Intention to use mobile applications in competitive intelligence: An extended conceptual framework
Keywords:Behavioural intention, competitive intelligence systems, Mobile Applications, mobile apps, UTAUT2
AbstractThis article aims at identifying the key antecedents to behavioral intention anduse behavior of individuals regarding mobile applications that can support competitiveintelligence of firms. Attention was given to perspective antecedents in behavioural intentionand use behaviour of mobile applications in competitive intelligence. A qualitative researchbased on a literature review of 21 peer-reviewed journal articles covering a period of six yearsfrom 2014 was used. These articles were collected from separate databases using searchengines. All UTAUT2 constructs had a direct and significant influence on mobile applicationuse. Following significance factors were ease of use, perceived usefulness, perceived enjoyment,and trust. However, perceived risk, subjective norms, and self-efficacy were insignificant. Anextended model was later developed with 15 constructs. This article highlights the keydeterminants of user behavior regarding mobile applications that firms should act on in orderto foster the acceptance of these technologies despite the privacy risks that arise. Previousresearch has largely ignored the influence of perceptive antecedents in the behaviouralintention and use behaviour of mobile applications in competitive intelligence. This articlecovers this gap by drawing attention to the cognitive psychological perspective of thephenomenon.
Agarwal, R. and Prasad, J. (1999). “Are
individual differences germane to the
acceptance of new information technologies?”
Decision Sciences, Vol. 30, pp.361–391.
Ajzen, I. (1985). “From intentions to actions: a
theory of planned behavior.” In Kuhl, J. and
Beckman, J. (Eds.): Action-control: From
cognition to behaviour (pp.11–39), Springer,
Ajzen, I. (1991). “The theory of planned behavior,”
Organizational Behavior and Human Decision
Process, Vol. 50(2), pp. 179–211.
Ajzen, I. (2002). “Residual Effects of Past on Later
Behavior: Habituation and Reasoned Action
Perspectives,” Personality & Social Psychology
Review, Vol. 6(2), pp. 107-122.
Ajzen, I. and Fishbein, M. (2005). “The Influence
of Attitudes on Behavior,” in The Handbook of
Attitudes, D. Albarracín, B. T. Johnson, and
M. P. Zanna (eds.), Mahwah, NJ: Erlbaum, pp.
Arya, A. (April, 2011). “More than 10 billion app
store downloads served,” Macworld, Vol. 29(4),
Bandura, A. (1997). Self-Efficacy: The Exercise of
Control, Freeman, New York.
Barnea, A. (2013). “National Strategic
Intelligence and Competitive Intelligence and
what is in between,” National Strategic
Intelligence and Competitive Intelligence, Vol.
(3), pp. 37-44.
Benbasat, I. and Barki, H. (2007). “Quo Vadis,
TAM?” Journal of the AIS, Vol. 8(4), pp. 212-
Bergeron, P. and Hiller, C. A. (2002).
“Competitive intelligence,” Ann. Rev. Info. Sci.
Tech., Vol. 36, pp. 353–390.
Bose, R. (2008). “Competitive intelligence process
and tools for intelligence analysis,” Industrial
Management & Data Systems, Vol. 108(4), pp.
-528. DOI 10.1108/02635570810868362.
Bouhnik, D. and Deshen, M. (2014). “WhatsApp
goes to school: Mobile instant messaging
between teachers and students,” Journal of
Information Technology Education Research,
Vol. 13, pp. 217-231.
Brandtzæg, P. and Heim, J. (2009). “Why people
use social networking sites,” Online
Communities and Social Computing, Vol.
, pp. 143-152. DOI: 10.1007/978-3-642-
Brown, S. A. and Venkatesh, V. (2005). “Model of
Adoption of Technology in the Household: A
Baseline Model Test and Extension
Incorporating Household Life Cycle,” MIS
Quarterly, Vol. 29(4), pp. 399-426.
Bulao, J. (2021, August 6). How much data is
created every day in 2021? Retrieved
September 1, 2021, from
Calof, J. L. and Skinner, B. (1999). “Government’s
role in competitive intelligence: What’s
happening in Canada?” Competitive
Intelligence Magazine, Vol. 2(2), pp. 20-23.
Carlos, H. R. and Herrera, J. (2021). Innovation
and Competitive Intelligence in business: A
bibliometric Analysis, International Journal
of Financial Studies, 9: 31.
Chan, K. Y., Gong, M., Xu, Y., and Thong, J. Y. L.
(2008, July 3-7). “Examining User Acceptance
of SMS: An Empirical Study in China and
Hong Kong.” In Proceedings of 12th Pacific
Asia Conference on Information System,
Cheung, T. (2014). A study on motives, usage, selfpresentation
and number of followers on
Instagram (Thesis). City University of Hong
Kong, Hong Kong.
Childers, T. L., Carr, C. L., Peck, J., and Carson,
S. (2001). “Hedonic and Utilitarian
Motivations for Online Retail Shopping
Behavior,” Journal of Retailing, Vol. 7(4), pp.
Chiu, C. M. and Wang, E. T. G. (2008).
“Understanding web-based learning
continuance intention: the role of subjective
task value,” Information and Management,
Vol. 45(3), pp. 194-201.
Chong, A.Y., Darmawan, N., Ooi, K., and Lin, B.
(2010). “Adoption of 3G services among
Malaysian consumers: An empirical analysis,”
International Journal of Mobile
Communications, Vol. 8(2), pp. 129–149.
Church, K. and de Oliveira, R. (2013, August).
“What’s up with WhatsApp?: Comparing
mobile instant messaging behaviors with
traditional SMS.” In: Proceedings of the 15th
International Conference on Human-
Computer Interaction with Mobile Devices
and Services (pp. 352-361). Munich, Germany.
Creswell, J. W. (2009). Research design:
Qualitative, quantitative, and mixed methods
approaches (3rd Ed.), Thousand Oaks. CA:
Curtis, L., Edwards, C., Fraser, K. L., Gudelsky,
S., Holmquist, J., Thornton, K. and Sweetser,
K.D. (2010). “Adoption of social media for
public relations by nonprofit organizations’,
Public Relations Review, Vol. 36(1), pp. 90–92.
Davis, F. D. (1989). “Perceived usefulness,
perceived ease of use, and user acceptance,”
MIS Quarterly, Vol. 13(3), pp. 319–340.
Davis, F. D., Bagozzi, R. P. and Warshaw, P. R.
(1989). “User acceptance of computer
technology: a comparison of two theoretical
models,” Management Science, Vol. 35(8), pp.
Degerstedt, L. (2015). “Social competitive
intelligence: sociotechnical themes and values
for the networking organization,” Journal of
Intelligence Studies in Business, Vol. 5(3), pp.
Dishman, P. L. and Calof, J. L. (2007).
“Competitive Intelligence: A multiphasic
precedent to marketing strategy,” European
Journal of Marketing, Vol. 42(7/8), pp. 766-
Dodds, W. B., Monroe, K. B., and Grewal, D.
(1991). “Effects of Price, Brand, and Store
Information on Buyers,” Journal of Marketing
Research, Vol. 28(3), pp. 307-319.
Ellison, N., Steinfield, C., and Lampe, C. (2007).
“The benefits of Facebook ‘friends’: Social
capital and college students’ use of online
social network sites,” Journal of Computer-
Mediated Communication, Vol. 12(4), pp.
-1168. DOI: 10.1111/j.1083-
Field Manual 34-3 (1990). Intelligence Analysis,
Headquarters Department of the Army,
Washington, DC. U.S.A.
Fishbein, M. and Ajzen, I. (1975). Belief, Attitude,
Intention, and Behavior: An Introduction to
Theory and Research, Addison-Wesley,
Gefen, D. and Straub, D. W. (1997). “Gender
differences in the perception and use of e-mail:
an extension to the technology acceptance
model,” MIS Quarterly, Vol. 21, pp. 389–400.
Gefen, D., Karahanna, E., and Straub, D. W.
(2003). “Trust and TAM in online shopping: An
integrated model,” MIS Quarterly, Vol. 27(1),
Gilad, B. and Gilad, T. (1985). “A Systems
Approach to Business Intelligence,” Business
Horizons, Vol. 28(5), pp. 65–70.
Gračanin, S., Kalac , E., and Jovanović, D. (2015).
“Competitive Intelligence: importance and
application in practice,” Review of Innovation
and Competitiveness, Vol. 1(1), pp. 25-44.
Groß, M. (2015). “Exploring the acceptance of
technology for mobile shopping: An empirical
investigation among Smartphone users,” The
International Review of Retail, Distribution
and Consumer Research, Vol. 25(3), pp. 215-
Gupta, B., Dasgupta, S. and Gupta, A. (2008).
“Adoption of ICT in a government
organization in a developing country: an
empirical study,” Journal of Strategic
Information Systems, Vol. 17(2), pp. 140–154.
Han, S., Mustonen, P., Seppanen, M. and Kallio,
M. (2006). “Physicians’ acceptance of mobile
communication technology: an exploratory
study,” International Journal of Mobile
Communications, Vol. 4(2), pp. 210–230.
Homburg, C., Wieseke, J., and Kuehnl, C. (2010).
“Social influence on salespeople’s adoption of
sales technology: a multilevel analysis,”
Journal of the Academy of Marketing Science,
Vol. 38(2), pp. 159–168.
Huang, E. (2008). “Use and gratification in econsumers,”
Internet Research, Vol. 18(4), pp.
Islam, R., Islam, R., and Mazumder, T. (2010).
“Mobile application and its global impact,”
International Journal of Engineering and
Technology, Vol. 10(6), pp. 72-78.
Java, A., Song, X., Finin, T., and Tseng, B. (2007,
August). “Why we twitter: Understanding
microblogging usage and communities.” In:
Proceedings of the 9th WebKDD and 1st SNAKDD
Workshop on Web Mining and
Social Network Analysis (pp. 56-65). San Jose,
Joubert, J. and Van, J. (2013). “The role of trust
and risk in mobile commerce adoption within
South Africa,” International Journal of
Business, Humanities and Technology, Vol.
(2), pp. 27-38.
Kahaner, L. (1998). Competitive Intelligence: How
to Gather, Analyze and Use Information to
Move your Business to the Top, Touchstone,
Kang, S. (2014). “Factors influencing intention of
mobile application use,” International Journal
of Mobile Communications, Vol. 12(4), pp.
Karapanos, E., Teixeira, P., and Gouveia, R.
(2016). “Need fulfillment and experiences on
social media: A case on Facebook and
WhatsApp,” Computers in Human Behavior,
Vol. 55, pp. 888-897. DOI:
Kijsanayotin, B., Pannarunothai, S., and Speedie,
S. M. (2009). “Factors influencing health
information technology adoption in Thailand’s
community health centers: applying the
UTAUT model,” International Journal of
Medical Informatics, Vol. 78(6), pp. 404–416.
Kim, S. S. and Malhotra, N. K. (2005). “A
Longitudinal Model of Continued IS Use: An
Integrative View of Four Mechanisms
Underlying Post-Adoption Phenomena,”
Management Science, Vol. 51(5), pp. 741-755.
Kim, S. S., Malhotra, N. K., and Narasimhan, S.
(2005). “Two Competing Perspectives on
Automatic Use: A Theoretical and Empirical
Comparison,” Information Systems Research,
Vol. 16(4), pp. 418-432.
King, W. R. and He, J. (2006). “A meta-analysis of
the technology acceptance model,”
Information & Management, Vol. 43, pp.740–
Limayem, M., Hirt, S. G., and Cheung, C. M. K.
(2007). “How Habit Limits the Predictive
Power of Intentions: The Case of IS
Continuance,” MIS Quarterly, Vol. 31(4), pp.
Lin, C. P., and Anol, B. (2008). “Learning online
social support: An investigation of network
information technology based on UTAUT,”
Cyber Psychology and Behavior, Vol. 11(3), pp.
Lin, H. H. and Wang, Y. S. (2005). “Predicting
consumer intention to use mobile commerce in
Taiwan,” In Mobile Business, International
Conference, pp. 406-412.
Luarn, P., and Lin, H. H. (2005). “Toward an
understanding of the behavioral intention to
use mobile banking,” Computers in Human
Behaviour, Vol. 21(6), pp. 873–891.
Madureira, L., Popoviˇc, A. and Castelli, M.
(2021). “Competitive intelligence: A unified
view and modular definition,” Technological
Forecasting & Social Change, 173, pp. 1-17.
Maune, A. (2014a). “A conceptual analysis of the
role of competitive intelligence in Zimbabwe`s
banking sector,” Journal of Governance and
Regulation, Vol. 3(4), pp. 125-137.
Maune, A. (2014b). “Competitive Intelligence as
an Important Contributor to the Growth of
Banks: A Zimbabwean Perspective,” Journal
of Governance and Regulation, Vol. 3(3), pp.
Maune, A. (2017). “The Role of Competitive
Intelligence in Trade Facilitation in an
Emerging Economy,” Journal of Economics
and Behavioral Studies, Vol. 9(6), pp. 132-148.
Maune, A. (2019). “Competitive intelligence as a
game changer for Africa’s competitiveness in
the global economy,” Journal of Intelligence
Studies in Business, Vol. 9 (3), pp. 24-38.
McGonagle, J. J. and Vella, C.M. (2012).
Proactive intelligence, Springer-Verlag,
Montgomery, D. B. and Urban, G. L. (1970).
“Marketing decision-information systems: an
emerging view,” Journal of Marketing
Research, Vol. 7, pp. 226-34.
Montgomery, D. B. and Weinberg, C. B. (1979).
“Toward strategic intelligence systems,”
Journal of Marketing, Vol. 43, pp. 41-52.
Moore, G. C. and Benbasat, I. (1991).
“Development of an instrument to measure
the perceptions of adopting an information
technology innovation,” Information Systems
Research, Vol. 2(3), pp. 192–222.
Murphy, T. (2011). “App vs. Website: Banks
offering mobile banking services face a choice:
Should they develop mobile applications, a
mobile website or both?” Bank Technology
News, Vol. 24(6), pp. 39.
Narula, S. and Jindal, N. (2015). “Use of social
network sites by AUMP students: A
comparative study on Facebook, Twitter and
Instagram usage,” Journal of Advanced
Research, Vol. 2(2), pp. 20-24.
Neuman, W. L. (2014). Social Research Methods:
Qualitative and Quantitative Approaches (7th
Ed.), London: Pearson Education Limited.
Ouellette, J. A. and Wood, W. (1998). “Habit and
Intention in Everyday Life: The Multiple
Processes by Which Past Behavior Predicts
Future Behavior,” Psychological Bulletin, Vol.
(1), pp. 54-74.
Pearce, F. T. (1976). “Business intelligence
systems: the need, development and
integration,” Industrial Marketing
Management, Vol. 5 No. 2, p. 115.
Pellissier, R. and Nenzhelele, T. E. (2013).
“Towards a universal definition of
Competitive Intelligence,” South Africa
Journal of Information Management, Vol.
(2), Art. No. 559, 7 pages.
Pielot, M., de Oliveira, R., Kwak, H., and Oliver,
N. (2014, May). “Didn't you see my message?
Predicting attentiveness to mobile instant
messages.” In: Proceedings of the 32nd Annual
ACM Conference on Human Factors in
Computing Systems (pp. 3319-3328). Toronto,
Porter, M. E. (1980). Competitive Strategy:
Techniques of Analyzing Industries and
Competitors, The Free Press, New York.
Pynoo, B., Devolder, P., Tondeur, J., van Braak,
J., Duyck, W., and Duyck, P. (2011).
“Predicting secondary school teachers’
acceptance and use of a digital learning
environment: a crosssectional study,”
Computers in Human Behavior, Vol. 27(1), pp.
Rogers, E. M. (1962). Diffusion of Innovations,
The Free Press, New York.
Rogers, E. M. (1995). Diffusion of Innovations,
(4th Ed.), The Free Press, New York.
Schepers, J. and Wetzels, M. (2007). “A metaanalysis
of the technology acceptance model:
investigating subjective norm and moderation
effects,” Information & Management, Vol. 44,
Schneider, F., Feldmann, A., Krishnamurthy, B.,
and Willinger, W. (2009, November).
“Understanding online social network usage
from a network perspective.” In: Proceedings
of the 9th ACM SIGCOMM Conference on
Internet Measurement (pp. 35-48). Chicago,
Shneor, R. and Munimb, Z. H. (2019). “Reward
crowdfunding contribution as planned
behaviour: An extended framework,” Journal
of Business Research, Vol. 103, pp. 56–70.
Singer, P. W. and Friedman, A. (2014).
Cybersecurity and cyberwar: what everyone
needs to know, Oxford University Press, New
So, S. (2016). “Mobile instant messaging support
for teaching and learning in higher education,”
The Internet and Higher Education, Vol. 31,
pp. 32-42. DOI: 10.1016/j.iheduc.2016.06.001.
Solberg, K. S. (2017). “Why care about
competitive intelligence and market
intelligence? The case of Ericsson and the
Swedish Cellulose Company,” Journal of
Intelligence Studies in Business, Vol. 7(2), pp.
Sultan, A. (2014). “Addiction to mobile text
messaging applications is nothing to “lol”
about,” The Social Science Journal, Vol. 51(1),
pp. 57-69. DOI: 10.1016/j.soscij.2013.09.003.
Tan, K. S., Chong, S. C., Loh, P. L., and Lin, B.
(2010). “An evaluation of e-banking and
mbanking adoption factors and preference in
Malaysia: A case study,” International
Journal of Mobile Communications, Vol. 8(5),
Thong J. Y. L., Hong, S. J., and Tam, K. Y. (2006).
“The Effects of Post-Adoption Beliefs on the
Expectation–Confirmation Model for
Information Technology Continuance,”
International Journal of Human-Computer
Studies, Vol. 64(9), pp. 799-810.
van der Heijden, H. (2004). “User Acceptance of
Hedonic Information Systems,” MIS
Quarterly, Vol. 28(4), pp. 695-704.
Vasileiadis, A. (2014). “Security Concerns and
Trust in the Adoption of M-Commerce,” Social
Technologies, Vol. 4(1), pp. 179-191.
Venkatesh, V. and Davis, F. D. (2000). “A
theoretical extension of the technology
acceptance model: four longitudinal field
studies,” Management Science, Vol. 46(2), pp.
Venkatesh, V., Davis, F. D., and Morris, M. G.
(2007). “Dead or Alive? The Development,
Trajectory and Future of Technology Adoption
Research,” Journal of the AIS, Vol. 8(4), pp.
Venkatesh, V., Morris, M. G., Davis, G. B., and
Davis, F. D. (2003). “User Acceptance of
Information Technology: Toward a Unified
View,” MIS Quarterly, Vol. 27(3), pp. 425-478.
Venkatesh, V., Thong, J., and Xu, X. (2012).
“Consumer acceptance and use of information
technology: extending the unified theory of
acceptance and use of technology,” MIS
Quarterly, Vol. 36(1), pp. 157-178.
Vuleta, B. (2021, January 28). How much data is
created every day? Retrieved September 1,
, from https://www.seedscientific.com.
Wang, H. and Wang, S. (2010). “User acceptance
of mobile Internet based on the unified theory
of acceptance and use of technology:
investigating the determinants and gender
differences,” Social Behavior & Personality:
An International Journal, Vol. 38(3), pp. 415–
Wei, T. T., Marthandan, G., Chong, Y-L. A., Ooi,
K., and Arumugam, S. (2009). “What drives
Malaysian m-commerce adoption? An
empirical analysis,” Industrial Management
and Data Systems, Vol. 109(3), pp. 370-388.
Wong, S. (2012). “Which platform do our users
prefer: website or mobile app?” Reference
Services Review,” Vol. 40(1), pp. 103-115.
Xu, C., Ryan, S., Prybutok, V., and Wen, C.
(2012). “It is not for fun: An examination of
social network site usage,” Information and
Management, Vol. 49(5), pp. 210-217. DOI:
Yang, K. C. (2007). “Exploring factors affecting
consumer intention to use mobile advertising
in Taiwan,” Journal of International
Consumer Marketing, Vol. 20(1), pp. 33–49.
Yuen, Y. Y., Yeow, P. H. P., Lim, N., and Saylani,
N. (2010). “Internet banking adoption:
Comparing developed and developing
countries,” Journal of Computer Information
Systems, Vol. 51(1), pp. 52-61.
Zeithaml, V. A. (1988). “Consumer Perceptions of
Price, Quality, and Value: A Means–End
Model and Synthesis of Evidence,” Journal of
Marketing, Vol. 52(3), pp. 2-22.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).