{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T08:10:03Z","timestamp":1746259803188,"version":"3.40.4"},"reference-count":96,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1,1]]},"abstract":"<p>Prior research has shown that proximal states are important mechanisms through which distal states relate to IT usage. In particular, the influence of distal traits tied to social activity has not been incorporated into the nomological network surrounding information technology (IT) use. Addressing this literature gap, the authors develop their research model using Social Cognitive Theory and examine how two distal traits, social aversion (SA) and institution-based trust (TRIT), influence computer self-efficacy (CSE) and other proximal state-like differences related to IT use. The authors' results show that SA and TRIT demonstrated influence on CSE and CA at the general and specific levels of analysis, and that CSE mediates the influence of SA and TRIT on PU and PEOU, yet does not fully mediate the influence of CA on PU and PEOU. The implications of their findings for research and practice are discussed, as well as avenues for future research.<\/p>","DOI":"10.4018\/joeuc.2014010101","type":"journal-article","created":{"date-parts":[[2014,6,6]],"date-time":"2014-06-06T13:35:47Z","timestamp":1402061747000},"page":"1-26","source":"Crossref","is-referenced-by-count":3,"title":["The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use"],"prefix":"10.4018","volume":"26","author":[{"given":"Elizabeth White","family":"Baker","sequence":"first","affiliation":[{"name":"Cameron School of Business, University of North Carolina - Wilmington, Wilmington, NC, USA"}]},{"given":"Jason Bennett","family":"Thatcher","sequence":"additional","affiliation":[{"name":"College of Business and Behavioral Science, Clemson University, Clemson, SC, USA"}]},{"given":"Michael","family":"Gundlach","sequence":"additional","affiliation":[{"name":"College of Business, California State University, Chico, CA, USA"}]},{"given":"D. Harrison","family":"McKnight","sequence":"additional","affiliation":[{"name":"Eli Broad College of Business, Michigan State University, East Lansing, MI, USA"}]}],"member":"2432","reference":[{"key":"joeuc.2014010101-0","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"joeuc.2014010101-1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.204"},{"key":"joeuc.2014010101-2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(97)00006-7"},{"key":"joeuc.2014010101-3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1999.tb01614.x"},{"key":"joeuc.2014010101-4","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.418.11876"},{"key":"joeuc.2014010101-5","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"joeuc.2014010101-6","doi-asserted-by":"crossref","first-page":"661","DOI":"10.17705\/1jais.00208","article-title":"The adoption and use of IT artifacts: A new interaction-centric model for the study of user-artifact relationships.","volume":"10","author":"S.Al-Natour","year":"2009","journal-title":"Journal of the Association for Information Systems"},{"key":"joeuc.2014010101-7","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1080\/08874417.2003.11647533","article-title":"Is trust important in technology adoption? A policy capturing approach.","volume":"43","author":"T.Bahmanziari","year":"2003","journal-title":"Journal of Computer Information Systems"},{"key":"joeuc.2014010101-8","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"joeuc.2014010101-9","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/0146-6402(78)90012-7","article-title":"Reflections on self-efficacy","author":"A.Bandura","year":"1978","journal-title":"Advances in behavior research and therapy"},{"journal-title":"Social foundations of thought and action: A social cognitive theory","year":"1986","author":"A.Bandura","key":"joeuc.2014010101-10"},{"key":"joeuc.2014010101-11","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-2792-6_2"},{"journal-title":"Self-efficacy: The exercise of control","year":"1997","author":"A.Bandura","key":"joeuc.2014010101-12"},{"key":"joeuc.2014010101-13","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0277"},{"key":"joeuc.2014010101-14","first-page":"285","article-title":"The partial least squares (PLS) approach to causal modeling personal computer adoption and use as an illustration.","volume":"2","author":"D.Barclay","year":"1995","journal-title":"Technology Studies"},{"key":"joeuc.2014010101-15","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"joeuc.2014010101-16","doi-asserted-by":"crossref","first-page":"689","DOI":"10.2307\/25750701","article-title":"The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use.","volume":"34","author":"A.Beaudry","year":"2010","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2014010101-17","doi-asserted-by":"crossref","first-page":"81","DOI":"10.17705\/1jais.00046","article-title":"Who\u2019s afraid of the virtual world? The role of anxiety in computer mediated communication use and satisfaction.","volume":"5","author":"S. A.Brown","year":"2004","journal-title":"Journal of the Association for Information Systems"},{"key":"joeuc.2014010101-18","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0096"},{"key":"joeuc.2014010101-19","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.85.6.835"},{"key":"joeuc.2014010101-20","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","author":"W. W.Chin","year":"1998","journal-title":"Modern methods for business research"},{"key":"joeuc.2014010101-21","unstructured":"Chircu, A. M., Davis, G. B., & Kauffman, R. J. (2000). Trust, expertise, and e-commerce intermediary adoption. In Proceedings of Presented at the Americas Conference on Information Systems, Association for Information Systems (AMCIS), Long Beach, CA (pp. 710\u2013716)."},{"key":"joeuc.2014010101-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.003"},{"key":"joeuc.2014010101-23","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1989.65.3.735"},{"key":"joeuc.2014010101-24","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.118"},{"key":"joeuc.2014010101-25","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"joeuc.2014010101-26","doi-asserted-by":"publisher","DOI":"10.2307\/249749"},{"journal-title":"Quasi-experimentation: Design and analysis issues for field settings","year":"1979","author":"T. D.Cook","key":"joeuc.2014010101-27"},{"key":"joeuc.2014010101-28","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1979.44.3.959"},{"key":"joeuc.2014010101-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2004.12.002"},{"key":"joeuc.2014010101-30","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"joeuc.2014010101-31","first-page":"95","article-title":"An empirical investigation into the relationship between computer self-efficacy, anxiety, experience, support and usage.","volume":"44","author":"M. H.Fagan","year":"2004","journal-title":"Journal of Computer Information Systems"},{"journal-title":"Belief, attitude, intention and behavior: An introduction to theory and research","year":"1975","author":"M.Fishbein","key":"joeuc.2014010101-32"},{"key":"joeuc.2014010101-33","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"joeuc.2014010101-34","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","article-title":"Trust and TAM in online shopping: An integrated model.","volume":"27","author":"D.Gefen","year":"2003","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2014010101-35","first-page":"205","article-title":"Should institutional trust matter in information systems research?","volume":"17","author":"D.Gefen","year":"2006","journal-title":"Communications of the AIS"},{"key":"joeuc.2014010101-36","doi-asserted-by":"crossref","first-page":"183","DOI":"10.5465\/amr.1992.4279530","article-title":"Self-efficacy: A theoretical analysis of its determinants and malleability.","volume":"17","author":"M. E.Gist","year":"1992","journal-title":"Academy of Management Review"},{"key":"joeuc.2014010101-37","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.74.6.884"},{"key":"joeuc.2014010101-38","article-title":"An investigation of the appropriation of technology-Mediated training methods incorporating enactive and collaborative learning.","author":"S.Gupta","year":"2012","journal-title":"Information Systems Research"},{"key":"joeuc.2014010101-39","doi-asserted-by":"crossref","first-page":"544","DOI":"10.17705\/1jais.00168","article-title":"Clarifying the use of formative measurement in the IS discipline: The case of computer self-efficacy.","volume":"9","author":"A.Hardin","year":"2008","journal-title":"Journal of the Association for Information Systems"},{"key":"joeuc.2014010101-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2005.11.005"},{"key":"joeuc.2014010101-41","doi-asserted-by":"publisher","DOI":"10.1016\/0747-5632(87)90010-0"},{"key":"joeuc.2014010101-42","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0256"},{"key":"joeuc.2014010101-43","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.17"},{"key":"joeuc.2014010101-44","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(95)00035-6"},{"key":"joeuc.2014010101-45","doi-asserted-by":"publisher","DOI":"10.1177\/014920638901500302"},{"key":"joeuc.2014010101-46","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1979.tb02154.x"},{"key":"joeuc.2014010101-47","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2011.536115"},{"key":"joeuc.2014010101-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.02.008"},{"key":"joeuc.2014010101-49","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.402.11869"},{"key":"joeuc.2014010101-50","doi-asserted-by":"publisher","DOI":"10.1007\/BF01173005"},{"key":"joeuc.2014010101-51","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00269.x"},{"key":"joeuc.2014010101-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.05.003"},{"key":"joeuc.2014010101-53","doi-asserted-by":"publisher","DOI":"10.1007\/BF02497085"},{"key":"joeuc.2014010101-54","doi-asserted-by":"crossref","first-page":"197","DOI":"10.2307\/30036529","article-title":"Reconceptualizing users as social actors in IS research.","volume":"27","author":"R.Lamb","year":"2003","journal-title":"Management Information Systems Quarterly"},{"journal-title":"Social anxiety","year":"1995","author":"M. R.Leary","key":"joeuc.2014010101-55"},{"key":"joeuc.2014010101-56","first-page":"167","article-title":"Self-report assessment of anxiety: Somatic, cognitive, and behavioral modalities.","volume":"4","author":"P. M.Lehrer","year":"1982","journal-title":"Behavioral Assessment"},{"key":"joeuc.2014010101-57","doi-asserted-by":"crossref","first-page":"414","DOI":"10.17705\/1jais.00235","article-title":"Understanding the influence of team climate on IT use.","volume":"11","author":"H.Liang","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"key":"joeuc.2014010101-58","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1159\/000414022","article-title":"Social phobia.","volume":"22","author":"M. R.Liebowitz","year":"1987","journal-title":"Modern Problems of Pharmacopsychiatry"},{"key":"joeuc.2014010101-59","article-title":"Generalizing from laboratory to field ecological validity or abstraction of essential elements?","author":"E. A.Locke","year":"1986","journal-title":"Generalizing from laboratory to field settings: Research findings from industrial-organizational psychology, organizational behavior, and human resource management"},{"key":"joeuc.2014010101-60","doi-asserted-by":"crossref","unstructured":"Marakas, G. M., Johnson, R. D., & Clay, P. F. (2007). The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability, and stability over time. Journal of Association of Information Systems, 8, Article 2.","DOI":"10.17705\/1jais.00112"},{"key":"joeuc.2014010101-61","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0348"},{"key":"joeuc.2014010101-62","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.126"},{"journal-title":"Dying of embarrassment: Help for social anxiety and phobia","year":"1992","author":"B.Markway","key":"joeuc.2014010101-63"},{"key":"joeuc.2014010101-64","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-7967(97)10031-6"},{"key":"joeuc.2014010101-65","doi-asserted-by":"crossref","first-page":"809","DOI":"10.2307\/25148821","article-title":"Dispositional factors in internet use: Personality versus cognitive style.","volume":"31","author":"J. C.McElroy","year":"2007","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2014010101-66","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"joeuc.2014010101-67","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(01)00276-4"},{"key":"joeuc.2014010101-68","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1986.59.3.1199"},{"key":"joeuc.2014010101-69","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","article-title":"Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model.","volume":"7","author":"P.Pavlou","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"key":"joeuc.2014010101-70","first-page":"24","article-title":"Comorbidity, neurobiology, and pharmacotherapy of social anxiety disorder.","volume":"62","author":"M. H.Pollack","year":"2001","journal-title":"The Journal of Clinical Psychiatry"},{"key":"joeuc.2014010101-71","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.40"},{"key":"joeuc.2014010101-72","doi-asserted-by":"publisher","DOI":"10.1080\/03033910.1995.10558044"},{"key":"joeuc.2014010101-73","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.10.003"},{"key":"joeuc.2014010101-74","first-page":"243","article-title":"Investigating computer anxiety in an academic library.","volume":"7","author":"M.Sievert","year":"1988","journal-title":"Information Technology and Libraries"},{"key":"joeuc.2014010101-75","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1995.1051"},{"journal-title":"STAI manual for the state-trait anxiety inventory","year":"1970","author":"C. D.Spielberger","key":"joeuc.2014010101-76"},{"key":"joeuc.2014010101-77","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.04.005"},{"key":"joeuc.2014010101-78","first-page":"359","article-title":"Citizen trust development for e-government adoption and usage: Insights from young adults in Singapore.","volume":"25","author":"S.Srivastava","year":"2009","journal-title":"Communications of the AIS"},{"key":"joeuc.2014010101-79","first-page":"185","article-title":"Unmasking social anxiety disorder.","volume":"26","author":"M. B.Stein","year":"2001","journal-title":"Journal of Psychiatry & Neuroscience"},{"key":"joeuc.2014010101-80","doi-asserted-by":"publisher","DOI":"10.2307\/248922"},{"key":"joeuc.2014010101-81","doi-asserted-by":"crossref","first-page":"182","DOI":"10.17705\/1jais.00226","article-title":"Sellers\u2019 trust and continued use of online marketplaces.","volume":"11","author":"H.Sun","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"journal-title":"Using multivariate statistics","year":"1996","author":"B. G.Tabachnick","key":"joeuc.2014010101-82"},{"key":"joeuc.2014010101-83","first-page":"681","article-title":"Structures of mood and personality and their relevance to assessing anxiety with an emphasis on self-report","author":"A.Tellegen","year":"1985","journal-title":"Anxiety and anxiety disorders"},{"key":"joeuc.2014010101-84","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.11.007"},{"key":"joeuc.2014010101-85","first-page":"353","article-title":"The role of trust in post-adoption IT exploration: An empirical examination of knowledge management systems.","volume":"57","author":"J. B.Thatcher","year":"2010","journal-title":"IEEE Transactions on Engineering Management"},{"key":"joeuc.2014010101-86","doi-asserted-by":"publisher","DOI":"10.2307\/4132314"},{"key":"joeuc.2014010101-87","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.02.001"},{"key":"joeuc.2014010101-88","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240403"},{"key":"joeuc.2014010101-89","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1996.tb01822.x"},{"key":"joeuc.2014010101-90","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view.","volume":"27","author":"V.Venkatesh","year":"2003","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2014010101-91","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2002.tb01646.x"},{"key":"joeuc.2014010101-92","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1080\/08874417.2003.11647085","article-title":"Investigating computer anxiety and communications apprehension as performance antecedents in a computing-intensive learning environment.","volume":"43","author":"C.Vician","year":"2002","journal-title":"Journal of Computer Information Systems"},{"key":"joeuc.2014010101-93","first-page":"20","article-title":"The nature of social anxiety disorder.","volume":"59","author":"H. G. M.Westenberg","year":"1998","journal-title":"The Journal of Clinical Psychiatry"},{"key":"joeuc.2014010101-94","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5414.2006.00132.x"},{"key":"joeuc.2014010101-95","first-page":"52","article-title":"How individual differences influence technology usage behavior: Toward an integrated model.","volume":"46","author":"Y. D.Yi","year":"2005","journal-title":"Journal of Computer Information Systems"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=108827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T07:39:11Z","timestamp":1746257951000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/joeuc.2014010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":96,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2014010101","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"type":"print","value":"1546-2234"},{"type":"electronic","value":"1546-5012"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}