{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:14:29Z","timestamp":1654100069969},"reference-count":62,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10,1]]},"abstract":"<p>Although much research in the IS field has examined IS adoption, less is known about post-adoption behavior among IS users, especially when competing alternatives are available. Incorporating commitment theory from social psychology and management science literature, this paper proposes an IS continuance model that explains why some IS technologies enjoy continued use after adoption and others are often relegated to the basement as shelfware. This paper uses a technology commitment perspective to unravel why adopted technologies experience mixed success. Specifically, the authors argue that IS continuance may be best understood by investigating user commitment toward specific technologies. Three components of technology commitment, that is, affective commitment, calculative commitment, and normative commitment, are used to formulate a research model. The model is empirically tested in the context of instant messaging software. Results show a strong support for the model and explicate commitment differentials among users across different brands of instant messaging software. The study ends with a discussion of the results and their implications for research and practice.<\/p>","DOI":"10.4018\/joeuc.2010100104","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T20:16:12Z","timestamp":1297800972000},"page":"70-94","source":"Crossref","is-referenced-by-count":3,"title":["Investigating Technology Commitment in Instant Messaging Application Users"],"prefix":"10.4018","volume":"22","author":[{"given":"Y. Ken","family":"Wang","sequence":"first","affiliation":[{"name":"University of Pittsburgh at Bradford, USA"}]},{"given":"Pratim","family":"Datta","sequence":"additional","affiliation":[{"name":"Kent State University, USA"}]}],"member":"2432","reference":[{"key":"joeuc.2010100104-0","doi-asserted-by":"publisher","DOI":"10.2307\/258906"},{"key":"joeuc.2010100104-1","author":"P.Abrahamsson","year":"2002","journal-title":"The Role of Commitment in Software Process Improvement"},{"key":"joeuc.2010100104-2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-642-69746-3_2","article-title":"From intentions to actions: a theory of planned behavior","author":"I.Ajzen","year":"1985","journal-title":"Action Control: From Cognition to Behavior"},{"key":"joeuc.2010100104-3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2044-8325.1990.tb00506.x","article-title":"The measurement and antecedents of affective, continuance, and normative commitment to the organization.","volume":"63","author":"N. J.Allen","year":"1990","journal-title":"Journal of Occupational Psychology"},{"key":"joeuc.2010100104-4","doi-asserted-by":"publisher","DOI":"10.1006\/jvbe.1996.0043"},{"key":"joeuc.2010100104-5","doi-asserted-by":"publisher","DOI":"10.1002\/mar.10063"},{"key":"joeuc.2010100104-6","doi-asserted-by":"publisher","DOI":"10.1177\/0146167201279011"},{"key":"joeuc.2010100104-7","doi-asserted-by":"publisher","DOI":"10.1177\/0092070304263332"},{"key":"joeuc.2010100104-8","doi-asserted-by":"publisher","DOI":"10.1086\/222820"},{"key":"joeuc.2010100104-9","author":"P. M.Bentler","year":"2004","journal-title":"EQS 6 Structural Equations Program Manual"},{"key":"joeuc.2010100104-10","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"joeuc.2010100104-11","author":"T. A.Brown","year":"2006","journal-title":"Confirmatory Factor Analysis for Applied Research"},{"key":"joeuc.2010100104-12","author":"B. M.Byrne","year":"2006","journal-title":"Structural Equation Modeling with EQS, Basic Concepts, Applications, and Programming"},{"key":"joeuc.2010100104-13","doi-asserted-by":"publisher","DOI":"10.1207\/S15328031US0203_02"},{"key":"joeuc.2010100104-14","doi-asserted-by":"crossref","unstructured":"Cooper, R. B., & Zmud, R. W. (1990). Information technology implementation research: a technological diffusion approach. Management Science, 36(2), 123,117.","DOI":"10.1287\/mnsc.36.2.123"},{"key":"joeuc.2010100104-15","article-title":"Test Validation","author":"L. J.Cronbach","year":"1971","journal-title":"Educational Measurement"},{"key":"joeuc.2010100104-16","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"joeuc.2010100104-17","author":"R. F.Devellis","year":"2003","journal-title":"Scale Development"},{"key":"joeuc.2010100104-18","doi-asserted-by":"crossref","DOI":"10.1515\/9781400830176","author":"A.Dixit","year":"1994","journal-title":"Investment Under Uncertainty"},{"key":"joeuc.2010100104-19","doi-asserted-by":"crossref","DOI":"10.1515\/9781503620766","author":"L.Festinger","year":"1957","journal-title":"A theory of cognitive dissonance"},{"key":"joeuc.2010100104-20","author":"M.Fishbein","year":"1975","journal-title":"Beliefs, Attitude, Intention and Behavior: An Introduction to Theory and Research"},{"key":"joeuc.2010100104-21","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"joeuc.2010100104-22","author":"A.Gallagher","year":"2006","journal-title":"A Guide to Eliminating Software"},{"key":"joeuc.2010100104-23","doi-asserted-by":"publisher","DOI":"10.1177\/03079450094306"},{"key":"joeuc.2010100104-24","doi-asserted-by":"publisher","DOI":"10.1037\/10318-000"},{"key":"joeuc.2010100104-25","doi-asserted-by":"publisher","DOI":"10.1108\/02635570410567757"},{"key":"joeuc.2010100104-26","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0326"},{"key":"joeuc.2010100104-27","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0070"},{"key":"joeuc.2010100104-28","doi-asserted-by":"publisher","DOI":"10.1002\/smj.333"},{"key":"joeuc.2010100104-29","unstructured":"Lacy, S. (2006, May 3). The Friendly Face of Business Software. Business Week."},{"key":"joeuc.2010100104-30","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"joeuc.2010100104-31","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5414.2006.00133.x"},{"issue":"4","key":"joeuc.2010100104-32","doi-asserted-by":"crossref","first-page":"102","DOI":"10.17705\/1jais.00066","article-title":"Understanding Individual Adoption of Instant Messenging: An Empirical Investigation.","volume":"6","author":"D.Li","year":"2005","journal-title":"Journal of the Association for Information Systems"},{"key":"joeuc.2010100104-33","doi-asserted-by":"crossref","first-page":"65","DOI":"10.17705\/1jais.00030","article-title":"Force of Habit and Information Systems Usage: Theory and Initial Validation.","volume":"4","author":"M.Limayem","year":"2003","journal-title":"Journal of the Association for Information Systems"},{"key":"joeuc.2010100104-34","author":"M.Limayem","year":"2007","journal-title":"How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance"},{"issue":"1","key":"joeuc.2010100104-35","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1080\/07421222.2003.11045840","article-title":"A multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior.","volume":"22","author":"Y.Malhotra","year":"2005","journal-title":"Journal of Management Information Systems"},{"key":"joeuc.2010100104-36","first-page":"11","article-title":"If We Build It, They Will Come: Designing Information Systems That People Want to Use.","author":"L.Markus","year":"1994","journal-title":"Sloan Management Review"},{"key":"joeuc.2010100104-37","doi-asserted-by":"publisher","DOI":"10.1016\/1053-4822(91)90011-Z"},{"key":"joeuc.2010100104-38","author":"J. P.Meyer","year":"1997","journal-title":"Commitment in the Workplace: Theory, Research, and Application"},{"key":"joeuc.2010100104-39","doi-asserted-by":"publisher","DOI":"10.1016\/S1053-4822(00)00053-X"},{"key":"joeuc.2010100104-40","doi-asserted-by":"publisher","DOI":"10.1006\/jvbe.2001.1842"},{"key":"joeuc.2010100104-41","author":"L. S.Meyers","year":"2005","journal-title":"Applied Multivariate Research: Design and Interpretation"},{"key":"joeuc.2010100104-42","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"joeuc.2010100104-43","author":"R. T.Mowday","year":"1982","journal-title":"Employee-Organization Linkage - The Psychology of Commitment, Absenteeism, and Turnover"},{"key":"joeuc.2010100104-44","unstructured":"Nielsen-Natratings (2006). A Survey Report on Instant Messaging."},{"key":"joeuc.2010100104-45","author":"M. J.Noru\u0161is","year":"2006","journal-title":"SPSS Base 13.0 Guide to Data Analysis"},{"key":"joeuc.2010100104-46","author":"J. C.Nunnally","year":"1978","journal-title":"Psychometric Theory"},{"key":"joeuc.2010100104-47","unstructured":"Pallant,J.(2007). SPSS Survival Manual: A Step by Step Guide to Data Analysis Using SPSS for Windows (Version 15)."},{"key":"joeuc.2010100104-48","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.4.362"},{"issue":"1","key":"joeuc.2010100104-49","doi-asserted-by":"crossref","first-page":"59","DOI":"10.4018\/joeuc.2004010104","article-title":"The Technology Acceptance Model: A Meta-Analysis of Empirical Findings.","volume":"16","author":"T.Qingxiong Ma","year":"2004","journal-title":"Journal of Organizational and End User Computing"},{"key":"joeuc.2010100104-50","doi-asserted-by":"publisher","DOI":"10.1177\/01466216970212006"},{"key":"joeuc.2010100104-51","author":"E. M.Rogers","year":"1995","journal-title":"Diffusion of Innovations"},{"key":"joeuc.2010100104-52","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6811.1998.tb00177.x"},{"key":"joeuc.2010100104-53","doi-asserted-by":"publisher","DOI":"10.1016\/S0160-791X(02)00062-3"},{"key":"joeuc.2010100104-54","author":"T. B.Sheridan","year":"1992","journal-title":"Telerobotics, Automation, and Human Supervisory Control"},{"key":"joeuc.2010100104-55","unstructured":"SPSS. I. (2006). SPSS 15.0 Base User's Guide. Upper Saddle River, NJ: Prentice Hall."},{"key":"joeuc.2010100104-56","doi-asserted-by":"crossref","first-page":"380","DOI":"10.17705\/1CAIS.01324","article-title":"Validation Guidelilnes of IS Positivist Research.","volume":"13","author":"D. W.Straub","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"key":"joeuc.2010100104-57","doi-asserted-by":"crossref","unstructured":"Szajna, B. (1996). Empirical Evaluation of the Revised Technology Acceptance Model. Management Science, 42(1), 85,88.","DOI":"10.1287\/mnsc.42.1.85"},{"key":"joeuc.2010100104-58","author":"B. G.Tabachnick","year":"2000","journal-title":"Using Multivariate Statistics"},{"key":"joeuc.2010100104-59","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"issue":"3","key":"joeuc.2010100104-60","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User Acceptance Of Information Technology: Toward A Unified View.","volume":"27","author":"V.Venkatesh","year":"2003","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2010100104-61","doi-asserted-by":"publisher","DOI":"10.1016\/0737-6782(92)90006-X"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=46970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:52:50Z","timestamp":1654098770000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/joeuc.2010100104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,10,1]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2010100104","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"value":"1546-2234","type":"print"},{"value":"1546-5012","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,1]]}}}