Difference between revisions of "Social Influence Theory"

From IS Theory
Jump to navigation Jump to search
(Created page with "== Acronym == * == Alternate name(s) == Kelman's three process theory == Main dependent construct(s)/factor(s) == * == Main independent construct(s)/factor(s) == * == Con...")
 
Line 13: Line 13:
 
== Concise description of theory ==
 
== Concise description of theory ==
 
The central theme of Social influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:
 
The central theme of Social influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:
** ''Compliance'' is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the ''social effect'' of accepting influence.” (p. 53)
+
* ''Compliance'' is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the ''social effect'' of accepting influence.” (p. 53)
** ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)
+
* ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)
** ''Internalization'' is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the ''content'' of the new behavior.” (p. 53)
+
* ''Internalization'' is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the ''content'' of the new behavior.” (p. 53)
 
Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative ''compliance'', thereby overlooking the ''identification'' and ''internalization'' processes of social influence (Malhotra and Galletta 2005). It is argued that the ''subjective norm'' is the dominant conceptualization of social influence and mostly emphasizes compliance (Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).
 
Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative ''compliance'', thereby overlooking the ''identification'' and ''internalization'' processes of social influence (Malhotra and Galletta 2005). It is argued that the ''subjective norm'' is the dominant conceptualization of social influence and mostly emphasizes compliance (Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).
  

Revision as of 20:39, 27 February 2017

 Acronym

Alternate name(s)

Kelman's three process theory

Main dependent construct(s)/factor(s)

Main independent construct(s)/factor(s)

Concise description of theory

The central theme of Social influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:

  • Compliance is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the social effect of accepting influence.” (p. 53)
  • Identification is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the act of conforming.” (p. 53)
  • Internalization is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the content of the new behavior.” (p. 53)

Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative compliance, thereby overlooking the identification and internalization processes of social influence (Malhotra and Galletta 2005). It is argued that the subjective norm is the dominant conceptualization of social influence and mostly emphasizes compliance (Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).

Realizing that only one aspect of social influence i.e., compliance may not predict the true relationship between the system users’ belief and behavior, and IS use, other researchers attempt to bring the perspectives of all three processes of social influence to provide the integrated impact of them (Malhotra and Galletta 2005; Wang et al. 2013). They believe that the effect of compliance-based social influence may reduce over time, whereas the effects of identification and internalization would persist over longer periods. Therefore, studies that theorize all three processes of social influence indicate that social influence may differ significantly across groups in organizations (Wang et al. 2013). Such conceptualization helps us to understand how the system users’ own beliefs and judgments also influence their commitment to adopt and use technology, complementing the understanding of previous studies that focus on how the system users comply and conform to the beliefs of salient others.

Diagram/schematic of theory

Originating author(s)

  • Kelman (1958)

Seminal articles

Ajzen, I. 1991. “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes (50:2), pp. 179-211.

Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.

Kelman, H. C. 1958. “Compliance, Identification, and Internalization: Three Processes of Attitude Change,” Journal of Conflict Resolution (2:1), pp. 51-60.

Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. “Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers,” MIS Quarterly, (27:4), pp. 657-678.

Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” Journal of Management Information Systems (22:1), pp. 117-151.

Venkatesh, V., and Davis, F. D. 2000. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science (46:2), pp. 186-204.

Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly (27:3), pp. 425-478.

Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” MIS Quarterly, (37:1), pp. 299-313.

Originating area

  • Psychology

Level of analysis

  • Individual

Links to WWW sites describing theory

Links from this theory to other theories

IS articles that use the theory

Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” Journal of Management Information Systems (22:1), pp. 117-151.

Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” MIS Quarterly, (37:1), pp. 299-313.

Contributor(s)

  • Anupriya Khan

Date last updated