Intention to use mobile applications in competitive intelligence: An extended conceptual framework
DOI:
https://doi.org/10.37380/jisib.v11i2.701Keywords:
Behavioural intention, competitive intelligence, mobile applications, mobile apps, unified theory of acceptance and use of technology, use behaviour, UTAUT, UTAUT2Abstract
This article aims at identifying the key antecedents to behavioral intention and use behavior of individuals regarding mobile applications that can support competitive intelligence of firms. Attention was given to perspective antecedents in behavioural intention and use behaviour of mobile applications in competitive intelligence. A qualitative research based on a literature review of 21 peer-reviewed journal articles covering a period of six years from 2014 was used. These articles were collected from separate databases using search engines. All UTAUT2 constructs had a direct and significant influence on mobile application use. Following significance factors were ease of use, perceived usefulness, perceived enjoyment, and trust. However, perceived risk, subjective norms, and self-efficacy were insignificant. An extended model was later developed with 15 constructs. This article highlights the key determinants of user behavior regarding mobile applications that firms should act on in order to foster the acceptance of these technologies despite the privacy risks that arise. Previous research has largely ignored the influence of perceptive antecedents in the behavioural intention and use behaviour of mobile applications in competitive intelligence. This article covers this gap by drawing attention to the cognitive psychological perspective of the phenomenon.
References
Agarwal, R. and Prasad, J. (1999). “Are individual differences germane to the acceptance of new information technologies?” Decision Sciences, Vol. 30, pp.361–391.
Ajzen, I. (1985). “From intentions to actions: a theory of planned behavior.” In Kuhl, J. and Beckman, J. (Eds.): Action-control: From cognition to behaviour (pp.11–39), Springer, Heidelberg, Germany.
Ajzen, I. (1991). “The theory of planned behavior,” Organizational Behavior and Human Decision Process, Vol. 50(2), pp. 179–211. https://doi.org/10.1080/08870446.2011.613995
Ajzen, I. (2002). “Residual Effects of Past on Later Behavior: Habituation and Reasoned Action Perspectives,” Personality & Social Psychology Review, Vol. 6(2), pp. 107-122.
Ajzen, I. and Fishbein, M. (2005). “The Influence of Attitudes on Behavior,” in The Handbook of Attitudes, D. Albarracín, B. T. Johnson, and M. P. Zanna (eds.), Mahwah, NJ: Erlbaum, pp. 173-221.
Arya, A. (April, 2011). “More than 10 billion app store downloads served,” Macworld, Vol. 29(4), p. 29.
Bandura, A. (1997). Self-Efficacy: The Exercise of Control, Freeman, New York.
Barnea, A. (2013). “National Strategic Intelligence and Competitive Intelligence and what is in between,” National Strategic Intelligence and Competitive Intelligence, Vol. 16(3), pp. 37-44.
Benbasat, I. and Barki, H. (2007). “Quo Vadis, TAM?” Journal of the AIS, Vol. 8(4), pp. 212- 218.
Bergeron, P. and Hiller, C. A. (2002). “Competitive intelligence,” Ann. Rev. Info. Sci. Tech., Vol. 36, pp. 353–390.
Bose, R. (2008). “Competitive intelligence process and tools for intelligence analysis,” Industrial Management & Data Systems, Vol. 108(4), pp. 510-528. DOI 10.1108/02635570810868362.
Bouhnik, D. and Deshen, M. (2014). “WhatsApp goes to school: Mobile instant messaging between teachers and students,” Journal of Information Technology Education Research, Vol. 13, pp. 217-231.
Brandtzæg, P. and Heim, J. (2009). “Why people use social networking sites,” Online Communities and Social Computing, Vol. 5621, pp. 143-152. DOI: 10.1007/978-3-642-02774-1_16.
Brown, S. A. and Venkatesh, V. (2005). “Model of Adoption of Technology in the Household: A Baseline Model Test and Extension Incorporating Household Life Cycle,” MIS Quarterly, Vol. 29(4), pp. 399-426.
Bulao, J. (2021, August 6). How much data is created every day in 2021? Retrieved September 1, 2021, from https://www.techjury.net.
Calof, J. L. and Skinner, B. (1999). “Government’s role in competitive intelligence: What’s happening in Canada?” Competitive Intelligence Magazine, Vol. 2(2), pp. 20-23.
Carlos, H. R. and Herrera, J. (2021). Innovation and Competitive Intelligence in business: A bibliometric Analysis, International Journal of Financial Studies, 9: 31. https://doi.org/10.3390/ijfs9020031.
Chan, K. Y., Gong, M., Xu, Y., and Thong, J. Y. L. (2008, July 3-7). “Examining User Acceptance of SMS: An Empirical Study in China and Hong Kong.” In Proceedings of 12th Pacific Asia Conference on Information System, Suzhou, China.
Cheung, T. (2014). A study on motives, usage, self- presentation and number of followers on Instagram (Thesis). City University of Hong Kong, Hong Kong.
Childers, T. L., Carr, C. L., Peck, J., and Carson, S. (2001). “Hedonic and Utilitarian Motivations for Online Retail Shopping Behavior,” Journal of Retailing, Vol. 7(4), pp. 511-535.
Chiu, C. M. and Wang, E. T. G. (2008). “Understanding web-based learning continuance intention: the role of subjective task value,” Information and Management, Vol. 45(3), pp. 194-201.
Chong, A.Y., Darmawan, N., Ooi, K., and Lin, B. (2010). “Adoption of 3G services among Malaysian consumers: An empirical analysis,” International Journal of Mobile Communications, Vol. 8(2), pp. 129–149.
Church, K. and de Oliveira, R. (2013, August). “What’s up with WhatsApp?: Comparing mobile instant messaging behaviors with traditional SMS.” In: Proceedings of the 15th International Conference on Human- Computer Interaction with Mobile Devices and Services (pp. 352-361). Munich, Germany. Creswell, J. W. (2009). Research design: Qualitative, quantitative, and mixed methods approaches (3rd Ed.), Thousand Oaks. CA: Sage.
Curtis, L., Edwards, C., Fraser, K. L., Gudelsky, S., Holmquist, J., Thornton, K. and Sweetser, K.D. (2010). “Adoption of social media for public relations by nonprofit organizations’, Public Relations Review, Vol. 36(1), pp. 90–92. Davis, F. D. (1989). “Perceived usefulness, perceived ease of use, and user acceptance,” MIS Quarterly, Vol. 13(3), pp. 319–340.
Davis, F. D., Bagozzi, R. P. and Warshaw, P. R. (1989). “User acceptance of computer technology: a comparison of two theoretical models,” Management Science, Vol. 35(8), pp. 982–1003.
Degerstedt, L. (2015). “Social competitive intelligence: sociotechnical themes and values for the networking organization,” Journal of Intelligence Studies in Business, Vol. 5(3), pp. 5-34.
Dishman, P. L. and Calof, J. L. (2007). “Competitive Intelligence: A multiphasic precedent to marketing strategy,” European Journal of Marketing, Vol. 42(7/8), pp. 766- 785.
Dodds, W. B., Monroe, K. B., and Grewal, D. (1991). “Effects of Price, Brand, and Store Information on Buyers,” Journal of Marketing Research, Vol. 28(3), pp. 307-319.
Ellison, N., Steinfield, C., and Lampe, C. (2007). “The benefits of Facebook ‘friends’: Social capital and college students’ use of online social network sites,” Journal of Computer- Mediated Communication, Vol. 12(4), pp. 1143-1168. DOI: 10.1111/j.1083-6101.2007.00367.x.
Field Manual 34-3 (1990). Intelligence Analysis, Headquarters Department of the Army, Washington, DC. U.S.A.
Fishbein, M. and Ajzen, I. (1975). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley, Reading, MA.
Gefen, D. and Straub, D. W. (1997). “Gender differences in the perception and use of e-mail: an extension to the technology acceptance model,” MIS Quarterly, Vol. 21, pp. 389–400.
Gefen, D., Karahanna, E., and Straub, D. W. (2003). “Trust and TAM in online shopping: An integrated model,” MIS Quarterly, Vol. 27(1), pp. 51–90.
Gilad, B. and Gilad, T. (1985). “A Systems Approach to Business Intelligence,” Business Horizons, Vol. 28(5), pp. 65–70.
Gračanin, S., Kalac , E., and Jovanović, D. (2015). “Competitive Intelligence: importance and application in practice,” Review of Innovation and Competitiveness, Vol. 1(1), pp. 25-44.
Groß, M. (2015). “Exploring the acceptance of technology for mobile shopping: An empirical investigation among Smartphone users,” The International Review of Retail, Distribution and Consumer Research, Vol. 25(3), pp. 215- 235.
Gupta, B., Dasgupta, S. and Gupta, A. (2008). “Adoption of ICT in a government organization in a developing country: an empirical study,” Journal of Strategic Information Systems, Vol. 17(2), pp. 140–154.
Han, S., Mustonen, P., Seppanen, M. and Kallio, M. (2006). “Physicians’ acceptance of mobile communication technology: an exploratory study,” International Journal of Mobile Communications, Vol. 4(2), pp. 210–230.
Homburg, C., Wieseke, J., and Kuehnl, C. (2010). “Social influence on salespeople’s adoption of sales technology: a multilevel analysis,” Journal of the Academy of Marketing Science, Vol. 38(2), pp. 159–168.
Huang, E. (2008). “Use and gratification in e- consumers,” Internet Research, Vol. 18(4), pp. 405–426.
Islam, R., Islam, R., and Mazumder, T. (2010). “Mobile application and its global impact,” International Journal of Engineering and Technology, Vol. 10(6), pp. 72-78.
Java, A., Song, X., Finin, T., and Tseng, B. (2007, August). “Why we twitter: Understanding microblogging usage and communities.” In: Proceedings of the 9th WebKDD and 1st SNA- KDD 2007 Workshop on Web Mining and Social Network Analysis (pp. 56-65). San Jose, California: ACM.
Joubert, J. and Van, J. (2013). “The role of trust and risk in mobile commerce adoption within South Africa,” International Journal of Business, Humanities and Technology, Vol. 3(2), pp. 27-38.
Kahaner, L. (1998). Competitive Intelligence: How to Gather, Analyze and Use Information to Move your Business to the Top, Touchstone, New York.
Kang, S. (2014). “Factors influencing intention of mobile application use,” International Journal of Mobile Communications, Vol. 12(4), pp. 360–379.
Karapanos, E., Teixeira, P., and Gouveia, R. (2016). “Need fulfillment and experiences on social media: A case on Facebook and WhatsApp,” Computers in Human Behavior, Vol. 55, pp. 888-897. DOI: 10.1016/j.chb.2015.10.015.
Kijsanayotin, B., Pannarunothai, S., and Speedie, S. M. (2009). “Factors influencing health information technology adoption in Thailand’s community health centers: applying the UTAUT model,” International Journal of Medical Informatics, Vol. 78(6), pp. 404–416.
Kim, S. S. and Malhotra, N. K. (2005). “A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Post-Adoption Phenomena,” Management Science, Vol. 51(5), pp. 741-755.
Kim, S. S., Malhotra, N. K., and Narasimhan, S. (2005). “Two Competing Perspectives on Automatic Use: A Theoretical and Empirical Comparison,” Information Systems Research,
Vol. 16(4), pp. 418-432.
King, W. R. and He, J. (2006). “A meta-analysis of the technology acceptance model,” Information & Management, Vol. 43, pp.740– 755.
Limayem, M., Hirt, S. G., and Cheung, C. M. K. (2007). “How Habit Limits the Predictive Power of Intentions: The Case of IS Continuance,” MIS Quarterly, Vol. 31(4), pp. 705-737.
Lin, C. P., and Anol, B. (2008). “Learning online social support: An investigation of network information technology based on UTAUT,” Cyber Psychology and Behavior, Vol. 11(3), pp. 268-272.
Lin, H. H. and Wang, Y. S. (2005). “Predicting consumer intention to use mobile commerce in Taiwan,” In Mobile Business, International Conference, pp. 406-412.
Luarn, P., and Lin, H. H. (2005). “Toward an understanding of the behavioral intention to use mobile banking,” Computers in Human Behaviour, Vol. 21(6), pp. 873–891.
Madureira, L., Popoviˇc, A. and Castelli, M. (2021). “Competitive intelligence: A unified view and modular definition,” Technological Forecasting & Social Change, 173, pp. 1-17. https://doi.org/10.1016/j.techfore.2021.121086 Maune, A. (2014a). “A conceptual analysis of the role of competitive intelligence in Zimbabwe`s banking sector,” Journal of Governance and Regulation, Vol. 3(4), pp. 125-137.
Maune, A. (2014b). “Competitive Intelligence as an Important Contributor to the Growth of Banks: A Zimbabwean Perspective,” Journal of Governance and Regulation, Vol. 3(3), pp. 98-112.
Maune, A. (2017). “The Role of Competitive Intelligence in Trade Facilitation in an Emerging Economy,” Journal of Economics and Behavioral Studies, Vol. 9(6), pp. 132-148.
Maune, A. (2019). “Competitive intelligence as a game changer for Africa’s competitiveness in the global economy,” Journal of Intelligence Studies in Business, Vol. 9 (3), pp. 24-38.
McGonagle, J. J. and Vella, C.M. (2012). Proactive intelligence, Springer-Verlag, London.
Montgomery, D. B. and Urban, G. L. (1970). “Marketing decision-information systems: an emerging view,” Journal of Marketing Research, Vol. 7, pp. 226-34.
Montgomery, D. B. and Weinberg, C. B. (1979). “Toward strategic intelligence systems,” Journal of Marketing, Vol. 43, pp. 41-52.
Moore, G. C. and Benbasat, I. (1991). “Development of an instrument to measure the perceptions of adopting an information technology innovation,” Information Systems Research, Vol. 2(3), pp. 192–222.
Murphy, T. (2011). “App vs. Website: Banks offering mobile banking services face a choice: Should they develop mobile applications, a mobile website or both?” Bank Technology News, Vol. 24(6), pp. 39.
Narula, S. and Jindal, N. (2015). “Use of social network sites by AUMP students: A comparative study on Facebook, Twitter and Instagram usage,” Journal of Advanced Research, Vol. 2(2), pp. 20-24.
Neuman, W. L. (2014). Social Research Methods: Qualitative and Quantitative Approaches (7th Ed.), London: Pearson Education Limited.
Ouellette, J. A. and Wood, W. (1998). “Habit and Intention in Everyday Life: The Multiple Processes by Which Past Behavior Predicts Future Behavior,” Psychological Bulletin, Vol. 124(1), pp. 54-74.
Pearce, F. T. (1976). “Business intelligence systems: the need, development and integration,” Industrial Marketing Management, Vol. 5 No. 2, p. 115.
Pellissier, R. and Nenzhelele, T. E. (2013). “Towards a universal definition of Competitive Intelligence,” South Africa Journal of Information Management, Vol. 15(2), Art. No. 559, 7 pages. http://dx.doi.org/10.4102/sajim.v15i2.559.
Pielot, M., de Oliveira, R., Kwak, H., and Oliver,
N. (2014, May). “Didn't you see my message? Predicting attentiveness to mobile instant messages.” In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems (pp. 3319-3328). Toronto, Ontario, Canada.
Porter, M. E. (1980). Competitive Strategy: Techniques of Analyzing Industries and Competitors, The Free Press, New York.
Pynoo, B., Devolder, P., Tondeur, J., van Braak, J., Duyck, W., and Duyck, P. (2011). “Predicting secondary school teachers’ acceptance and use of a digital learning environment: a crosssectional study,” Computers in Human Behavior, Vol. 27(1), pp. 568–575.
Rogers, E. M. (1962). Diffusion of Innovations, The Free Press, New York.
Rogers, E. M. (1995). Diffusion of Innovations, (4th Ed.), The Free Press, New York.
Schepers, J. and Wetzels, M. (2007). “A meta- analysis of the technology acceptance model: investigating subjective norm and moderation effects,” Information & Management, Vol. 44, pp. 90–103.
Schneider, F., Feldmann, A., Krishnamurthy, B., and Willinger, W. (2009, November). “Understanding online social network usage from a network perspective.” In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (pp. 35-48). Chicago, Illinois, USA.
Shneor, R. and Munimb, Z. H. (2019). “Reward crowdfunding contribution as planned behaviour: An extended framework,” Journal of Business Research, Vol. 103, pp. 56–70.
Singer, P. W. and Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know, Oxford University Press, New York.
So, S. (2016). “Mobile instant messaging support for teaching and learning in higher education,” The Internet and Higher Education, Vol. 31, pp. 32-42. DOI: 10.1016/j.iheduc.2016.06.001.
Solberg, K. S. (2017). “Why care about competitive intelligence and market intelligence? The case of Ericsson and the Swedish Cellulose Company,” Journal of Intelligence Studies in Business, Vol. 7(2), pp. 27-39.
Sultan, A. (2014). “Addiction to mobile text messaging applications is nothing to “lol” about,” The Social Science Journal, Vol. 51(1),
pp. 57-69. DOI: 10.1016/j.soscij.2013.09.003.
Tan, K. S., Chong, S. C., Loh, P. L., and Lin, B. (2010). “An evaluation of e-banking and mbanking adoption factors and preference in Malaysia: A case study,” International Journal of Mobile Communications, Vol. 8(5),
pp. 507-527.
Thong J. Y. L., Hong, S. J., and Tam, K. Y. (2006). “The Effects of Post-Adoption Beliefs on the Expectation–Confirmation Model for Information Technology Continuance,” International Journal of Human-Computer Studies, Vol. 64(9), pp. 799-810.
van der Heijden, H. (2004). “User Acceptance of Hedonic Information Systems,” MIS Quarterly, Vol. 28(4), pp. 695-704.
Vasileiadis, A. (2014). “Security Concerns and Trust in the Adoption of M-Commerce,” Social Technologies, Vol. 4(1), pp. 179-191.
Venkatesh, V. and Davis, F. D. (2000). “A theoretical extension of the technology acceptance model: four longitudinal field studies,” Management Science, Vol. 46(2), pp. 186–204.
Venkatesh, V., Davis, F. D., and Morris, M. G. (2007). “Dead or Alive? The Development, Trajectory and Future of Technology Adoption Research,” Journal of the AIS, Vol. 8(4), pp. 268-286.
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. (2003). “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly, Vol. 27(3), pp. 425-478. Venkatesh, V., Thong, J., and Xu, X. (2012). “Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology,” MIS Quarterly, Vol. 36(1), pp. 157-178.
Vuleta, B. (2021, January 28). How much data is created every day? Retrieved September 1, 2021, from https://www.seedscientific.com.
Wang, H. and Wang, S. (2010). “User acceptance of mobile Internet based on the unified theory of acceptance and use of technology: investigating the determinants and gender differences,” Social Behavior & Personality: An International Journal, Vol. 38(3), pp. 415– 426.
Wei, T. T., Marthandan, G., Chong, Y-L. A., Ooi, K., and Arumugam, S. (2009). “What drives Malaysian m-commerce adoption? An empirical analysis,” Industrial Management and Data Systems, Vol. 109(3), pp. 370-388.
Wong, S. (2012). “Which platform do our users prefer: website or mobile app?” Reference Services Review,” Vol. 40(1), pp. 103-115.
Xu, C., Ryan, S., Prybutok, V., and Wen, C. (2012). “It is not for fun: An examination of social network site usage,” Information and Management, Vol. 49(5), pp. 210-217. DOI: 10.1016/j.im.2012.05.001.
Yang, K. C. (2007). “Exploring factors affecting consumer intention to use mobile advertising in Taiwan,” Journal of International Consumer Marketing, Vol. 20(1), pp. 33–49.
Yuen, Y. Y., Yeow, P. H. P., Lim, N., and Saylani, N. (2010). “Internet banking adoption: Comparing developed and developing countries,” Journal of Computer Information Systems, Vol. 51(1), pp. 52-61.
Zeithaml, V. A. (1988). “Consumer Perceptions of Price, Quality, and Value: A Means–End Model and Synthesis of Evidence,” Journal of Marketing, Vol. 52(3), pp. 2-22.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Journal of Intelligence Studies in Business
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).