https://is.theorizeit.org/w/index.php?title=Social_Influence_Theory&feed=atom&action=historySocial Influence Theory - Revision history2024-03-28T10:47:27ZRevision history for this page on the wikiMediaWiki 1.35.3https://is.theorizeit.org/w/index.php?title=Social_Influence_Theory&diff=1039&oldid=prevAnupriya Khan: /* Links from this theory to other theories */2017-02-28T19:30:29Z<p><span dir="auto"><span class="autocomment">Links from this theory to other theories</span></span></p>
<table class="diff diff-contentalign-left diff-editfont-monospace" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 19:30, 28 February 2017</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l17" >Line 17:</td>
<td colspan="2" class="diff-lineno">Line 17:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Diagram/schematic of theory ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Diagram/schematic of theory ==</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">N/A</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Originating author(s) ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Originating author(s) ==</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l34" >Line 34:</td>
<td colspan="2" class="diff-lineno">Line 35:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Links from this theory to other theories ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Links from this theory to other theories ==</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del class="diffchange diffchange-inline">*</del></div></td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">Technology Acceptance Model 2 (TAM2), TAM3, [[Unified theory of acceptance and use of technology]], Self-determination theory, Organizational commitment</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== IS articles that use the theory ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== IS articles that use the theory ==</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l44" >Line 44:</td>
<td colspan="2" class="diff-lineno">Line 45:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. “Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers,” ''MIS Quarterly,'' (27:4), pp. 657-678.</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. “Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers,” ''MIS Quarterly,'' (27:4), pp. 657-678.</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Li, H., Zhang, J., and Sarathy, R. 2010. "Understanding compliance with internet use policy from the perspective of rational choice theory," ''Decision Support Systems'', (48:4), pp. 635-645.</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.</div></td></tr>
</table>Anupriya Khanhttps://is.theorizeit.org/w/index.php?title=Social_Influence_Theory&diff=1031&oldid=prevAnupriya Khan: /* Concise description of theory */2017-02-28T10:20:51Z<p><span dir="auto"><span class="autocomment">Concise description of theory</span></span></p>
<table class="diff diff-contentalign-left diff-editfont-monospace" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 10:20, 28 February 2017</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l2" >Line 2:</td>
<td colspan="2" class="diff-lineno">Line 2:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Acronym ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Acronym ==</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">*</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Alternate name(s) ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Alternate name(s) ==</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Kelman's three process theory</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Kelman's three process theory</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">== Main dependent construct(s)/factor(s) ==</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">*</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">== Main independent construct(s)/factor(s) ==</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">*</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Concise description of theory ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Concise description of theory ==</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l18" >Line 18:</td>
<td colspan="2" class="diff-lineno">Line 10:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Internalization'' is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the ''content'' of the new behavior.” (p. 53)</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Internalization'' is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the ''content'' of the new behavior.” (p. 53)</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative ''compliance'', thereby overlooking the ''identification'' and ''internalization'' processes of social influence (Malhotra and Galletta 2005). It is argued that the ''subjective norm'' is the dominant conceptualization of social influence and <del class="diffchange diffchange-inline">mostly </del>emphasizes <del class="diffchange diffchange-inline">compliance </del>(Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).</div></td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">Each of the three processes can be represented by a function of the following three determinants of influence: (a) the relative importance of the anticipated effect, (b) the relative power of the influencing agent, and (c) the prepotency of the induced response (Kelman 1958). However, for each process, these determinants are qualitatively different. So each process has a distinctive set of antecedent conditions; similarly each process leads to a distinctive set of consequent conditions.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative ''compliance'', thereby overlooking the ''identification'' and ''internalization'' processes of social influence (Malhotra and Galletta 2005). It is argued that the ''subjective norm'' is the dominant conceptualization of social influence and <ins class="diffchange diffchange-inline">the way it is operationalized that typically </ins>emphasizes <ins class="diffchange diffchange-inline">compliance </ins>(Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Realizing that only one aspect of social influence i.e., ''compliance'' may not predict the true relationship between the system users’ belief and behavior, and IS use, other researchers attempt to bring the perspectives of all three processes of social influence to provide the integrated impact of them (Malhotra and Galletta 2005; Wang et al. 2013). They believe that the effect of compliance-based social influence may reduce over time, whereas the effects of identification and internalization would persist over longer periods. Therefore, studies that theorize all three processes of social influence indicate that social influence may differ significantly across groups in organizations (Wang et al. 2013). Such conceptualization helps us to understand how the system users’ ''own'' beliefs and judgments also influence their commitment to adopt and use technology, complementing the understanding of previous studies that focus on how the system users ''comply'' and ''conform'' to the beliefs of salient others.</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Realizing that only one aspect of social influence i.e., ''compliance'' may not predict the true relationship between the system users’ belief and behavior, and IS use, other researchers attempt to bring the perspectives of all three processes of social influence to provide the integrated impact of them (Malhotra and Galletta 2005; Wang et al. 2013). They believe that the effect of compliance-based social influence may reduce over time, whereas the effects of identification and internalization would persist over longer periods. Therefore, studies that theorize all three processes of social influence indicate that social influence may differ significantly across groups in organizations (Wang et al. 2013). Such conceptualization helps us to understand how the system users’ ''own'' beliefs and judgments also influence their commitment to adopt and use technology, complementing the understanding of previous studies that focus on how the system users ''comply'' and ''conform'' to the beliefs of salient others.</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l28" >Line 28:</td>
<td colspan="2" class="diff-lineno">Line 22:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Seminal articles ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Seminal articles ==</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Ajzen, I. 1991. “The Theory of Planned Behavior,” ''Organizational Behavior and Human Decision Processes'' (50:2), pp. 179-211.</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Fishbein, M., and Ajzen, I. 1975. ''Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research'', Reading, MA: Addison-Wesley.</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Kelman, H. C. 1958. “Compliance, Identification, and Internalization: Three Processes of Attitude Change,” ''Journal of Conflict Resolution'' (2:1), pp. 51-60.</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Kelman, H. C. 1958. “Compliance, Identification, and Internalization: Three Processes of Attitude Change,” ''Journal of Conflict Resolution'' (2:1), pp. 51-60.</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. “Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers,” ''MIS Quarterly,'' (27:4), pp. 657-678.</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Venkatesh, V., and Davis, F. D. 2000. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” ''Management Science'' (46:2), pp. 186-204.</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. “User Acceptance of Information Technology: Toward a Unified View,” ''MIS Quarterly'' (27:3), pp. 425-478.</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” ''MIS Quarterly,'' (37:1), pp. 299-313.</del></div></td><td colspan="2"> </td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Originating area ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Originating area ==</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l57" >Line 57:</td>
<td colspan="2" class="diff-lineno">Line 37:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== IS articles that use the theory ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== IS articles that use the theory ==</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Cheung, C. M., Chiu, P. Y., and Lee, M. K. 2011. “Online social networks: Why do students use facebook?,” ''Computers in Human Behavior'', (27:4), pp. 1337-1343.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. 1989. “User acceptance of computer technology: a comparison of two theoretical models,” ''Management science'', (35:8), pp. 982-1003.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Karahanna, E., Straub, D. W., & Chervany, N. L. 1999. “Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs,” ''MIS quarterly'', pp. 183-213.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. “Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers,” ''MIS Quarterly,'' (27:4), pp. 657-678.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Mun, Y. Y., Jackson, J. D., Park, J. S., and Probst, J. C. 2006. “Understanding information technology acceptance by individual professionals: Toward an integrative view,” ''Information & Management'', (43:3), pp. 350-363.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Srite, M., and Karahanna, E. 2006. “The role of espoused national cultural values in technology acceptance,” ''MIS quarterly'', pp. 679-704.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Venkatesh, V., and Bala, H. 2008. “Technology acceptance model 3 and a research agenda on interventions,” ''Decision sciences'', (39:2), pp. 273-315.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Venkatesh, V., and Davis, F. D. 2000. “A theoretical extension of the technology acceptance model: Four longitudinal field studies,” ''Management science'', (46:2), pp. 186-204.</ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” ''MIS Quarterly,'' (37:1), pp. 299-313.</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” ''MIS Quarterly,'' (37:1), pp. 299-313.</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l65" >Line 65:</td>
<td colspan="2" class="diff-lineno">Line 61:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Date last updated ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Date last updated ==</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>*</div></td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>*<ins class="diffchange diffchange-inline">28 Feb 2017</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">== References ==</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Ajzen, I. 1991. “The Theory of Planned Behavior,” ''Organizational Behavior and Human Decision Processes'' (50:2), pp. 179-211.</small></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Fishbein, M., and Ajzen, I. 1975. ''Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research'', Reading, MA: Addison-Wesley.</small></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Kelman, H. C. 1958. “Compliance, Identification, and Internalization: Three Processes of Attitude Change,” ''Journal of Conflict Resolution'' (2:1), pp. 51-60.</small></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. “Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers,” ''MIS Quarterly,'' (27:4), pp. 657-678.</small></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.</small></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Venkatesh, V., and Davis, F. D. 2000. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” ''Management Science'' (46:2), pp. 186-204.</small></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. “User Acceptance of Information Technology: Toward a Unified View,” ''MIS Quarterly'' (27:3), pp. 425-478.</small></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><small>Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” ''MIS Quarterly,'' (37:1), pp. 299-313.</small></ins></div></td></tr>
</table>Anupriya Khanhttps://is.theorizeit.org/w/index.php?title=Social_Influence_Theory&diff=1024&oldid=prevAnupriya Khan: /* Concise description of theory */2017-02-27T20:48:53Z<p><span dir="auto"><span class="autocomment">Concise description of theory</span></span></p>
<table class="diff diff-contentalign-left diff-editfont-monospace" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:48, 27 February 2017</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l1" >Line 1:</td>
<td colspan="2" class="diff-lineno">Line 1:</td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">= Kelman's Social Influence Theory =</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Acronym ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Acronym ==</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>*</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l12" >Line 12:</td>
<td colspan="2" class="diff-lineno">Line 14:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Concise description of theory ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Concise description of theory ==</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The central theme of <del class="diffchange diffchange-inline">Social </del>influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:</div></td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The central theme of <ins class="diffchange diffchange-inline">social </ins>influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Compliance'' is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the ''social effect'' of accepting influence.” (p. 53)</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Compliance'' is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the ''social effect'' of accepting influence.” (p. 53)</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)</div></td></tr>
</table>Anupriya Khanhttps://is.theorizeit.org/w/index.php?title=Social_Influence_Theory&diff=1021&oldid=prevAnupriya Khan: /* Concise description of theory */2017-02-27T20:39:04Z<p><span dir="auto"><span class="autocomment">Concise description of theory</span></span></p>
<table class="diff diff-contentalign-left diff-editfont-monospace" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:39, 27 February 2017</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l13" >Line 13:</td>
<td colspan="2" class="diff-lineno">Line 13:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Concise description of theory ==</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Concise description of theory ==</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The central theme of Social influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The central theme of Social influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del class="diffchange diffchange-inline">*</del>* ''Compliance'' is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the ''social effect'' of accepting influence.” (p. 53)</div></td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* ''Compliance'' is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the ''social effect'' of accepting influence.” (p. 53)</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del class="diffchange diffchange-inline">*</del>* ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)</div></td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del class="diffchange diffchange-inline">*</del>* ''Internalization'' is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the ''content'' of the new behavior.” (p. 53)</div></td><td class='diff-marker'>+</td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>* ''Internalization'' is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the ''content'' of the new behavior.” (p. 53)</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative ''compliance'', thereby overlooking the ''identification'' and ''internalization'' processes of social influence (Malhotra and Galletta 2005). It is argued that the ''subjective norm'' is the dominant conceptualization of social influence and mostly emphasizes compliance (Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).</div></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative ''compliance'', thereby overlooking the ''identification'' and ''internalization'' processes of social influence (Malhotra and Galletta 2005). It is argued that the ''subjective norm'' is the dominant conceptualization of social influence and mostly emphasizes compliance (Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"></td></tr>
</table>Anupriya Khanhttps://is.theorizeit.org/w/index.php?title=Social_Influence_Theory&diff=1020&oldid=prevAnupriya Khan: Created page with "== Acronym == * == Alternate name(s) == Kelman's three process theory == Main dependent construct(s)/factor(s) == * == Main independent construct(s)/factor(s) == * == Con..."2017-02-27T20:37:42Z<p>Created page with "== Acronym == * == Alternate name(s) == Kelman's three process theory == Main dependent construct(s)/factor(s) == * == Main independent construct(s)/factor(s) == * == Con..."</p>
<p><b>New page</b></p><div>== Acronym ==<br />
*<br />
<br />
== Alternate name(s) ==<br />
Kelman's three process theory<br />
<br />
== Main dependent construct(s)/factor(s) ==<br />
*<br />
<br />
== Main independent construct(s)/factor(s) ==<br />
*<br />
<br />
== Concise description of theory ==<br />
The central theme of Social influence theory, as proposed by Kelman (1958), is that an individual’s attitudes, beliefs, and subsequent actions or behaviors are influenced by referent others through three processes: compliance, identification, and internalization. Kelman (1958) posited that social influence brings about changes in attitude and actions, and that changes may occur at different “levels.” This difference in the level of changes can be attributed by the differences in the processes through which individuals accept influence. Kelman (1958) delineated three primary processes of influence as described below:<br />
** ''Compliance'' is assumed to occur when individuals accept influence and adopt the induced behavior to gain rewards (or, approval) and avoid punishments (or, disapproval). Hence, “the satisfaction derived from compliance is due to the ''social effect'' of accepting influence.” (p. 53)<br />
** ''Identification'' is said to happen when individuals adopt the induced behavior in order to create or maintain a desired and beneficial relationship to another person or a group. Hence, the satisfaction occurs due to “the ''act'' of conforming.” (p. 53)<br />
** ''Internalization'' is assumed to occur when individuals accept influence after perceiving the content of the induced behavior is rewarding in which the content indicates the opinions and actions of others. It is also stated that individuals adopt the induced behavior realizing that it is congruent with their value system. In this case, therefore, the satisfaction occurs due to “the ''content'' of the new behavior.” (p. 53)<br />
Since social influence can shape an individual’s attitudes, beliefs and actions, the impact of social influence on information systems (IS) acceptance and usage has been studied extensively. However, the initial theorizing on IS adoption and use (Lewis et al. 2003; Venkatesh and Davis 2000; Venkatesh et al. 2003) is contended to consider the perspective of social normative ''compliance'', thereby overlooking the ''identification'' and ''internalization'' processes of social influence (Malhotra and Galletta 2005). It is argued that the ''subjective norm'' is the dominant conceptualization of social influence and mostly emphasizes compliance (Wang et al. 2013). Subjective norm is theorized in several behavioral models such as the theory of planned behavior (TPB) and the theory of reasoned action (TRA) (Ajzen 1991; Fishbein and Ajzen 1975). Technology-related subjective norm appears in different IS-specific models, including TAM2 and UTAUT (Venkatesh and Davis 2000; Venkatesh et al. 2003).<br />
<br />
Realizing that only one aspect of social influence i.e., ''compliance'' may not predict the true relationship between the system users’ belief and behavior, and IS use, other researchers attempt to bring the perspectives of all three processes of social influence to provide the integrated impact of them (Malhotra and Galletta 2005; Wang et al. 2013). They believe that the effect of compliance-based social influence may reduce over time, whereas the effects of identification and internalization would persist over longer periods. Therefore, studies that theorize all three processes of social influence indicate that social influence may differ significantly across groups in organizations (Wang et al. 2013). Such conceptualization helps us to understand how the system users’ ''own'' beliefs and judgments also influence their commitment to adopt and use technology, complementing the understanding of previous studies that focus on how the system users ''comply'' and ''conform'' to the beliefs of salient others.<br />
<br />
== Diagram/schematic of theory ==<br />
<br />
== Originating author(s) ==<br />
* Kelman (1958)<br />
<br />
== Seminal articles ==<br />
Ajzen, I. 1991. “The Theory of Planned Behavior,” ''Organizational Behavior and Human Decision Processes'' (50:2), pp. 179-211.<br />
<br />
Fishbein, M., and Ajzen, I. 1975. ''Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research'', Reading, MA: Addison-Wesley.<br />
<br />
Kelman, H. C. 1958. “Compliance, Identification, and Internalization: Three Processes of Attitude Change,” ''Journal of Conflict Resolution'' (2:1), pp. 51-60.<br />
<br />
Lewis, W., Agarwal, R., and Sambamurthy, V. 2003. “Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers,” ''MIS Quarterly,'' (27:4), pp. 657-678.<br />
<br />
Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.<br />
<br />
Venkatesh, V., and Davis, F. D. 2000. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” ''Management Science'' (46:2), pp. 186-204.<br />
<br />
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. “User Acceptance of Information Technology: Toward a Unified View,” ''MIS Quarterly'' (27:3), pp. 425-478.<br />
<br />
Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” ''MIS Quarterly,'' (37:1), pp. 299-313.<br />
<br />
== Originating area ==<br />
* Psychology<br />
<br />
== Level of analysis ==<br />
* Individual <br />
<br />
== Links to WWW sites describing theory ==<br />
* https://en.wikipedia.org/wiki/Social_influence<br />
<br />
== Links from this theory to other theories ==<br />
*<br />
<br />
== IS articles that use the theory ==<br />
Malhotra, Y., and Galletta, D. 2005. “A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior,” ''Journal of Management Information Systems'' (22:1), pp. 117-151.<br />
<br />
Wang, Y., Meister, D. B., and Gray, P. H. 2013. “Social Influence and Knowledge Management Systems Use: Evidence from Panel Data,” ''MIS Quarterly,'' (37:1), pp. 299-313.<br />
<br />
== Contributor(s) ==<br />
* Anupriya Khan<br />
<br />
== Date last updated ==<br />
*</div>Anupriya Khan