Modeling usage intention and its antecedents based on information asymmetry theory

Yuan Hui Tsai*, Chieh-Peng Lin, Wen Kung Lin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Much of our prior knowledge of information systems (IS) usage is based on its acceptance or continuance without understanding whether users are likely to use the IS or not. Prior models of IS usage provide a limited understanding of one's intention to use the IS, given that IS usage or continuance does not necessarily suggest the subsequent use of the IS. Even if people use particular IS, there is no guarantee that the users always use the IS. This study proposes an IS usage intention model based on the information asymmetry theory to compliment previous studies that mostly focus on IS usage or continuance without considering the possibility of its use. For IS usage research, this paper proposes one of the earliest usage models of IS. For practitioners, this study provides some guidelines for IS manufacturers on how to derive the most return on their system development efforts with a successfully high usage rate in the market for their newly usage systems.

Original languageEnglish
Title of host publication2011 International Conference on E-Business and E-Government, ICEE2011 - Proceedings
Pages450-453
Number of pages4
DOIs
StatePublished - 21 Jul 2011
Event2nd International Conference on E-Business and E-Government, ICEE 2011 - Shanghai, China
Duration: 6 May 20118 May 2011

Publication series

Name2011 International Conference on E-Business and E-Government, ICEE2011 - Proceedings

Conference

Conference2nd International Conference on E-Business and E-Government, ICEE 2011
Country/TerritoryChina
CityShanghai
Period6/05/118/05/11

Keywords

  • User acceptance of information systems
  • information asymmetry
  • questionnaire surveys
  • usage intention

Fingerprint

Dive into the research topics of 'Modeling usage intention and its antecedents based on information asymmetry theory'. Together they form a unique fingerprint.

Cite this