extending the theory of planned behaviour as a model to explain post-merger employee behaviour of is...

18
Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use Echo Huang a, * , Meng Hao Chuang b a Department of Information Management, National Kaohsiung First University of Science and Technology, Taiwan, ROC b Department of Information, Barits International Securities Group, Inc., Mega Holdings Corp. Taiwan, ROC 100 Available online 18 November 2004 Abstract A merger that fails to adequately address technology integration and its consequent impact on employee IS behaviour is almost doomed from the start. The theory of planned behaviour, a widely accepted expectancy-value model of attitude–behaviour relationship, suggests an individualÕs behaviour is determined by attitudes toward behaviour, subjective norm, and per- ceived behaviour control. This paper examines ways of expanding the model in the specific area of financial merger through inclusion of an additional risk variable. Exploratory results from field experiments are then presented. Ó 2004 Elsevier Ltd. All rights reserved. Keywords: Information systems; Risk; The planned behaviour; Bank mergers; IS use 1. Introduction The Taiwanese government has been actively promoting mergers among banks as evident by recent passing of Bank Mergers and Acquisition Act in November 0747-5632/$ - see front matter Ó 2004 Elsevier Ltd. All rights reserved. doi:10.1016/j.chb.2004.10.010 * Corresponding author. Address: 2 Juoyue Rd., Nantz District, Kaohsiung 811, Taiwan, ROC. Tel.: +886 7 6011000x4119; fax: +886 7 6011042. E-mail address: [email protected] (E. Huang). Computers in Human Behavior 23 (2007) 240–257 www.elsevier.com/locate/comphumbeh Computers in Human Behavior

Upload: echo-huang

Post on 04-Sep-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

omputers in

C

Computers in Human Behavior 23 (2007) 240–257

www.elsevier.com/locate/comphumbeh

Human Behavior

Extending the theory of planned behaviour asa model to explain post-mergeremployee behaviour of IS use

Echo Huang a,*, Meng Hao Chuang b

a Department of Information Management, National Kaohsiung First University of Science and

Technology, Taiwan, ROCb Department of Information, Barits International Securities Group, Inc.,

Mega Holdings Corp. Taiwan, ROC 100

Available online 18 November 2004

Abstract

A merger that fails to adequately address technology integration and its consequent impact

on employee IS behaviour is almost doomed from the start. The theory of planned behaviour,

a widely accepted expectancy-value model of attitude–behaviour relationship, suggests an

individual�s behaviour is determined by attitudes toward behaviour, subjective norm, and per-

ceived behaviour control. This paper examines ways of expanding the model in the specific

area of financial merger through inclusion of an additional risk variable. Exploratory results

from field experiments are then presented.

� 2004 Elsevier Ltd. All rights reserved.

Keywords: Information systems; Risk; The planned behaviour; Bank mergers; IS use

1. Introduction

The Taiwanese government has been actively promoting mergers among banks

as evident by recent passing of Bank Mergers and Acquisition Act in November

0747-5632/$ - see front matter � 2004 Elsevier Ltd. All rights reserved.

doi:10.1016/j.chb.2004.10.010

* Corresponding author. Address: 2 Juoyue Rd., Nantz District, Kaohsiung 811, Taiwan, ROC. Tel.:

+886 7 6011000x4119; fax: +886 7 6011042.

E-mail address: [email protected] (E. Huang).

Page 2: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 241

2000. In addition to tax incentives and lengthening the legal validity deadlines,

the new legislation has also relaxed regulations on mergers between banking

and non-banking entities. When examining existing mergers, two common points

are evident: (1) measurement of the efficiency of post-merger system integration

and diversification has largely been neglected, (2) little is known about employeeperformance of IS usage before consolidation. Bagozzi and Kimmel (1995)

suggested influencing factors of past behaviour on current behaviour are fre-

quency of performing the same target behaviour in the past and recency of those

events.

The theory of planned behaviour (TPB) is designed to predict behaviour. This the-

ory is based on expectancy-value model of attitude–behaviour relationship (Ajzen,

1985; Ajzen & Madden, 1985) and has predicted a variety of behaviours with signif-

icant degree of success. This paper examines ways of expanding the model into thespecific area of post-merger employee system performance through inclusion of var-

iables such as pressure, experience, and security.

The paper is divided into five major sections: The first sections begins with a back-

ground overview; the second briefly describes the challenges of commercial bank

consolidation in Taiwan; the third specifies variables that directly influence employee

behaviour; the fourth presents the research design; and, the fifth section presents an

analysis of the empirical data.

2. Merger and acquisition challenges

Berger, Demsetz, and Strahan (1990) and Kane (2000) identified three main

motivations behind mergers: scale and scope of economy, access to safety net sub-

sidies, and market power. These factors are based on the assumption of wealth-

maximization as the primary motive for the merger. Regardless of whether these

mergers are eventually successful, substantial benefits are presented to customersand shareholders, also the level of competition within the industry becomes more

balanced.

A merger that fails to adequately address technology integration and its conse-

quent impact on employee behaviour is almost doomed from the start. The severity

of failures increases with integration issues; for example, decisions like which branch

automation platform or loan system makes the cut. The acquired bank may have a

better check-processing system that allows it to issue monthly statements with min-

iaturized images of customer checks.Merger architects must evaluate how technology is to be migrated after factor-

ing integration and consolidation issues. The process requires evaluating the bank�sgoal, inventorying resources, evaluating impact on current operation, selling

senior management on system benefits, and consulting outside experts for imple-

mentation.

The challenges of merger and acquisition can be divided into two categories: (1)

Integration issues, which include execution risk, information risk, technology inte-

gration, and rapid integration, (2) Management and Operation issues, which include

Page 3: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

ExecutionRisk

TechnologyIntegration

Mergerand

AcquisitionChallenges

RapidIntegration

UninterruptedService

MaximizeOperations

InformationRisk

Combine

Managemen

t

CulturalIssues

DiversificationReduced

Cost

Fig. 1. Friction in mergers.

242 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

combined management, cultural problem, diversification, maximize operations,

uninterrupted service, and cost reduction (Guerra, 2001; Murphy, 2002) (shown in

Fig. 1).

3. Literature review

There exists several expectancy-value models of attitude–behaviour relationship

such as the theory of reasoned action (TRA), the technology acceptance model

(TAM), the theory of planned behaviour (TPB), and the decomposed TPB, which

may all be used to explain employee performance patterns. In the following sections,

we investigate various theories to determine an model to rationalize our research

data.

3.1. Theory of reasoned action

TRA is a widely accepted model in social psychology that can explain virtually

any human behaviour (Fishbein & Ajzen, 1975). TRA assumes that human beings

are usually quite rational and make systematic evaluation of information made avail-

able to them. According to TRA, a person�s performance of a specified behaviour is

determined by an intention (l) to perform the behaviour, B = f(l). Next, the intention

is jointly determined by a person�s attitude (A) and subjective norm (SN) with rela-

tive weights estimated by regression coefficients (Bl = wA + wSN). Furthermore, aperson�s attitude toward a behaviour is also determined by his salient belief (bi)

on the consequences of performing the behaviour multiplied by evaluation (ei) of

Page 4: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 243

those consequences (A = Ebiei). Finally, an individual�s subjective norm (SN) is a

multiplicative function of normative beliefs (nbi) and motivation to comply (mci),

SN = Enbimci. A notable aspect of TRA is the assumption that all other factors

influencing behaviour indirectly through attitude, subjective norms, or relative

weights (Davis, Bagozzi, & Warshaw, 1989).

3.2. Technology acceptance model

TAM (Davis et al., 1989) with its TRA theoretical basis (Ajzen, 1991; Fishb-

ein & Ajzen, 1975) is the current favored theory explaining adoption of new IT.

TAM and its relationship to TRA have been discussed extensively in the litera-

ture (Davis et al., 1989; Keil, Beranek, & Konsynski, 1995; Mitchell & Greato-

rex, 1993; Rogers, 1995) and will not be elaborated here. According to TAM,people form intentions to adopt a new behaviour or technology based on their

beliefs and evaluation of the consequences of adoption. Past research has shown

applicability of TAM; PU and PEOU are antecedents of use-intentions, applica-

ble to a wide range of IT services, for both experienced and novice users (Kara-

hanna, Norman, & Chervany, 1999), and across expertise levels (Taylor & Todd,

1995).

When Davis (1989a, 1989b), Davis, Bagozzi, and Warshaw (1992) applied TAM

to IT adoption, they focused on two behavioural beliefs, PU and PEOU. Sincethese two directly affect IT user intentions and social norms are insignificant in

the case of IT adoption, the basic TAM model (Davis, 1989a, 1989b) contains just

these two beliefs as the antecedents of IT acceptance without the mitigating effect

of attitude suggested by TRA without social norms. Later research showed that

social norms might be important only prior to actual use of IT (Keil et al.,

1995). Many subsequent research has adopted this parsimonious TAM model with

just PU and PEOU as predictors of IT or intended IT use. A number of literature

(Adams, Nelson, & Todd, 1992; Agarwal & Prasad, 1997; Gefen & Straub, 1997,2000; Hendrickson, Massey, & TimothyPaul, 1993; Igbaria, Zinatelli, Cragg, &

Cavaye, 1997; Szajna, 1996) has shown that the TAM model is applicable to a

wide range of technology (Gefen, Karahanna, & Straub, 2003; Gefen & Keil,

1998).

3.3. Theory of planned behaviour

The TPB is essentially an extension of the TRA by incorporating an additionalconstruct, perceived behavioural control, to account for situations where an individ-

ual lacks substantial control over target behaviour (Ajzen, 1985; Ajzen & Madden,

1985). According to TPB, an individual�s behaviour can be explained by behavioural

intention, which is jointly affected by attitude, subjective norms, perceived norms,

and perceived behavioural control. The TPB model extended TRA by adding per-

ceived behavioural control as the third factor influencing intention–behaviour rela-

tionship (Ajzen, 1991; Ajzen & Madden, 1985, 1986; Madden, Scholder Ellen, &

Ajzen, 1992).

Page 5: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

244 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

In addition, TPB postulates that beliefs affect attitudes, subjective norms, and per-

ceived behavioural control. Attitudes are determined by behavioural beliefs (i.e. sali-

ent beliefs about the consequences) multiplied by outcome evaluations. Subjective

norms are determined by normative beliefs (i.e. salient beliefs of how important oth-

ers view the behaviour) multiplied by motivation to comply. Perceived behaviouralcontrol is determined by control beliefs (i.e. salient beliefs of available resources,

opportunities, obstacles, impediments) weighted by the perceived ease of performing

the behaviour.

3.4. Decomposed theory of planned behaviour (decomposed TPB)

Using TPB as the basis, this model decomposes attitude further by incorporating

perceived usefulness and ease of use as mediating variables. Compatibility serves asan antecedent for both perceived usefulness and ease of use. Both TPB and TAM

include attitude as a fundamental determinant of behavioural intention. A review

of nine investigations suggests the significance of effects of perceived usefulness

and ease of use on attitude (Jacoby & Kaplan, 1972; Keil et al., 1995; Mathieson,

1991; Szajna, 1996; Taylor & Todd, 1995). Seven other literature studies reported

the significant impact of compatibility on user technology acceptance (Cooper &

Zmud, 1990; Moore & Benbasat, 1992; Rogers, 1995; Taylor & Todd, 1995; Torna-

tzky & Klein, 1982; Venkatesh & Davis, 2000).

4. Research model

The decomposed TPB model is adopted as the theoretical basis for explaining

how determinants affect system behaviour. In our case, risk is also included, as it

is identified as an essential factor for system use, particularly in banking. Impact

of risk on system behaviour has been reported by many prior studies (Guseman,1981; Jacoby & Kaplan, 1972; Rosenbloom, 2000).

According to TPB, behaviour is determined by the intention to perform the

behaviour. In our behaviour evaluation focus, we test TPB without its intention con-

struct; therefore, behaviour is predicted by four factors: attitude toward the behav-

iour (A), subject norm (SN), perceived behavioural control (PBC), and risk (R).

Identifying different beliefs is a part of the standard methodology when using TPB

(Mathieson, 1991). TPB�s instruments need to be tailored for each group. Therefore,

referring to prior studies, attitude, subjective norms, perceived behaviour control,and risk are decomposed as follows.

4.1. Attitudinal beliefs

Attitudes refer to an individual�s positive or negative disposition when per-

forming a particular behaviour (Davis, 1989a, 1989b; Kane, 2000). In our exam-

ple, an employee�s behaviour is determined by his or her attitude toward IS use.

Page 6: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 245

The described decomposed model resembles the one proposed by Taylor and

Todd (1995), where factors like Perceived Usefulness (PU), Perceived Ease of

Use (EOU), and Perceived Compatibility (COM) influence attitude, defined as

desirability to use the system. Davis et al. (1989) defined EOU as the degree

to which a user expects the target system to be freed of effort. Usefulness isthe user�s subjective probability that using a specific application will increase

job performance within an organization. In our case, an employee�s behaviour

to use IS is affected by factors such as perceived usefulness and perceived ease

of use.

4.2. Subjective norms

Subjective norms refer to an individual�s perception of relevant opinions onwhether to perform a particular behaviour (Salancik & Pfeffer, 1978). Employees

who embrace comparable normative beliefs may vary considerably in the extent

to which they want to comply with these beliefs (Engel, 1998). In our case, supe-

rior�s influences (SI) and peer�s influences (PI) are antecedents to subjective norms.

Superiors and coworkers have a profound effect on an employee�s technology

acceptance as reported by many prior studies (Aydin & Rice, 1991; Compeau &

Higgins, 1995; Fulk, Schmitz, & Steinfield, 1987, 1990). In our case, an employee�sbehaviour to use IS is affected by perceived variables such as superior influence andpeer influence.

4.3. Perceived behavioural control

Perceived behaviour control is a construct unique to TPB and refers to an individ-

ual�s perception of the accessibility of requisite resources or opportunities necessary

for performing a behaviour (Ajzen, 1985; Ajzen & Madden, 1985). Broadly, a con-

trol belief is a perception of the availability of skills, resources, and opportunitiesnecessary for performing the behaviour under discussion (Bandura, 1997; Francik,

Susan Ehrlich, Donna, & Levine, 1991; Taylor & Todd, 1995). In a review of 113

studies, Van den Putte (1993) identified a relatively strong relationship of 0.64.

The addition of perceived behavioural control contributes significantly to prediction

of behavioural intentions. In our case, an employee�s behaviour to use IS is affected

by perceived control variables such as self-efficacy, requisite resources, and technical

support.

4.4. Risk

Risk is a construct that refers to an individual�s perception of pressure or prior

experience for performing a behavior. It also refers to information processing secu-

rity for operating Information System and includes: (1) strategic risk – promised

sales and efficiency gains may not be achieved, (2) infrastructure risk – inadequate

hardware and software will need replacements, (3) vendor risk – new and upgraded

Page 7: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

246 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

systems may be inadequate or late, (4) information risk – data and information can-

not be optimally used, (5) security risk – data and systems may be exposed to unau-

thorized use or deletion. Mitchell and Greatorex (1993) indicated financial and time

risk showed higher effect on employee in comparison with physical, mental, and so-

cial risks. Compeau and Higgins (1995) found computer anxiety had a significant ef-fect on self-computer use. In our case, an employee�s behaviour to use IS maybe

affected by risk factors such as perceived pressure, past experience, and information

security, please refer to our research model in Fig. 2.

5. Research method

5.1. Measures

The measures used to operationalize the constructs included in the investigated

models were mainly adapted from relevant prior studies, with minor wording

changes to tailor them to the targeted context. Pretests were conducted to ensure that

the instrument possessed acceptable validity. First, 25 respondents from different

branches were asked to evaluate the content validity. Then, the survey was further

tested for reliability, item consistency, ease of understanding, and question sequence

appropriateness.

Complexity

Perceived ease of use

Behaviour

Attitude

Subjective norm

Risk

PerceivedBehavioural

Control

Experience

Information security

Pressure

Technical support

Resources

Self- efficacy

Peer Influence

Superior influence

Perceived usefulness

Fig. 2. Research model.

Page 8: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 247

The instrument�s reliability was assessed using Cronbach�s a. The resulting value

ranged from 0.667 to 0.87, which is acceptable for pretests. Suggestions on the ques-

tion sequence, wording choice, or measures were solicited, leading to some minor

changes to the questionnaire. Based on pretest feedback, several items were removed.

Table 1 lists the final questionnaire items used to measure each construct, togetherwith their reference sources. Subject who had participated in the pretests were ex-

cluded from the subsequent formal study. Items were all measured on a 7-ponit rat-

ing scale with �1 = strong disagree� and �7 = strongly agree.�

5.2. Construct validity and reliability

The four-item behaviour scale obtained a Cronbach a reliability of 0.61. The

three-item attitude and two-item SN scales showed a reliability of 0.97 and 0.72,respectively; the two-item PBC and three-item risk exhibited a reliability coefficient

of 0.66 and 0.65, respectively. These scale reliabilities are considered adequate for

behaviour research at all levels. The two-item PU, EOU and COM, have a values

of 0.86, 0.95, and 0.97, respectively. Two-item SI and CI as are 0.61 and 0.79.

Two-item SE, FR, and TS as are 0.80, 0.83, and 0.81, respectively. The two-item

P, E, and S as are 0.81, 0.71, and 0.91.

6. Results and findings

This section presents the research findings. We first present the demographic pro-

file of respondents, shown in Table 2. Then, ANOVA test variance of two subsam-

ples is shown. Finally, a hierarchical regression model is used to validate the

explanation power of TPB.

6.1. Demographic profile

A total of 224 responses were collected out of 249 sent, with one invalid response.

Thus, the response rate is 89%. Of the 223 responses received, 132 were from old

employees, and 91 from new ones. The samples do not show significant deviation be-

tween the two. Table 2 indicates respondents were predominantly female (75–80%)

key-in staffs (31%), in the age bracket of 26–35 (67–83%). Respondents with a diplo-

ma made up of 59–65% of respondents. The majority of respondents are branch

employees (90–91%).

6.2. Comparison

Table 3 contains a list of factors for respondents. Each item is rated from extre-

mely disagree (1) to extremely agree (7). The 35 firms responding to these questions

were divided into two groups, with ranking shown below. Table 3 displays a signif-

icant difference in variance of behaviour (F = 17.535, p < 0.000). There is also a sig-

Page 9: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

Table 1

List of construct indicators

Construct Source

Behaviour

B1 I would have no difficulty telling others about the

results of using back-end system.

Fishbein and Ajzen (1980); Taylor and

Todd (1995, 1996); Riemenschneider

et al. (2002)

B2 I believe I could communicate to others the

consequence of using back-end system.

B3 The results of using back-end system are apparent

to me.

B4 I would have no difficulty explaining why

back-end system may or may not be beneficial.

Attitude

A1 Back-end system is useful in my job. Fishbein and Ajzen (1980); Taylor and

Todd (1995, 1996); Riemenschneider

et al. (2002)

A2 Using back-end system is enhances the quality of

my work.

A3 The advantages of using back-end system

outweight the disadvantages.

Subjective norms

S1 My peers confirm my knowledge and ability to

make use of back-end system.

Fishbein and Ajzen (1980); Taylor and

Todd (1995, 1996)

S2 My superior confirms my knowledge and ability

to make use of back-end system.

Perceived behaviour control

Pb1 I feel that there is no gap between my existing

skills and knowledge and those required by

back-end system.

Fishbein and Ajzen (1980); Taylor and

Todd (1995); Riemenschneider et al.

(2002)

Pb2 Using the current system is entirely within my

control.

Pb3 I have the knowledge and ability to make use of

back-end system.

Risk

R1 When I operate back-end system, I feel unstable. Risk management and control guidance

for securities firms and their superiors

(1998)

R2 I encountered many incorrect messages while I use

back-end system.

R3 I need to take all the responsibility of data security

and accuracy.

Perceived ease of use

E1 Learning back-end system was easy for me. Moore and Benbasat (1991); Davis et al.

(1989); Riemenschneider et al. (2002)

E2 I think back-end system is clear and

understandable.

Perceived usefulness

P1 Using back-end system improves my job

performance.

Moore and Benbasat (1991); Davis et al.

(1989); Riemenschneider et al. (2002)

(continued on next page)

248 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

Page 10: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

Table 1 (continued)

Construct Source

P2 Using back-end system increases my productivity.

Compatibility

C1 Using back-end system is compatible with all

aspects of my work.

Moore and Benbasat (1991); Davis et al.

(1989); Riemenschneider et al. (2002)

C2 Using back-end system fits well with the way I

work.

Peer influence

PI1 Peers who influence my behaviour would think

that I should have the knowledge and ability to

use back-end system.

Burnkrant and Page (1988); Shimp and

Kavas (1984)

PI2 Peers who are important to me would think that I

should have the knowledge and ability to use

back-end system.

Superior influence

SI1 My superior who influences my behaviour would

think that I should have the knowledge and ability

to use back-end system.

Burnkrant and Page (1988); Shimp and

Kavas (1984)

SI2 My superiors whom I report would think that I

should have the knowledge and ability to use

back-end system.

Self-efficacy

Se1 Specialized instruction and education concerning

back-end system is available to me.

Compeau and Higgins (1991), Ajzen

(1985), Ajzen and Madden (1985), Ajzen

(1991)

Se2 Formal guidance is available to me in using

back-end system.

Resources

Re1 A specific resource is available only for back-end

system use.

Fishbein and Ajzen (1980); Taylor and

Todd (1995, 1996)

Re2 For making the transition to back-end system, I

felt I need a plenty of related resources (e.g.

printer, manual, training courses, wireless

peripheral equipments, etc.).

Technical support

T1 A specific group is available for assistance with

back-end system difficulties.

Fishbein and Ajzen (1980); Taylor and

Todd (1995, 1996)

T2 For making the transition to back-end system, I

felt I had a solid ‘‘network of support’’ (e.g.

knowledgeable colleagues, support personnel,

consultants, etc).

Pressure

Pr1 I was afraid to make mistakes while using back-

end t system.

Self-defined

Pr2 I feel stressful to use back-end t system.

(continued on next page)

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 249

Page 11: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

Table 1 (continued)

Construct Source

Experience

Ex1 My prior experience can help me to understand

back-end t system.

Self-defined

Ex2 I have confidence to use back-end t system.

Security

St1 I believe that account-password policy is

important to protect the data processing.

Self-defined

St2 I believe that the privilege policy is necessary to

protect the data processing.

250 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

nificant variance in usefulness (F = 37.948, p < 0.000), ease of use (F = 14.687,

p < 0.000), compatibility (F = 24.238, p < 0.000), self-efficacy (F = 18.807,

p < 0.000), and technical resources (F = 17.286, p < 0.000).

6.3. Explaining power

6.3.1. Explaining behaviour

As expected, TPB explains a significant proportion of the variance in Behaviour.Regression results confirmed three of the four factors are significant, and the equa-

tion captures 49% of old group�s Behaviour variance (Adjusted oldR2). The new

group data revealed that Attitude also has a significant effect on Behaviour and

the equation captures 29% variance (Adjusted newR2). The individual determinants

of Behaviour in equation (1a), each of Aold, SNold, and Rold had a very significant

effect on Bold (bA = 0.445, bSN = 0.233, bR = 0.192, p < 0.000), whereas PBCold has

no significant effect. Within new group, Anew had a very strong effect on Bnew

(bA = 0.424, p < 0.000), while SNnew, PBCnew, and Rnew have non-significant effects.Please refer to Table 4 Hierarchical regression test for expected relationships.

6.3.2. Explaining attitude

Regression results confirmed each of the three factors explains a significant vari-

ance (82%) in Attitude (Adjusted oldR2). Individual determinants of Attitude, equa-

tion (2a), Uold, EOUold, and COMold had a very significant effect on Aold

(bU = 0.250, bEOU = 0.255, bCOM = 0.494, p < 0.000). The new group data revealed

that EOU and COM also have significant effects on Anew and the equation captures86% variance (Adjusted newR2), while Unew has nonsignificant effect. Equation (2a),

Table 1, both EOUnew, and COMnew had significant effects on Anew (bEOU = 0.251,

bCOM = 0.595, p < 0.000).

6.3.3. Explaining subjective norms

As theorized, regression models confirmed two factors have significant effects and

the equation explains 17% of the variance of SNold and 29% of the variance of

SNnew. The data revealed that both PIold and SIold have significant effects(bCI = 0.301, bSI = 0.215, p < 0.000). Notice that both regressions predict SN well,

Page 12: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

Table 2

Demographic profiles of respondents

Old New

Number Percentage (%) Number Percentage (%)

Gender

Male 33 25 18 20

Female 99 75 73 80

Marriage

Married 61 46 49 54

Unmarried 71 54 42 46

Age

20–25 5 4 6 7

26–30 60 45 37 41

31–35 50 38 26 28

36–40 13 10 15 16

Over 40 4 3 7 8

Division

Branch office 119 90 82 91

Information department 5 4 4 4

Management department 8 6 5 5

Stock company working history

Under 1 yr 20 15 21 23

1–2 yrs 21 16 10 11

2–4 yrs 36 27 20 22

4–6 yrs 32 24 19 21

Over 6 yrs 23 18 21 23

Highest education

High school 21 16 18 20

Diploma 78 59 59 65

Degree 30 23 13 14

Masters 2 2 1 1

Position

IT staff 19 15 15 17

Key-in staff 40 31 28 31

Credit staff 16 12 4 4

Stock staff 8 6 7 8

Audit staff 7 5 3 3

Front-desk clerk 7 5 9 10

Cashier 7 5 4 4

Manager 11 8 11 12

Other 17 13 10 11

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 251

although new group model explains slightly more variance than old group model.

Equation (3a), indicates PInew had significant effects (bCI = 0.553, p < 0.000). The re-

sults also imply that new group was slightly more influenced by coworkers� influences

in compare with superior�s influences.

Page 13: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

Table 3

ANOVA of two groups perception and behaviours

Factors Old (N = 132) New (N = 91) F-value

Rank Mean SD Rank Mean SD

Information security 1 5.4356 1.0726 1 5.5495 1.0029 0.640

Ease of use 2 4.9508 0.9997 4 4.3462 1.3554 14.687***

Usefulness 3 4.9167 1.0117 8 3.9396 1.3557 37.948***

Compatibility 4 4.7462 1.1026 9 3.9341 1.3503 24.283***

Experience 5 4.7386 0.9235 2 4.5714 0.8582 1.870

Self-Efficacy 6 4.6629 0.9440 6 4.0330 1.2220 18.807***

Peer influence 7 4.4697 1.0203 3 4.5659 1.1235 0.441

Technical support 8 4.4167 1.0192 10 3.8022 1.1735 17.286***

Superiors influence 9 4.2652 0.9173 7 3.9560 0.9934 5.714

Pressure 10 4.1136 1.0782 5 4.1593 0.9941 0.103

Facilitation of resources 11 4.0455 1.2951 11 3.5769 1.3923 6.629

Attitude – 4.7071 1.0264 – 3.7985 1.3616 32.234

Subjective norms – 7.9205 0.0192 – 4.7033 1.0434 3.020

Perceived behaviour control – 4.8409 0.9168 – 4.6374 0.8994 2.696

Risk – 4.5000 0.7510 – 4.4396 0.6124 0.404

Behaviour – 4.7121 0.7175 – 4.2720 0.8438 17.535***

* p < 0.05.** p < 0.01.

*** p < 0.001.

252 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

6.3.4. Explaining perceived behaviour control

As expected, regression models confirm three factors captures 48% of variance of

PBCold, and 29% of variance of PBCnew, respectively. The data revealed that SEold

and TSold have significant effects (bE = 0.372, bS = 0.389, p < 0.000), while PPold

has non-significant effect. The effects of individual determinants on PBCnew are

not confirmed.

6.3.5. Explaining risk

As expected, regression models confirmed three factors captures 29% of variance

of Rold, and 25% of variance of Rnew, respectively. The data revealed that Pold and

Eold have significant effects (bE = 0.401, bS = 0.312, p < 0.000), while Sold had non-

significant effect. The Pnew had a significant effect on Rnew was confirmed

(bp = 0.474, p < 0.000).

7. Discussion and conclusion

7.1. Conclusion

Our findings are consistent with the expectancy-value model of attitude–behav-

iour relationship as proposed by Ajzen (1985, 1989, 1991) and Ajzen and Madden

Page 14: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

Table 4

Hierarchical regression test for expected relationships

Equation Old group New group

R2 Beta R2 Beta

(1) Behaviour (B)

(a) B = A + SN + PBC + R 0.507 (0.491) 0.321 (0.290)

A 0.445 (5.609)*** 0.424 (4.181)***

SN 0.233 (2.974)** 0.138 (1.303)

PBC 0.051 (0.607) 0.180 (1.888)

R 0.192 (2.926)** �0.116 (�1.260)

(2) Attitude (A)

(a) A = U + EOU + COM 0.829 (0.825) 0.866 (0.862)

U 0.250 (3.966)*** 0.135 (1.714)

EOU 0.255 (4.767)*** 0.251 (3.661)***

COM 0.494 (7.793)*** 0.595 (6.389)***

(3) Subjective norms (SN)

(a) SN = SI + CI 0.188 (0.175) 0.308 (0.293)

SI 0.301 (3.488)*** 0.005 (0.049)

CI 0.215 (2.493)** 0.553 (5.677)***

(4) Perceived behaviour control (PBC)

(a) PBC = SE + FR + TS 0.696 (0.484) 0.240 (0.214)

SE 0.372 (4.157)*** 0.187 (1.278)

FR �0.009 (�0.113) 0.235 (1.808)

TS 0.389 (4.158)*** 0.130 (0.840)

(5) Risk (R)

(a) R = P + E + S 0.310 (0.294) 0.274 (0.249)

P 0.401 (5.297)*** 0.474 (5.121)***

E 0.312 (3.842)*** 0.148 (1.604)

S �0.023 (�0.293) 0.151 (1.643)

Notes. Figures shown are beta coefficients of the OLS regressions, t-values in parentheses. Additional

statistics: olddf = 128, and newdf = 87.* p < 0.05.

** p < 0.01.*** p < 0.001.

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 253

(1985, 1986). We have predicted with a significant degree of success various two

subsample behaviours. Also, our results yield insights into the difference between

the two samples. While many of the differences in mean are marginal, five cases

showed statistically significant differences. Respondents with higher scores on

behaviours are more receptive to system in terms of ease of use, usefulness, and

compatibility. This subgroup is also more confident with their self-efficacy andtechnical support.

Our results also yield several insights into the determinants of backend system use

for the old group. Their behaviour can be predicted reasonably well from their atti-

tude, subjective norms, and risk. Compatibility is the primary determinant of atti-

tude, with perceived ease of use and perceived usefulness as the secondary and

Page 15: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

254 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

tertiary determinants of attitude. Peer�s influence is a major determinant of subjective

norms, while superior�s influence is a significant determinant. Pressure is a major

determinant of risk, with experience as a significant secondary determinant.

However, the results of mental processes can be tangible and physical; the new

joiner performance of daily routine job is predictable, observable, and controllablebased on understand their attitude. Performance of the new group can be predicted

and controlled based on an understanding of their attitude. Our investigation re-

vealed three insights concerning determinants of new backend system users. Their

behaviour can be predicted reasonably well from attitude, with compatibility as a

major determinant of attitude, and perceived ease of use as a significant secondary

determinant.

7.2. Limitation

There are two limitation: (1) The use of only a single company survey restricts us

to a limited pool of respondents, (2) The use of stock backend system without taking

into consideration of front-end system restricts us to fewer system users. Hence, re-

sults obtained may not be generalized to other transaction systems. However, this

research includes all three popular stock backend systems in Taiwan.

7.3. Implication

The findings in this research will facilitate practitioners in formulating measures

to improve new employee performance. Our studies showed that employee attitude

is positively associated with behaviour. Instead of focusing on formal training

courses, superiors should help their staff identify similarity with past system func-

tions, to accelerate understanding of system conversion. Since easy of use, compat-

ibility, and superior�s influence are found to be important factors, practitioners may

also engage a team leader as a guide for system orientation.There are several directions for further research: first, other factors may exist that

can further explain employee behaviour; second, the study of stock backend system

behaviour can be extended to other financial systems; and, finally, the study of stock

backend system can be extended to other industry when facing merger and acquisi-

tion issues.

8. Further reading

Armitage and Conner (2001); Bagozzi (1982); Bagozzi (1983); Chau and Jen-

HwaHu (2001); Chau and Jen-HwaHu (2002); Christie (1981); Clark (1998); Jean

Paul Broonen (2002); Kallgren and Wood (1986); Liao, Yuan Pu, Huaiqing, and

Ada. (1999).

Page 16: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 255

References

Adams, D. A., Nelson, R. R., & Todd, P. A. . (1992). Perceived usefulness, ease of use, and usage of

information technology: a replication. MIS Quarterly, 16(2), 227–247.

Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntaries in the

acceptance of information technologies. Decision Sciences, 28(3), 557–582.

Ajzen, I. (1985). From intentions to actions: A theory of planned behaviour, action control from cognition to

behaviour (pp. 11–39). New York: Springer Verlag.

Ajzen, I. (1989). Attitude, personality, & behavioural. Milton Keynes: Open University Press.

Ajzen, I. (1991). The theory of planned behaviour. Organizational Behaviour and Human Decision

Processes, 50, 179–211.

Ajzen, I., & Madden, T. J. (1985). Prediction of goal-directed behaviour: attitudes, intentions, and

perceived behavioural control. Journal of Experimental Social Psychology, 20, 453–474.

Ajzen, I., & Madden, T. J. (1986). Prediction of goal-directed behaviour: attitudes, intentions, and

perceived behavioural control. Journal of Experimental Social Psychology, 22, 453–474.

Armitage, C. J., & Conner, M. (2001). Efficacy of the theory of planned behaviour: a meta-analytic review.

British Journal of Social Psychology, 40, 471–499.

Aydin, C., & Rice, R. E. (1991). Attitudes toward new organizational technology: network proximity as a

mechanism for social information processing. Administrative Science Quarterly, 36, 219–244.

Bagozzi, R. P. (1982). A field investigation of causal relations among cognitions, affect, intentions, and

behaviour. Journal of Marketing Research, 19, 562–583.

Bagozzi, R. P. (1983). Holistic methodology for modelling consumer response to innovation. Operations

Research, 31, 128–176.

Bagozzi, R. P., & Kimmel, S. K. (1995). A comparison of leading theories for the prediction of goal-

directed behaviours. British Journal of Social Psychology, 34, 437–461.

Bandura, A. (1997). Self-efficacy: The exercise of control. New York: W.H. Freeman.

Berger, A. N., Demsetz, R. S., & Strahan, P. E. (1990). The consolidation of the financial services industry:

causes, consequences, and implications for the future. Journal of Banking and Finance, 23, 135–194.

Burnkrant, Robert E., & Page, Thomas J. (1988). The structure and antecedents of the normative and

attitudinal components of Fishbein�s theory of reasoned action. Journal of Experimental Social

Psychology, 24, 66–87.

Chau, P. Y. K., & Pau, Jen-HwaHu (2001). Information technology acceptance by individual

professionals: a model comparison approach. Decision Sciences, 32(4), 699–720.

Chau, P. Y. K., & Pau, Jen-HwaHu (2002). Investigating healthcare professionals� decisions to accept

telemedicine technology: an empirical test of competing theories. Information & Management, 39(4),

297–311.

Christie, B. (1981). Face to file communication: A psychological approach to information system. New York:

Wiley.

Clark, D. (1998). Megadeal challenges Citicorp to Meld systems successfully series: 3:[1]. American Banker,

163(67), 1–1.

Compeau, D. R., & Higgins, C. A. (1991). A Social Cognitive Theory Perspective on Individual Reactions

to Computing Technology. Proceedings of the International Conference on Information Systems (ICIS).

December 16–18, 187–198. New York.

Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: development of a measure and initial

test. MIS Quarterly, 19(2), 189–211.

Cooper, R. B., & Zmud, R. W. (1990). Information technology implementation research: a technological

diffusion approach. Management Science, 36(2), 123–139.

Davis, F. D. (1989a). Perceived usefulness, perceived ease of use and user acceptance of information

technology. MIS Quarterly, 14, 319–340.

Davis, F. D. (1989b). Perceived usefulness, perceived ease of use, and user acceptance of information

technology. MIS Quarterly, 13(3), 319–335.

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a

comparison of two theoretical models. Management Science, 35(8), 982–1003.

Page 17: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

256 E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers

in the workplace. Journal of Applied Social Psychology, 22(14), 1111–1132.

Francik, E., Ehrlich, S., Rudman, D., Cooper & Levine, S. (1991). Putting innovation to work: adoption

strategies for multimedia communication systemsassociation for computing machinery. Communica-

tions of the ACM, 34(12), 52–64.

Engel, P. (1998). Comments on logical and psychological partitioning of mind: depicting the same map.

New Ideas in Psychology, 16(2), 107–113.

Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behaviour: An introduction to theory and

research. Reading, MA: Addison-Wesley.

Fishbein, M., & Ajzen, I. (1980). Understanding attitudes & predicting social behavior. New Jersey:

Prentice-Hall.

Fulk, J., Schmitz, J., & Steinfield, C. W. (1987). On the role of theory in research on information

technology in organizations: an introduction to the special issue. Communication Research, 14(5),

479–490.

Fulk, J., Schmitz, J., & Steinfield, C. W. (1990). A social influence model of technology use. In J. Fulk & C.

Steinfield (Eds.), J. organizations and communication technology (pp. 117–140). Newbury Park, CA:

Sage.

Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated

model. MIS Quarterly, 27(1), 51–90.

Gefen, D., & Keil, M. (1998). The impact of developer responsiveness on perceptions of usefulness and

ease of use: an extension of the technology acceptance model. The Database for Advances in

Information Systems, 29(2), 35–49.

Gefen, D., & Straub, D. W. (1997). Gender differences in perception and adoption of E-Mail: an extension

to the technology acceptance model. MIS Quarterly, 21(4), 389–400.

Gefen, D., & Straub, D. W. (2000). The relative importance of perceived ease-of-use in IS adoption: a

study of E-commerce adoption. Journal of the Association for Information Systems, 1(8), 1–28.

Guerra, A. (2001). Citigroup – once the deals are signed technology must create the ties that bind. Bank

Systems & Technology, 38(5), A12–A15.

Guseman, D. S. (1981). Risk perception and risk reduction in consumer services. In J. H. Donnelly & W.

R. George (Eds.), Marketing of services (pp. 200–204). Chicago, IL: American Marketing Association.

Hendrickson, A. R., Massey, P. D., & Cronan, T. P. (1993). On the test–retest reliability of perceived

usefulness and perceived ease of use scales. MIS Quarterly, 17(2), 227–230.

Igbaria, Magid, Zinatelli, Nancy, Cragg, Paul, & Cavaye, Angele L. M. (1997). Personal

computing acceptance factors in small firms: a structural equation model. MIS Quarterly, 21(3),

279–305.

Jacoby, J., & Kaplan, L. (1972). The components of perceived risk. In M. Venkatesan (Ed.). Advanced in

consumer research (Vol. 3). Chicago: Association for Consumer Research.

Broonen, P. (2002). Extending the theory of planned behaviour as a model of cognitive and motivational

influences on academic performance. American Institute of Physics Conference Proceedings, 573,

508–513.

Kallgren, C. A., & Wood, W. (1986). Access to attitude-relevant information in memory as a determinant

of attitude–behaviour consistency. Journal of Experimental Social Psychology, 22, 328–338.

Kane, E. J. (2000). Incentives for banking megamergers: What motives might regulators infer from event-

study evidence. Journal of Money, Credit, and Banking, 32(3), 671–701.

Karahanna, E. S., Norman, L., & Chervany, D. W. (1999). Information technology adoption across time:

a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23(2),

183–213.

Keil, M., Beranek, P. M., & Konsynski, B. R. (1995). Usefulness and ease of use: field study evidence

regarding task considerations. Decision Support Systems, 13(1), 75–91.

Liao, Shaoyi, Yuan Pu, Shao, Huaiqing, Wang, & Ada., Chen (1999). The adoption of virtual banking: an

empirical study. International Journal of Information Management, 19(1), 63–75.

Madden, T. J., Scholder, E., Pamela & Ajzen, I. (1992). A comparison of the theory of planned behaviour

and the theory of reasoned action. Personality and Social Psychology Bulletin, 18(1), 3–9.

Page 18: Extending the theory of planned behaviour as a model to explain post-merger employee behaviour of IS use

E. Huang, M.H. Chuang / Computers in Human Behavior 23 (2007) 240–257 257

Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the

theory of planned behaviour. Information Systems Research, 2(3), 173–191.

Mitchell, V.-W., & et Greatorex, M. (1993). Risk perception and reduction in the purchase of consumer

services. The Service Industries Journal, 13(4), 179–200.

Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of

adopting an information technology innovation. Information Systems Research, 2(3), 192–222.

Moore, G., & Benbasat, I. (1992). Development of an instrument to measure the perceptions of adopting

an information technology innovation. Information Systems Research, 2(3), 192–222.

Murphy, Patricia A. (2002). Beating the post-merger odds. Bank Director, 12(1), 54–55.

Riemenschneider, C. K., Harrison, D. A, & Mykytn, P. P. Jr., (2002). Understanding IT adoption

decisions in small business: Integrating current theories. Information & Management, 40(4), 269–285.

Rogers, E. (1995). Diffusion of innovations. New York: Free Press.

Rosenbloom, R. S. (2000). Leadership, capabilities, and technological change: the transformation of NCR

in the electronic era. Strategic Management Journal, 21(10/11), 1083–1103.

Salancik, P. (1978). The external control of organizations: A resource dependence perspective. New York:

Harper and Row.

Shimp, T. A., & Kavas, A. (1984). The theory of reasoned action applied to coupon usage. Journal of

Consumer Research, 11, 795–809.

Szajna, B. (1996). Empirical evaluation of the revised technology acceptance model. Management Science,

42(1), 85–92.

Taylor, S., & Todd, P. (1995). Assessing IT usage: the role of prior experience. MIS Quarterly, 19(4),

561–570, December.

Taylor, S., & Todd, P. A. (1996). Understanding information technology usage: a test of competing

models. Information Systems Research, 6(2), 144–176.

Tornatzky, L. G., & Klein, R. J. (1982). Innovation characteristics and innovation adoption-

implementation: a meta-analysis of findings. IEEE Transactions on Engineering Management, EM-

29, 28–45.

Van den Putte, B. (1993). On the theory of reasoned action, Unpublished dissertation, University of

Amsterdam, the Netherlands.

Venkatesh, V., & Davis, F. D. (2000). Theoretical extension of the technology acceptance model: four

longitudinal field studies. Management Science, 46(2), 186–204.

Echo Huang is an Associate Professor in the Department of Information Management in the School of

Management, National Kaohsiung First University of Science and Technology. Her received her M.S.

degree from the University of Maryland at College Park, Ph.D. degree from the National Cheng Kung

University. Her research focuses on electronic commerce, Internet banking, customer relationship man-

agement, and e-marketing. Her articles on these topics have been published in Electronic Commerce

Research and Applications, Computers in Human Behavior and other academic journals.