Abstract
The introduction of new consumer technology is often greeted with declarations that the way people conduct their lives will be changed instantly. In some cases, this might create hype surrounding a specific technology. This article investigates the adoption of hyped technology, a special case that is absent in the adoption literature. The study employs a consumer research perspective, specifically the theory of consumption values (TCV), to understand the underlying motives for adopting the technology. In its original form, TCV entails five values that influence consumer behavior: functional, social, epistemic, emotional and conditional. The values catch the intrinsic and extrinsic motives influencing behavior. Using a qualitative approach that includes three focus groups and 60 one-on-one interviews, the results of the study show that emotional, epistemic and social values influence the adoption of hyped technologies. Contrary to expectations, functional value, which is similar to the widely used information system constructs of perceived usefulness and relative advantage, has little impact on the adoption of technologies that are surrounded with significant hype. Using the findings of the study, this article proposes a model for investigating and understanding the adoption of hyped technologies. This article contributes to the literature by (1) focusing on the phenomenon of hyped technology, (2) introducing TCV, a consumer research-based theoretical framework, to enhance the understanding of technology adoption, and (3) proposing a parsimonious model explaining the adoption of hyped technology.
Similar content being viewed by others
References
Agarwal R (2000) Individual acceptance of information technology. In: Zmud RW (ed) Framing the domains of it management: projecting the future through the past. Pinnaflex Educational Resources, Cincinnati, pp 85–104
Ajzen I (1985) From intentions to actions: a theory of planned behavior. In: Kuhl J, Beckmann J (eds) Action control: from cognition to behavior. Springer, Berlin, pp 11–39
Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50(2):179–211
Al-Gahtani SS, Hubona GS, Wang J (2007) Information technology in Saudi Arabia: culture and the acceptance and use of IT. Inf Manage 44(8):681–691
Alpert F (1994) Innovator buying behavior over time. J Prod Brand Manage 3(2):50–62
Bagozzi RP (2007) The legacy of the technology acceptance model and a proposal for a paradigm shift. J Assoc Inf Syst 8(4):244–254
Barbour RS (2005) Making sense of qualitative research making sense of focus groups. Med Educ 39(7):742–750
Benbasat I, Barki H (2007) Quo vadis, TAM? J Assoc Inf Syst 8(4):212–218
Benbasat I, Zmud RW (1999) Empirical research in information systems: the practice of relevance. MIS Quart 23(1):3–16
Bergeron F, Raymond L, Rivard S, Gara MF (1995) Determinants of EIS use: testing a behavioral model. Decis Support Syst 14(2):131–146
Bhattacherjee A (2001) Understanding information systems continuance: an expectation-confirmation model. MIS Quart 25(3):351–370
Blair DC (2002) Knowledge management: hype, hope, or help? J Am Soc Inf Sci Technol 53(12):1019–1028
Blechar J, Constantiou ID, Damsgaard J (2006) Exploring the influence of reference situations and reference pricing on mobile service user behavior. Eur J Inf Syst 15(3):285–291
Block R (2007, January 9) Live from MacWorld 2007: Steve Jobs keynote. Available at http://www.engadget.com/2007/01/09/live-from-macworld-2007-steve-jobs-keynote. Accessed 15 Sept 2010
Bouwman H, Carlsson C, Molina-Castillo FJ, Walden P (2007) Barriers and drivers in the adoption of current and future mobile services in Finland. Telemat Inf 24(2):145–160
Bouwman H, van de Wijngaert L (2009) Coppers context, and conjoints: a reassessment of TAM. J Inf Technol 24(2):186–201
Charmaz K (2006) Constructing grounded theory. SAGE, London
Choudrie J, Dwivedi YK (2006) Investigating factors influencing adoption of broadband in the household. J Comput Inf Syst 46(4):25–34
Cloete M, Snyman R (2003) The enterprise portal: is it knowledge management? Aslib Proc 55(4):234–242
Davenport TH, Markus ML (1999) Rigor vs. relevance revisited: response to Benbasat and Zmud. MIS Quart 23(1):19–23
Davenport TH, Stoddard DB (1994) Reengineering: business change of mythic proportions. MIS Quart 18(2):121–127
Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart 13(3):319–340
Dickinger A, Arami M, Meyer D (2008) The role of perceived enjoyment and social norm in the adoption of technology with network externalities. Eur J Inf Syst 17(1):4–11
Dinev T, Qing H (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. J Assoc Inf Syst 8(7):386–408
Dishaw MT, Strong DM (1999) Extending the technology acceptance model with task-technology fit constructs. Inf Manage 36(1):9–21
Eckhardt A, Laumer S, Weitzel T (2009) Who influences whom? Analyzing workplace referents’ social influence on it adoption and non-adoption. J Inf Technol 24(1):11–24
Edwards C, Peppard JW (1994) Business process redesign: hype, hope or hypocrisy. J Inf Technol 9(4):251–266
Fang XW, Chan S, Brzezinski J, Xu S (2003) Moderating effects of task type on wireless technology acceptance. In: Proceedings of the 2nd pre-ICIS workshop on HCI research in MIS, Seattle, WA, pp 123–157
Fedorowicz J, Gogan JL (2010) Reinvention of interorganizational systems: a case analysis of the diffusion of a bio-terror surveillance system. Inf Syst Front 12(1):81–95
Fishbein M, Ajzen I (1975) Belief, intention, and behavior: an introduction to theory and research. Addison-Wesley, Reading
Gill TG (1995) Early expert-systems: where are they now. MIS Quart 19(1):51–81
Glaser BG (1978) Theoretical sensitivity. Sociology Press, Mill Valley
Goodhue DL (1995) Understanding user evaluations of information systems. Manage Sci 41(12):1827–1844
Guest G, MacQueen KM (2008) Handbook of team-based qualitative research. AltaMira, Lanham
Hedman J, Kalling T (2003) The business model concept: theoretical underpinnings and empirical illustrations. Eur J Inf Syst 12(1):49–59
Hirschman EC, Holbrook MB (1982) Hedonic consumption: emerging concepts, methods and propositions. J Mark 46(3):92–101
Ho SH, Ko YY (2008) Effects of self-service technology on customer value and customer readiness: the case of Internet banking. Internet Res 18(4):427–446
Holbrook MB (2005) Customer value and autoethnography: subjective personal introspection and the meanings of a photograph collection. J Bus Res 58(1):45–61
Holbrook MB (2006) Consumption experience, customer value, and subjective personal introspection: an illustrative photographic essay. J Bus Res 59(6):714–725
Holbrook MB, Hirschman EC (1982) The experiential aspects of consumption: consumer fantasies, feelings, and fun. J Consum Res 9(2):132–140
Hong SJ, Thong JYL, Moon JY, Tam KY (2008) Understanding the behavior of mobile data services consumers. Inf Syst Front 10(4):431–445
Hsieh JJP, Rai A, Keil M (2008) Understanding digital inequality: comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. MIS Quart 32(1):97–126
Hsu CL, Lin JCC (2008) Acceptance of blog usage: the roles of technology acceptance, social influence and knowledge sharing motivation. Inf Manage 45(1):65–74
Jiang P (2009) Consumer adoption of mobile Internet services: an exploratory study. J Promot Manage 15(3):418–454
Kauffman RJ, Techatassanasoontorn AA (2009) Understanding early diffusion of digital wireless phones. Telecommun Policy 33(8):432–450
Khalifa M, Shen KN (2008) Drivers for the transactional B2C m-commerce adoption: extended theory of planned behavior. J Comput Inf Syst 48(3):111–117
Kim H, Lee I, Kim J (2008) Maintaining continuers vs. converting discontinuers: relative importance of post-adoption factors for mobile data services. Int J Mob Commun 6(1):108–132
Kim HW, Chan HC, Gupta S (2007) Value-based adoption of mobile Internet, an empirical investigation. Decis Supp Syst 43(1):111–126
King WR (1999) Integrating knowledge management into IS strategy. Inf Syst Manage 16(4):70–72
Kitzinger J (1995) Qualitative research: introducing focus groups. Brit Med J 311(7000):299–302
Klein HK, Myers MD (1999) A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quart 23(1):67–93
Krueger RA, Casey MA (2000) Focus groups: a practical guide for applied research. Sage, Thousand Oaks
Lee AS (1999) Rigor and relevance in MIS research: beyond the approach of positivism alone. MIS Quart 23(1):29–33
Lee CC, Cheng HK, Cheng HH (2007) An empirical study of mobile commerce in insurance industry: task-technology fit and individual differences. Decis Supp Syst 43(1):95–110
Lee Y, Kozar KA, Larsen KRT (2003) The technology acceptance model: past, present, and future. Commun AIS 12(50):752–780
Lin CA, Jeffres LW (1998) Factors influencing the adoption of multimedia cable technology. J Mass Commun Quart 75(2):341–352
Lopez-Nicolas C, Molina-Castillo FJ, Bouwman H (2008) An assessment of advanced mobile services acceptance: contributions from tam and diffusion theory models. Inf Manage 45(6):359–364
Lu J, Liu C, Yu CS, Wang KL (2008) Determinants of accepting wireless mobile data services in China. Inf Manage 45(1):52–64
Lyytinen K, Damsgaard J (2001) What’s wrong with the diffusion of innovation theory? In: Ardis MA, Marcolin BL (eds) Proceedings of the fourth working conference on diffusing software product and process innovations. Kluwer, Norwell, pp 173–189
Magni M, Taylor MS, Venkatesh V (2010) To play or not to play: a cross-temporal investigation using hedonic and instrumental perspectives to explain user intentions to explore a technology. Int J Hum–Comput Stud 68(9):572–588
Mathieson K, Keil M (1998) Beyond the interface: ease of use and task/technology fit. Inf Manage 34(4):221–230
Mathwick C, Malhotra N, Rigdon E (2001) Experiential value: conceptualization, measurement and application in the catalog and Internet shopping environment. J Retail 77(1):39–56
McMaster T, Wastell D (2005) Diffusion or delusion? Challenging an IS research tradition. Inf Technol People 18(4):383–404
Moody DL (2000) Building links between is research and professional practice: improving the relevance an impact of IS research. In: Proceedings of the 21st international conference on information systems, Brisbane, Australia, pp 351–360
Moore GC, Benbasat I (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation. Inf Syst Res 2(3):192–222
Morgan DL (1997) Focus groups as qualitative research. Sage, Thousand Oaks
Orlikowski WJ, Baroudi JJ (1991) Studying information technology in organizations: research approaches and assumptions. Inf Syst Res 2(1):1–28
Ramayah T, Rouibah K, Gopi M, Rangel GJ (2009) A decomposed theory of reasoned action to explain intention to use internet stock trading among Malaysian investors. Comput Hum Behav 25(6):1222–1230
Rogers EM (1962) Diffusion of innovations. The Free Press, New York
Rogers EM (1995) Diffusion of innovations. The Free Press, New York
Rosemann M, Vessey I (2008) Toward improving the relevance of information systems research to practice: the role of applicability checks. MIS Quart 32(1):1–22
Saldaña J (2009) The coding manual for qualitative researchers. Sage, Thousand Oaks
Sheth JN (1979) The surpluses and shortages in consumer behavior theory and research. J Acad Mark Sci 7(4):414–427
Sheth JN, Newman BI, Gross BL (1991) Consumption values and market choices: theory and applications. South-Western Publishing Co., Cincinnati
Sheth JN, Newman BI, Gross BL (1991) Why we buy what we buy: a theory of consumption values. J Bus Res 22(2):159–170
Sledgianowski D, Kulviwat S (2009) Using social network sites: the effects of playfulness, critical mass and trust in a hedonic context. J Comput Inf Syst 49(4):74–83
Spaulding TJ (2010) How can virtual communities create value for business? Electron Comm Res Appl 9(1):38–49
Strader TJ, Shaw MJ (1997) Characteristics of electronic markets. Decis Supp Syst 21(3):185–198
Turel O, Serenko A, Bontis N (2009) User acceptance of hedonic digital artifacts: a theory of consumption values perspective. Inf Manage 47(1):53–59
Uzoka DME (2008) Organisational influences on e-commerce adoption in a developing country context using UTAUT. Int J Bus Inf Syst 3(3):300–316
Van der Heijden H (2004) User acceptance of hedonic information systems. MIS Quart 28(4):695–704
Venkatesh V, Brown SA (2001) A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MIS Quart 25(1):71–102
Venkatesh V, Davis FD, Morris MG (2007) Dead or alive? The development, trajectory and future of technology adoption research. J Assoc Inf Syst 8(4):268–286
Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quart 27(3):425–478
Volkoff O, Strong DM, Elmes MB (2005) Understanding enterprise systems-enabled integration. Eur J Inf Syst 14(2):110–120
Wakefield RL, Whitten D (2006) Mobile computing, a user study on hedonic/utilitarian mobile device usage. Eur J Inf Syst 15(3):292–300
Walsham G (2006) Doing interpretive research. Eur J Inf Syst 15(3):320–330
Warwick C, Pritchard E (2000) ‘Hyped’ text markup language: XML and the future of Web markup. Aslib Proc 52(5):174–184
Yoon C, Kim S (2007) Convenience and TAM in a ubiquitous computing environment: the case of wireless LAN. Electron Comm Res Appl 6(1):102–112
Zhang J, Mao E (2008) Understanding the acceptance of mobile SMS advertising among young Chinese consumers. Psychol Mark 25(8):787–805
Acknowledgments
This work was in part supported by the DREAMS project via a grant from the Danish Agency of Science and Technology (grant number 2106-04-0007) and by Copenhagen Business School. We also thank the reviewers and special issue editors for their constructive comments and the field study participants for their involvement.
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors contributed equally. This article is forthcoming in Information Technology and Management, in a guest-edited special issue by Robert J. Kauffman and Angsana A. Techatassanasoontorn.
Appendix 1: Focus group script
Appendix 1: Focus group script
-
1.
Could everyone take 1 min or so and let me know what they think of the study thus far?
-
2.
I want to know about what values/motives/reasons are important to you when deciding to use a mobile device or to use a new feature on it? What is important to you? What characteristics give it value?
-
3.
There are five specific types of values I’d like to explore. The first is functional value. What makes a smart phone useful to you?
-
4.
What make a smart phone useful and valuable to you socially?
-
5.
What kinds of emotions are satisfied or aroused by having and using a smart phone?
-
6.
How is a smart phone useful to you to get knowledge, arouse curiosity, or to aid in some kind of learning?
-
7.
Are there certain situations in which a smart phone gains value that it usually doesn’t have? What are specific situations that make a smart phone more useful (or less useful) than an alternative…? An alternative could be a regular mobile phone, a laptop computer, or anything else you might want to compare it to.
-
8.
Look at the five values you’ve written down. Rank them in order from 1 to 5, with 1 being the most important. Write it down.
Are there any other important values that we should have discussed but didn’t?
Rights and permissions
About this article
Cite this article
Hedman, J., Gimpel, G. The adoption of hyped technologies: a qualitative study. Inf Technol Manag 11, 161–175 (2010). https://doi.org/10.1007/s10799-010-0075-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10799-010-0075-0