USER ADOPTION OF MANDATORY E-GOVERNMENT SYSTEMS: NOTARIAL SYSTEM IN ALBANIA, AN EMPIRICAL ANALYSE
AbstractE-Government has high priority for governments worldwide, with much effort and money being invested into government digital initiatives. For such efforts to be worthy, a high rate of adoption of e-government is needed. Technology adoption is one of the most mature areas in information technology (IT) research and many adoption models have been developed for this purpose. Most studies in this field have been focused on voluntary use of systems and mainly from a business context, with minor emphasize on an e-government. A major distinction between technologies of e-government and other online technologies, is that the use of certain e-government technologies is mandatory, rather than voluntary. This paper provides a short introduction of e-government, followed by a review of the most well-known information technology (IT) adoption models at the individual level. Using previous research results, the study will identify the determinant constructs and their relationship for adoption of the digital notarial system of Albania. Finally, the paper proposes a theoretical framework for private professional adoption of mandatory e-government information systems.
Ajzen, I. (1985). From Intentions to Actions: A Theory of Planned Behavior. In J. Kuhl & J. Beckmann (Eds.), Action Control (pp. 11–39). Berlin, Heidelberg: Springer Berlin Heidelberg. http://doi.org/10.1007/978-3-642-69746-3_2
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211. http://doi.org/10.1016/0749-5978(91)90020-T
Ajzen, I., & Fishbein, M. (1977). Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological Bulletin, 84(5), 888–918. http://doi.org/10.1037/0033-2909.84.5.888
Brown, S. A., Massey, A. P., Montoya-Weiss, M. M., & Burkman, J. R. (2002). Do I really have to? User acceptance of mandated technology. European Journal of Information Systems, 11(4).
Brown, S. A., Venkatesh, V., & Goyal, S. (2012). Expectation Confirmation in Technology Use. Information Systems Research, 23(2), 474–487. http://doi.org/10.1287/isre.1110.0357
Compeau, D. R., & Higgins, C. A. (1995a). Application of Social Cognitive Theory to Training for Computer Skills. Information Systems Research, 6(2), 118–143. http://doi.org/Article
Compeau, D. R., & Higgins, C. A. (1995b). Computer self-efficacy: development of a measure and initial test. MIS Quarterly, 19(2), 189–211. http://doi.org/10.2307/249688
Davis, F., Bagozzi, R., & Warshaw, P. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science. http://doi.org/10.1287/mnsc.35.8.982
Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, 13(3), 319–340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and Intrinsic Motivation to Use Computers in the Workplace1. Journal of Applied Social Psychology, 22(14), 1111–1132. http://doi.org/10.1111/j.1559-1816.1992.tb00945.x
DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60–95. http://doi.org/10.1287/isre.3.1.60
Delone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems / Spring, 19(4), 9–30. http://doi.org/10.1073/pnas.0914199107
Deloitte Research, Deloitte & Touche, & Deloitte Consulting (2000). At the dawn of e-Government: the citizen as customer. Deloitte Consulting, New York.
Fishbein, M., & Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior, An Introduction to Theory and Research.
Goodhue, D. L., & Thompson, R. L. (1995). Task-Technology Fit and Individual Performance. MIS Quarterly, 19(2), 213. http://doi.org/10.2307/249689
Gupta, B., Dasgupta, S., & Gupta, A. (2008). Adoption of ICT in a government organization in a developing country: An empirical study. The Journal of Strategic Information Systems, 17(2), 140–154. http://doi.org/10.1016/j.jsis.2007.12.004
Hartwick, J., & Barki, H. (1994). Explaining the Role of User Participation in Information System Use. Management Science, 40(4), 440–465. http://doi.org/10.1287/mnsc.40.4.440
Malavet, P. A. (1995). Counsel for the Situation: The Latin Notary, a Historical and Comparative Model. Hastings International and Comparative Law Review, 19(3), 389–490.
Min, T., & Park, C. (2008). Mobile technology usage and B2B market performance under mandatory adoption. Industrial Marketing Management, 37(7), 833–840. http://doi.org/10.1016/j.indmarman.2008.02.008
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192–222. http://doi.org/10.1287/isre.2.3.192
O’Connor, R. C., & Armitage, C. J. (2003). Theory of planned behaviour and parasuicide: An exploratory study. Current Psychology, 22(3), 196–205. http://doi.org/10.1007/s12144-003-1016-4
Rogers, E. M. (1995). DIFFUSION OF INNOVATIONS. Elements of Diffusion (4th ed.). THE FREE PRESS. http://doi.org/citeulike-article-id:126680
Sheppard, B. H., Hartwick, J., & Warshaw, P. R. (1988). The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research. Journal of Consumer Research, 15(3), 325–343. http://doi.org/http://dx.doi.org/10.1086/209170
Susanto, T. D., & Goodwin, R. (2013). User acceptance of SMS-based e-government services: Differences between adopters and non-adopters. Government Information Quarterly, 30(4), 486–497. http://doi.org/10.1016/j.giq.2013.05.010
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research. http://doi.org/10.1287/isre.6.2.144
Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal Computing: Toward a Conceptual Model of Utilization. MIS Quarterly, 15(1), 125–143. http://doi.org/10.2307/249443
Tornatzky, L. G., & Fleischer, M. (1990). The processes of technological innovation. The Journal of Technology Transfer, 16(1), 45–46. http://doi.org/10.1007/BF02371446
United Nations Department of Economic and Social Affair. (2014). United Nations E-Government Survey 2014: E-Government for the Future We Want.
Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315. http://doi.org/10.1111/j.1540-5915.2008.00192.x
Venkatesh, V., Chan, F. K. Y., & Thong, J. Y. L. (2012). Designing e-government services: Key service attributes and citizens’ preference structures. Journal of Operations Management, 30(1-2), 116–133. http://doi.org/10.1016/j.jom.2011.10.001
Venkatesh, V., & Davis, F. D. (2000). A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2), 186–204. http://doi.org/10.1287/mnsc.18.104.22.16826
Venkatesh, V., Morris, M. G., Hall, M., Davis, G. B., Davis, F. D., & Walton, S. M. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. http://doi.org/10.2307/30036540
Venkatesh, V., Thong, J., & Xu, X. (2012). Consumer acceptance and user of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36(1), 157–178.
Warkentin, M., Gefen, D., Pavlou, P. a., & Rose, G. M. (2002). Encouraging Citizen Adoption of e-Government by Building Trust. Electronic Markets, 12(3), 157–162. http://doi.org/10.1080/101967802320245929
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Creative Commons Attribution License 3.0 - CC BY 3.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
email@example.com, www.iseic.cz, ojs.journals.cz