A study on the effects of empowerment and habit on continuance usage of pervasive business intelligence systems

Y. M. Han, C. K. Farn

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Pervasive business intelligence system (BIS) have been adopted by organizations to provide internal and external information to stakeholders in decision-making scenarios. However, the continuance usage of pervasive BIS becomes a challenge from a practical standpoint. The aim of this study is to extend a model that explains the pervasive BIS continuance usage. In addition to Limayem et al.'s model which considers habit construct, we also include the influence of empowerment on individual authorization and intrinsic task motivation in the pervasive BIS context. The model was empirically tested using data from 117 respondents to shed light on the situation of voluntary continuance usage. Our results support the extended IS model and conclude that habit has a direct effect on pervasive BIS continuance usage. We also find psychological empowerment is influenced by structural empowerment and acts as a pure moderator between pervasive BIS continuance intention and continuance usage behavior.

Original languageEnglish
Title of host publicationProceedings of the 46th Annual Hawaii International Conference on System Sciences, HICSS 2013
Pages3768-3777
Number of pages10
DOIs
StatePublished - 2013
Event46th Annual Hawaii International Conference on System Sciences, HICSS 2013 - Wailea, Maui, HI, United States
Duration: 7 Jan 201310 Jan 2013

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
ISSN (Print)1530-1605

Conference

Conference46th Annual Hawaii International Conference on System Sciences, HICSS 2013
Country/TerritoryUnited States
CityWailea, Maui, HI
Period7/01/1310/01/13

Fingerprint

Dive into the research topics of 'A study on the effects of empowerment and habit on continuance usage of pervasive business intelligence systems'. Together they form a unique fingerprint.

Cite this