211
Views
0
CrossRef citations to date
0
Altmetric
Research case article

Integrating the perceptions that cause Resistance to IT: Expanding the nomological network of the IT identity Threat

ORCID Icon, &

References

  • Aiken, L. S., & West, S. G. (1991). Multiple regression: Testing and interpreting interactions. Sage Publications, Inc.
  • Ambrose, M. L., Seabright, M. A., & Schminke, M. (2002). Sabotage in the workplace: The role of organizational injustice. Organizational Behavior and Human Decision Processes, 89(1), 947–965. https://doi.org/10.1016/S0749-5978(02)00037-7
  • Baumeister, R. F., & Tice, D. M. (1985). Self-esteem and responses to success and failure: Subsequent performance and intrinsic motivation. Journal of Personality, 53(3), 450–467. https://doi.org/10.1111/j.1467-6494.1985.tb00376.x
  • Beer, D. (2017). The social power of algorithms. Taylor & Francis.
  • Boise, L., Wild, K., Mattek, N., Ruhl, M., Dodge, H. H., & Kaye, J. (2013). Willingness of older adults to share data and privacy concerns after exposure to unobtrusive in-home monitoring. Gerontechnology: International Journal on the Fundamental Aspects of Technology to Serve the Ageing Society, 11(3), 428. https://doi.org/10.4017/gt.2013.11.3.001.00
  • Breakwell, G. M. (1983). Threatened identities. Wiley Chichester.
  • Bryson, J., & Winfield, A. (2017). Standardizing ethical design for artificial intelligence and autonomous systems. Computer, 50(5), 116–119. https://doi.org/10.1109/MC.2017.154
  • Burke, P. J. (2006). Identity change. Social Psychology Quarterly, 69(1), 81–96. https://doi.org/10.1177/019027250606900106
  • Burke, P. J., & Stets, J. E. (2009). Identity theory. Oxford University Press.
  • Carter, M. (2012). Information technology (IT) identity: A conceptualization, proposed measures, and research agenda. Clemson University.
  • Carter, M., & Grover, V. (2015). Me, my self, and I (T): Conceptualizing information technology identity and its implications. MIS Quarterly, 39(4), 931–958. https://doi.org/10.25300/MISQ/2015/39.4.9
  • Carter, M. J., & Marony, J. (2021). Examining self-perceptions of identity change in person, role, and social identities. Current Psychology, 40(1), 253–270. https://doi.org/10.1007/s12144-018-9924-5
  • Carter, M., Petter, S., Grover, V., & Thatcher, J. (2020). Information technology identity: A key determinant of IT feature use and exploratory usage. MIS Quarterly, 44(3), 983–1021. https://doi.org/10.25300/MISQ/2020/14607
  • Cast, A. D., & Burke, P. J. (2002). A theory of self-esteem. Social Forces, 80(3), 1041–1068. https://doi.org/10.1353/sof.2002.0003
  • Catherwood, P. A., Finlay, D. D., & McLaughlin, J. A. (2016). Intelligent subcutaneous body area networks: Anticipating implantable devices. IEEE Technology and Society Magazine, 35(3), 73–80. https://doi.org/10.1109/MTS.2016.2593219
  • Cenfetelli, R. T. (2004). Inhibitors and enablers as dual factor concepts in technology usage. Journal of the Association for Information Systems, 5(11), 16. https://doi.org/10.17705/1jais.00059
  • Charki, M. H., & Josserand, E. (2008). Online reverse auctions and the dynamics of trust. Journal of Management Information Systems, 24(4), 175–197. https://doi.org/10.2753/MIS0742-1222240407
  • Chen, Y., & Reay, T. (2021). Responding to imposed job redesign: The evolving dynamics of work and identity in restructuring professional identity. Human Relations, 74(10), 1541–1571. https://doi.org/10.1177/0018726720906437
  • Chiu, Y.-T., Zhu, Y.-Q., & Corbett, J. (2021). In the hearts and minds of employees: A model of pre-adoptive appraisal toward artificial intelligence in organizations. International Journal of Information Management, 60, 102379. https://doi.org/10.1016/j.ijinfomgt.2021.102379
  • Cohen-Charash, Y., & Spector, P. E. (2001). The role of justice in organizations: A meta-analysis. Organizational Behavior and Human Decision Processes, 86(2), 278–321. https://doi.org/10.1006/obhd.2001.2958
  • Cohen, J., Cohen, J., Cohen, P., West, S. G. A., Leona, S., & Leona, S. A. (2003). Applied multiple regression/correlation analysis for the behavioral sciences. Routledge.
  • Colquitt, J. A., Conlon, D. E., Wesson, M. J., Porter, C. O., & Ng, K. Y. (2001). Justice at the millennium: A meta-analytic review of 25 years of organizational justice research. Journal of Applied Psychology, 86(3), 425. https://doi.org/10.1037/0021-9010.86.3.425
  • Craig, K., & Sadovykh, V. (2022). Perceived social media bias, social identity threat, and conspiracy theory ideation during the COVID-19 pandemic. 55th Hawaii International Conference on System Sciences, 5975–5984.
  • Craig, K., Thatcher, J. B., & Grover, V. (2019). The IT identity Threat: A conceptual definition and operational measure. Journal of Management Information Systems, 36(1), 259–288. https://doi.org/10.1080/07421222.2018.1550561
  • Creswell, J. W., & Creswell, J. D. (2005). Mixed methods research: Developments, debates, and dilemma. Berrett-Koehler Publishers.
  • Creswell, J. W., Plano Clark, V. L., Gutmann, M. L., & Hanson, W. E. (2003). Advanced mixed methods research designs. In Handbook of Mixed Methods in Social & Behavioral Research (pp. 209–240). SAGE.
  • Cronbach, L. J., & Meehl, P. E. (1955). Construct validity in psychological tests. Psychological Bulletin, 52(4), 174–203. https://doi.org/10.1037/h0040957
  • Daniels, J. (2018). The algorithmic rise of the “alt-right. Contexts, 17(1), 60–65. https://doi.org/10.1177/1536504218766547
  • Dhinakaran, A. (2021). Overcoming AI’s transparency paradox, Forbes, https://www.forbes.com/sites/aparnadhinakaran/2021/09/10/overcoming-ais-transparency-paradox/?sh=3b0f23624b77
  • Dubé, L., & Paré, G. (2003). Rigor in information systems positivist case research: Current practices, trends, and recommendations. MIS Quarterly, 27(4), 597–636. https://doi.org/10.2307/30036550
  • Elsbach, K. D. (2003). Relating physical environment to self-categorizations: Identity threat and affirmation in a non-territorial office space. Administrative Science Quarterly, 48(4), 622–654. https://doi.org/10.2307/3556639
  • Erickson, R. J. (1995). The importance of authenticity for self and society. Symbolic Interaction, 18(2), 121–144. https://doi.org/10.1525/si.1995.18.2.121
  • Erikson, H., & Salzmann-Erikson, M. (2016). Future challenges of robotics and artificial intelligence in nursing: What can we learn from monsters in popular culture? The Permanente Journal, 20(3). https://doi.org/10.7812/TPP/15-243
  • Felzmann, H., Fosch-Villaronga, E., Lutz, C., & Tamò-Larrieux, A. (2020). Towards transparency by design for artificial intelligence. Science and Engineering Ethics, 26(6), 3333–3361. https://doi.org/10.1007/s11948-020-00276-4
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/10.1177/002224378101800104
  • Fraedrich, E., & Lenz, B. (2016). Taking a drive, hitching a ride: Autonomous driving and car usage. In Autonomous driving (pp. 665–685). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-48847-8_31
  • Francis, P., & Winfield, H. N. (2006). Medical robotics: The impact on perioperative nursing practice. Urologic Nursing, 26(2), 99–108.
  • Friedman, N., & Ormiston, J. (2022). Blockchain as a sustainability-oriented innovation?: Opportunities for and resistance to blockchain technology as a driver of sustainability in global food supply chains. Technological Forecasting and Social Change, 175, 121403. https://doi.org/10.1016/j.techfore.2021.121403
  • Gable, G. G. (1994). Integrating case study and survey research methods: An example in information systems. European Journal of Information Systems, 3(2), 112–126. https://doi.org/10.1057/ejis.1994.12
  • García-Izquierdo, A. L., Moscoso, S., & Ramos-Villagrasa, P. J. (2012). Reactions to the fairness of promotion methods: Procedural justice and job satisfaction. International Journal of Selection and Assessment, 20(4), 394–403. https://doi.org/10.1111/ijsa.12002
  • Gillespie, T. (2018). Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press. https://doi.org/10.12987/9780300235029
  • Gini, A. (2001). My job, my self: Work and the creation of the modern individual. Routledge.
  • Glikson, E., & Woolley, A. W. (2020). Human trust in artificial intelligence: Review of empirical research. Academy of Management Annals, 14(2), 627–660. https://doi.org/10.5465/annals.2018.0057
  • Godin, G., Sheeran, P., Conner, M., & Germain, M. (2008). Asking questions changes behavior: Mere measurement effects on frequency of blood donation. Health Psychology, 27(2), 179. https://doi.org/10.1037/0278-6133.27.2.179
  • Grimshaw, D., Cooke, F.-L., Grugulis, I., & Vincent, S. (2002). New technology and changing organisational forms: Implications for managerial control and skills. New Technology, Work and Employment, 17(3), 186–203. https://doi.org/10.1111/1468-005X.00104
  • Guthey, E., & Jackson, B. (2005). CEO portraits and the authenticity paradox. Journal of Management Studies, 42(5), 1057–1082. https://doi.org/10.1111/j.1467-6486.2005.00532.x
  • Halevy, N., Weisel, O., & Bornstein, G. (2012). “In-group love” and “out-group hate” in repeated interaction between groups. Journal of Behavioral Decision Making, 25(2), 188–195. https://doi.org/10.1002/bdm.726
  • Hamilton, I. A. (2019). Uber says people are bullying its self-driving cars with rude gestures and road rage. Business Insider. https://www.businessinsider.com/uber-people-bullying-self-driving-cars-2019-6
  • Hannover, B., Birkner, N., & Pöhlmann, C. (2006). Ideal selves and self-esteem in people with independent or interdependent self-construal. European Journal of Social Psychology, 36(1), 119–133. https://doi.org/10.1002/ejsp.289
  • Harter, S. (2002). Authenticity. In C. R. Snyder & S. Lopez (Eds.), Handbook of positive psychology (pp. 382–394). Oxford University Press.
  • Haslan, S. (2004). Psychology in organizations: The social identity approach. Sage Publications, Inc.
  • Hayes, A. F. (2017). Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. Guilford publications.
  • Hitlin, S. (2003). Values as the core of personal identity: Drawing links between two theories of self. Social Psychology Quarterly, 66(2), 118–137. https://doi.org/10.2307/1519843
  • Hitlin, S. (2011). Values, personal identity, and the moral self. In Handbook of identity theory and research (pp. 515–529). Springer New York. https://doi.org/10.1007/978-1-4419-7988-9_20
  • Hodge, R. W., Siegel, P. M., & Rossi, P. H. (1964). Occupational prestige in the United States, 1925-63. American Journal of Sociology, 70(3), 286–302. https://doi.org/10.1086/223840
  • Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. Mis Quarterly, 29(3), 525–557. https://doi.org/10.2307/25148694
  • Joe-Wong, C., & Sen, S. (2018). Harnessing the Power of the Cloud: Revenue, fairness, and Cloud neutrality. Journal of Management Information Systems, 35(3), 813–836. https://doi.org/10.1080/07421222.2018.1481639
  • Joshi, K. (2005). Understanding user resistance and acceptance during the implementation of an order management system: A case study using the equity implementation model. Journal of Information Technology Case & Application Research, 7(1), 6–20. https://doi.org/10.1080/15228053.2005.10856057
  • Jussupow, E., Spohrer, K., & Heinzl, A. (2022). Identity threats as a reason for resistance to artificial intelligence: Survey study with medical students and professionals. JMIR Formative Research, 6(3), e28750. https://doi.org/10.2196/28750
  • Kan, B. M., July 15, 2019 6:07PM EST, & July 15, 2019. (2019). Like It or Not, You’re Getting Twitter’s Redesigned Website Soon. PCMAG. https://www.pcmag.com/news/369546/twitters-redesigned-desktop-website-will-replace-the-old-la
  • Kickul, J. (2001). When organizations break their promises: Employee reactions to unfair processes and treatment. Journal of Business Ethics, 29(4), 289–307. https://doi.org/10.1023/A:1010734616208
  • Kim, T., & Hinds, P. (2006). Who should I blame? Effects of autonomy and transparency on attributions in human-robot interaction. ROMAN 2006-The 15th IEEE International Symposium on Robot and Human Interactive Communication, Hatfield, UK (pp. 80–85).
  • Kim, H.-W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS Quarterly, 33(3), 567–582. https://doi.org/10.2307/20650309
  • King, W. R. (1978). Strategic planning for management Information Systems. MIS Quarterly, 2(1), 27. https://doi.org/10.2307/249104
  • Kitchin, R. (2017). Thinking critically about and researching algorithms. Information, Communication & Society, 20(1), 14–29. https://doi.org/10.1080/1369118X.2016.1154087
  • Kwon, Y. J., & Kwon, K.-N. (2015). Consuming the objectified self: The quest for authentic self. Asian Social Science, 11(2), 301–312. https://doi.org/10.5539/ass.v11n2p301
  • Lapointe, L., & Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS Quarterly, 29(3), 461–491. https://doi.org/10.2307/25148692
  • Laran, J., & Janiszewski, C. (2009). Behavioral consistency and inconsistency in the resolution of goal conflict. Journal of Consumer Research, 35(6), 967–984. https://doi.org/10.1086/593293
  • Laumer, S., & Eckhardt, A. (2012). Why do people reject technologies: A review of user resistance theories. Information Systems Theory: Explaining and Predicting Our Digital Society, 1(1), 63–86.
  • Lawrence, T. B., & Robinson, S. L. (2007). Ain’t misbehavin: Workplace deviance as organizational resistance. Journal of Management, 33(3), 378–394. https://doi.org/10.1177/0149206307300816
  • Lehman, D. W., O’Connor, K., Kovács, B., & Newman, G. E. (2019). Authenticity. Academy of Management Annals, 13(1), 1–42. https://doi.org/10.5465/annals.2017.0047
  • Lowry, P. B., Posey, C., Bennett, R., Becky, J., & Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Information Systems Journal, 25(3), 193–273. https://doi.org/10.1111/isj.12063
  • Lyytinen, K., & Newman, M. (2008). Explaining information systems change: A punctuated socio-technical change model. European Journal of Information Systems, 17(6), 589–613. https://doi.org/10.1057/ejis.2008.50
  • MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334. https://doi.org/10.2307/23044045
  • Marakas, G. M., & Hornik, S. (1996). Passive resistance misuse: Overt support and covert recalcitrance in is implementation. European Journal of Information Systems, 5(3), 208–219. https://doi.org/10.1057/ejis.1996.26
  • Markus, M. L. (1983). Power, politics, and MIS implementation. Communications of the ACM, 26(6), 430–444. https://doi.org/10.1145/358141.358148
  • Marsh, S., & Dibben, M. R. (2005). Trust, untrust, distrust and mistrust–an exploration of the dark (er) side. International Conference on Trust Management, Berlin (pp. 17–33).
  • Martinko, M. J., Zmud, R. W., & Henry, J. W. (1996). An attributional explanation of individual resistance to the introduction of information technologies in the workplace. Behaviour & Information Technology, 15(5), 313–330. https://doi.org/10.1080/014492996120085a
  • Mayer, D. M., Kuenzi, M., Greenbaum, R., Bardes, M., & Salvador, R. B. (2009). How low does ethical leadership flow? Test of a trickle-down model. Organizational Behavior and Human Decision Processes, 108(1), 1–13. https://doi.org/10.1016/j.obhdp.2008.04.002
  • McCarthy, E. D. (2009). Emotional performances as dramas of authenticity. In P. Vannini & J. P. Williams (Eds.), Authenticity in culture, self, and society (pp. 241–255). Ashgate.
  • Mcknight, D. H., Carter, M., Thatcher, J. B., & Clay, P. F. (2011). Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems (TMIS), 2(2), 12. https://doi.org/10.1145/1985347.1985353
  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359. https://doi.org/10.1287/isre.13.3.334.81
  • McWhorter, R. R., & Bennett, E. E. (2021). Creepy technologies and the privacy issues of invasive technologies. In Research anthology on privatizing and securing data (pp. 1726–1745). IGI Global.
  • Moorman, R. H. (1991). Relationship between organizational justice and organizational citizenship behaviors: Do fairness perceptions influence employee citizenship? Journal of Applied Psychology, 76(6), 845. https://doi.org/10.1037/0021-9010.76.6.845
  • Morwitz, V. G., & Fitzsimons, G. J. (2004). The mere-measurement effect: Why does measuring intentions change actual behavior? Journal of Consumer Psychology, 14(1–2), 64–74.
  • Murtagh, N., Gatersleben, B., & Uzzell, D. (2014). Identity threat and resistance to change: Evidence and implications from transport-related behavior. Identity Process Theory: Identity, Social Action and Social Change, 32(4), 335.
  • Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism. nyu Press.
  • Nunnally, J. (1978). Psychometric theory. McGraw-Monte.
  • O’Neil, I., Ucbasaran, D., & York, J. G. (2022). The evolution of founder identity as an authenticity work process. Journal of Business Venturing, 37(1), 106031. https://doi.org/10.1016/j.jbusvent.2020.106031
  • Pagliaro, S., Ellemers, N., & Barreto, M. (2011). Sharing moral values: Anticipated ingroup respect as a determinant of adherence to morality-based (but not competence-based) group norms. Personality and Social Psychology Bulletin, 37(8), 1117–1129. https://doi.org/10.1177/0146167211406906
  • Patel, V., Chesmore, A., Legner, C. M., & Pandey, S. (2022). Trends in workplace wearable technologies and connected-worker solutions for next-generation occupational safety, health, and productivity. Advanced Intelligent Systems, 4(1), 2100099. https://doi.org/10.1002/aisy.202100099
  • Paul, G., & Irvine, J. (2014). Privacy implications of wearable health devices. Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, UK (pp. 117–121).
  • Petriglieri, J. L. (2011). Under threat: Responses to and the consequences of threats to individuals’ identities. Academy of Management Review, 36(4), 641–662. https://doi.org/10.5465/AMR.2011.65554645
  • Powers, E. (2017). My news feed is filtered? Awareness of news personalization among college students. Digital Journalism, 5(10), 1315–1335. https://doi.org/10.1080/21670811.2017.1286943
  • Saad, G. (2020). Building a global database of nomological networks of cumulative evidence. Evolutionary Behavioral Sciences, 14(4), 368–372. https://doi.org/10.1037/ebs0000223
  • Schmidt, P. J., Riley, J., & Swanson Church, K. (2020). Investigating accountants’ resistance to move beyond excel and adopt new data analytics technology. Accounting Horizons, 34(4), 165–180. https://doi.org/10.2308/HORIZONS-19-154
  • Schwarz, N., & Oyserman, D. (2001). Asking questions about behavior: Cognition, communication, and questionnaire construction. American Journal of Evaluation, 22(2), 127–160. https://doi.org/10.1177/109821400102200202
  • Sheldon, K. M., Ryan, R. M., Rawsthorne, L. J., & Ilardi, B. (1997). Trait self and true self: Cross-role variation in the Big-Five personality traits and its relations with psychological authenticity and subjective well-being. Journal of Personality and Social Psychology, 73(6), 1380. https://doi.org/10.1037/0022-3514.73.6.1380
  • Stets, J. E. (1995). Role identities and person identities: Gender identity, mastery identity, and controlling one’s partner. Sociological Perspectives, 38(2), 129–150. https://doi.org/10.2307/1389287
  • Stets, J. E., & Burke, P. J. (2014). Self-esteem and identities. Sociological Perspectives, 57(4), 409–433. https://doi.org/10.1177/0731121414536141
  • Suder, S., & Erikson, M. (2021). Microchipping employees: Unlawful monitoring practice or a new trend in the workplace? In Algorithmic governance and governance of algorithms (pp. 71–85). Springer International Publishing. https://doi.org/10.1007/978-3-030-50559-2_4
  • Tabachnick, B. G., Fidell, L. S., & Ullman, J. B. (2007). Using multivariate statistics (Vol. 5). Pearson.
  • Tams, S., Thatcher, J. B., & Craig, K. (2018). How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy. Journal of Strategic Information Systems, 27(2), 170–190. https://doi.org/10.1016/j.jsis.2017.07.004
  • Thatcher, J. B., McKnight, D. H., Baker, E. W., Arsal, R. E., & Roberts, N. H. (2010). The role of trust in postadoption IT exploration: An empirical examination of knowledge management systems. IEEE Transactions on Engineering Management, 58(1), 56–70. https://doi.org/10.1109/TEM.2009.2028320
  • Turillo, C. J., Folger, R., Lavelle, J. J., Umphress, E. E., & Gee, J. O. (2002). Is virtue its own reward? Self-sacrificial decisions for the sake of fairness. Organizational Behavior and Human Decision Processes, 89(1), 839–865. https://doi.org/10.1016/S0749-5978(02)00032-8
  • Vannini, P., & Franzese, A. (2008). The authenticity of self: Conceptualization, personal experience, and practice. Sociology Compass, 2(5), 1621–1637. https://doi.org/10.1111/j.1751-9020.2008.00151.x
  • Vitale, F., Mcgrenere, J., Tabard, A., Beaudouin-Lafon, M., & Mackay, W. E. (2017). High costs and small benefits: A field study of how users experience operating system upgrades. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO (pp. 4242–4253).
  • Walker, J. (2005). Links and power: The political economy of linking on the web.
  • Wang, W., & Benbasat, I. (2016). Empirical assessment of alternative designs for enhancing different types of trusting beliefs in online recommendation agents. Journal of Management Information Systems, 33(3), 744–775. https://doi.org/10.1080/07421222.2016.1243949
  • Zhang, D., Peng, G., Yao, Y., & Browning, T. R. (2023). Is a college education still enough? The IT-Labor relationship with education level, task routineness, and artificial intelligence. Information Systems Research. https://doi.org/10.1287/isre.2021.0391
  • Zhou, W., & Piramuthu, S. (2014). Security/Privacy of wearable fitness tracking IoT devices. 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), Barcelona (pp. 1–5).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.