Three Dimensions of Business Intelligence Systems Use Behavior

Three Dimensions of Business Intelligence Systems Use Behavior

Tanja Grublješič, Jurij Jaklič
Copyright: © 2014 |Pages: 15
DOI: 10.4018/ijeis.2014070105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the Business Intelligence Systems (BIS) use context, the well-researched dimension of intensity of use is not broad enough to capture its meaningful use. The authors therefore investigate the whole spectrum of its use that encompasses effective utilization. The post-adoption research of Information System (IS) use is still under-researched; the study therefore brings novel insights to this area. The authors have conceptualized three dimensions of BIS use that capture the intensity of BIS use, the extent of BIS use, and BIS embeddedness. Confirmatory Factor Analysis (CFA) was used to determine convergent and discriminant validities proving construct validities, based on survey data gathered from BIS users in medium and large sized organizations. The results of our study provide sound evidence for apprehending these three constructs as different conceptualizations. This work adds to the literature by emphasizing the role of post-adoptive behavior that can lead to greater and effective utilization in the studied BIS environment, and potentially to a better organizational performance.
Article Preview
Top

Introduction

The research stream examining adoption and acceptance is one of the richest and most mature streams in the IS field (e.g. Davis, 1989, Venkatesh & Davis, 2000; Venkatesh, Morris, Davis & Davis, 2003; Venkatesh & Bala, 2008). But, in contrast, post-adoptive use behavior is still under-researched, and often conceptualized as increasing intensity or greater frequency of use (Jasperson, Carter & Zmud, 2005). Some efforts have already been made and show that post-adoptive use behavior may also diminish over time with gained experience (Bhattacherjee, 2001), or on the other hand become habitualized and routinized in individuals’ work routines (Jasperson et al., 2005). Undoubtedly, research on technology acceptance and initial use can enrich our understanding of post-adoptive use behaviors (Hernandez, Jimenez & Martin, 2008), but distinctions between pre- and post-adoptive beliefs and behaviors have already been observed (Agarwal & Karahanna, 2000). Understanding the three different dimensions of effective use in a specific BIS utilization context is central to this work. Deng and Chi (2013) argue that the Business Intelligence (BI) application context offers an ideal opportunity to examine a variety of post-adoptive system uses.

In the IS literature, the positive impact of the information provided by Business Intelligence Systems (BIS) on decision-making has been emphasized, particularly when organizations operate in highly competitive environments (Popovič, Hackney, Coelho, & Jaklič, 2012; Harison, 2012). These technological innovations are one of the main sources of competitive advantage for the long-term survival of organizations (Jourdan, Rainer & Marshal, 2008), although their benefits can only be fully realized in situations where these promising innovations are completely accepted and effectively used. User acceptance is also crucial to BIS success, but in this context, in contrast with operational information systems (IS), there is a particularly pronounced difference between using or accepting the system and long-term routinization (Bhattacherjee, 2001) of the use of information provided by the system as part of management of the organization and business processes (Popovič et al., 2012).

There are two motivations for this study. First, previous research in the field of IT acceptance has mainly focused on general IS and thereby only considered the narrower aspect of use, merely the frequency of use and not how IS is used (Davis, Bagozzi & Warshaw, 1989; Venkatesh & Davis, 2000; Venkatesh & Bala, 2008), treating system use simply and solely as a measure of the relevant behavior consequent to technology acceptance. This work represents a step in the direction advocated by Jasperson et al. (2005) who call for richer conceptualizations of system use by also treating system use as a theoretical construct. Second, it also responds to the call by Burton-Jones and Straub (2006) to develop the conceptualization of usage and select usage constructs and measures for specific contexts. The specific features of BIS use as compared to operational IS motivate the three conceptualizations of BIS use. For BIS it is important if BIS are deeply embedded within the business (Shanks et al., 2012). Therefore, BIS use behavior should be measured by several dimensions to yield a rich understanding of its utilization. In addition to quantitative measures of how much a BIS is used (frequency or duration) (Davis et al., 1989), we are also interested in a qualitative measure of how a BIS is used in the organization. The aims of this study are therefore to:

  • Conceptualize and develop relevant measures for the three constructs of BIS use behavior, namely intensity, extent, and embeddedness; and

  • Empirically test and evaluate the construct reliability and validity of these three conceptualizations of BIS use.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing