Abstract
Information systems (IS) should be infused into individuals’ work activities for organizations to extract value from these systems. Studies have identified various factors that impact IS infusion, but few have examined the importance of individuals’ identities and the role of contextual factors. Drawing on identity and status characteristics theories, this study conceptualizes individuals’ material identity as IT identity, and role identity as IS infusion role identity and examines their relationships and effects on IS infusion as well as the role status characteristics play in shaping these relationships. The models were evaluated using survey data collected from enterprise systems users. Findings suggest that individuals’ IT identity shape IS infusion role identity, and together, these identities influence their IS infusion. Additionally, work-related and personal characteristics strengthen the relationships between identities and IS infusion. This study highlights the role of individual’s IT and role identities and status characteristics in fostering IS infusion.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Information systems (IS) implementation research has demonstrated that the most successful IS implementations are those in which users take full advantage of system features (Jasperson et al., 2005). While different reasons may contribute to why IS implementations do not bring about the expected result, a recurrent theme is the fact that these systems are rarely infused into individuals’ work practices. IS infusion behavior is defined as the degree to which an IS application is used by users to its fullest potential within an organization (Saga & Zmud, 1993).
Despite the significance of user IS infusion in realizing benefits from IS implementations, research has not paid enough attention to how an individual’s characteristics in relation to their IS-related roles may shape infusion behaviors. Recent research (Carter, 2012; Dávila & Finkelstein, 2010; Fadel, 2012; Hasan et al., 2016) has argued that IS infusion involves voluntary, exploratory, and proactive behaviors toward IS use, which is distinct from IS adoption behavior because it requires individuals to put in significant adaptation efforts to engage in deep use of IS. This suggests that those who manage to attain IS infusion are likely to identify with an IS through their interactions with technology based on ‘who they are’ as individuals and their IS-related roles in an organization (Carter & Grover, 2015; Hassandoust et al., 2015; Stein et al., 2013). In previous studies, it has been suggested that individuals’ identities are central to understanding IS-related behaviors within professional communities and organizations (Balapour et al., 2019; Carter et al., 2017; Mishra et al., 2012). Identity relates to how a person defines herselfFootnote 1 with unique characteristics and self-concepts, and her claim to perform a role competently within the workplace (Burke, 1991). This study theorizes the relationship between individual identities and performance-related behaviors by examining the influence of IT identity and IS-related role identity on IS infusion behaviors.
The need to examine the impact of individuals’ identities on their IS infusion behaviors can be argued in the following ways. First, previous studies have suggested that psychological factors, particularly those related to identities, are likely to play a stronger role in explaining proactive behaviors such as IS infusion behaviors (Carter & Grover, 2015; Carter et al., 2017; Kim & Gupta, 2014; Saga & Zmud, 1993; Stein et al., 2013). When individuals psychologically depend on an IS, they are more likely to invest time and effort in engaging in proactive behaviors (Thatcher et al., 2010; Wang & Hsieh, 2006). Second, the notion of identities has been used to explain IS use in organizations, including IS assimilation (Leclercq-Vandelannoitte, 2014; Mishra et al., 2012) and ongoing use of information technology (IT) in the workplace (Stein et al., 2013). For example, Mishra et al. (2012) found that physicians’ role identity of a care provider explains their electronic health record system assimilation.
Identity emerges over time as individuals learn the meanings and expectations associated with social categories from others and from self-evaluations (Burke, 2004). As individuals increasingly interact with technology, IT identity, a new form of material identity, reflects the extent to which these individuals identify with an IT. According to identity theories (McCall & Simmons, 1966; Stryker & Burke, 2000), an individual’s identity associated with deep attachment to IT use affects her internalized expectations about competent performance in her work role. In an empirical study, Mishra and colleagues (2012) found that health employees’ reliance and dependence on the implemented IT enabled them to retain and strengthen their autonomy and dominant role identity among physicians. Therefore, employees’ IT identity impacts their role identities and both IT and role identities facilitate employees’ behaviors in an organization.
In addition, to generate further insights, we contextualize the influence of role identity and IT identity as prior research have suggested (Burton-Jones & Gallivan, 2007; Hsieh et al., 2011). Drawing on the intersection of status characteristics theory and identity theory, we also explore the role of personal characteristics (gender, age, education) and work-related characteristics (position or role in an organization, tenure, and former IT experience with business applications) in shaping the relationship between identities and IS infusion.
The above discussion and extant literature suggest that as individuals interact with a specific IS in an organization, these interactions become essential to the sense of who they are as individuals. In the context of IS use, it is likely that IT identity as a form of material identity shapes individuals’ IS infusion behaviors in an organization, through IS infusion role identity. IT identity as an individual’s material identity refers to the sense of who they are in relation to IT and is defined as “the extent to which a person views the use of an IT as integral to his or her sense of self” (Carter & Grover, 2015, p. 938). IS infusion role identity refers to the meanings and expectations of behaviors that a person ascribes to herself in relation to the use of IS to its fullest potential to perform job tasks. As we are studying professionals in a workplace, their personal and work-related context may well play an important role in their sense making. Hence, we seek to answer the research questions: To what extent does individuals’ IT identity shape their IS infusion role identity in the use of IS to its fullest potential within an organization? How important are both individuals’ IT identity and IS infusion role identity to their IS infusion behaviors within an organization? How do personal and work-related characteristics play a role in shaping the relationships between identities and IS infusion?
The rest of the paper is organized as follows. In the next section, we review prior research on IS infusion behaviors, followed by a discussion on IT and role identities and relevant arguments to explain how IT and role identities shape behaviors. We then develop the research models that theorize the influence of IT and IS infusion role identities and contextual characteristics on IS infusion and propose the research hypotheses. Next, we discuss the research methodology and the results. Finally, the paper concludes with a discussion of findings, implications for theory and practice, and the limitations of the study along with opportunities for future research.
2 Literature on IS Infusion
IS infusion is the last stage in the six-stage IS implementation model. The six stages are initiation, adoption, adaptation, acceptance (assimilation), routinization, and infusion (Cooper & Zmud, 1990). From a behavioral perspective, IS infusion is realized when “the IT application is used to its fullest potential” (Cooper & Zmud, 1990, p.125). An individual’s IS infusion behavior has been conceptualized as a single-dimensional construct that reflects IS use at its fullest potential (Cooper & Zmud, 1990; Jones et al., 2002; Karimikia et al., 2020; Maas et al., 2014; O’Connor & O’Reilly, 2018; Sundaram et al., 2007), as well as through three distinct and related ways to achieve IS infusion, namely extended use, integrative use, and emergent use (Fadel, 2012; Kim & Gupta, 2014; Saga & Zmud, 1993). Extended use refers to the use of more features of a system to perform job tasks without considering the interconnectedness of these tasks with others, or new ways of applying the system to accomplish job tasks beyond the prescribed guidelines (Hsieh & Wang, 2007; Hsieh et al., 2011; Saeed & Abdinnour-Helm, 2008; Saga & Zmud, 1993). Integrative use involves “using the technology to establish or enhance flow linkages among a set of work tasks” (Saga & Zmud, 1993, p.80), while emergent use refers to “using the technology in order to accomplish tasks that were not feasible or recognized prior to the application of the technology to the work system” (Saga & Zmud, 1993, p.80), which suggests an innovative way to use IS to support job tasks. Since previous studies (e.g., Kim & Gupta, 2014) have reported that extended use, integrative use, and emergent use are influenced differently by determinants, this study will evaluate IS infusion as a single dimensional construct as well as the three different ways of using an IS to its fullest potential.
Although IS infusion can be studied at an organizational level, this study focuses on individual IS infusion behaviors. A summary of selected individual IS infusion studies is presented in Appendix Table 6. A recent literature review study on IS infusion behaviors identified 85 influencing factors and grouped them into five main categories: organizational, environmental, technological, task-job, and individual factors (Hassandoust et al., 2016). Other recent studies have focused on individual factors such as empowerment, commitment, intrinsic motivations, and other psychological factors, which show the importance of psychological factors in explaining IS infusion (Hasan et al., 2016; Kim & Gupta, 2014). As IT plays an increasingly important role in people’s work lives, it has become intertwined with how individuals view themselves and the actions they take (Carter et al., 2017; Mishra et al., 2012; Stein et al., 2013). In other words, there is a need to look at new theoretical perspectives that can help explain behaviors in the roles individuals occupy in an organization in relation to IT. In this study, we apply identity theoriesFootnote 2 in social psychology to develop a conceptual model to explain IS infusion behaviors in organizations. Next, we discuss identity theories and how IT identity and role identity shape individual behaviors.
Self-concept and identity are key concepts in identity theories. Identity is a set of meanings that defines individuals and guides their behaviors (Burke & Stets, 2009; McCall & Simmons, 1978; Stryker & Burke, 2000). Identities constitute person identity, role identity, and social identity. Recently, Carter and Grover (2015) conceptualized IT identity as a fourth perspective of identity that shapes post-adoption IS use (Carter et al., 2020a, b). Individuals have different identities that relate to the idiosyncratic personal characteristics they possess (e.g., moral, hardworking), the various roles they perform (e.g., mother, professor), and the various social groups they affiliate with (e.g., work groups) (Burke & Stets, 2009). For example, an individual may have an understanding of what is required to be ethical when she thinks about herself as a moral person, and a notion of what it means to be productive when she reflects about herself as an academic professor (Stets & Serpe, 2016). These meanings allow her to define herself in terms of a moral person identity and an academic role identity. Previous studies have used identity theories to demonstrate how identities, internalized and enacted by people, can change their behavior. However, most studies have primarily investigated role identities (Carter & Grover, 2015). Little is known about the part played by individuals’ IT identity in shaping their role identity and in turn, how these identities influence individual behavior, particularly in the IS related context.
Burke's identity theory concentrates on person identity or the set of self-interpretations that defines a person as a unique, identifiable, and distinct entity (Burke, 2004; Burke & Stets, 2009). Research has suggested that person identity operates like a master identity because person identity is constantly activated, high in identity salience, and ranked higher than role and social identity (Burke, 2004; Burke & Stets, 2009). Fundamentally, the meanings of a person’s identity have implications for how that person behaves, and the person’s behavior, in turn, confirms the meanings of the specific identity. Carter and Grover (2015) applied identity theories to develop a new construct, IT identity, which reflects how individuals view the use of an IT as integral to their self-concept through the incorporation of IT capabilities as personal resources. In particular, a strong IT identity means that “use of the [target IT] is integral to my sense of self” (Carter & Grover, 2015, p. 938).
McCall and Simmons’ (1978) role identity theory focuses on the roles individuals occupy in society (e.g., professor, parent, or spouse). A role identity is a set of internalized meanings associated with a role or an individual’s imaginative view of herself when thinking of herself being and acting as an occupant of that position. People have many role identities and the concept of prominence hierarchy is used to organize these identities. Prominence denotes the importance of an identity to an individual. An identity is likely to be high in the prominence hierarchy when individuals “receive support from others for the identity, when they are committed to the identity, and when they receive rewards (both extrinsic and intrinsic) for the identity” (Stets & Serpe, 2013, p. 37). In other words, self-support, social support, commitment, resource investment, external gratifications, and internal gratifications shape identity prominence (McCall & Simmons, 1978). When a role is more prominent, that specific role is accepted as the salient role in the hierarchy. We believe that IS use-related role identityFootnote 3 sits higher in a hierarchy of role identities for some individuals who embrace the meanings of IS use in their self-concept. These individuals are likely to see themselves as being deep users of IS when they think of themselves because they primarily rely on the use of this particular IS to effectively complete their job tasks. Based on these theoretical arguments, we next explain how we apply material identity and role identity as IT identity and IS infusion role identity respectively in this study.
2.1 Conceptualization of IT Identity
To develop an understanding of IS infusion behaviors in an organization, it is important to consider an individual’s interactions and perceived relationships with a particular IS in order to find answers to the question, “Who am I, as an individual, through my use of this technology?” (Carter & Grover, 2015).
IT identity is conceptualized as a higher order construct with three dimensions: dependence, emotional energy, and relatedness. Dependence reflects “a person’s sense of reliance upon an IT” (Carter & Grover, 2015, p. 945). Emotional energy refers to “a person’s enduring feelings of emotional energy and enthusiasm in relation to an IT” (Carter & Grover, 2015, p. 945), while relatedness refers to “the blurring of boundaries between the self and an IT, and manifests as feelings of connectedness with the IT” (Carter & Grover, 2015, p. 945). Affective emotional responses to an IT, a strong sense of connection, and successful experiences with an IT reflect stronger identification with a particular IT.
2.2 Conceptualization of IS Infusion Role Identity
IT identity focuses on self-expansion through exploration and learning until the interaction with IT becomes routinized through the use of a set of IT features. However, as reported in previous studies, some users move from ‘use’ to ‘deep use,’ which requires their commitment and willingness to experiment with IT to extend the frontiers of IT use (Hasan et al., 2016; Kim & Gupta, 2014). These individuals are likely to incorporate the social role of being an IS infuser in an organization into their self-concept. Based on the theoretical argument of role identity, individuals’ IS infusion role identity is likely to form through their self-support, social support, commitment, resource investment, and external and internal gratifications within an organization. Individuals’ self-support regarding IS infusion role identity refers to self-confirming feedback that the infusion behaviors they enact fit their view of infusion role identity. Individuals’ social support regarding IS infusion role identity refers to their belief in colleagues’ perceptions of how they perform as IS infusers and how their colleagues regard their important characteristics as IS infusers. Individuals’ commitment regarding IS infusion role identity refers to how devoted they perceive themselves to be and how committed they are for being the kind of IS infusers that they perceive themselves to be. Individuals’ resource investment regarding IS infusion role identity refers to how much of their working time and energy is devoted to being IS infusers. Individuals’ external gratifications regarding IS infusion role identity refers to their work improvement in performance, speed, productivity, and effectiveness by being IS infusers. Individuals’ internal gratifications regarding IS infusion role identity refers to their positive feeling and enjoyment from being IS infusers.
Next, we present the research models that will be used to evaluate the influence of IT identity and IS infusion role identity on IS infusion behavior and extended use, integrative use, and emergent use.
3 Research Model and Hypotheses
Drawing on identity theories, we present the two proposed research models and discuss the hypothesized relationships between IT identity and IS infusion role identity as well as their importance to IS infusion behavior. The first model conceptualizes three ways of achieving IS infusion namely, extended, integrative, and emergent use behaviors, while the second model uses IS infusion behavior as a single variable. Drawing on the intersection of status characteristics theory and identity theory, we theorize that three personal characteristics (gender, age, education) and three work-related characteristics (position or role in an organization, tenure, and former IT experience with business applications) may play a role in shaping the relationship between identities and IS infusion. These contextual variables are included as moderators in the research models. Figure 1 presents the research models.
3.1 Impact of IT Identity on IS Infusion Role Identity
When individuals have a choice in roles to perform, the meanings attributed to IT use are likely to influence the meanings of their role identities (Burke & Stets, 2009). For example, when a worker identifies her personality with objects associated with her (e.g., technologies), she is more likely to consider those objects to be instrumental in delivering her job tasks with a sense of fulfilment. It is important to recognize that situational context influences the self through shared language and meanings that enable individuals to assume different roles in relation to that specific context (da Costa Netto & Maçada, 2019). Individuals’ IT identity reflects their deep attachment with an object like an IS affects their internalized expectations about competent performance in their work roles that are related to that targeted system usage (McCall & Simmons, 1966; Stryker & Burke, 2000). This is because individuals’ personal characteristics and attachment to an IS is related to the meaning of “who they are” and this meaning influences the meanings of individuals’ role identities in the workplace. In turn, individuals with strong IT identity may choose to claim role identities that align with their IT identity. A study by Mishra et al. (2012) on the care-provision process among physicians found that their reliance and dependence on the implemented IS enabled them to retain and strengthen their autonomy and dominant IS assimilation role identity. Similarly, previous studies have suggested that an individual’s engagement and participation in a digital-based community impacts the formation of the individual’s role identities, as the individual’s identity that is related to a specific IS becomes related to who they are in the roles they perform and the groups they associate with (Carter, 2012; Carter et al., 2017). Therefore, it is expected that individuals’ IS infusion role identity is influenced by their IT identity in the workplace. This leads to the following hypothesis:
-
Hypothesis 1: IT identity is positively associated with IS infusion role identity within an organization.
3.2 Impact of IT Identity on IS Infusion, Extended, Integrative, and Emergent use Behaviors
When individuals mentally depend on a system to do their job tasks, they are more likely to act proactively; that is, they invest time and effort in engaging in proactive behaviors, such as using the system to its fullest potential. A strong IT identity demonstrates identification – the use of the target IT is integral to a person’s sense of self (who I am) (Carter & Grover, 2015). This indicates that, to investigate IS infusion, it is necessary to assess the influence of individuals’ IT identity in relation to the IS that they use on a regular basis. An individual with strong IT identity seeks more information, increases her knowledge about the IT’s features, and finds out how to apply previously unused features to perform different tasks (Esmaeilzadeh, 2021). For example, Stein and colleagues (2013) found that individuals develop their identity in relation to the systems-in-use, which influence their use of these technologies to accomplish job tasks. In another study, Carter (2012) found that IT identity is motivated by individuals’ desire for self-expansion, and IT identity enactment includes exploring features of a technology and using it in novel ways to improve self-efficacy. Esmaeilzadeh (2021) found that a strong IT identity can inspire users of smart devices to explore previously unused features and embedded resources and capabilities that can be utilized for additional health-related tasks. Through perceiving the benefit and impact of the target system, individuals with a strong personal preference and salient IT identity will have more passion, reliance, and enthusiasm toward using the targeted system and are therefore more likely to extend the usage of the targeted system to reach a better outcome (extended use). Furthermore, they may use the target system to reinforce the linkage among related job tasks to improve their task accomplishment (integrative use), or, when confronted with unexpected issues, individuals with a salient IT identity may explore and find innovative ways of using a target IS (emergent use). On this basis, it is expected that there is a positive relationship between individuals’ IT identity and their use of an IS to its fullest potential within an organization. Thus, we hypothesize:
-
Hypothesis 2: IT identity is positively associated with IS infusion behavior within an organization.
-
Hypotheses 2(a-c): IT identity is positively associated with IS extended use, integrative use, and emergent use behaviors within an organization.
3.3 Impact of IS Infusion Role Identity on IS Infusion, Extended, Integrative, and Emergent use Behaviors
Individuals are motivated to use an IS if that system can support them to improve their role identity performance (Armitage & Conner, 1999). Drawing on role identity theory, individuals’ IS infusion role identity indicates their internal expectations regarding the use of an IS to its fullest potential, which subsequently influence them to be proactive in using IS features to perform a number of job tasks, enhance linkages among job tasks, and explore new ways of using IS to support job tasks (Burke & Stets, 2009; McCall & Simmons, 1978; Stryker & Burke, 2000). Mishra et al. (2012, p. 740) argue that a “[p]hysician’s role and social identities together constitute their professional identity.” In their study, they focused on the professional role identity of physicians as care providers and the professional social identity of physicians as part of the extended community of care and reported that these identities influence physicians’ IS use behaviors. As IS plays an increasingly important role in people’s work lives, people’s roles become increasingly inseparable from their interactions with IS (Carter & Grover, 2015). In other words, if an individual receives self-confirming feedback on the fit between her enacted behavior and her view of IS infusion role identity (self-support), and also receives support from others (social support), commits to the use of an IS, invests significant effort, time, and energy (resource investment) when using the IS, receives extrinsic rewards such as a bonus or promotion, and receives intrinsic rewards such as satisfaction and enjoyment from using the IS (external and internal gratifications), then it will likely impact on her role identity prominence and influence her IS infusion behavior. When an individual is committed to the use of an IS, she is more able to appreciate the benefits of IS usage and more likely to engage in using more features of the system (Wang & Hsieh, 2006). She is also better able to interconnect multiple job tasks than those who have weak role identity in relation to IS (Wang et al., 2008), and to show more commitment and competency in the role, therefore expending effort in trying out innovative features of IS. We therefore hypothesize:
-
Hypothesis 3: IS infusion role identity is positively associated with IS infusion behavior within an organization.
-
Hypotheses 3(a-c): IS infusion role identity is positively associated with IS extended use, integrative use, and emergent use behaviors within an organization.
3.4 Contextualization for IS Infusion Behaviors in Organizations
The context in which information systems in general and enterprise systems in particular are deployed can affect system use (Burton-Jones & Gallivan, 2007) and infusion behaviors (Hsieh et al., 2011). Therefore, we should appropriately contextualize the influence of role identity and IT identity, which were initially developed for a broad set of behaviors (Burke & Stets, 2009; McCall & Simmons, 1978; Stets & Serpe, 2016) and information technologies (Carter & Grover, 2015), before using them to understand IS infusion behaviors in organizations. In addition, we do not know enough about the interplay between IT identity and other contextual characteristics such as individual differences (Carter et al., 2020b). By incorporating context into our theory development, we can generate rich theoretical and practical insights (Hong et al., 2014; Johns, 2017).
We consider the guidelines offered by Hong et al. (2014) for incorporating context into the theorizing of IS phenomena. To identify salient contextual factors, we begin with Burton-Jones and Gallivan's (2007) suggestion that researchers should account for elements of IS use, i.e., user, system, and task when building theories of system use. To further specify pertinent contextual variables, we turn to status characteristics theory (Berger et al., 1972) which helps explain how social structures influence the identity verification process whereby individuals actively seek out opportunities aimed at keeping their perceptions of how others view them congruent with their self-view (Burke & Stets, 2009). Different status characteristics (e.g., age, gender, education) are linked with the verification of identities (Burke et al., 2007; Stets & Harrod, 2004; Stryker & Burke, 2000). This is because one’s position in the social structure becomes important in a situation when it is perceived to be relevant to expectations about performance associated with a particular identity. For example, Stets and Harrod (2004) found that high-status individuals have access to resources which help them in their identity verification process. Burke et al. (2007) found that higher status individuals based on gender (males) aid their verification process of leadership identity because women are typically not viewed as competent or provided equal resources compared to men.
Since we study professionals in the workplace, their IT identity and role identity tend to involve a task orientation that requires competence, knowledge and skills needed to do well in their jobs (Stets & Harrod, 2004). Therefore, we theorize that three personal characteristics (gender, age, education) and three work-related characteristics (position or role in an organization, tenure, and former IT experience with business applications) may play a role in shaping the relationship between identities and IS infusion. Gender carries general expectations for competence and skills. In a workplace context, men, due to their highly task-oriented nature, tend to hold high positions on the status characteristic of gender and will find it easier to verify their IT identity and role identity than females (Burke et al., 2007). Therefore, we expect that the relationship between IT identity and IS infusion and between IS infusion role identity and IS infusion will be especially salient for men. Although age as a status characteristic generally designates competence, increased age has been found to be associated with challenges in processing complex stimuli, difficulty with paying attention to information on the job (Venkatesh et al., 2003) and declines in cognition that become impediment to technology use (Carter et al., 2020a). Thus, we expect that the relationship between IT identity and IS infusion and between IS infusion role identity and IS infusion will be stronger for those who are younger. Education is important with the verification of task-oriented identities such as IT identity and role infusion identity. The status characteristic of education indicates that individuals with high education have more knowledge and skills than those low in education (Stets & Harrod, 2004). Therefore, we expect that the influence of IT identity and IS infusion role identity on IS infusion will be moderated by education, such that the effect will be stronger for those with higher education. Individuals’ positions or roles in an organization such as those in customer-oriented or front-line positions may have more opportunities to develop competence in their application of IT to situations and problems that arise on a daily basis. Thus, we expect that the relationship between IT identity and IS infusion and between IS infusion role identity and IS infusion will be especially salient for employees who hold customer-oriented or front-line positions. Finally, tenure and IT experience with business applications in task-oriented identities such as IT identity and IS infusion role identity signify competence, resources, knowledge, and skills. Therefore, we expect that the relationship between IT identity and IS infusion and between IS infusion role identity and IS infusion will be stronger for those with longer tenure and those with more experience with business applications.
It is important to recognize that there is the potential for a three-way interaction between personal and work-related contextual characteristics and identity. This is because several status characteristics (e.g., education, gender, organizational position) may be salient in a given situation. The theory argues that individuals are likely to combine the implications of each of these salient characteristics and their relevance to the task at hand (Berger et al., 1972; Ridgeway & Smith-Lovin, 1999). However, researchers (Dawson & Richter, 2006; Jaccard & Turrisi, 2003) have suggested that a three-way interaction can either be probed empirically or proposed in a hypothesis with a full explanation of the specification of its manifestation (Dawson, 2014). Since there is no definite theoretical reasoning to help us specify the exact form of interaction, we choose to perform post hoc probing on three-way interactions and report the results, if applicable.
Following the guideline offered by Hong et al. (2014) and theoretical arguments supported by empirical evidence from research at the intersection of identity theory and status characteristics theory, we incorporate three personal and work-related contextual characteristics as moderators of the relationships between IS infusion role identity and IS infusion and between IT identity and IS infusion. This approach allows us to explicate the interplay among identity variables and contextual variables and improve the explanatory power of our research models. Therefore, we hypothesize:
-
Hypothesis 4a: Gender moderates the relationship between IT identity and IS infusion behavior, such that the relationship between IT identity and IS infusion behavior will be stronger for men.
-
Hypothesis 4b-d: Gender moderates the relationship between IT identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior such that the relationship between IT identity and these IS use behaviors will be stronger for men.
-
Hypothesis 4e: Gender moderates the relationship between IS infusion role identity and IS infusion behavior, such that the relationship between IS infusion role identity and IS infusion behavior will be stronger for men.
-
Hypothesis 4f-h: Gender moderates the relationship between IS infusion role identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IS infusion role identity and these IS use behaviors will be stronger for men.
-
Hypothesis 5a: Age moderates the relationship between IT identity and IS infusion behavior, such that the relationship between IT identity and IS infusion behavior will be stronger for younger employees.
-
Hypothesis 5b-d: Age moderates the relationship between IT identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IT identity and these IS use behaviors will be stronger for younger employees.
-
Hypothesis 5e: Age moderates the relationship between IS infusion role identity and IS infusion behavior, such that the relationship between IS infusion role identity and IS infusion behavior will be stronger for younger employees.
-
Hypothesis 5f-h: Age moderates the relationship between IS infusion role identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IS infusion role identity and these IS use behaviors will be stronger for younger employees.
-
Hypothesis 6a: Education moderates the relationship between IT identity and IS infusion behavior, such that the relationship between IT identity and IS infusion behavior will be stronger for employees with higher education.
-
Hypothesis 6b-d: Education moderates the relationship between IT identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IT identity and these IS use behaviors will be stronger for employees with higher education.
-
Hypothesis 6e: Education moderates the relationship between IS infusion role identity and IS infusion behavior, such that the relationship between IS infusion role identity and IS infusion behavior will be stronger for employees with higher education.
-
Hypothesis 6f-h: Education moderates the relationship between IS infusion role identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IS infusion role identity and these IS use behaviors will be stronger for employees with higher education.
-
Hypothesis 7a: Organizational position moderates the relationship between IT identity and IS infusion behavior, such that the relationship between IT identity and IS infusion behavior will be stronger for employees with customer-facing positions.
-
Hypothesis 7b-d: Organizational position moderates the relationship between IT identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IT identity and these IS use behaviors will be stronger for employees with customer-facing positions.
-
Hypothesis 7e: Organizational position moderates the relationship between IS infusion role identity and IS infusion behavior, such that the relationship between IS infusion role identity and IS infusion behavior will be stronger for employees with customer-facing positions.
-
Hypothesis 7f-h: Organizational position moderates the relationship between IS infusion role identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IS infusion role identity and these IS use behaviors will be stronger for employees with customer-facing positions.
-
Hypothesis 8a: Job tenure moderates the relationship between IT identity and IS infusion behavior, such that the relationship between IT identity and IS infusion behavior will be stronger for employees with longer tenure.
-
Hypothesis 8b-d: Job tenure moderates the relationship between IT identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IT identity and these IS use behaviors will be stronger for employees with longer tenure.
-
Hypothesis 8e: Job tenure moderates the relationship between IS infusion role identity and IS infusion behavior, such that the relationship between IS infusion role identity and IS infusion behavior will be stronger for employees with longer tenure.
-
Hypothesis 8f-h: Job tenure moderates the relationship between IS infusion role identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IS infusion role identity and these IS use behaviors will be stronger for employees with longer tenure.
-
Hypothesis 9a: IT experience moderates the relationship between IT identity and IS infusion behavior, such that the relationship between IT identity and IS infusion behavior will be stronger for employees with more IT experience.
-
Hypothesis 9b-d: IT experience moderates the relationship between IT identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IT identity and these IS use behaviors will be stronger for employees with more IT experience.
-
Hypothesis 9e: IT experience moderates the relationship between IS infusion role identity and IS infusion behavior, such that the relationship between IS infusion role identity and IS infusion behavior will be stronger for employees with more IT experience.
-
Hypothesis 9f-h: IT experience moderates the relationship between IS infusion role identity and IS extended use behavior, IS integrative use behavior, and IS emergent use behavior, such that the relationship between IS infusion role identity and these IS use behaviors will be stronger for employees with more IT experience.
4 Methodology
This study empirically evaluates the application of the research models amongst enterprise system users in organizations. The population of interest to this research is sales and marketing professionals who have had the experience of using a CRM system (e.g., Salesforce.com, Microsoft Dynamics) for more than one year to complete job tasks in organizations.
4.1 Survey Instrument
We used measurement items that have been validated in previous studies. A seven-point Likert scale (strongly disagree, disagree, slightly disagree, neutral, slightly agree, agree, and strongly agree) was used to measure all of these key constructs. The measurement items are presented in Appendix Table 7.
4.2 Pre-test and Pilot Test
In order to fine-tune the survey, the questionnaire was refined in two stages: pre-test and pilot study (Straub et al., 2004). For the pre-test, five domain experts were approached for their comments on the face validity of the measurement items and the clarity of the questions. Several refinements were then made to improve the flow and structure of the questions according to these experts' feedback. The pilot test was conducted at a company that had used a CRM system for more than three years. Findings of the pilot study from 42 respondents indicated that there were no major difficulties in understanding the questionnaire items and instructions. For this study, indicator reliability of 0.70 or higher was accepted. The measurement item analysis resulted in deleting one item related to external gratifications (EXTG5 with indicator reliability of 0.48) to ensure the construct validity. The elimination of this item follows the guideline that an item can be eliminated only when the indicator’s reliability is low and the elimination of that item causes an increase in composite reliability (CR) (Gefen et al., 2000). In this case, the elimination of EXTG5 increased CR from 0.910 to 0.960. We then assessed the reliability of the remaining items: the Cronbach’s alpha coefficients of all constructs were > 0.7, which met the guideline of Gefen and colleagues (2000). These results showed that the survey items were reliable and valid.
In the field survey, we received 510 responses with 413 responses remaining after removing incomplete responses. The data were collected from employees working in the marketing and sales teams of two major telecommunication companies in New Zealand. The CRM system most used by respondents was Salesforce CRM (68.3%). A summary of the respondents’ demographic information is presented in Table 1.
5 Data Analysis
This research used Partial Least Squares – Structural Equation Modeling (PLS-SEM) through SmartPLS 3.0 software to evaluate the research models from a predictive perspective (Hair et al., 2019). PLS-SEM is an appropriate approach for large complex models with many latent variables (Henseler et al., 2009). This study followed the state-of-the-art guidelines proposed by Hair et al. (2019) to evaluate the measurement and structural models. In order to evaluate the out-of-sample predictive power of the models, the latest principles proposed by Shmueli et al. (2019) were considered.
5.1 Assessment of Measurement Models
The validity and reliability of the measurement models (Models A and B) were assessed through internal consistency reliability, indicator reliability, convergent validity, and discriminant validity of the measurement items (Chin, 2010). In this study, IT identity is considered as a second-order reflective construct, reflecting three distinct but highly correlated dimensions, while IS infusion role identity is modeled as a second-order formative construct with six reflective first-order factors. Overall, internal consistency reliability, indicator reliability, and convergent validity were tested and reported a satisfactory level (Appendix Table 8).
Discriminant validity was assessed based on the newly introduced criterion for establishing discriminant validity in PLS-SEM, known as Heterotrait-Monotrait (HTMT) criterion (Hair et al., 2019). Typically, for conceptually similar constructs, HTMT values above 0.9 would suggest the lack of discriminant validity between the constructs and with respect to conceptually distinct constructs, HTMT values less than 0.85 indicate discriminant validity (Henseler et al., 2009). All the HTMT values in different models were then less than 0.85, implying the establishment of discriminant validity based on HTMT0.85 criterion. Cross-loadings of the items in all models and HTMT0.85 tables are provided in Appendix Tables 9, 10, 11, 12. Correlations from the pooled analysis for both models are reported in Tables 2 and 3.
The item weights were examined for IS infusion role identity, which is a formative construct. Generally, formative constructs have lower absolute values in item loadings compared to reflective constructs (Karimi et al., 2007). This study used the approach suggested by Petter et al. (2007) to assess formative construct validity, which involves testing multicollinearity among the indicators of the formative construct. The formative constructs of IS infusion role identity had weights ranging from 0.11 to 0.45. The VIF ranged from 2.333 to 2.998, which are lower than 3.3, and all were statistically significant with t-statistics from 6.03 to 21.83, p < 0.001 as shown in Appendix Table 13, indicating that multicollinearity is not an issue among formative indicators. In addition, we evaluated the VIF on the interactions between moderators and independent variables. The results showed that all the VIFs ranged from 2.20 to 4.411, which are below the recommended threshold of 5 (Appendix Table 14), indicating that multicollinearity is not a concern in our models.
To reduce the potential for common method bias (CMB), we followed procedural guidelines established in the literature (MacKenzie et al., 2011). Overall, the results supported that CMB was not a significant issue for this study. The implemented procedural and statistical approaches are presented in Appendix Table 15.
5.2 Assessment of Structural Models and Hypothesis Testing
To determine the statistical significance of the path coefficients, we ran the bootstrapping method using the number of samples as 2,000 and the number of cases as 300. Most main relationship hypotheses were supported, and the details of the supported hypotheses are presented in Table 4.
IT identity explains 60% of the variance of IS infusion role identity. Taken together, IT identity and IS infusion role identity explain 69% of the variance in IS infusion behavior. Moreover, IT identity and IS infusion role identity explain 63%, 61%, and 57% of the variances in extended use, integrative use, and emergent use respectively. We discuss these findings in detail in the next section.
In addition to evaluating the magnitude of the R2 values as a criterion of predictive accuracy, we also applied the predictive sample reuse technique (Q2) to evaluate predictive relevance using a blindfolding procedure. The predictive relevance of IS infusion, extended use, integrative use, and emergent use were obtained using a two-stage approach with the values of 0.577, 0.553, 0.509, and 0.420, respectively. These results show that the models have predictive relevance (Chin & Dibbern, 2010).
5.3 Results
Our results show that H1 was supported (path coefficient = 0.779, t-value = 29.703, p-value = 0.000), validating the notion that individuals’ IT identity significantly shapes their IS infusion role identity. The result indicates that individuals’ IT identity (as a set of meanings that individuals attach to the self in relation to a particular IT, and the interactions with that specific IT) affects the extent to which they internalize their self-perceptions about the expectations of using an IS to its fullest potential to perform job tasks (McCall & Simmons, 1966; Stryker & Burke, 2000), thereby supporting their role identity in the IS infusion process.
H2 (path coefficient = 0.409, t-value = 7.601, p-value = 0.000), H2a (path coefficient = 0.470, t-value = 6.845, p-value = 0.000), H2b (path coefficient = 0.321, t-value = 5.977, p-value = 0.000), and H2c (path coefficient = 0.208, t-value = 2.501, p-value = 0.000) were also supported, indicating that individuals’ IT identity shapes their IS infusion behaviors. This is in line with the tenet of identity theories (Burke, 2004; Stryker, 1980) as discussed earlier. In this study, individuals’ IT identity as material identity is guided by their own personal goals, self-interests, and values in relation to IS use rather than expectations or goals of the group or their role in the workplace. The findings of this study suggest that individuals who feel a sense of connectedness, reliance, confidence, and enthusiasm when thinking about themselves in relation to an IT (i.e., strong IT identity) are more motivated to pursue infusion behaviors as well as extended, integrative, or emergent IS use.
When scrutinizing the different aspects of IS infusion, our study’s findings reveal that individuals’ IT identity has a greater impact on extended use than on integrative use and emergent use in the workplace. In other words, individuals who have stronger reliance, dependence, and attachment to the system are more likely to use most features of the system in a deeper manner to do their daily job tasks, as opposed to making innovative and exploratory use of the system.
In addition to the influence of IT identity, we found support for H3 (path coefficient = 0.451, t-value = 8.303, p-value = 0.000), H3a (path coefficient = 0.286, t-value = 4.471, p-value = 0.000), H3b (path coefficient = 0.377, t-value = 6.244, p-value = 0.000), and H3c (path coefficient = 0.478, t-value = 6.013, p-value = 0.000), regarding the influence of IS infusion role identity on IS infusion behaviors. This is in line with findings from Finkelstein and Penner (2004) who examined role identity and organizational citizenship behavior. Our results showed that individuals who personally view the use of an IS to its fullest potential to be an important part of their sense of self are more engaged in IS infusion behavior in the workplace. From a theoretical perspective, individuals who see their IS infusion role identity as being in a higher position in their role identity prominence hierarchy are likely to engage in IS infusion behavior beyond the prescribed or formal guidelines for the use of system features within an organization. When individuals receive strong support from their own self and others on their role identity, as well as commitment, resource investment, and external and internal gratifications in relation to IS use in the workplace, they are likely to be motivated to engage in using more features of an IS or explore the new features of the system in an innovative fashion or reinforce the linkages among multiple job tasks.
The findings show that individuals’ IS infusion role identity has a greater impact on their IS emergent use than on extended and integrative use; that is, these individuals are more engaged in exploring the new features of the system. Thus, individuals with strong IS infusion role identity show more commitment and competency in their role and expend effort in trying out innovative features of an IS. This result is consistent with previous studies that have reported that employees’ IS-related role identities positively influence their IS continuance use behavior in organizations (Farmer et al., 2003; Finkelstein & Penner, 2004).
However, the results of testing hypotheses associated with the influence of contextual characteristics as moderators (gender, age, education, position in organization, tenure, and former IT experience) on the relationships between IT identity and IS infusion, extended, integrative, and emergent use as well as the relationships between IS infusion role identity and IS infusion, extended, integrative, and emergent use, were not all supported. Education is the only personal characteristics that shows significant moderating effects. In particular, H6e is supported (path coefficient = 0.101, t-value = 2.258, p-value = 0.024), suggesting that education moderates the relationship between IS infusion role identity and IS infusion. H6f is supported (path coefficient = 0.112, t-value = 2.589, p-value = 0.010 and H6h is supported (path coefficient = 0.159, t-value = 2.108, p-value = 0.036), indicating that education moderates the relationships between IS infusion role identity and extended use and emergent use respectively. These results suggest that employees with higher education who possess strong IS infusion role identity are endowed with more resources and are more committed to using a CRM system to its fullest potential and more likely to engage in extended and emergent use of these systems. The remaining personal characteristics (i.e., age, gender in H4a-h and H5a-h) had no significant moderator relationships between IT identity, IS infusion role identity and IS infusion, extended use, integrative use, and emergent use behaviors. According to status characteristics theory, age and gender are considered diffuse status characteristics that signify general competencies and may not exert influence in IS infusion behaviors compared to other specific status characteristics (e.g., education, tenure, former IT experience) that are more closely associated with knowledge and skills required to engage in IS infusion (Berger et al., 1972; Stets & Harrod, 2004). The three work-related contextual characteristics have moderating effects on selected relationships between IT identity and IS infusion behaviors and between IS infusion role identity and between IS infusion behaviors. In particular, we found that H7b is supported (path coefficient = 0.193, t-value = 2.836, p-value = 0.005), indicating that an individual’s position in the organization moderates the relationships between IT identity and extended use. H7f is supported (path coefficient = -0.232, t-value = 3.507, p-value = 0.000), and H7h is supported (path coefficient = -0.249, t-value = 2.665, p-value = 0.001), suggesting that organizational position moderates the relationship between IS infusion role identity and extended use and emergent use. These results indicate that employees with more customer-related and front-line team positions (e.g., customer service representative/managers) who embrace strong IT identity and IS infusion role identity are dependent on the CRM systems or are committed to the use of CRM systems for better engagement and greater use of the features of CRM systems. H8d is supported (path coefficient = -0.248, t-value = 2.577, p-value = 0.011). The negative moderating influence of tenure on the relationship between IT identity and emergent use of CRM systems, suggesting that newly joined employees who embrace strong IT identity and IS infusion role identity are more dependent on the CRM systems and are more committed to fully using the systems and trying the new features of these systems. This result contrasts with our hypothesized role of tenure. This may be because those who have longer experience in their positions may develop habits of IT use that lead to fewer attempts at developing deep use of a system (Carter et al., 2020b). Finally, H9f is supported (path coefficient = 0.101, t-value = 2.083, p-value = 0.033), showing a positive moderation effect of former IT experience on the relationship between IS infusion role identity and extended use of CRM systems.
Figure 2 in Appendix shows the interaction diagrams that provide a more nuanced understanding of the interaction of personal and work-related characteristics on the relationships between individual identities and IS infusion.
5.4 Post-hoc Analysis
Due to the non-significant moderating effect of some contextual characteristics on the relationships between IT identity, IS infusion role identity, and IS infusion, extended, integrative, and emergent use behaviors, we further investigated if there are differential impacts of these relationships amongst employees who have different levels of former IT experience and CRM experience. Employees with more IT experience or CRM experience may show a higher level of attachment, dependency, and commitment to engage in IS infusion behaviors compare to employees with less IT and CRM experience.
We conducted a multi-group analysis (MGA) of former IT experience and CRM experience to detect any significant differences in path coefficients of the relationships between IT identity, IS infusion role identity, and IS infusion behaviors. We followed the approaches suggested by Henseler et al. (2009) to assess the variances in population parameters based on the differences in path coefficients and t-values. The parametric test results indicated that there were significant differences in the relationships between IT identity and IS infusion, extended, and integrative use behaviors among employees with more than three years CRM experience and employees with one to three years experience with CRM. The parametric test results also showed that there were significant differences in the relationships between IS infusion role identity and IS infusion, and extended use behaviors among employees with more than three years CRM experience and employees with one to three years experience with CRM. Moreover, the parametric test results indicated that there were significant differences in the relationships between IT identity, IS infusion role identity and IS infusion and extended use behaviors among employees with more former IT experience than employees with less former IT experience. The MGA results are presented in Appendix Table 16.
Moreover, we tested the mediator role of IS infusion role identity between IT identity and IS infusion, extended, integrative, and emergent use behaviors. From the analysis, IS infusion role identity was found to influence IS infusion, extended use, integrative use, and emergent use positively, and also IS infusion role identity was positively influenced by IT identity. In particular, based on Baron and Kenny’s (1986) guidelines, IS infusion role identity partially mediated the relationship between IT identity and extended use, integrative use, and emergent use behaviors. Subsequently, Sobel’s test was used to assess the significance of the mediating relationship, which showed that IS infusion role identity was a significant mediator. The results are presented in Appendix Table 17.
6 Discussion and Implications
In this section, we discuss the theoretical and practical contributions of this study. We highlight the strength of the impact of individuals’ IT identity on their IS infusion role identity and confirm the importance of these identities in explaining IS infusion behaviors. We also acknowledge the limitations of this study and offer avenues for future research.
6.1 Contributions to Research and Practice
This study contributes to both research and practice. Drawing on identity theories, this research offers insights into the role and importance of IT identity and role identity in IS infusion behaviors in organizations. In particular, the findings reveal that individuals’ IT identity as their material identity strongly influences their IS infusion role identity within an IS use context. In this case, individuals who have strong IT identity are likely to choose roles consistent with these meanings to give them more opportunities to interact with the IS that they view as integral to their self-concept.
The study further extends our understanding that individuals’ IT and role identities have different degrees of influence on the three ways that demonstrate IS infusion behaviors. In particular, IT identity has a stronger influence on extended use and integrative use while IS infusion role identity exerts a stronger influence on emergent use. This means that both IT identity and IS infusion role identity play a complementary role in promoting the overall IS infusion behaviors that involve using a number of IS features, new feature exploration, and novel use of IS features. This study therefore finds that individuals’ identities are important drivers of their IS infusion behavior, be it their extended, integrative, or emergent IS use.
In addition, this study also points out that employees’ personal and work-related characteristics play a role in IS infusion behaviors, thus helping to enrich our understanding of employees’ infusion behaviors in an organization. In particular, some of the salient work-related characteristics that strengthen the influence of IT identity and IS infusion role identity on IS infusion behaviors are IT experience in general and CRM experience in particular, and whether employees are in customer-related or front-line roles. Education as a personal characteristic also shapes the influence of IS infusion role identity on IS infusion behaviors.
Methodologically, this study operationalized IT identity and IS infusion role identity as second-order constructs through their sub-dimensions within an organizational context. IT identity was operationalized through three reflective dimensions: dependence, emotional energy, and relatedness. IS infusion role identity was operationalized through six formative determinants: self-support, social support, commitment, resource investment, and external and internal gratifications. Most previous studies have examined the role identity construct as a single-dimensional construct through only a few measurement items (Farmer & Van Dyne, 2010; Farmer et al., 2003). Although both single-dimensional and multi-dimensional constructs are appropriate to measure identity, our study shows that the operationalization of IT identity and IS infusion role identity as multidimensional constructs offers rich understanding of their influence on IS infusion behaviors in an organization. Future research may want to adapt these measurement items to suit their study contexts of IS use in organizations.
Table 5 presents a summary of the unique findings of this study in relation to the current body of knowledge in the literature.
In terms of practice, given the impact of IT identity and IS infusion role identity in IS infusion, extended use, integrative use, and emergent use behaviors, organizations can help to promote individuals’ IT identity and IS infusion role identity by providing them with opportunities to use IT to coordinate among job tasks, and by implementing mechanisms to support and reward individuals’ attempts to explore new features of the system. One possibility to strengthen individuals’ IT identity and motivate them to depend on the target system to do their daily job tasks is to design customized training interventions. These interventions should focus on developing individuals’ understanding of organizational improvement goals and IS investment through their effective and full use of the system.
The analysis revealed that social support and external gratifications have a strong influence on individuals’ role identity in relation to IS use. Therefore, managers should outline their expectation and provide appropriate resources to encourage IS infusion behavior. In addition, organizations should develop strategies and conditions to reassure individuals that their IS infusion behavior is supported and rewarded and thus reinforce individuals’ IS infusion role identity. An organization that values IS infusion behavior should provide opportunities and a working atmosphere in which peers are encouraged to reflect on each other’s IS usage behaviors, talk about their expectations, and discuss their concerns about the system and its impacts on work. Managers should identify those individuals with strong IS infusion role identity and place them in positions in which they can act as super users in order to provide these individuals with enhanced status and opportunity to influence other users.
6.2 Limitations and Future Research
While the findings of this study provide insightful contributions for research and practice, certain limitations should be acknowledged. The methodology adopted, i.e., a cross-sectional survey design and a quantitative approach, may limit the interpretation of the results. With the intertwined nature of the relationship between identity and behavior, future studies should (i) investigate how individuals’ IT identity and IS infusion role identity change over time as they continue to interact with IS; and (ii) establish the cause and effect, while also examining the possible reciprocal causation in the research models longitudinally. Future studies may apply qualitative research methods to provide explanatory insights and underlying meanings regarding how individuals’ IT identity and IS infusion role identity shape their IS infusion behaviors.
It is also plausible that the results may have been impacted by sample selection bias. Future studies may address this point by testing the theoretical models in other systems and contexts. Since individuals can hold many identities simultaneously, future research should further investigate the relationships between IT identity, IS infusion role identity, and other workplace identities (e.g., social identity, professional identity) and IS infusion behaviors.
7 Conclusions
This study applied identity and status characteristics theories to examine IS infusion behaviors among individuals within an organization. The research models and results of this study provide a comprehensive view of the role of individuals’ (i) IT identity and IS infusion role identity, (ii) their personal and work-related characteristics; and (iii) their importance in explaining IS infusion behaviors. Individuals’ emotional energy and high dependence and reliance on IS constitute strong IT identity and notably influence individuals’ role identity in relation to IS infusion, and together, they subsequently shape individuals’ IS infusion behaviors. From a practical point of view, the findings suggest that managers should focus on providing employees with opportunities and programs to nurture their IT identity and IS infusion role identity, which in turn will influence their IS infusion behavior and help organizations to achieve their expected benefits from IS implementations.
Notes
The use of “her/him” and “she/he” is potentially distractive to readers; therefore, this study will use female pronouns throughout the manuscript.
Note that a variety of theories have been used in the IS literature to conceptualize identity. For instance, Stein et al. (2013) built on a socio-technical school of thought to study identities around IT use in organizations. Leclercq-Vandelannoitte (2014) drew on Foucault’s conception of identity to analyze identity and technology relationships in IT assimilation. In this study, we draw on identity theory rooted in structural symbolic interactionism, which argues that an identity is a set of meanings that defines individuals in particular roles or as persons with specific characteristics that differentiate them from others (Stets and Serpe 2013).
For the rest of this paper, the term ‘role identity’ will be used instead of ‘role identity prominence’.
References
Afonso, C. M., Schwarz, A., Roldán, J. L., & Sánchez-Franco, M. J. (2015). EDMS use in local E-government: An analysis of the path from extent of use to overall performance. International Journal of Electronic Government Research (IJEGR), 11(2), 18–34.
Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29(3), 427–459.
Aiken, L. S., West, S. G., & Reno, R. R. (1991). Multiple regression: Testing and interpreting interactions. Sage.
Armitage, C. J., & Conner, M. (1999). Distinguishing perceptions of control from self-efficacy: Predicting consumption of a low-fat diet using the theory of planned behavior 1. Journal of Applied Social Psychology, 29(1), 72–90.
Balapour, A., Reychav, I., Sabherwal, R., & Azuri, J. (2019). Mobile technology identity and self-efficacy: Implications for the adoption of clinically supported mobile health apps. International Journal of Information Management, 49, 58–68.
Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51(6), 1173–1182.
Berger, J., Cohen, B. P., & Zelditch Jr, M. (1972). Status characteristics and social interaction. American Sociological Review, 37(3), 241–255.
Burke, P. J. (1991). Identity processes and social stress. American Sociological Review, 56(6), 836–849.
Burke, P. J. (2004). Identities and social structure: The 2003 Cooley-Mead award address. Social Psychology Quarterly, 67(1), 5–15.
Burke, P. J., & Stets, J. E. (2009). Identity theory. Oxford University Press.
Burke, P. J., Stets, J. E., & Cerven, C. (2007). Gender, legitimation, and identity verification in groups. Social Psychology Quarterly, 70(1), 27–42.
Burton-Jones, A., & Gallivan, M. J. (2007). Toward a deeper understanding of system usage in organizations: A multilevel perspective. MIS Quarterly, 31(4), 657–679.
Carter, M. (2012). Information technology (IT) identity: A conceptualization, proposed measures, and research agenda. Clemson University.
Carter, M., & Grover, V. (2015). Me, my self, and I (T) conceptualizing information technology identity and its implications. MIS Quarterly, 39(4), 931–958.
Carter, M., Petter, S., Grover, V., & Thatcher, J. B. (2020a). Information technology identity: A key determinant of IT feature and exploratory usage. MIS Quarterly, 44(3), 981–1021.
Carter, M., Petter, S., Grover, V., & Thatcher, J. B. (2020b). IT Identity: A measure and empirical investigation of its utility to IS research. Journal of the Association for Information Systems, 21(5), 1313–1342.
Carter, M., Compeau, D., Kennedy, M. I. L., & Schmalz, M. (2017). The content and context of identity in a digital society Association For Information System (AIS). Symposium conducted at the meeting of the European Conference On Information Systems (ECIS), Guimarães, Portugal.
Chin, W. W. (2010). Bootstrap cross-validation indices for PLS path model assessment. Handbook of partial least squares (pp. 83–97). Springer.
Chin, W. W., & Dibbern, J. (2010). An introduction to a permutation based procedure for multi-group PLS analysis: Results of tests of differences on simulated data and a cross cultural analysis of the sourcing of information system services between Germany and the USA. Handbook of partial least squares (pp. 171–193). Springer.
Cooper, R. B., & Zmud, R. W. (1990). Information technology implementation research: A technological diffusion approach. Management Science, 36(2), 123–139.
da Costa Netto, Y. W. E., & Maçada, A. C. G. (2019). The Antecedents of IT identity construction through social media usage.
Dávila, M. C., & Finkelstein, M. A. (2010). Predicting organizational citizenship behavior from the functional analysis and role identity perspectives: Further evidence in Spanish employees. The Spanish Journal of Psychology, 13(1), 277–283.
Dawson, J. F. (2014). Moderation in management research: What, why, when, and how. Journal of Business and Psychology, 29(1), 1–19.
Dawson, J. F., & Richter, A. W. (2006). Probing three-way interactions in moderated multiple regression: Development and application of a slope difference test. Journal of Applied Psychology, 91(4), 917–926.
Donaldson, D. R., & Yakel, E. (2013). Secondary adoption of technology standards: The case of PREMIS. Archival Science, 13(1), 55–83.
Esmaeilzadeh, P. (2021). How IT identity affects individuals’ personal health devices (PHDs) use behaviors? An Empirical Study. Information & Management, 58(1), 1–19.
Fadel, K. J. (2012). User adaptation and infusion of information systems. Journal of Computer Information Systems, 52(3), 1–10.
Farmer, S. M., & Van Dyne, L. (2010). The idealized self and the situated self as predictors of employee work behaviors. Journal of Applied Psychology, 95(3), 503–516.
Farmer, S. M., Tierney, P., & Kung-Mcintyre, K. (2003). Employee creativity in Taiwan: An application of role identity theory. Academy of Management Journal, 46(5), 618–630.
Finkelstein, M. A., & Penner, L. A. (2004). Predicting organizational citizenship behavior: Integrating the functional and role identity approaches. Social Behavior and Personality: An International Journal, 32(4), 383–398.
Gefen, D., Straub, D., & Boudreau, M.-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4(1), 7–84.
Grublješič, T., & Jaklič, J. (2015). Conceptualization of the business intelligence extended use model. Journal of Computer Information Systems, 55(3), 72–82.
Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2–24.
Harman, H. H. (1976). Modern factor analysis. University of Chicago press.
Hasan, H., Linger, H., Kim, H. W., Chan, H. C., & Gupta, S. (2016). Examining information systems infusion from a user commitment perspective. Information Technology & People, 29(1), 173–199.
Hassandoust, F., Techatassanasoontorn, A. A., & Tan, F. B. (2016). Factors influencing the infusion of information systems: A literature review. Pacific Asia Journal of the Association for Information Systems, 8(1), 1–31.
Hassandoust, F., Techatassanasoontorn, A. A., & Tan, F. B. (2015). The impact of individual's identities on the infusion of information systems within organizations Symposium conducted at the meeting of the 2015 European Conference on Information Systems, Munster, Germany.
Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. Emerald Group Publishing Limited.
Hester, A. J. (2011). A comparative analysis of the usage and infusion of wiki and non-wiki-based knowledge management systems. Information Technology and Management, 12(4), 335–355.
Hong, W., Chan, F. K., Thong, J. Y., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136.
Hsieh, J. P. A., & Wang, W. (2007). Explaining employees’ extended use of complex information systems. European Journal of Information Systems, 16(3), 216–227.
Hsieh, J. P. A., Rai, A., & Xu, S. X. (2011). Extracting business value from IT: A sensemaking perspective of post-adoptive use. Management Science, 57(11), 2018–2039.
Jaccard, J., & Turrisi, R. (2003). Interaction effects in multiple regression. Sage.
Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS Quarterly, 29(3), 525–557.
Johns, G. (2017). Reflections on the 2016 decade award: Incorporating context in organizational research. Academy of Management Review, 42(4), 577–595.
Jones, E., Sundaram, S., & Chin, W. (2002). Factors leading to sales force automation use: A longitudinal analysis. Journal of Personal Selling & Sales Management, 22(3), 145–156.
Karimi, J., Somers, T. M., & Bhattacherjee, A. (2007). The role of information systems resources in ERP capability building and business process outcomes. Journal of Management Information Systems, 24(2), 221–260.
Karimikia, H., Safari, N., & Singh, H. (2020). Being useful: How information systems professionals influence the use of information systems in enterprises. Information Systems Frontiers, 22, 429–453.
Ke, W., Tan, C.-H., Sia, C. L., & Wei, K.-K. (2012). Inducing intrinsic motivation to explore the enterprise system: The supremacy of organizational levers. Journal of Management Information Systems, 29(3), 257–290.
Kim, H. W., & Gupta, S. (2014). A user empowerment approach to information systems infusion. IEEE Transactions on Engineering Management, 61(4), 656–668.
Kim, H. W., Chan, H. C., & Lee, S. H. (2012). A user commitment approach to information systems infusion symposium conducted at the meeting of the PACIS.
Kishore, R., & McLean, E. R. (2007). Reconceptualizing innovation compatibility as organizational alignment in secondary IT adoption contexts: An investigation of software reuse infusion. IEEE Transactions on Engineering Management, 54(4), 756–775.
Koo, C., Chung, N., & Kim, H. W. (2015). Examining explorative and exploitative uses of smartphones: a user competence perspective. Information Technology & People.
Leclercq-Vandelannoitte, A. (2014). Interrelationships of identity and technology in IT assimilation. European Journal of Information Systems, 23(1), 51–68.
Li, X., Hsieh, J.P.-A., & Rai, A. (2013). Motivational differences across post-acceptance information system usage behaviors: An investigation in the business intelligence systems context. Information Systems Research, 24(3), 659–682.
Lindell, M. K., & Whitney, D. J. (2001). Accounting for common method variance in cross-sectional research designs. Journal of Applied Psychology, 86(1), 114.
Maas, J. B., van Fenema, P. C., & Soeters, J. (2014). ERP system usage: The role of control and empowerment. New Technology, Work and Employment, 29(1), 88–103.
MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.
Marakhimov, A., & Joo, J. (2017). Consumer adaptation and infusion of wearable devices for healthcare. Computers in Human Behavior, 76, 135–148.
McCall, G. J., & Simmons, J. L. (1966). Identities and interactions. Free Press.
McCall, G. J., & Simmons, L. (1978). Interactions: An examination of human associations in everyday life. Free Press.
McKnight, D. H., Carter, M., Thatcher, J. B., & Clay, P. F. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems (TMIS), 2(2), 1–25.
Mishra, A. N., Anderson, C., Angst, C. M., & Agarwal, R. (2012). Electronic health records assimilation and physician identity evolution: An identity theory perspective. Information Systems Research, 23(3-part-1), 738–760.
Nambisan, S., Agarwal, R., & Tanniru, M. (1999). Organizational mechanisms for enhancing user innovation in information technology. MIS quarterly, 365–395.
O’Connor, Y., & O’Reilly, P. (2018). Examining the infusion of mobile technology by healthcare practitioners in a hospital setting. Information Systems Frontiers, 20(6), 1297–1317.
Pao-Long, C., & Lung, S. S. (2002). Organizational changes for advanced manufacturing technology infusion: An empirical study. International Journal of Management, 19(2), 206.
Petter, S., Straub, D., & Rai, A. (2007). Specifying formative constructs in information systems research. MIS Quarterly, 31(4), 623–656.
Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531–544.
Podsakoff, P. M., MacKenzie, S. B., Lee, J., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
Pongpattrachai, D., Cragg, P., & Fisher, R. (2014). IT infusion within the audit process: Spreadsheet use in small audit firms. International Journal of Accounting Information Systems, 15(1), 26–46.
Reid, S. A. (1999). Augmenting identity theory: toward an empirical measure of role-identity prominence. Kent State University.
Ridgeway, C., & Smith-Lovin, L. (1999). The gender system and interaction. Annual Review of Sociology, 25, 191–216.
Saeed, K. A., & Abdinnour-Helm, S. (2008). Examining the effects of information system characteristics and perceived usefulness on post adoption usage of information systems. Information & Management, 45(6), 376–386.
Saga, V. L., & Zmud, R. W. (1993). The nature and determinants of IT acceptance, routinization, and infusion. Elsevier Science Inc. Symposium conducted at the meeting of the IFIP TC8 Working Conference on Diffusion, Transfer and Implementation of Information Technology, North-Holland, Amsterdam.
Shmueli, G., Sarstedt, M., Hair, J. F., Cheah, J. H., Ting, H., Vaithilingam, S., & Ringle, C. M. (2019). Predictive model assessment in PLS-SEM: Guidelines for using PLSpredict. European Journal of Marketing, 53(1), 2322–2347.
Stein, M.-K., Galliers, R. D., & Markus, M. L. (2013). Towards an understanding of identity and technology in the workplace. Journal of Information Technology, 28(3), 167–182.
Stets, J. E., & Harrod, M. M. (2004). Verification across multiple identities: The role of status. Social Psychology Quarterly, 67(2), 155–171.
Stets, J. E., & Serpe, R. T. (2013). Identity theory. Handbook of social psychology (pp. 31–60). Springer.
Stets, J. E., & Serpe, R. T. (2016). New directions in identity theory and research. Oxford University Press.
Straub, D., Boudreau, M. C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 13(1), 380–429.
Stryker, S. (1980). Symbolic interactionism: A social structural version. Benjamin-Cummings Publishing Company.
Stryker, S., & Burke, P. J. (2000). The past, present, and future of an identity theory. Social Psychology Quarterly, 63(4), 284–297.
Sun, H. (2012). Understanding user revisions when using information system features: Adaptive system use and triggers. MIS Quarterly 36(2), 453–478.
Sundaram, S., Schwarz, A., Jones, E., & Chin, W. W. (2007). Technology use on the front line: How information technology enhances individual performance. Journal of the Academy of Marketing Science, 35(1), 101–112.
Thatcher, J. B., McKnight, D. H., Baker, E. W., Arsal, R. E., & Roberts, N. H. (2010). The role of trust in postadoption IT exploration: An empirical examination of knowledge management systems. IEEE Transactions on Engineering Management, 58(1), 56–70.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Wang, W., Butler, J. E., Hsieh, J. P. A., & Hsu, S. H. (2008). Innovate with complex information technologies: A theoretical model and empirical examination. Journal of Computer Information Systems, 49(1), 27–36.
Wang, W., & Hsieh, J. (2006). Beyond routine: Symbolic adoption, extended use, and emergent use of complex information systems in the mandatory organizational context Symposium conducted at the meeting of the Twenty-seventh International Conference on Information Systems, Milwaukee, Wisconsin.
Funding
Open Access funding enabled and organized by CAUL and its Member Institutions
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of Interest
The authors declare that there are no conflicts of interest that are directly or indirectly related to this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Hassandoust, F., Techatassanasoontorn, A.A. & Tan, F.B. Importance of IT and Role Identities in Information Systems Infusion. Inf Syst Front 26, 333–367 (2024). https://doi.org/10.1007/s10796-023-10378-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-023-10378-6