Available,
Location Choice, Management Decision, and
Research. Among them Become More Competitive and Challenges/Risks emerged as central categories. Central to the framework is the inferred
relationship between the goal of becoming more
competitive and the challenges and risks involved
in doing so. Becoming more competitive is driven
by managerial decisions taking into account a
desire to reduce costs establish a wider global
presence and the skills and work available. The
challenges and risks are dependent on where the
offshoring takes place, what needs to be done,
and the extent of research governing the decision.
The framework demonstrates the relationships
that exist between the categories. There are four
types of relationships present in the framework—
significant (heavy black arrow) illustrating the
concepts that have a direct influence on either of
the central categories Become More Competitive
or Challenges/Risks. The relationship between
the central categories themselves—the impact
of Challenges/Risks on Become More Competitive—is not directly observable from the data but
is nevertheless implied, which we inferred from
the broader analysis and insight (indicated by
the heavy dashed black arrow). The red arrows
represent relationships between concepts where
concept A has a direct relationship with concept
B and concept B is related to either Become
More Competitive or Challenges/Risks. Finally,
the blue arrows illustrate the remaining relationships presented by the framework, which do not
directly impact the central categories. As a result
of the data analysis and the model, two primary
propositions are put forward.
Proposition 1: The central driver of the
offshore sourcing project is for ComputerInc to
296
Become more Competitive. This concept came
as a directive from ComputerInc’s executive
management team, which additionally identified
the organisation’s need to reduce its operational
costs. Becoming more competitive not only focuses on improving the competitive standing of
ComputerInc but also looks at improving how
efficient and effective it is with its operations.
ComputerInc was able to achieve its goal of becoming more competitive, with the assistance of
two factors, namely reducing its operational costs,
and establishing a global capability, which are
acknowledged as two of the main advantages of
offshore sourcing (Sobol & Apte, 1995, p. 274).
Reducing operational costs is one key advantage
of offshoring, but another is the ability for organisations to develop and operate global information
systems (Sobol & Apte, 1995, p. 271). Establishing
capabilities in locations around the world provided
ComputerInc with access to a highly skilled and
readily available work force allowing the organisation to “improve their ability to compete in their
fast-paced domestic and international markets”
(Wilson, 2003, p. 102). Furthermore, the skills
and the type of work that are available in the offshore locations further enabled ComputerInc to
establish its global capability as well as become
more competitive in the marketplace because
“having workers overseas in close proximity to
a new pool of consumers can assist a company
in expanding its global presence” (Pfannenstein
& Tsai, 2004, p. 74).
Proposition 2: The Challenges/Risks faced and
anticipated by ComputerInc may prove to impede
the organisation from Becoming more Competitive. This relationship is a research inference made
based on the empirical data that emerged during
analysis. Although there is no direct evidence in
the data linking these concepts, the analysis of
all the data and the observations indicated the
existence of this relationship. Furthermore, the
authors have identified this as one of the core
note-worthy relationships present in the model
presented. ComputerInc conducted a thorough
Taking Information Systems Business Process Outsourcing Offshore
analysis into the potential challenges the organisation might have been faced with, prior to partaking
in this offshoring project, through in-depth market
research and assessments of past experiences both
within the organisation and externally. However,
the organisation developed very few risk mitigation techniques and as a result, these challenges
impeded its ability to become more competitive
in the marketplace, that is, until these challenges
were adequately managed. It is absolutely necessary for ComputerInc to act on the findings of the
research it conducts, and to develop a series of
techniques to assist the organisation in preventing,
mitigating, and/or managing these challenges and
risks, as is addressed by Hirschheim et al. (2004)
who stipulate, “It is critical that an organization
considering offshore outsourcing take the time to
evaluate the challenges and study how other organizations have handled these challenges” (p. 22).
This article has identified a number of challenges and risks that projects of this nature face.
The authors believe that the list developed provides a useful starting point for other organisations considering a similar decision. The way an
organisation is able to mitigate and/or manage
these challenges and risks would to a large extend
impact the goal of becoming more competitive in
the marketplace.
CONCLUSION
Based on a grounded theory study of the IS BPO
offshoring in ComputerInc, the article proposes
a substantive framework that identifies key categories and their relationships (as described in
Figure 3). A key contribution of this research is
that it highlights the complex relationship between
the offshoring objectives and risk management.
In this way, and with the development of the
framework depicting the interrelationships, the
study takes the prior research further. Offshore
BPO is not a panacea. There are many variables
involved and these will differ significantly from
project to project. Organisations considering such
action need to carefully evaluate the risks and
their potential effects.
A further contribution of this study is the identification of areas for further study. The impact of
personal opinions and bias could prove to be an
impediment to the success of such of an offshore
sourcing project. A study of this impact could
prove extremely valuable and make a significant
contribution to the offshore sourcing field, in both
theory and practice. Additionally, the principle
researcher saw very little questioning of the decisions made by the executive management team.
The decisions were simply accepted as fact even
though many of the people involved had first-hand,
on-the-ground experience with the roles being sent
offshore. It may be that this could be the reason
behind why a number of the employees did not
fully comprehend the organisation’s reasons for
going offshore. The authors believe management
gathering ideas from those directly involved would
be an extremely interesting area for research. Other
limitations include the potential opportunity for
the interviewees to mislead the researcher or push
a point of view, the relatively brief time-frame in
which the study was conducted and the organisation to which the tasks were outsourced being
outside the scope of the study.
The authors believe that the proposed substantive framework of IS BPO offshoring in ComputerInc provides a sound basis for the examination of
such projects in other companies as it conceptualizes the key drivers associated with the offshore
sourcing of IS business processes, as well as the
challenges that are faced in such a situation. The
framework suggests that becoming more competitive in the marketplace primarily drove ComputerInc to offshore its IS business processes, and in
order to achieve this, the organisation reduced its
operating costs and established global capabilities. While this framework is grounded in the data
and therefore context bound it is also found to be
supported by the outsourcing and offshore BPO
297
Taking Information Systems Business Process Outsourcing Offshore
literature, which highlights its potential use in the
development of a more general theory.
For practitioners, the authors believe that the
study has presented a series of potential challenges
that may arise during an offshore sourcing project,
has highlighted the importance of understanding
the goals of the project and conducting thorough
and appropriate research, and demonstrates the
importance of communicating significant decisions and in considering the knowledge of all
parties involved. As such, it is hoped that this
study will go some way towards helping managers note and understand the pitfalls and provide a
greater understanding of how the conflict between
benefits and challenges might be resolved.
Bhide, D. (2005). Strategic offshoring: Decision
analysis, best practices, and emerging trends.
In Brudenall, P. (Ed.), Technology and offshore
outsourcing strategies (pp. 37–64). Great Britain:
Palgrave Macmillan.
REFERENCES
Costa, C., & Beaumont, N. (2001). Information
technology in Australia. Working Paper.
Agarwal, V., Farrell, D., & Remes, J. (2003).
Offshoring and beyond [Special edition]. The
McKinsey Quarterly, 4.
Apte, U. M., Sobol, M. G., Hanaoka, S., Shimada,
T., Saarinen, T., Salmela, T., et al. (1997). IS
outsourcing in the USA, Japan and Finland: A
comparative study. 12, 289-304.
Aron, R., & Singh, J. V. (2005). Getting offshoring right. Harvard Business Review, 135–143.
Aubert, B. A., Rivard, S., & Patry, M. (2001). A
transaction cost model of IT outsourcing. Information & Management, 41, 921–932. doi:10.1016/j.
im.2003.09.001
Babbie, E. (2004). The practice of social research
(10th ed.). CA: Wadsworth/Thomson Learning.
Benbasat, I., Goldstein, D. K., & Mead, M. (1987,
September). The case research strategy in studies
of information systems. Management Information
Systems Quarterly, 369–386. doi:10.2307/248684
298
Blaikie, N. (2005). Designing social research.
Cambridge, UK: Polity Press.
Carmel, E., & Agarwal, R. (2002). The maturation
of offshore sourcing of information technology.
MIS Quarterly Executive, 1(2), 65–77.
Charmaz, K. (2000). Grounded theory: Objectivist and constructivist methods. In Denzin, N., &
Lincoln, Y. S. (Eds.), Handbook of qualitative
research (2nd ed., pp. 509–535). Thousand Oaks,
CA: Sage.
Davison, D. (2005). Top 10 risks of offshore outsourcing. CIO – Analyst Corner. Retrieved July
28, 2008, from http://www2.cio.com/analyst/
report2224.html
Devata, A. C., Kumar, R., & Stratopoulos, T.
(2005). Business process outsourcing: A manager’s guide to understanding the market phenomenon. In Brudenall, P. (Ed.), Technology and
offshore outsourcing strategies (pp. 97–115).
Great Britain: Palgrave Macmillan.
Dibbern, J., Goles, T., Hirschheim, R., & Jayatilaka, B. (2004). Information systems outsourcing: A survey and analysis of the literature. The
Data Base for Advances in Information Systems,
35(4), 6–102.
Earl, M. J. (1996). The risks of outsourcing IT.
Sloan Management Review, 37(3), 26–32.
Glaser, B. G., & Strauss, A. L. (1968). The discovery of grounded theory strategies for qualitative
research. London: Weidenfeld and Nicolson.
Taking Information Systems Business Process Outsourcing Offshore
Gopal, A., Mukhopadhyay, T., & Krishnan, M. S.
(2002). The role of software processes and communication in offshore software development.
Communications of the ACM, 45(4), 193–200.
doi:10.1145/505248.506008
Grover, V., Cheon, M. J., & Teng, J. T. C. (1996).
The effect of service quality and partnership on
the outsourcing of information systems functions.
Journal of Management Information Systems,
14(4), 89–116.
Gupta, U. G., & Raval, V. (1999). Critical success factors for anchoring offshore projects.
Information Strategy: The Executive’s Journal,
15(2), 21–27.
Harris, A., Giunipero, L. C., & Hult, G. T. M.
(1998). Impact of organisational and contract flexibility on outsourcing contracts. Industrial Marketing Management, 27, 373–384. doi:10.1016/
S0019-8501(97)00085-0
Herbsleb, J. D., & Moitra, D. (2001). Global
software development. IEEE Software, 16–20.
doi:10.1109/52.914732
Hirschheim, R., George, B., & Wong, S.F. (2004,
December). Information technology outsourcing:
The move towards offshoring [Special issue].
Indian Journal of Economics and Business, 1-30.
Jurison, J. (1995). The role of risk and return in
information technology outsourcing decisions.
Journal of Information Technology, 10, 239–247.
doi:10.1057/jit.1995.27
Kern, T., Willcocks, L. P., & van Heck, E. (2002).
The winner’s curse in IT outsourcing: Strategies
for avoiding relational trauma. California Management Review, 44(2), 47–69.
King, W., & Malhotra, Y. (2000). Developing a
framework for analyzing IS sourcing. Information & Management, 37, 323–334. doi:10.1016/
S0378-7206(00)00046-X
Kleim, R. (2004, Summer). Managing the risks
of offshore IT development projects. Information
Systems Management, 22–27. doi:10.1201/1078/
44432.21.3.20040601/82473.4
Klein, H., & Myers, M. (1999). A set of principles
for conducting and evaluating interpretive field
studies in information systems. Management
Information Systems Quarterly, 23(1), 67–88.
doi:10.2307/249410
Krishna, S., Sahay, S., & Walsham, G. (2004).
Managing cross-cultural issues in global software
outsourcing. Communications of the ACM, 47(4),
62–66. doi:10.1145/975817.975818
Lacity, M. C., & Hirschheim, R. (1993a). The
information systems outsourcing bandwagon.
Sloan Management Review, 35(1), 73–86.
Lacity, M. C., & Hirschheim, R. (1993b). Information systems outsourcing, myths, metaphors
and realities. West Sussex, England: John Wiley
& Sons.
Lacity, M. C., Willcocks, L. P., & Feeny, D. F.
(1996). The value of selective IT sourcing. Sloan
Management Review, 37(3), 13–25.
Martinsons, M. G. (1993). Outsourcing information systems: A strategic partnership with
risks. Long Range Planning, 26(3), 18–25.
doi:10.1016/0024-6301(93)90003-X
McLellan, K., Marcolin, B. L., & Beamish, P. W.
(1995). Financial and strategic motivations behind
outsourcing. Journal of Information Technology,
10, 299–321. doi:10.1057/jit.1995.32
Neuman, W. L. (2006). Social research methods
qualitative and quantitative approaches (6th ed.).
USA: Pearson Education.
Pfannenstein, L. L., & Tsai, R. J. (2004, Fall).
Offshore outsourcing: Current and future effects
on American IT industry. Information Systems
Management, 72–80. doi:10.1201/1078/44705.
21.4.20040901/84190.9
299
Taking Information Systems Business Process Outsourcing Offshore
Quelin, B., & Duhamel, F. (2003). Bringing
together strategic outsourcing and corporate
strategy: Outsourcing motives and risks. European Management Journal, 21(5), 647–661.
doi:10.1016/S0263-2373(03)00113-0
Roy, V., & Aubert, B. A. (2002). A resourcebased analysis of IT sourcing. The Data Base for
Advances in Information Systems, 33(2), 29–40.
Sabherwal, R. (1999). The role of trust in outsourced
IS development projects. Communications of the
ACM, 42(2), 80–87. doi:10.1145/293411.293485
Tas, J., & Sunder, S. (2004). Financial services business process outsourcing. Communications of the
ACM, 47(5), 50–52. doi:10.1145/986213.986238
Walsham, G. (1995). The emergence of interpretivism in IS research. Information Systems Research,
6(4), 376–394. doi:10.1287/isre.6.4.376
Whinston, A. (2004). Offshoring statistics – dollar
size, job loss, and market potential. EBStrategy.
Retrieved July 28, 2008, from http://ebstrategy.
com/Outsourcing/trends/statistics.htm
Sobol, M. G., & Apte, U. (1990/1995). Domestic
and global outsourcing practices of America’s
most effective IS users. Journal of Information
Technology, 10, 269–280. doi:10.1057/jit.1995.30
Willcocks, L., Hindle, J., Feeny, D., & Lacity,
M. (2004, Summer). IT and business process
outsourcing: The knowledge potential. Information Systems Management, 7–15. doi:10.1201/1
078/44432.21.3.20040601/82471.2
Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Grounded theory procedures and
techniques. Newbury Park: Sage Publications.
Wilson, R. (2003). Outsource tide won’t ebb –
adapt to new order, CICC panel tells designers.
Electronic Engineering Times, 1289, 1/102.
Tafti, M.H.A. (2005). Risks factors associated with
offshore IT outsourcing. Industrial Management
+ Data Systems, 105(5), 549-560.
Yin, R. K. (2003). Case study research: Design
and methods (3rd ed.). Thousand Oaks, CA: SAGE
Publications.
300
Taking Information Systems Business Process Outsourcing Offshore
APPENDIX
Figure 4. Example of support for a “Category”
This work was previously published in International Journal of Global Information Management, Volume 17, Issue 1, edited
by Felix B. Tan, pp. 32-48, copyright 2009 by IGI Publishing (an imprint of IGI Global).
301
302
Chapter 14
Managing Knowledge
Transfer in Offshore
Software Development:
The Role of Copresent and
ICT-Based Interaction
Aini Aman
University Kebangsaan Malaysia, Malaysia
Brian Nicholson
Manchester Business School, UK
ABSTRACT
The aim of this article is to examine the role of copresent interaction and the extent to which this can be
supplanted by information and communication technology-based interaction for managing knowledge
transfer in distributed settings. This study draws on two case studies of small UK firms sourcing software
development from India and Bangladesh. Using Nonaka and Konno’s knowledge creation theory, the
role of copresent and ICT-based interactions in managing knowledge transfer is explained. The article
contributes an extension of the concepts of knowledge creation theory by providing evidence of the
role of copresent and ICT-based interaction for knowledge transfer in the context of offshore software
development.
INTRODUCTION
Offshore software development refers to the
process of sending tasks at various stages of the
software development lifecycle to suppliers in
DOI: 10.4018/978-1-60960-605-3.ch014
low-wage countries. This may involve direct
ownership of foreign facilities, partnering, or outsourcing (Shao & Smith David, 2007; Carmel &
Tija, 2005). There is a large, expanding literature
on knowledge transfer (see Schultze & Leidner
[2002] for a review) and an increasing focus on
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Managing Knowledge Transfer in Offshore Software Development
the complexities of knowledge transfer between
software team members that are separated across
time and space (e.g., Nicholson & Sahay, 2004;
Kotlarsky, Oshri, Hillegersberg, & Kumar, 2007;
Cha, Pingry, & Tatcher, 2008; Vlaar, Fenema, &
Tiwari, 2008). Other authors have questioned
the need for co-present interaction for effective
knowledge transfer in such scenarios (Boden &
Molotch, 1994; Maznevski & Chudoba, 2000;
Nardi & Whittaker, 2002; Oshri, Kotlarsky, &
Willcocks 2007). Boden and Molotch (1994)
emphasize how co-present interaction contributes
to the development of trust. This concurs with
the findings of Maznevski and Chudoba (2000),
who describe the importance of initial co-present
meetings to establish effective temporal rhythms
like ‘heartbeats’ which support subsequent stages
of global virtual teamwork. Nardi and Whittaker
(2002) point out how copresent interactions allow
bodily shared activities such as touching, eating
and drinking together, or engaging in mutually
meaningful experiences through socialization in a
common physical place. They argue that copresent
interaction is particularly useful as it is ‘thick’ with
information and can enable a transfer of greater
degree of contextual knowledge than ICT-based
interaction. Oshri et al. (2007) also emphasize
the importance of copresent meetings for creating
interpersonal ties and facilitating socialization.
However, in their study, socialization in globally
distributed teams is also supported by the use
of various collaborative technologies employed
before and after copresent meetings.
A gap in the existing academic literature and
a problem facing practitioners is that although
copresence is desirable for knowledge transfer,
arrangements may be logistically impossible or
cost prohibitive. This article aims to improve our
understanding of the practices firms are adopting
to overcome the dilemma between the need for
co-presence on the one hand and the drive for
lowest cost ICT-mediated offshore outsourcing
on the other. The study is guided by the following
research questions:
•
•
What is the role of co-present interaction
for knowledge transfer?
How can ICT-based interaction enable
knowledge transfer?
The empirical study draws on two cases of
UK-based software companies sourcing software
development from India and Bangladesh. The contribution of the article lies in the application and
extension of the concepts of knowledge creation
theory or “SECI-Ba” (Nonaka & Konno, 1998),
enabling an analysis of the knowledge transfer
practices and difficulties experienced. The article
is organized as follows. The next section presents
the literature review and theoretical framework
drawing on concepts derived from SECI-Ba. Subsequently in the research methodology section, we
explain the data collection and analysis approach.
Following this is the discussion and analysis of the
findings, and finally we present the conclusions
and limitations of the study.
THEORETICAL FRAMEWORK
The theoretical basis draws on knowledge creation
theory (Nonaka, 1994; Nonaka & Konno, 1998).
This theory presents knowledge as created and
transferred through a continuous dialogue between
tacit and explicit knowledge along four patterns of
interaction―socialization, externalization, combination, and internalization (SECI)―that create
a ‘spiral’ model of knowledge. Tacit knowledge is
broadly understood as intuitive and unarticulated,
while explicit knowledge is knowledge that can be
codified or documented (Nonaka & Konno, 1998).
The concept of ‘Ba’ refers to a “shared space for
emerging relationships,” which can be physical
(e.g., office, dispersed business space), virtual
(e.g., e-mail, teleconference), mental (e.g., shared
experiences, ideas, ideals), or a combination of all
three. For Nonaka and Konno (1998), knowledge
is embedded in Ba and acquired through one’s
own experience or reflections on the experiences
303
Managing Knowledge Transfer in Offshore Software Development
Table 1. SECI-Ba concepts
Socialization―Originating Ba
Exchange tacit knowledge through joint activities. Share feelings and emotions in
copresent meetings.
Externalization―Interacting Ba
Articulate hidden tacit knowledge through interaction. Express ideas in understandable forms.
Combination―Cyber Ba
Combine explicit knowledge through sorting, adding, combining, and categorizing.
Internalization―Exercising Ba
Convert explicit into tacit knowledge through learning by doing or training.
of others within Ba. The authors identify four Ba
types that correspond to the stages of the SECI
model: originating Ba (copresence), interacting
Ba (peer-to-peer), cyber Ba (group-to-group), and
exercising Ba (onsite). Thus, each Ba supports a
particular knowledge conversion process in the
SECI model, as summarized in Table 1.
Nonaka (1994) argues that tacit knowledge
cannot be formally articulated between individuals and can only be exchanged through joint activities. Originating Ba provides a physical context
for ‘socialization’, an existential space where
individuals can share feelings, emotions, and
experiences, hence removing barriers, as well as
increasing trust. Examples are group physical
activities or educational visits (Kostiainen, 2002).
Secondly, ‘externalization’ is the process of converting tacit knowledge into explicit knowledge
through reflection and dialogue where members
articulate hidden tacit knowledge (Nonaka, 1994).
Interacting Ba is the space that supports the process, typical examples being joint meetings, forums, discussions, memos, or other forms of dialogue (Kostiainen, 2002). The formation of Ba
can be encouraged by identifying an intermediary
or facilitator (Reich, 1995) to steer dialogue and
refine information. Thirdly, ‘combination’ is the
process of combining explicit knowledge through
sorting, adding, combining, and categorizing
(Nonaka, 1994). Cyber Ba provides a place of
storage, updating, querying, and interaction using
ICTs as encapsulated by integrated groupware
such as Lotus Notes. Finally, ‘internalization’ is
the process of converting explicit knowledge into
tacit knowledge through ‘learning by doing’ or
304
‘action’ (Nonaka, 1994). Exercising Ba supports
the process through focused training or on-the-job
learning by doing (Nonaka & Konno, 1998; Nonaka, Toyama, & Nagata, 2000). Shared bodies of
knowledge are internalized as “technical knowhow” (Nonaka & Konno, 1998). A limitation of
the theory as an appropriate conceptual lens for
our data is the lack of attention to knowledge
transfer between individuals or groups in distributed settings. Knowledge transfer between globally distributed software team members takes
place in shared electronic spaces (Carmel, 1999;
Carmel & Tija, 2005; Leonardi & Bailey, 2008),
which are supported by various types of ICTs such
as videoconferencing, telephone, text conferencing (e-chat), e-mail, databases, or via an integrated groupware application such as Lotus Notes.
However, the capacity of ICTs to transfer knowledge unproblematically is highly controversial
and has been subject to critique (Walsham, 2002;
Oshri et al., 2007; Leonardi & Bailey, 2008).
We extend the SECI-Ba model by drawing
on previous studies related to copresent and ICTbased interaction in software development. Table
2 shows the SECI-Ba concepts alongside findings from related studies showing strategies for
knowledge transfer in copresent and ICT-enabled
offshore software development settings.
In socialization-originating Ba, copresent
meetings at the start or during the project are
recommended by Carmel, (1999). Periodic copresent interaction provides a ‘rhythm’ that permits
intense focus during short intervals of remote
communication using ICTs (Maznevski & Chudoba, 2000). ICT-based interaction could provide
Managing Knowledge Transfer in Offshore Software Development
Table 2. Theoretical framework
SECI-Ba
Copresent Interaction
ICT-Based Interaction
Socialization―Originating Ba
Exchange tacit knowledge through joint activities.
Share feelings and emotions in copresent meetings.
Copresent meeting at the start or during
the project establishes understanding
between team members (Carmel, 1999;
Oshri et al., 2007).
Using text-based virtual realities
or posting static pictures during
e-chat establishes human connection (Robey et al., 2000; Towell &
Towell, 1997, 2001; Sarker & Sahay,
2004).
Externalization―Interacting Ba
Articulate hidden tacit knowledge through interaction.
Express ideas in understandable forms.
Using an intermediary to steer dialogue
and refine information (Reich, 1995).
Using team leader to refine information during online communication
(Sarker & Sahay, 2004).
Combination―Cyber Ba
Combine explicit knowledge through sorting, adding,
combining, and categorizing.
Gathering team members in a physical
place for preparation of documents
(Chua & Pan, 2008).
Posting documents and updating the
current set of documentation in the
groupware (Sarker & Sahay, 2004).
Internalization―Exercising Ba
Convert explicit into tacit knowledge through learning
by doing or training.
Sending experts to offshore location for
a period of 1-3 weeks to train the teams
(Chua & Pan, 2008).
Online training on new standards or
methods using groupware application (Deek & Espinosa, 2005).
‘virtual presence’ by members posting static
pictures and displaying names during synchronous
e-chat sessions in order to enhance social presence
and establish human connection (Robey, Khoo,
& Powers, 2000; Sarker & Sahay, 2004). The use
of text-based virtual realities such as description
of themselves, rooms, or objects (Towell & Towell, 1997, 2001) could enhance the feelings of
‘being there’ or presence. Oshri et al. (2007) stress
the importance of copresent meetings in socializing remote team members as well as the resocializing them throughout project lifecycle. Oshri
et al. (2008) further investigate how these globally distributed teams support the re-acquisition
of norms and attitudes over time. The main challenge they identify is that copresent meetings are
usually short and tend to offer only limited social
space that accommodates cultural differences.
However socialization can be developed and
sustained through various activities that take place
before, during, and after copresent meetings which
ensure the renewal of socialization using various
collaborative technologies.
In externalization-interacting Ba, there is
considerable literature on the positive effects of
copresent interaction by an intermediary: making
regular visits to offshore centers may facilitate
communication and refine information (Reich,
1995). Intermediaries (sometimes referred to as
“boundary spanners” or “straddlers”) can assist
in bridging distributed groups, coordinating tasks
(Carmel & Tija, 2005; Sarker & Sahay, 2004;
Waterson, Clegg, & Axtell, 1997), establishing
interpersonal relationships (Crowston, Howison,
Masango, & Eseryel, 2005), and developing social
ties between team members (Kotlarsky, Fenema
& Willcocks, 2008).
In combination-cyber Ba, copresent interaction
may help the process of preparing various documentation and forms of codified knowledge by
gathering resource persons who have the knowledge in one place (Chua & Pan, 2008). Sarker
and Sahay (2004) demonstrate how ICT-based
interaction may facilitate this process by making
the ongoing tasks visible to remote members by
posting detailed minutes of meetings or documents
held by team members of any location to online
databases: updating the current set of documentation or downloading documents that are required.
In internalization-exercising Ba, copresent interaction during the training by experts travelling
to the offshore location enables a large group of
offshore staff to be copresent and observe how the
software development work is carried out (Deek
305
Managing Knowledge Transfer in Offshore Software Development
Table 3. Summary of cases
Alp
Das
Founded
1997
1994
Employees
25-35
40-50
Headquarters
Manchester, UK
London, UK
Offshore Center
India
- Started a partnership with Indian companies in
1999
- Established a wholly owned software development center in 2002
Bangladesh and Malaysia
- Opened a wholly owned software development
center in Bangladesh in 1997
- Opened a wholly owned subsidiary in Malaysia in
2000
Major Product
Custom software development
Custom software development
Onshore/Offshore Work
Split
Sent different types of work including design to
offshore
Only sent coding to offshore
Communication Medium
Copresent meetings, telephone, e-mail, e-chat,
documents, and reports
Groupware application (Lotus Notes), telephone,
e-mail, e-chat
& Espinosa, 2005). Chua and Pan (2008) describe
how knowledge experts take turns travelling to
the offshore location to train the offshore teams.
The offshore team members are learning-by-doing
when they perform activities together, engaging in
active participation such as explaining, discussing, arguing opinions, and answering each other’s
questions. Deek and Espinosa (2005) posit that
internalization-exercising Ba may be achieved
during online training.
METHODOLOGY AND
CASE DESCRIPTION
We adopt an interpretive case study approach
(Walsham, 1995; Yin, 1994) carried out in two
UK-based companies of similar size engaged in
offshore software development. Both companies
were selected, as they offer some similarities and
differences that enable cross-case analysis. The
foremost similarity is that both are UK-based
software companies with offshore software development centers in Asia (Alp in India, Das in
Bangladesh and Malaysia) and their head offices
are based in the UK. Over the past decade, India
and Malaysia have emerged as a preferred location
for offshore outsourcing. According to a study on
306
the performance of the top four Asian offshore
countries, India will continue to lead the offshore
segment through 2010 with at least a 15% share,
while Malaysia is estimated to achieve 1.2% of the
global market share (XMG, 2007). Bangladesh is
still an untapped market for offshore outsourcing.
Table 3 displays a summary of both case study
companies.
Alp (a pseudonym) was established in 1997
with a total of 40 staff in the UK and India. During 1999, Alp entered into a partnership with a
local company in Mumbai for offshore software
development in order to take advantage of low
labor costs. The partnership with the small local
company called ABS in India lasted for almost
two years. Alp (UK) set up a wholly owned offshore software development center in India in
July 2002. In Alp, the type of software development work sent to India varies dependent on the
type of project. Typically, the onshore team in the
UK will perform the requirements elicitation and
some high-level technical architecture. The offshore team in India will undertake the design,
coding, and testing. Communication between
onshore and offshore involves copresent meetings,
telephone, e-chat, and e-mail.
The second case, Das (a pseudonym), was
established in 1994 with a total of 50 staff in the
Managing Knowledge Transfer in Offshore Software Development
UK, Malaysia, and Bangladesh. In 1997, Das
commenced operations in Bangladesh.. The offshore center in Bangladesh serves both the UK
and Malaysia, and the subsidiary in Malaysia
started in 2000 for local project delivery. Das
UK only sent coding work to Das offshore and
onshore teams to prepare requirements and design,
which are subsequently completed by the offshore
teams with time estimation and technical design.
The onshore and offshore teams use Lotus Notes
Groupware, which contains features such as messaging, calendaring and scheduling, e-meetings,
team room, and e-mail.
Fieldwork and Data Collection
Field research for both companies was carried
out between 2002 and 2005. The research began
with historical reconstruction from inception of
operations offshore and following the subsequent
operations during the period of the study. Data
collection used a variety of methods including
unstructured and semi-structured interviews,
documentation reviews, and observations taken in
the UK and during field trips to India, Bangladesh,
and Malaysia. Interviewing, repeat interviewing
and triangulation of sources over time using various techniques of data collection provided multiple
perspectives (Eisenhardt, 1989; Strauss & Corbin,
1990). There was no specific interview protocol,
but the first stage of interviews covered fact finding on company background, client background,
as well as their onsite and offsite interactions.
The second stage of interviews covered detailed
issues on projects and management in terms of
the processes, practices, and discussion of the
challenges encountered.
Documents such as functional specifications,
project plans, project reports, test cases, e-chat
between onshore and offshore teams, and other
documents related to software projects and work
procedures were reviewed. In addition, observations of team interactions and meetings during
projects were undertaken during the fieldwork in
the UK, Malaysia, Bangladesh, and India. Interview information collected at periodic intervals
was cross-checked where possible against other
sources of evidence such as company reports.
Data collection consisted of two stages, the first
stage being largely based on the interviews and
an external documents review, while the second
stage was based on the fieldwork in Bangladesh,
India, and Malaysia. The first stage of data collection was accomplished in the first quarter of
2002, and the second stage started at the end of
2003 and was completed in early 2004. The data
collection process included repeated interviews,
which are important in a longitudinal research
design to identify changes over time. Overall, there
were 111 total hours of interviews. Interviews in
Das involved 34 hours of interviews from January
to March 2002 and from December to February
2004 (summarized in Table 4). Interviews in Alp
involved 77 hours of interviews in June 2002 and
from August to December 2003 (summarized in
Table 5). Interviews lasted for at least one and a
maximum of two-and-a-half hours.
The process of data analysis involves coding,
theorizing, interpreting, and reporting. Data from
interviews, observations, and documents were
coded using the open coding technique, which
adopts a form of content analysis where the data
are read and categorized into concepts suggested
by the data (Strauss & Corbin, 1990). The data
are then re-examined and re-coded using the
proposed scheme where the goal is to determine
the set of categories and concepts that cover as
much of the data as possible. This iterative examination yields a set of broad categories and
associated concepts that describe the events,
experiences, and consequences. Once all the data
were examined, the concepts were organized by
recurring themes. The themes were categorized
and sorted according to their relevance to the
process of managing knowledge in offshore software development. This was followed with axial
coding to relate the main themes to the sub-themes
using stable categories to construct a more com-
307
Managing Knowledge Transfer in Offshore Software Development
Table 4. Details of interviews in Das
Number of Interviews
Number of Hours
2
6
Director, Das Asia
2
3
Offshore Project Manager
1
2
1
1
Director, Das Asia
1
2
Project Manager
1
2
Deputy Director
1
2
Country Manager
1
2
Project Manager
1
2
Project Leader
1
2
Senior Developers
4
8
System Administration
1
2
Total
17
34
January-March 2002
UK, Copresent interview
Director, Das UK
Malaysia, Copresent interviews
December-February 2004
UK, Telephone interview
Director, Das UK
Malaysia, Copresent interviews
Bangladesh, Copresent interviews
prehensive scheme. The emerging themes were
further analyzed in relation to related theory (Klein
& Myers, 1999). In the process of theorizing, the
goal was to seek a theory that was compatible
with the evidence and enabled explanation (Neuman, 1994). The process of relating the data to
theory involved a degree of ‘trial and error’ as the
researchers often had to refer to the related literature reviews during the process of data collection and analysis. Theoretical analysis involved
continuous reflecting on the data collected, interpretations, feedback from the case participants,
discussions with colleagues, evolving literature
reviews, and relating the data to relevant theoretical concepts (Nicholson & Sahay, 2001;
Walsham & Sahay, 1999). Finally, although not
part of an explicit action research approach, an
intermediate report was presented to the operations
308
manager in one of the case companies for further
explanation and verification.
FINDINGS AND ANALYSIS
This section presents specific episodes in Alp and
Das to illustrate the role of copresent interaction
and ICT-based interaction in managing knowledge transfer between onshore and offshore team
members. The analysis draws firstly from Alp
and subsequently the Das case. Episodes from
both cases are framed and explained using the
conceptual lens of SECI-Ba.
Managing Knowledge Transfer in Offshore Software Development
Table 5. Details of interviews in Alp
Number of Interviews
Number of Hours
Director, Alp UK
3
6
Operations Director
2
4
June 2002
UK, Copresent interviews
Principal Consultant
1
2
Business Consultants
2
4
Systems Administration
1
2
1
1.5
India, Conference call & e-chat interviews
Director, Alp India
Project Leader
1
1.5
Quality and Testing
2
2
Client
1
2
Director, Alp UK
3
6
December-February 2004
UK, Copresent interviews
Operations Director
3
6
Business Consultants
2
4
Chinese Translator
1
2
1
2
India, Copresent interviews
Director, Alp (India)
Project Manager
1
2.5
Project Leader
1
2.5
Senior Developers
5
10.5
Developers
3
6
Junior Developer
2
3
Finance
1
1.5
Administration
2
4
Systems Administration
1
2
Total
40
77
Case 1: Alp
Socialization-Originating Ba
Socialization took place in copresence between
onshore and offshore team members. When
commencing operations in India, Alp management brought Indian developers to the UK for
six months. During that period, the onshore and
offshore team members shared office and living
accommodations with UK staff. During their time
together living in the same environment, the teams
developed mutual understanding. For instance, one
of the offshore developers in Alp (India) tells the
story of how he had gained a greater understanding of UK norms:
309
Managing Knowledge Transfer in Offshore Software Development
I have learned a lot from the onshore team in the
UK, when we were there. Now, I can talk to the
team in the UK about so many things. We played
table tennis, squash and did Yoga with them. In
India, even if you know the person very well you
might not say ‘thank you’ or ‘please’ all the time.
Now, that has become common language for me
and the cultural difference is reducing.
Informal socialization enabled originating Ba
in the form of mutual understanding of mental
frameworks of local norms and for personal ties
to be fostered in community activity. However,
when the Indian team returned home, some difficulties endured in sustaining originating Ba
even after the period of copresent socialization.
In one episode after an early project failure, the
onshore team blamed the offshore teams’ ‘lack of
questioning behavior’ and their ‘low self-esteem’
when dealing with their English colleagues. One
of the team members in UK explains:
When you suggest something, they (Indian developers) often don’t question you. They just accept it
as correct. I also feel that there is some inferiority
complex that they have. They think that you are
an English person and you should know better
than they.
The offshore director in India explained that
this situation arose because Indians tended to be
relatively “more reserved and reluctant to pose
questions.” She explains further:
It takes some time for you to get into the relationship so that you can ask. Otherwise, people tend
to assume, because you think ‘well, what will the
people think if I go back and ask again?’
An explanation of this can be related to the
enduring effect of norms of status consciousness
in India. Once back in India, team members did
not want to give a ‘negative’ impression. Their
reluctance to interrogate instructions from UK
310
staff meant that incorrect assumptions were often
made which negatively affected outcomes. Chung
(2001) points out that such a cultural issue is
common between Western and Asian managers.
Western managers often assume that “direct talk”
and ‘getting to the point’ are the best way to negotiate, while the Asian manager prefers indirect
communication, absolute politeness, and reserve
with self-control. In India, social relations tend
to be hierarchical, and relative status is related
to issues of caste, which, although diminishing
in importance, still have effect on perceived
perceptions in social pecking order (Nicholson
& Sahay, 2001). This finding points to the limits
of socialization in sustaining Ba, the need for and
enduring impact of social structures affecting
knowledge transfer.
Externalization-Interacting Ba
Since the cost of moving large numbers of team
members around the globe is considered cost
prohibitive, Alp assigns a project manager to act
as an intermediary. The travel of this person is
bi-directional, for example at the early stage of
the project the UK-based onshore project manager
will visit India for a period (usually one or two
weeks) to interpret the requirements of the project
to the offshore teams. On occasion, an offshore
project leader will travel to the UK to facilitate the
India team’s understanding of client requirements.
An onshore project manager in the UK explains:
We bring a systems analyst from India to the UK.
We go together to the customers and try to understand the requirements. Then he takes all the
requirements back to India. Since he is Indian, he
can explain better to the offshore teams. Sometimes
I go to India to explain the requirements.
This finding concurs with previous research in
that the intermediary was responsible for answering queries from clients, onshore and offshore
teams, disseminating information and checking
Managing Knowledge Transfer in Offshore Software Development
progress (Reich, 1995; Sarker & Sahay, 2004).
However, intermediaries were not always able to
create the conditions of interacting Ba and externalize tacit knowledge. This is demonstrated in an
episode involving Jeevan, a UK-based intermediary between client and offshore teams. Jeevan had
difficulty externalizing knowledge to the offshore
team as he did not hold the technical knowledge
to communicate the client requirements to the offshore teams using technical terms that the Indian
team would understand. The consequences of this
are described by one offshore developer in India:
Most of the time, we have to assume. Some developers felt that they didn’t have enough information about the system because questions were not
adequately answered.
Jeevan, as intermediary between client and
offshore team, ought to have been able to make his
tacit knowledge of the client requirement explicit
in a meaningful technical specification that could
be understood by the offshore team. However, the
offshore team felt he was insufficiently technically trained and inexperienced to perform the
externalization. Pratap, an India-based project
leader, explains:
The person in the UK (onshore team) should understand what the client wants and communicate
the same line of information down to the Indian
team. The very essence of understanding is the
ability to explain with data, to foresee the possible design or coding and to communicate it to
the offshore teams.
Nicholson (1999) describes how an intermediary in similar circumstances had difficulty externalizing knowledge due to a lack of contextual
knowledge of UK social security benefits, an
application context unknown to many Indians.
India has no equivalent concept of social security
unemployment or housing benefits, and thus the
Indians had no common understanding with their
UK counterparts of the functions and terminology
of such as system. The UK intermediary was not
aware of the gaps in the Indians’ knowledge when
documenting client requirements into specifications for the Indians, and thus misunderstandings
occurred.
Combination-Cyber Ba
A central practice for knowledge combination
at Alp involves preparation of detailed progress
reports at stages in the project. The report is
signed by the client in a copresent meeting and
subsequently posted in an online database. It is
intended to provide “synchronization” between
offshore, onshore, and the client. A project leader
in India explains:
We have to prepare a project plan, at the end of
every important deliverable and milestone there
is a review and approval process. If the deliverables have been completed, it will be reviewed
and certified by the project leader, the project
manager in India and the project manager in
UK. They will meet a customer face-to-face to
sign off the deliverables. If the customer has any
issues he should raise it before we can continue
to the next stage.
The client felt uncomfortable with the formal
process of reporting:
I felt that it was just not necessary to do it because
what I need is just some informal reporting and
for them to treat me as their team leader and not
as a customer so that there is not so much time
wasted on reporting. I don’t have too much time
to read their reports.
The quote indicates that there was a tension
between the formal knowledge combination
mechanism and the client’s wishes. Yates and
Orlikowski (1992, 1999) posit that the use of
document as genre should be created based on
311
Managing Knowledge Transfer in Offshore Software Development
substance or topics and should focus on the physical and linguistic feature of the communication.
The document was considered inappropriate by
the client, who did not read it as he wanted to be
treated in the same manner as an internal team
leader and updated informally rather than as a
distanced, formal client-vendor relationship.
The episode underlines the importance of shared
mental frameworks in creation of Ba. The practice
of project reporting physical and virtual arrangements alone did not create Ba. Mental frameworks
around the client’s role and position in the team
were not taken into account, meaning that Ba was
not created and combination not achieved.
Internalization-Exercising Ba
Internalization involves mentoring of Indian staff
and Ba created through bi-directional travel, regular telephone, calls and e-chat between onshore
and offshore project managers. One of the onshore
project managers in the UK explains:
Project management is not something that you
just follow a guide to. It is extremely difficult and
needs experience. So giving the Indian teams a
process is not enough. We have to give them a
mentor; we need to give them someone who is
really experienced who actually can be a mentor
to them.
The process of reporting, review, and approval
is designed in such a way to enable ‘learning by
doing’ in virtual Ba. An example is provided by
one of the mentors:
When a document is produced in India, it is produced in Indian English and the grammar is not
always good. When I received a document from
India, I will meticulously go through it, change
the grammar, and send it back to the person with
a copy to the team leader. The purpose is to make
sure they learn their mistakes. In practice, the next
version has the same English errors. We don’t have
312
any sort of formal way of assessing individuals’
English and I think we really need to do that.
Other approaches use copresence; for example
an episode during the early stages of software
development involved an offshore team leader
travelling to the onshore location to be trained
by a mentor. The offshore team leader had the
opportunity to sit next to the expert and engage
in and observe how work is performed. The team
leaders later went back to the offshore location
and trained other team members. Any questions
raised after return were handled through regular
telephone calls and e-chat. These findings concur with previous research on the importance of
one-to-one on-the-job training for internalization
(Deek & Espinosa, 2005) and active participation
(Chua & Pan, 2008) for knowledge transfer.
Case 2: Das
Socialization-Originating Ba
Das does not engage in copresent interaction
and instead relies wholly on ICT-based interaction. Originating Ba is created in the team room,
which is one of the features built into Lotus
Notes Groupware. It provides a shared space for
team members to socialize and interact using the
discussion forums and e-chat, and by placing
personal information online (e.g., hobbies, etc.)
to establish social presence (Robey et al., 2000;
Sarker & Sahay, 2004). Text-based interaction
overcomes disadvantages of verbal communication being immediately lost. An offshore team
member explains:
We feel more comfortable using e-chat because
we will have more time to think and we can document it. We will put the chat conversation in the
team room so that other team members can refer
to it later.
Managing Knowledge Transfer in Offshore Software Development
Das requires team members to follow standard
communication procedures to overcome the lack
of non-verbal confirmations which could be encountered in copresent interaction. The director
of Das (UK) told us:
We develop methods and standards…Whenever we
discussed something, we (onshore team members)
would get them (offshore team members) to confirm
that they understood or agreed. When they didn’t
say anything, we would ask. ‘Did you understand
it, did I explain it right and are you happy with
it?’ Whatever it is, we always get them to agree.
If we have a very long discussion, we always
summarize what we agreed in the course of that.
An example of problems in maintaining Ba is
shown in the functional requirement specification
(FRS). This is a key document that must be clearly
understood by the offshore teams for accurate
coding. The offshore teams are not regarded as
‘good’ in English, and there were occasions when
they experienced difficulty in interpreting the
FRS and thus the onshore teams must use “simple
language.” One of the onshore project managers
told us that she had learned to communicate in
e-chat for clarifications as if she was “talking” in
a copresent setting:
When I type, I don’t use text abbreviation so
much. Literally, the words I use through e-chat
will be the same words I use when I talk to the
offshore teams face-to-face. It doesn’t inhibit me
and I am quite happy. I want to have a personal
connection, so I try to foster the idea that when
we are talking online we are doing it as though
we are face-to-face.
The techniques and rules around standardization, use of clear language, databases in the team
room, and “talking” in e-chat facilitate socialization in originating Ba.
Externalization-Interacting Ba
The venue for externalized knowledge is the Lotus
Notes team room, which forms the interacting Ba.
It is here where stores of discussions related to
the project are held. For example, onshore teams
will prepare the functional requirement specification and later send this to the offshore teams for
technical design and coding. The externalization
process involves intensive discussions over the
FRS in the team room. The same procedures
apply for project delivery from the offshore to
onshore teams. One of the offshore developers
in Bangladesh explains:
In the team room we can check the documents and
discussions related to the project. We can track who
is doing what, what has been done on which day,
what are the errors and whether they have been
repaired. When we deliver the project, we zip the
document in the database and the UK team will
unzip and open the document from their database.
If there is a bug, the onshore teams will create a
document in the team room. We will respond to
them and if it is really a bug we give reasons and
repairs. If it is not a bug, we will explain and give
structure on how it works. At this stage, we are
guiding them on how to repair the bugs properly.
Records saved in the team room allow all
authorized employees to have access to the latest
versions of documents. The onshore and offshore
team members are linked together and connected to
the team room as a shared knowledge base. One of
the senior developers in Bangladesh describes this:
In the team room we can check the document and
the discussion related to the project. If we chat on
e-messenger, even a single line, we will put it in
the team room. We can track who is doing what,
on which day, what has been done, what the errors are and whether it has been improved or not.
The team room shows project steps, discussions,
and deliveries.
313
Managing Knowledge Transfer in Offshore Software Development
Over time, the offshore teams became comfortable with the use of the groupware application for
communicating technical knowledge. In addition,
the use of the medium supported and integrated
knowledge as well as encouraged learning between
users (Ciborra & Patriota, 1998). For example,
when someone in an onshore team wants to
communicate about ‘bugs’, he or she must only
create a document in the team room and commence discussions. However, a team leader was
needed to act as facilitator between onshore and
offshore team members to facilitate the process
of interacting Ba.
Similar evidence was found in the Alp case in
relation to the questioning ability of the offshore
team. Clara, a UK director, explains:
It will be a painful process to make them say
something.
Bangladeshi developers revealed that they felt
unable to question the onshore teams because they
did not want to feel ‘discredited’ for asking questions. Consequently, they tried to avoid negative
perceptions from the onshore teams that questioning meant they had no cognizance. According to
one offshore team leader in Bangladesh:
‘sometimes it is this’, instead saying ‘sometimes
it is this because of that’, which we don’t necessarily have to explain to other people.
In reaction to the perceptions of relative status,
team leaders were encouraged to apply a “parentstick game.” Clara, the UK director, explains:
There is high value placed on success especially
in Bangladesh. So, you can play this ‘parent-stick’
game quite a lot. When you praise them, [for example] ‘that is really fantastic’, they really take
it up, and equally if you tell them they are bad,
they really take it quite seriously. I pretended to
be disgusted, disappointed and I really played
on their emotional response to feel as though it
is very difficult to manage when they did something wrong.
Combination-Cyber Ba
In my early years with Das, as an inexperienced
developer, I took more time to understand the FRS.
We did not ask many questions, even if sometimes
we did not understand the FRS. We used to think
that if we asked, it might be a ‘discredit’ to us.
At Das, combination takes place when knowledge
of a specific project is documented and stored
in the ‘team room’ along with e-chat and e-mail
records. The use of templates and standard forms
is considered important by both on- and offshore
groups. However, there is the problem of ‘how
much and what’ is to be documented to avoid
information overload. The problem has been
resolved over time and Ba in the evolution of
key documents. According to the Das offshore
project manager:
Thus, in reaction to this the director in the UK
told us that onshore team leaders are required to
make their “assumptions clear and to express
knowledge that might otherwise be assumed
to exist between co-present individuals.” One
onshore team leader in the UK explained further:
In the beginning, UK people tested our work and
then sent us a list of errors including silly mistakes.
Now, we have to prepare test scripts or procedures
and have a process to follow. As a result, UK
people don’t have to test so much. Every delivery
contains documents and installation procedures.
…we (onshore teams) learn how to talk with the
Bangladesh team…we know that we have to explain things in a particular way: rather than saying
314
Managing Knowledge Transfer in Offshore Software Development
Internalization-Exercising Ba
To enable internalization, Das performs online
mentoring and training. In the early years since Das
was formed, onshore teams personally coached
the offshore teams and ensured they learned from
their mistakes. One of the offshore team leaders
explains:
Previously, when we delivered it, they used to
re-check. If there were bugs, they used to re-do it
themselves. After some time, they sent the errors
back to us and asked us to do the correction. We
did the correction and we sent it back to them.
The process went on until it was perfect before
delivery.
This ‘one-on-one’ online training was regarded
as much slower than that would be encountered
in copresent settings. This was due to the time
taken to explain, send, re-explain, and re-send
until the explanation became clear. This results
in delay compared to the instantaneous nature of
co-present feedback. The process is also more
difficult according to a UK-based manager:
When you try to do things online, you can make
progress but ultimately teaching them down to
absolute detail is a lot harder compared to doing
it face-to-face.
However, over time, the offshore teams’ ability
to internalize their understanding of client requirements and processes improved as the communication with the onshore teams developed. Thus, the
exercising Ba was not created instantaneously but
gradually through experience. One of the longer
experienced offshore team leaders explains:
In the early years we used to make mistakes quite
often. We often misunderstood the requirements
because of: (1) we could not understand the client,
(2) we could not understand the process, and (3)
we lacked experience. As time passes, we are get-
ting better and now we can visualize the scenario
because now we have more experience and can
communicate better with the onshore teams to
visualize the whole system.
To train the offshore team, the onshore project
manager asks the offshore teams to try several
solutions even though she knew from experience
the best solution. As explained by the offshore
senior developer:
She (UK manager) has a lot of experience in
programming and she will suggest some other
solution, saying ‘you may try this’, but I always
find that her suggestion is actually the best solution. She never says that it is the best solution
and asks me to try other solutions too. I will try
other ways but after comparing with her solution,
I usually agree with her solution.
Although the project manager who acts as a
mentor had direct answers to the questions, she
would encourage the offshore teams to think about
and try several solutions before reaching a decision as to which solution was more suitable for
coding. Taylor (1990) has stated the importance
of considering variation between cultures to avoid
misinterpretation of knowledge being communicated. The techniques of asking the offshore teams
to think and try several solutions was deemed to
encourage creativity of the offshore team.
Table 6 summarizes the findings showing the
role of copresent interaction and ICT-based interaction for managing knowledge transfer between
globally distributed team members.
DISCUSSION AND CONCLUSION
The Role of Copresent Interaction
in Knowledge Transfer
Our first research question was to understand the
role of copresent interaction in the knowledge
315
Managing Knowledge Transfer in Offshore Software Development
Table 6. Summary of findings
Alp
Das
Socialization–Originating Ba
Develop understanding during copresent interaction
at the early stage of relationship.
Set guidance for ICT-based interaction especially
at the early stage of relationship.
Externalization–Interacting Ba
Use intermediary to allow copresent interaction.
Use team room features for ICT-based interaction.
Combination–Cyber Ba
Gather team members with knowledge for document/
report preparation.
Online documentation using team room features
and standard templates.
Internalization–Exercising Ba
On the job training―Bring offshore teams to the UK
or send a project manager to India to train offshore
teams. Learning by doing.
Online training, mentoring, and coaching.
transfer process. We found that the copresent
interaction plays important roles in managing
knowledge transfer. Firstly, copresent interaction
allowed the development of mutual understanding between team members. The onshore and
offshore teams in Alp were colocated in the UK,
allowing them to socialize through formal and
informal activities which developed understanding
of each other’s mental framework. However, the
creation 
Download