Intention to use mobile applications in competitive intelligence: An extended conceptual framework

Authors

  • Alexander Maune

Keywords:

Behavioural intention, competitive intelligence systems, Mobile Applications, mobile apps, UTAUT2

Abstract

This article aims at identifying the key antecedents to behavioral intention anduse behavior of individuals regarding mobile applications that can support competitiveintelligence of firms. Attention was given to perspective antecedents in behavioural intentionand use behaviour of mobile applications in competitive intelligence. A qualitative researchbased on a literature review of 21 peer-reviewed journal articles covering a period of six yearsfrom 2014 was used. These articles were collected from separate databases using searchengines. All UTAUT2 constructs had a direct and significant influence on mobile applicationuse. Following significance factors were ease of use, perceived usefulness, perceived enjoyment,and trust. However, perceived risk, subjective norms, and self-efficacy were insignificant. Anextended model was later developed with 15 constructs. This article highlights the keydeterminants of user behavior regarding mobile applications that firms should act on in orderto foster the acceptance of these technologies despite the privacy risks that arise. Previousresearch has largely ignored the influence of perceptive antecedents in the behaviouralintention and use behaviour of mobile applications in competitive intelligence. This articlecovers this gap by drawing attention to the cognitive psychological perspective of thephenomenon.

References

Agarwal, R. and Prasad, J. (1999). “Are

individual differences germane to the

acceptance of new information technologies?”

Decision Sciences, Vol. 30, pp.361–391.

Ajzen, I. (1985). “From intentions to actions: a

theory of planned behavior.” In Kuhl, J. and

Beckman, J. (Eds.): Action-control: From

cognition to behaviour (pp.11–39), Springer,

Heidelberg, Germany.

Ajzen, I. (1991). “The theory of planned behavior,”

Organizational Behavior and Human Decision

Process, Vol. 50(2), pp. 179–211.

https://doi.org/10.1080/08870446.2011.613995

Ajzen, I. (2002). “Residual Effects of Past on Later

Behavior: Habituation and Reasoned Action

Perspectives,” Personality & Social Psychology

Review, Vol. 6(2), pp. 107-122.

Ajzen, I. and Fishbein, M. (2005). “The Influence

of Attitudes on Behavior,” in The Handbook of

Attitudes, D. Albarracín, B. T. Johnson, and

M. P. Zanna (eds.), Mahwah, NJ: Erlbaum, pp.

-221.

Arya, A. (April, 2011). “More than 10 billion app

store downloads served,” Macworld, Vol. 29(4),

p. 29.

Bandura, A. (1997). Self-Efficacy: The Exercise of

Control, Freeman, New York.

Barnea, A. (2013). “National Strategic

Intelligence and Competitive Intelligence and

what is in between,” National Strategic

Intelligence and Competitive Intelligence, Vol.

(3), pp. 37-44.

Benbasat, I. and Barki, H. (2007). “Quo Vadis,

TAM?” Journal of the AIS, Vol. 8(4), pp. 212-

Bergeron, P. and Hiller, C. A. (2002).

“Competitive intelligence,” Ann. Rev. Info. Sci.

Tech., Vol. 36, pp. 353–390.

Bose, R. (2008). “Competitive intelligence process

and tools for intelligence analysis,” Industrial

Management & Data Systems, Vol. 108(4), pp.

-528. DOI 10.1108/02635570810868362.

Bouhnik, D. and Deshen, M. (2014). “WhatsApp

goes to school: Mobile instant messaging

between teachers and students,” Journal of

Information Technology Education Research,

Vol. 13, pp. 217-231.

Brandtzæg, P. and Heim, J. (2009). “Why people

use social networking sites,” Online

Communities and Social Computing, Vol.

, pp. 143-152. DOI: 10.1007/978-3-642-

-1_16.

Brown, S. A. and Venkatesh, V. (2005). “Model of

Adoption of Technology in the Household: A

Baseline Model Test and Extension

Incorporating Household Life Cycle,” MIS

Quarterly, Vol. 29(4), pp. 399-426.

Bulao, J. (2021, August 6). How much data is

created every day in 2021? Retrieved

September 1, 2021, from

https://www.techjury.net.

Calof, J. L. and Skinner, B. (1999). “Government’s

role in competitive intelligence: What’s

happening in Canada?” Competitive

Intelligence Magazine, Vol. 2(2), pp. 20-23.

Carlos, H. R. and Herrera, J. (2021). Innovation

and Competitive Intelligence in business: A

bibliometric Analysis, International Journal

of Financial Studies, 9: 31.

https://doi.org/10.3390/ijfs9020031.

Chan, K. Y., Gong, M., Xu, Y., and Thong, J. Y. L.

(2008, July 3-7). “Examining User Acceptance

of SMS: An Empirical Study in China and

Hong Kong.” In Proceedings of 12th Pacific

Asia Conference on Information System,

Suzhou, China.

Cheung, T. (2014). A study on motives, usage, selfpresentation

and number of followers on

Instagram (Thesis). City University of Hong

Kong, Hong Kong.

Childers, T. L., Carr, C. L., Peck, J., and Carson,

S. (2001). “Hedonic and Utilitarian

Motivations for Online Retail Shopping

Behavior,” Journal of Retailing, Vol. 7(4), pp.

-535.

Chiu, C. M. and Wang, E. T. G. (2008).

“Understanding web-based learning

continuance intention: the role of subjective

task value,” Information and Management,

Vol. 45(3), pp. 194-201.

Chong, A.Y., Darmawan, N., Ooi, K., and Lin, B.

(2010). “Adoption of 3G services among

Malaysian consumers: An empirical analysis,”

International Journal of Mobile

Communications, Vol. 8(2), pp. 129–149.

Church, K. and de Oliveira, R. (2013, August).

“What’s up with WhatsApp?: Comparing

mobile instant messaging behaviors with

traditional SMS.” In: Proceedings of the 15th

International Conference on Human-

Computer Interaction with Mobile Devices

and Services (pp. 352-361). Munich, Germany.

Creswell, J. W. (2009). Research design:

Qualitative, quantitative, and mixed methods

approaches (3rd Ed.), Thousand Oaks. CA:

Sage.

Curtis, L., Edwards, C., Fraser, K. L., Gudelsky,

S., Holmquist, J., Thornton, K. and Sweetser,

K.D. (2010). “Adoption of social media for

public relations by nonprofit organizations’,

Public Relations Review, Vol. 36(1), pp. 90–92.

Davis, F. D. (1989). “Perceived usefulness,

perceived ease of use, and user acceptance,”

MIS Quarterly, Vol. 13(3), pp. 319–340.

Davis, F. D., Bagozzi, R. P. and Warshaw, P. R.

(1989). “User acceptance of computer

technology: a comparison of two theoretical

models,” Management Science, Vol. 35(8), pp.

–1003.

Degerstedt, L. (2015). “Social competitive

intelligence: sociotechnical themes and values

for the networking organization,” Journal of

Intelligence Studies in Business, Vol. 5(3), pp.

-34.

Dishman, P. L. and Calof, J. L. (2007).

“Competitive Intelligence: A multiphasic

precedent to marketing strategy,” European

Journal of Marketing, Vol. 42(7/8), pp. 766-

Dodds, W. B., Monroe, K. B., and Grewal, D.

(1991). “Effects of Price, Brand, and Store

Information on Buyers,” Journal of Marketing

Research, Vol. 28(3), pp. 307-319.

Ellison, N., Steinfield, C., and Lampe, C. (2007).

“The benefits of Facebook ‘friends’: Social

capital and college students’ use of online

social network sites,” Journal of Computer-

Mediated Communication, Vol. 12(4), pp.

-1168. DOI: 10.1111/j.1083-

2007.00367.x.

Field Manual 34-3 (1990). Intelligence Analysis,

Headquarters Department of the Army,

Washington, DC. U.S.A.

Fishbein, M. and Ajzen, I. (1975). Belief, Attitude,

Intention, and Behavior: An Introduction to

Theory and Research, Addison-Wesley,

Reading, MA.

Gefen, D. and Straub, D. W. (1997). “Gender

differences in the perception and use of e-mail:

an extension to the technology acceptance

model,” MIS Quarterly, Vol. 21, pp. 389–400.

Gefen, D., Karahanna, E., and Straub, D. W.

(2003). “Trust and TAM in online shopping: An

integrated model,” MIS Quarterly, Vol. 27(1),

pp. 51–90.

Gilad, B. and Gilad, T. (1985). “A Systems

Approach to Business Intelligence,” Business

Horizons, Vol. 28(5), pp. 65–70.

Gračanin, S., Kalac , E., and Jovanović, D. (2015).

“Competitive Intelligence: importance and

application in practice,” Review of Innovation

and Competitiveness, Vol. 1(1), pp. 25-44.

Groß, M. (2015). “Exploring the acceptance of

technology for mobile shopping: An empirical

investigation among Smartphone users,” The

International Review of Retail, Distribution

and Consumer Research, Vol. 25(3), pp. 215-

Gupta, B., Dasgupta, S. and Gupta, A. (2008).

“Adoption of ICT in a government

organization in a developing country: an

empirical study,” Journal of Strategic

Information Systems, Vol. 17(2), pp. 140–154.

Han, S., Mustonen, P., Seppanen, M. and Kallio,

M. (2006). “Physicians’ acceptance of mobile

communication technology: an exploratory

study,” International Journal of Mobile

Communications, Vol. 4(2), pp. 210–230.

Homburg, C., Wieseke, J., and Kuehnl, C. (2010).

“Social influence on salespeople’s adoption of

sales technology: a multilevel analysis,”

Journal of the Academy of Marketing Science,

Vol. 38(2), pp. 159–168.

Huang, E. (2008). “Use and gratification in econsumers,”

Internet Research, Vol. 18(4), pp.

–426.

Islam, R., Islam, R., and Mazumder, T. (2010).

“Mobile application and its global impact,”

International Journal of Engineering and

Technology, Vol. 10(6), pp. 72-78.

Java, A., Song, X., Finin, T., and Tseng, B. (2007,

August). “Why we twitter: Understanding

microblogging usage and communities.” In:

Proceedings of the 9th WebKDD and 1st SNAKDD

Workshop on Web Mining and

Social Network Analysis (pp. 56-65). San Jose,

California: ACM.

Joubert, J. and Van, J. (2013). “The role of trust

and risk in mobile commerce adoption within

South Africa,” International Journal of

Business, Humanities and Technology, Vol.

(2), pp. 27-38.

Kahaner, L. (1998). Competitive Intelligence: How

to Gather, Analyze and Use Information to

Move your Business to the Top, Touchstone,

New York.

Kang, S. (2014). “Factors influencing intention of

mobile application use,” International Journal

of Mobile Communications, Vol. 12(4), pp.

–379.

Karapanos, E., Teixeira, P., and Gouveia, R.

(2016). “Need fulfillment and experiences on

social media: A case on Facebook and

WhatsApp,” Computers in Human Behavior,

Vol. 55, pp. 888-897. DOI:

1016/j.chb.2015.10.015.

Kijsanayotin, B., Pannarunothai, S., and Speedie,

S. M. (2009). “Factors influencing health

information technology adoption in Thailand’s

community health centers: applying the

UTAUT model,” International Journal of

Medical Informatics, Vol. 78(6), pp. 404–416.

Kim, S. S. and Malhotra, N. K. (2005). “A

Longitudinal Model of Continued IS Use: An

Integrative View of Four Mechanisms

Underlying Post-Adoption Phenomena,”

Management Science, Vol. 51(5), pp. 741-755.

Kim, S. S., Malhotra, N. K., and Narasimhan, S.

(2005). “Two Competing Perspectives on

Automatic Use: A Theoretical and Empirical

Comparison,” Information Systems Research,

Vol. 16(4), pp. 418-432.

King, W. R. and He, J. (2006). “A meta-analysis of

the technology acceptance model,”

Information & Management, Vol. 43, pp.740–

Limayem, M., Hirt, S. G., and Cheung, C. M. K.

(2007). “How Habit Limits the Predictive

Power of Intentions: The Case of IS

Continuance,” MIS Quarterly, Vol. 31(4), pp.

-737.

Lin, C. P., and Anol, B. (2008). “Learning online

social support: An investigation of network

information technology based on UTAUT,”

Cyber Psychology and Behavior, Vol. 11(3), pp.

-272.

Lin, H. H. and Wang, Y. S. (2005). “Predicting

consumer intention to use mobile commerce in

Taiwan,” In Mobile Business, International

Conference, pp. 406-412.

Luarn, P., and Lin, H. H. (2005). “Toward an

understanding of the behavioral intention to

use mobile banking,” Computers in Human

Behaviour, Vol. 21(6), pp. 873–891.

Madureira, L., Popoviˇc, A. and Castelli, M.

(2021). “Competitive intelligence: A unified

view and modular definition,” Technological

Forecasting & Social Change, 173, pp. 1-17.

https://doi.org/10.1016/j.techfore.2021.121086

Maune, A. (2014a). “A conceptual analysis of the

role of competitive intelligence in Zimbabwe`s

banking sector,” Journal of Governance and

Regulation, Vol. 3(4), pp. 125-137.

Maune, A. (2014b). “Competitive Intelligence as

an Important Contributor to the Growth of

Banks: A Zimbabwean Perspective,” Journal

of Governance and Regulation, Vol. 3(3), pp.

-112.

Maune, A. (2017). “The Role of Competitive

Intelligence in Trade Facilitation in an

Emerging Economy,” Journal of Economics

and Behavioral Studies, Vol. 9(6), pp. 132-148.

Maune, A. (2019). “Competitive intelligence as a

game changer for Africa’s competitiveness in

the global economy,” Journal of Intelligence

Studies in Business, Vol. 9 (3), pp. 24-38.

McGonagle, J. J. and Vella, C.M. (2012).

Proactive intelligence, Springer-Verlag,

London.

Montgomery, D. B. and Urban, G. L. (1970).

“Marketing decision-information systems: an

emerging view,” Journal of Marketing

Research, Vol. 7, pp. 226-34.

Montgomery, D. B. and Weinberg, C. B. (1979).

“Toward strategic intelligence systems,”

Journal of Marketing, Vol. 43, pp. 41-52.

Moore, G. C. and Benbasat, I. (1991).

“Development of an instrument to measure

the perceptions of adopting an information

technology innovation,” Information Systems

Research, Vol. 2(3), pp. 192–222.

Murphy, T. (2011). “App vs. Website: Banks

offering mobile banking services face a choice:

Should they develop mobile applications, a

mobile website or both?” Bank Technology

News, Vol. 24(6), pp. 39.

Narula, S. and Jindal, N. (2015). “Use of social

network sites by AUMP students: A

comparative study on Facebook, Twitter and

Instagram usage,” Journal of Advanced

Research, Vol. 2(2), pp. 20-24.

Neuman, W. L. (2014). Social Research Methods:

Qualitative and Quantitative Approaches (7th

Ed.), London: Pearson Education Limited.

Ouellette, J. A. and Wood, W. (1998). “Habit and

Intention in Everyday Life: The Multiple

Processes by Which Past Behavior Predicts

Future Behavior,” Psychological Bulletin, Vol.

(1), pp. 54-74.

Pearce, F. T. (1976). “Business intelligence

systems: the need, development and

integration,” Industrial Marketing

Management, Vol. 5 No. 2, p. 115.

Pellissier, R. and Nenzhelele, T. E. (2013).

“Towards a universal definition of

Competitive Intelligence,” South Africa

Journal of Information Management, Vol.

(2), Art. No. 559, 7 pages.

http://dx.doi.org/10.4102/sajim.v15i2.559.

Pielot, M., de Oliveira, R., Kwak, H., and Oliver,

N. (2014, May). “Didn't you see my message?

Predicting attentiveness to mobile instant

messages.” In: Proceedings of the 32nd Annual

ACM Conference on Human Factors in

Computing Systems (pp. 3319-3328). Toronto,

Ontario, Canada.

Porter, M. E. (1980). Competitive Strategy:

Techniques of Analyzing Industries and

Competitors, The Free Press, New York.

Pynoo, B., Devolder, P., Tondeur, J., van Braak,

J., Duyck, W., and Duyck, P. (2011).

“Predicting secondary school teachers’

acceptance and use of a digital learning

environment: a crosssectional study,”

Computers in Human Behavior, Vol. 27(1), pp.

–575.

Rogers, E. M. (1962). Diffusion of Innovations,

The Free Press, New York.

Rogers, E. M. (1995). Diffusion of Innovations,

(4th Ed.), The Free Press, New York.

Schepers, J. and Wetzels, M. (2007). “A metaanalysis

of the technology acceptance model:

investigating subjective norm and moderation

effects,” Information & Management, Vol. 44,

pp. 90–103.

Schneider, F., Feldmann, A., Krishnamurthy, B.,

and Willinger, W. (2009, November).

“Understanding online social network usage

from a network perspective.” In: Proceedings

of the 9th ACM SIGCOMM Conference on

Internet Measurement (pp. 35-48). Chicago,

Illinois, USA.

Shneor, R. and Munimb, Z. H. (2019). “Reward

crowdfunding contribution as planned

behaviour: An extended framework,” Journal

of Business Research, Vol. 103, pp. 56–70.

Singer, P. W. and Friedman, A. (2014).

Cybersecurity and cyberwar: what everyone

needs to know, Oxford University Press, New

York.

So, S. (2016). “Mobile instant messaging support

for teaching and learning in higher education,”

The Internet and Higher Education, Vol. 31,

pp. 32-42. DOI: 10.1016/j.iheduc.2016.06.001.

Solberg, K. S. (2017). “Why care about

competitive intelligence and market

intelligence? The case of Ericsson and the

Swedish Cellulose Company,” Journal of

Intelligence Studies in Business, Vol. 7(2), pp.

-39.

Sultan, A. (2014). “Addiction to mobile text

messaging applications is nothing to “lol”

about,” The Social Science Journal, Vol. 51(1),

pp. 57-69. DOI: 10.1016/j.soscij.2013.09.003.

Tan, K. S., Chong, S. C., Loh, P. L., and Lin, B.

(2010). “An evaluation of e-banking and

mbanking adoption factors and preference in

Malaysia: A case study,” International

Journal of Mobile Communications, Vol. 8(5),

pp. 507-527.

Thong J. Y. L., Hong, S. J., and Tam, K. Y. (2006).

“The Effects of Post-Adoption Beliefs on the

Expectation–Confirmation Model for

Information Technology Continuance,”

International Journal of Human-Computer

Studies, Vol. 64(9), pp. 799-810.

van der Heijden, H. (2004). “User Acceptance of

Hedonic Information Systems,” MIS

Quarterly, Vol. 28(4), pp. 695-704.

Vasileiadis, A. (2014). “Security Concerns and

Trust in the Adoption of M-Commerce,” Social

Technologies, Vol. 4(1), pp. 179-191.

Venkatesh, V. and Davis, F. D. (2000). “A

theoretical extension of the technology

acceptance model: four longitudinal field

studies,” Management Science, Vol. 46(2), pp.

–204.

Venkatesh, V., Davis, F. D., and Morris, M. G.

(2007). “Dead or Alive? The Development,

Trajectory and Future of Technology Adoption

Research,” Journal of the AIS, Vol. 8(4), pp.

-286.

Venkatesh, V., Morris, M. G., Davis, G. B., and

Davis, F. D. (2003). “User Acceptance of

Information Technology: Toward a Unified

View,” MIS Quarterly, Vol. 27(3), pp. 425-478.

Venkatesh, V., Thong, J., and Xu, X. (2012).

“Consumer acceptance and use of information

technology: extending the unified theory of

acceptance and use of technology,” MIS

Quarterly, Vol. 36(1), pp. 157-178.

Vuleta, B. (2021, January 28). How much data is

created every day? Retrieved September 1,

, from https://www.seedscientific.com.

Wang, H. and Wang, S. (2010). “User acceptance

of mobile Internet based on the unified theory

of acceptance and use of technology:

investigating the determinants and gender

differences,” Social Behavior & Personality:

An International Journal, Vol. 38(3), pp. 415–

Wei, T. T., Marthandan, G., Chong, Y-L. A., Ooi,

K., and Arumugam, S. (2009). “What drives

Malaysian m-commerce adoption? An

empirical analysis,” Industrial Management

and Data Systems, Vol. 109(3), pp. 370-388.

Wong, S. (2012). “Which platform do our users

prefer: website or mobile app?” Reference

Services Review,” Vol. 40(1), pp. 103-115.

Xu, C., Ryan, S., Prybutok, V., and Wen, C.

(2012). “It is not for fun: An examination of

social network site usage,” Information and

Management, Vol. 49(5), pp. 210-217. DOI:

1016/j.im.2012.05.001.

Yang, K. C. (2007). “Exploring factors affecting

consumer intention to use mobile advertising

in Taiwan,” Journal of International

Consumer Marketing, Vol. 20(1), pp. 33–49.

Yuen, Y. Y., Yeow, P. H. P., Lim, N., and Saylani,

N. (2010). “Internet banking adoption:

Comparing developed and developing

countries,” Journal of Computer Information

Systems, Vol. 51(1), pp. 52-61.

Zeithaml, V. A. (1988). “Consumer Perceptions of

Price, Quality, and Value: A Means–End

Model and Synthesis of Evidence,” Journal of

Marketing, Vol. 52(3), pp. 2-22.

Downloads

Published

2021-10-13