Proceedings Template - WORD

Transcription

Proceedings Template - WORD
Salient beliefs that
influence
the
acceptance or rejection
of public e-services in
Lebanon
Abstract
This paper examines the reasons citizens would choose
to accept or non-accept/reject public e-services. The
approach taken was based on the model of acceptance
of technology in households (MATH) and on the two
factors theory. The research model was measured with
data gathered in two phases, via interviews with openended questions in the first stage, and through survey
with questionnaire in the second phase. Results of the
qualitative and the quantitative studies show that only
a small percentage of Lebanese intended to accept
government e-services. Perceived usefulness (PU),
perceived government support (PGS), computer self
efficacy (CSE), and perceived government influences
(PGI) are the key drivers of the e-services acceptance
intention (AI). For the non-intenders, barriers like fear
of government control (FGC), lack of trust in the security (TSEC), lack of trust in the privacy (TPRI), lack of
support (PGS), and lack of knowledge (CSE) were
most significant. In the two studies, the fear of government control (FGC) was the most important determinant, both in terms of frequency and in terms of
importance. The willingness to use the public eservices will be present if governments can develop
trust relationships with individuals, assure them that
their financial details are secure, that these services
will respect the privacy of citizens, and she will not use
e-services in order to increase control.
Référence : 22
Antoine HARFOUCHE
Maitre de Conférence au CREPA
Université Paris-Dauphine
Place du Maréchal de Lattre de Tassigny
75775 PARIS Cedex 16
Tél. : +33 (0)1 44 05 44 05
Fax : +33 (0)1 44 05 49 49
[email protected]
Stephane Bourlitaux-Lajoinie
Maitre de Conférences à l‟IAE de Tours, Laboratoire CERMAT
Directeur du M2 Marketing des Services
Tel : + 33 (0)2 47 36 10 42
Key-words:
E-government, e-services acceptance, MATH, TPB,
ICT acceptance intention, ITA e-Gov Model.
[email protected]
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Introduction
Research in information systems (IS) is concerned with
identifying the factors that facilitate or impede the acceptance and rejection (or non-acceptance) (Bagozzi 2007)
of e-services by citizens. Researchers seek to understand
the user‟s behavior by placing the individual at the center
of the inquiry. Understanding why people accept or reject
e-services or other information and communication technologies (ICTs) is one of most challenging issues in this
domain.
While ICTs acceptance in the workplace and at home has
been studied extensively, little systematic research has
been conducted to understand the determinants of acceptance of online public services by citizens. Government eservice acceptance by citizens is a substantial global
problem. Indeed, research shows that providing e-service
access and creating conditions for its usage does not
guarantee e-service acceptance by the citizens (Dwivedi
et al. 2009; UNDESA 2008; UNPAN 2005). Until today,
studies have shown that e-government initiatives have
failed to engage citizens. Despite incentives and media
campaigns that encourage citizens to go online for government transactions, most citizens of developing countries do not use government e-services and prefer to use
traditional face-to-face services (UNDESA 2008;
UNPAN 2005). Therefore, the success of e-government
will depend on whether governments are able to entice
citizens to accept and use online public services.
Today, in addition to the face-to-face service delivery
system, the Lebanese government is introducing the virtual channel of service delivery system (VCSDS). This
multichannel of service delivery system will allow the
government to offer two types of public service: traditional services and online services. As a result, the Lebanese government is appreciating the need to increase citizens‟ awareness regarding the transition to online delivery of public services. Therefore, the Lebanese government needs to better understand the factors that affect the
e-services acceptance or rejection (or non-acceptance)
intention.
According to van Dijk et al. (2008) a theory of the acceptance of public e-services is lacking. They also asserts
that this kind of theory have to be derived from a general
theory of acceptance and use of ICTs applied to the special context of the government to citizens (van Dijk et al.
2008, p. 383). In this article, we begin working on such a
theory. Therefore, this paper develops an integral model
of individuals‟ intention to accept or reject e-government
services (ITA e-Gov Model). It captures the influence of
different external and internal factors (enablers and inhibitors) on government e-services acceptance/ rejection at
the first stages of the acceptance process. Based on the
model of acceptance of technology in households
(MATH) conceptualized and measured by Brown and
Venkatesh (2001; 2005) and on Cenfetelli (2004) two
factors theory, the ITA e-Gov Model focuses on the association between (1) public e-services perceived outcomes
(2) citizens‟ personal variables, (3) social influences, and
(4) contextual factors, and their evaluations in the first
stages of the acceptance process. Developed from the
theory of planned behavior (TPB, e.g. Ajzen 1991) and
the decomposed theory of planned behavior (DTPB, e.g.
Taylor and Todd 1995a), MATH is suggested as an ideal
framework for understanding ICT acceptance outside the
workplace (Hsieh et al. 2008).
The ITA e-Gov Model was designed to capture the reasons for acceptance or rejection (or non-acceptance) of
public e-services in the Lebanese context. In order to
examine the inhibitors and enablers of the citizens‟ intention to accept e-services, data was collected in a first
stage from 188 randomly chosen potential Lebanese public e-service users. In Phase 1, open-ended questions
were asked about government e-services acceptance/nonacceptance intention, and about reasons for such acceptance or non-acceptance. Then, the 188 answers were
double coded based on a start list of beliefs (Miles and
Huberman 1984) that included variable definitions selected from prior research. After identifying salient beliefs of public e-services acceptance in Lebanon, the research model and the questionnaire were developed.
In Phase 2, we used a quantitative method. We surveyed
210 Lebanese potential public e-services users. The aim
was to understand the weight that the individual gave to
each variable. Therefore, respondents were asked to rate
each factor from the salient beliefs from 1 to 7 based on
how important it was in their acceptance or nonacceptance decision.
The ITA e-Gov Model could help governments better
deploy and manage their ICT investments by better understanding their citizens. Extensive efforts are necessary
to increase citizens‟ awareness about the transition to the
online delivery of government services. Government
communication could incorporate the variables that influence e-service acceptance intention.
In this paper, we begin by reviewing the technology acceptance literature. Then, we review the public e-services
acceptance literature. Based on prior research, a start list
of beliefs related to public e-service acceptance has been
created. After having defined each variable, we compare
respondents‟ answers to the start list. Then, we summarize the conceptual model of the public e-services acceptance intention by citizens. Finally, after testing the model, we describe in the conclusion the lessons learned from
this study. We also highlight the limitations and future
directions.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
1. Constructs that shape the public e-services acceptance process
One of the main reasons of difficulties that developing
countries face when implementing e-government, is the
low public e-services‟ acceptance and use by citizens
(Heeks 1999; Jaeger and Thompson 2003; Moon 2002;
Odedra-Straub 2003). Indeed, providing e-service access
and creating conditions for its usage (e-access and eskills) does not guarantee the acceptance and use of public e-services by citizens. Research indicates that in developing countries, e-government offerings have failed to
capture the imagination of the citizens (Dwivedi et al.
2009). Understanding the reasons of such low acceptance
and use may allow opportunities to develop more effective e-government policies. Thus, success of egovernment will depend on how governments entice citizens to accept and use online public services. Therefore,
governments need to better understand the factors that
influence the e-services acceptance/rejection by citizens.
According to Schwaerz and Chin (2007), ICT acceptance
“involves a holistic conjunction of a user‟s behavioral
interaction with the ICT over the time and his or her psychological
understanding/willingness
or
resistance/acceptance that develops within a specific social/environmental/organizational setting. The acceptation process may be conceptualized as a temporal sequence of activities that lead to initial acceptance and
subsequent adaptation and continued usage of an ICT by
the adopter.
1.1
Factors Influencing ICT Acceptance
Key constructs that shape the ICT acceptance process are
numerous. Based on Schwaerz‟s and Chin‟s (2007) definition and on diffusion of innovation theory (Rogers
1983), these key constructs are divided to four categories:
(1) ICT's perceived attributes and characteristics; (2) social influences and communication concerning the ICT
innovation received by the individual from his social
environment (3) individual differences and psychological
processes, and finally (4) the environmental influences
such as contextual factors.
The IS community has deeply investigated the relation
between these constructs. Indeed, twenty years ago, Davis
presented the most influential and commonly employed
theory in this domain (Lee et al. 2003): the technology
acceptance model (TAM). This model, presented as a
simplified adaptation of the theory of reasoned action
(TRA) and the theory of planned behavior (TPB) in the
IS context, has became a dominant paradigm (Straub and
Burton-Jones 2007). Ten percent of the total journal capacity in the IS field has been occupied with TAM studies (Lee et al 2003). The Journal of the Association of
Information Systems has even devoted a Special Issue in
2007 for the TAM research entitled “Quo Vadis TAM”.
But, fourteen years after TAM, by presenting the unified
theory of acceptance and use of technology (UTAUT, e.g.
Venkatesh et al. 2003) that synthesizes a large number of
TAM research, Venkatesh et al., ironically conveyed us
back to the TAM‟s origin: the TPB (Benbasat and Barki
2007).
Therefore, in order to explain the reasons for acceptance
or rejection (non-acceptance) of e-services by Lebanese,
we have selected one of the most useful theories in the
ICT voluntary acceptance context: the model of acceptance of technology in households (MATH, e.g. Brown
and Venkatesh 2005; Venkatesh and Brown 2001). The
MATH model extends the theory of planned behavior
(TPB, e.g. Ajzen 1991) by decomposing the beliefs that
comprise the attitude which determine the behavior intention (IA).
We think that MATH is more relevant than TAM because
MATH introduces a large number of factors that may
influence the acceptance/rejection of ICTs and e-services.
MATH allows the integration of more contextual beliefs
in the acceptance process. Indeed, according to the
MATH, ICT “acceptance intention” (IA) is a weighted
function of attitudinal, normative, and the control beliefs
structure. Attitudinal, normative, and the control beliefs
are decomposed into multi-dimensional beliefs structures.
1.1.1
Attitudinal beliefs
According to TRA, there are two kinds of attitudes: (1)
the individual‟s attitude towards the ICT (AICT) and
attitude concerning the ICT acceptance and use (Aacp).
Attitude toward the ICT represents a summary evaluation
of the ICT captured in such attribute dimensions as
good/bad, harmful/beneficial, likable/dislikable (Ajzen
and Fishbein 2000). Attitude toward ICT acceptance and
use (Aacp) is defined as a person's favorable/unfavorable
evaluation of the ICT acceptance and use. According to
Fishbein and Ajzen (1975), attitudes toward an innovation (AICT) do not strongly predict innovation acceptance and use (IA). Only the individual‟s attitude concerning the acceptance of an innovation (Aacp) determines its acceptance intention (IA). The individual‟s
attitude towards the innovation (AICT) influences the
ICT acceptance (IA) indirectly through influencing the
attitude concerning ICT acceptance and use (Aacp).
The individual‟s attitude toward accepting an ICT (Aacp)
is the function of the perceived consequences and outcomes that result from the acceptance and the usage of
the ICT. According to the decomposed theory of planned
behavior (DTPB, e.g., Taylor and Todd 1995a; 1995b)
and to MATH, attitude belief can be decomposed to a set
of attitudinal beliefs that derive from the literature which
describe the perceived characteristics of an innovation.
Indeed, in the Diffusion of Innovation Theory (IDT,
summarized in Table 1), Rogers indicates five ICT
attributes that are associated with the ICT acceptance
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
process: relative advantage, compatibility, complexity (or
ease of use), observability, and trialability (Rogers 1995).
The diffusion of Innovation Theory
Theory
Original measured ICT attributes
Results
The IDT examines
the determinants of
ICT or the ICT attributes which has
been translated in
Perceived Characteristics of using an
Innovation (PCI).
- Rogers (1995): relative advantage, compatibility,
complexity, observability, and trialability.
- Tornatzky and Klein (1982): cost, communicability,
divisibility, profitability, and social approval.
Tornatzky and Klein (1982); Agrawal and Prasad
(1998); Cooper and Zmud (1990) results:
- compatibility and relative advantage are positively
related to acceptance
- complexity is negatively related to acceptance
- PCI factors: relative advantage, compatibility, complexity, trialability, visibility, result demonstrability,
and image.
Moore and Benbasat (1991; 1996) results:
- all of the PCI factors, including voluntariness and
social norms influence the acceptance.
Table 1. This Table resumes the ICT attributes according to the diffusion of Innovation Theory
Tornatzky and Klein (1982), after analyzing 105 research
papers related to the IDT, identified five more characteristics: cost, communicability, divisibility, profitability,
and social approval. But, in their conclusion, they argued
that communicability and divisibility are closely related
to observability and to trialability.
Based on the TRA‟s (e.g. Fishbein and Ajzen 1975) assumption that users think about an ICT in terms of their
consequences not their attributes, Moore and Benbasat
(1991, p. 195; 1996) redefined the Rogers‟ five variables
in terms of usage consequences. They presented the full
set of perceived characteristics of using an innovation
(PCI) by adding image and willingness of use, and by
dividing observability into visibility and result demonstrability (e.g. Moore and Benbasat 1991, p. 202). They
also argued that the relative cost of an innovation (or
perceived cost) has a great effect on acceptance behavior.
But they did not include it in their research because they
were studying the ICT acceptance by employees within
organizations. Table 2 summarizes the definition of these
concepts.
Perceived characteristics of using an Innovation (PCI)
Definition
Relative advantage
The degree to which an innovation is
perceived as being better than its precursor.
Moore and Benbasat (1991) redefined “relative advantage” as the degree to which using the ICT innovation is
perceived as being better than using its precursor.
Compatibility
The degree to which an innovation is
perceived as being consistent with the
existing values, past experiences, and
needs of potential adopters.
Moore and Benbasat (1991) redefined “compatibility”
as the degree to which using this ICT is perceived as
being consistent with the existing values, needs, and
past experiences of potential adopters.
Complexity
The degree to which an innovation is
perceived as being difficult to understand and use.
Trialability
The degree to which an innovation may
be experimented with on a limited basis
before acceptance.
The degree to which the results of an
innovation are visible and communicable to others.
Observability
Cost
Communicability
Divisibility
Profitability
Sources
Redefined by… as …
Concepts
Rogers‟
IDT
(1995,
p.15).
Introduced by Tornatzky and Klein
(1982)
Closely related to observability.
Closely related to trialability.
Introduced by Tornatzky and Klein
(1982).
Tornatzky
and Klein
(1982)
Moore and Benbasat (1991) redefined “complexity” as
ease of use.
Moore and Benbasat (1991) redefined “trialability” as
the degree to which an innovation ICT may be experimented before acceptance.
Moore and Benbasat (1991) redefined “observability”
as the degree to which the results of using the innovation ICT are observable to others. They found that “observability” has construct ambiguity problems, so they
divided it into visibility and result demonstrability.
Moore and Benbasat (1991) redefined it as relative cost
or perceived cost.
Moore and Benbasat (1991) redefined it as “observability”.
Moore and Benbasat (1991) redefined it as “trialability”.
Moore and Benbasat did not include this characteristic.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Social Approval
Closely related to Moore and Benbasat‟s
image (1991).
Voluntariness to
use
The degree to which use of the innovation is perceived as being voluntary, or
of free will.
Moore and Benbasat‟ PCI (1991, p.203)
found that observability has construct
ambiguity problems, so they divided it
into visibility and result demonstrability.
Moore and Benbasat‟ PCI (1991, p.203)
found that observability has construct
ambiguity problems, so they divided it
into visibility and result demonstrability.
Result Demonstrability
Visibility
Table 2
Moore and
Benbasat‟
PCI (1991,
p.195;
203).
Moore and Benbasat (1991, p.195) redefined it as “image” or the degree to which use of an innovation ICT is
perceived to enhance one‟s image or status in one‟s
social system.
Moore and Benbasat (1991, p.195) redefined it as the
degree to which the use of the innovation is perceived
as being voluntary, or of free will.
The degree to which the results of adopting/accepting/using the ICT innovation are observable
and communicable to others.
The degree to which the ICT innovation is visible in the
environment of the adopter.
Perceived characteristics of using an Innovation (PCI)
Perceived usefulness (PU) and perceived ease of use
(PEU), proposed by Davis (1989) and Davis et al. (1989)
in TAM, are attributed to the PCI (Davis 1993; Davis et
al. 1989).
Based on the decomposed theory of planned behavior
(DTPB), the model of acceptance of technology in
households (MATH, e.g. Brown and Venkatesh 2005;
Venkatesh and Brown 2001) decomposes the attitudinal
beliefs in: utilitarian outcome (UO), hedonic outcome
(HO), and social outcomes (SO).
2.1.1.1. Utilitarian outcomes
Utilitarian outcomes (UO) adapt the rational basis for
ICT acceptance which is usually characterized by the
perceived usefulness of the ICT (Davis 1989; Davis et al.
1989, p.320) to the households‟ context. As summarized
in Table 3, PU is equivalent to Rogers‟ “relative advantage” (Rogers 1983; Moore and Benbasat 1991), to Compeau and Higgins‟ “outcome expectations” (1995b), to
Davis et al.‟s “extrinsic motivation” (1992), to Thompson
et al.‟s (1991) “job-fit”, and to Venkatesh et al.‟s (2003)
“performance expectancy”. The utilitarian outcomes
(UO) can be defined as the extent to which using an ICT
can enhances the effectiveness of user‟s activities.
Utilitarian outcomes
Constructs
Utilitarian
comes
Similar
constructs
Model
Authors
Definition
Perceived usefulness (PU)
TAM
Davis (1989); Davis
et al. (1989, p. 320)
Performance
expectancy
UTAUT
Venkatesh et
(2003, p. 447)
Extrinsic Motivation
MM
Davis et al. (1992, p.
1112)
Job Fit
MPCU
Thompson et
(1991, p. 129)
The degree to which a person believes that using a
particular system would enhance his or her job performance
The degree to which an individual believes that using
the system will help him or her to attain gains in job
performance.
The perception that users will want to perform an
activity because it is perceived to be instrumental in
achieving valued outcomes that are distinct from the
activity itself, such as improved job performance,
pay, or promotions.
The extent to which an individual believes that using
an ICT can enhance the performance of his or her job.
Relative advantage
IDT
Outcome
pectation
SCT
Rogers
(1983);
Moore and Benbasat
(1991, p. 195)
Compeau and Higgins (1995b)
out-
(MATH,
e.g.
Brown
and
Venkatesh 2005;
Venkatesh
and
Brown 2001)
ex-
Table 3.
al.
al.
The degree to which an innovation is perceived as
being better than its precursor.
The performance related consequences of the behavior. Specifically, the performance expectations that
deal with job related outcomes.
Utilitarian outcomes
2.1.1.2. Hedonic outcomes (HO)
Hedonic outcomes can be defined as the pleasure derived
from the acceptance and usage of an ICT. Hedonic outcomes (HO) adapt hedonic and affective ICT attributes.
Indeed, recently, IS scholars have included hedonic criteria and affective ICT attributes like: perceived enjoyment
(PE, Van der Heijden 2004; Sun and Zhang 2006), perceived affective quality of ICT (Zhang and Li 2005),
heightened enjoyment (Agarwal and Karahanna 2000),
and perceived playfulness (Sun and Zhang 2006). Table 4
summarizes these constructs that comprise the pleasure or
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
entertainment potential derived from the interaction with
the ICT.
Hedonic outcomes
Constructs
Hedonic
outcomes
(MATH,
e.g.
Brown
and
Venkatesh 2005;
Venkatesh
and
Brown 2001)
Similar constructs
Model
Authors
Definition
Perceived enjoyment (PE)
User Acceptance of
Hedonic Information Systems
Van der Heijden
(2004, p. 697); Lewis
et al. (2003, p. 163)
Perceived Affective Quality of
ICT (PAQ)
Perceived playfulness (PP)
Extended TAM
Zhang and Li (2005)
The extent to which fun can be derived
from using the system as such or the intrinsic enjoyment of the interaction with the
ICT
Fun and enjoyment perceived when using
an ICT.
Extended TAM
Sun
and
(2006)
Zhang
The extent to which the activity of using
ICT is perceived to be enjoyable in its own
right, apart from any performance consequences that may be anticipated
Heightened
joyment
Extended TAM
Agarwal and Karahanna (2000)
Defined and measured the same as perceived enjoyment.
en-
Table 4. Hedonic outcomes
2.1.1.3. Social outcomes
2.1.1.4. Control outcomes
Social outcomes (SO) refer to the image or the power that
the ICT acceptance gives to the user within his social
group. Social outcomes include the image or status gains,
result demonstrability and visibility (Venkatesh and
Brown 2001). These construct were defined in Table 2.
Karahana et al. (1999), in the decomposed theory of reasoned action (DTRA, e.g. Karahana et al. 1999) argued
that social outcomes play an important role in the acceptance process especially in the pre-acceptance period.
DTRA results show that visibility and result demonstrability are strong predictors of ICT acceptance but only in
the first phase of the acceptance process, while perception of image enhancement can predict ICT continued
usage in the post acceptance phase. According to MATH,
status gains impact on the acceptance of ICT increases
with the user‟s age (Brown and Venkatesh 2005).
In addition to the MATH‟s utilitarian outcome (UO),
hedonic outcome (HO), and social outcomes (SO), we
include the control outcomes (CO). The control outcomes
(CO) refer to the perceived characteristics of an ICT related to the control, like compatibility, trialability, relative cost, declining cost, and complexity or PEU. Control
outcomes (C0) differ from the perceived behavioral control that refers to the internal personal variables and to the
external resources, contextual, and environmental variables. Control outcomes are only related to ICT perceived characteristics. The most measured and used variable between the control outcomes is PEU. As summarized in Table 5, PEU is similar to “perceived complexity” (Rogers 1983; Thompson et al. 1991), to “effort expectancy” (UTAUT, Venkatesh et al. 2003), and to
Thompson et al.‟s “complexity” (1991).
Perceived ease of use construct
Constructs
Similar
constructs
Model
Authors
Definition
Perceived ease of use
(PEU)
The degree to which an
individual believes that
performing the behavior of
interest would be free of
effort.
Effort expectancy
Perceived
complexity
UTAUT
The degree of ease associated with the use of the
system.
The degree to which an innovation is perceived
as being difficult to understand and use.
Complexity
MPCU
Venkatesh et al.
(2003, p. 450)
Rogers
1983;
Thompson et al.
(1991)
Thompson et al.
(1991, p. 128)
IDT
The degree to which an innovation is perceived
as relatively difficult to understand and use.
Table 5.
Perceived ease of use construct according to the TAM (Davis 1989; Davis et al. 1989, p.320).
1.1.2
Normative beliefs
Prior research presented evidence that subjective norms
and social influences (friends and family influences FFI
and workplace referents‟ influences WRI) play a key role
in ICT acceptance, especially in the first stages of the
acceptance process (Karahana et al. 1999; Thompson et
al. 1991; Triandis 1971) and/or when users' knowledge
concerning the ICT are vague (Hartwick and Barki 1994).
As summarized in Table 6, the subjective norms construct
(TRA e.g. Ajzen 1991, TPB e.g. Fishbein and Azjen
1975; C-TAM-TPB e.g. Taylor and Todd 1995a; 1995b ;
and Matheison 1991) is equivalent to the social influences construct (Venkatesh et al. 2003), to the social
factors construct (Triandis 1980; Thompson et al. 1991),
and to societal norms (Warshaw 1980).
According to Fishbein and Azjen (1975), Ajzen (1991),
and Taylor and Todd (1995a; 1995b), a person's subjec-
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
tive norms (SN) may be influenced indirectly, for example, when the person infers that others think he or she
should use a system, or directly by other individuals, for
example, when referents tell the person that they think he
or she should use a system. The direct compliance effect
of subjective norms (SN) on intention to accept ICT (IA)
was identified in TRA, TPB, C-TAM-TPB, and MPCU
theories. This has also been proven by Hartwick and Barki (1994) in a mandatory context, but not in voluntary
usage contexts. Venkatesh and Brown (2001) have also
proven that the acceptance intention (IA) is influenced by
messages and stimuli conveyed via mass media and secondary sources like News, Newspapers, TVs, and radios
(Secondary Sources‟ Influences, SSI). In addition, TAM2
reflects the impact of two additional theoretical mechanisms: internalization and identification. Subjective norms,
also, includes the personal network exposure (PNE, e.g.
Hsieh et al. 2008; Valente 1995, p. 70) of the potential
adopters. Indeed, individuals‟ ICT acceptance intention
(IA) can also be influenced by how other members in the
individual‟s personal network respond to this ICT innovation. The personal network exposure (PNE) accounts
for the observed aggregate ICT acceptance behaviors in
an individual‟s personal network (Hsieh et al. 2008; Valente 1995, p. 70).
Normative beliefs construct
Construct
Normative
beliefs
(MATH, e.g.;
Brown
and
Venkatesh
2005;
Venkatesh and
Brown 2001)
Authors
Definition
Ajzen and Fishbein
(1980), Taylor and
Todd (1995a ; 1995b)
Warshaw (1980)
Belief of the consumer concerning the expectations of significant
others about the behavior multiplied by the consumer‟s felt need to
comply with those expectations.
Felt pressure from others.
Social Factors (SF)
Triandis
Thompson
(1991)
The individual‟s internalization of the reference groups‟ subjective
culture, and specific interpersonal agreements that the individual
has made with others, in specific social situations.
Social
(SI)
Venkatesh
(2003)
Subjective
(SN)
Norms
Societal Norms
Influences
(1980),
et al.‟s
et
al.
The general social pressure (in an organizational cultural setting)
for an individual to perform a behavior.
Table 6. Normative beliefs construct.
Consequently, subjective norms (SN) include friends and
family influences (FFI), secondary sources‟ influences
(SSI), and workplace referents‟ influences (WRI), with
personal network exposure (PNE).
lent to computer plaSyfulness (CP, Webster and Martocchio 1992; Moon and Kim 2001) and to personal innovativeness in ICT (PIIT, Agrawal and Prasad 1998; Agrawal and Karahanna 2000).
1.1.3
2.1.3.2. Contextual factors
Control beliefs
In general, perceived behavioral control (PBC) refers to
the user‟s ability to control the behavior. Ajzen (1991)
defined Perceived behaviour control (PBC) as both internal psychological determinant related to the target behaviour and to external resource and contextual constraints.
Consequently, PBC results only from the user‟s personal
variables and from the contextual factors.
2.1.3.1. Individual differences and psychological determinants
Researchers have studied a range of individual user characteristics that influence the acceptance or nonacceptance of the ICT innovation. Between all the individual characteristics, only one trait variable is specific to
ICT and refers to comparatively stable characteristics of
individuals which is invariant to situational stimuli:
Computer self efficacy (CSE). According to Compeau
and Higgins (1995a), computer self efficacy (CSE) can
predict ICT acceptance intention (IA). As defined in Table 7, computer self efficacy (CSE) refers to the individual's perceptions of his or her ability to use ICT in the accomplishment of a specific task (Compeau and Higgins
1995a; 1995b). Computer self efficacy (CSE) is equiva-
External control factors vary from context to context (Ajzen 2001) and depend on the situation. External control
factors consist of a large number of constructs like:
MPCU‟s Thompson et al.‟s (1991) facilitating conditions
(Venkatesh et al. 2003), Igbaria et al.‟s (1996) end user
support. Hartwick and Barki (1994) proved that control
evaluation is also related to the resources available for the
individual (such as: money, time, and information) that
can be a barrier inhibiting acceptance (such as: low financial resources, lack of time, or low experience).
Control beliefs are also related to trust. Indeed, according
to Gefen (2000), trust is a complex, multi-dimensional,
context-dependent construct. Trust is necessary for online
interactions where personal and financial information
exchange goes through the virtual channel of service delivery system characterized by high uncertainty (Hoffman
et al., 1999). It deals with the belief that the trusted party
will carry out its obligations (Gefen et al. 2003 a, 2003b).
This definition is rooted in Giddens‟ (1994) definition
which considers trust as a belief in someone‟s honesty
and credibility (Giddens 1994).
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
In a virtual context, trust refers to the user‟s ability to
control the actions of an e-service provider (Nah and
Davis 2002). This construct was defined as trust in the
privacy of the e-services and trust in the security aspects
of e-services (Chen and Barnes 2007; Hernandez and
Mazzon 2007; Nah and Davis 2002). The trust in privacy
reflects the user‟s confidence in the service provider‟s
ability to respect the user's privacy. Trust reveals the citizens confidence in the fact that his private information
will not be used by the service provider, or sold to others.
The trust in the security aspects of the e-services (Chen
and Barnes 2007; Hernandez and Mazzon 2007; Nah and
Davis 2002) refers to user‟s confidence in the e-service
provider‟s ability to protect and prevent the information
from being hacked (Nah and Davis 2002). Table 7 resumes the control beliefs.
Control beliefs
Construct
Computer self efficacy (Compeau and
Higgins 1995a)
Authors
Definition
playfulness
Webster and Martocchio (1992);
Moon and Kim (2001).
Personal innovativeness
in IT (PIIT)
Agrawal and Prasad (1998);
Agrawal and Karahanna (2000).
The degree of cognitive spontaneity in
microcomputer interactions.
An individual trait reflecting a willingness
to try out any new ICT;
Facilitating conditions
MPCU‟s Thompson et al. (1991);
Venkatesh et al. (2003); Taylor
and Todd (1995b).
End User Support
Igbaria et al. (1996).
Trust in the security
Chen and Barnes (2007); Hernandez and Mazzon (2007); Nah and
Davis (2002).
Trust in the privacy
Chen and Barnes (2007); Hernandez and Mazzon (2007); Nah and
Davis (2002).
Computer
(CP)
End user support
(Igbaria et al. 1996)
Trust (Gefen et al.
2003 a, 2003b)
The control beliefs relating to resource
factors such as time and money and ICT
compatibility issues that may constrain
usage.
High levels of support that promotes more
favorable beliefs about the system among
users as well as MIS staffs.
The user‟ confidence over the security
aspects of the e-services.
The user‟s confidence in the e-service
provider‟s ability to protect the information
by preventing it from being hacked.
The user‟s confidence in the service provider‟s ability to respect user's privacy.
User‟s confidence that his private information will not be used or sold to others.
Table 7. Control beliefs
1.2
Factors Influencing Public Eservices Acceptance
After reviewing large number of beliefs related to ICT
acceptance, we will compare it to literature in the egovernment research. Our aim is to detect the antecedents
that are unique to the e-service context as compared to
other voluntary ICT acceptance (e.g., PC acceptance,
Internet acceptance).
1.2.1
Attitudinal beliefs and public eservices
In adapting items from Van Slyke et al. (2004), Bélanger
and Carter (2006) measured the impact of the UO (relative advantage), SO (image), and CO (compatibility and
ease of use) on the intention to use e-government services. They found that higher level of UO (perceived relative
advantage) increases citizens‟ intentions to accept the
public e-services. Bretschneider et al. (2003) also demonstrated that the perceived benefit factor (UO) is a major
predictor of government e-services. Gilbert et al (2004),
Phang et al. (2005) reconfirmed it when they found that
perceived usefulness (or UO) of websites was the most
significant predictor of senior citizens‟ intention to accept
e-government.
Gilbert et al. (2004) confirmed that control outcomes
(CO), such as cost and time available, significantly influence willingness to use e-services. Bélanger and Carter
(2006) also found that higher levels of perceived image
enhancing value of e-government (SO) and higher levels
of perceived compatibility (CO) increase citizens‟ intentions to accept state e-government services. But contrary
to relative advantage, compatibility, and image, they
found that higher levels of perceived ease of use are not
significantly associated with increased use intentions of
e-government services (Bélanger and Carter 2006). By
doing so, they confirmed Phang et al. (2005) and Gilbert
et al. (2004) results. But we think that Bélanger and Carter (2006) had this result concerning ease of use because
they tested their model with college students that had an
average of nine years of experience with computers.
Therefore, we consider that the ease of use is still an important predictor of the acceptance especially when it is
the case of a population of normal citizens.
1.2.2
Normative beliefs and public eservices
Researchers in the IS field have studied the social influences impact on public e-services acceptance. For example Gefen et al. (2002) found that social influence has a
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
significant impact on intention to accept public eservices.
e-government were related to the increased vulnerability
due to security problems that could occur.
In Government to Citizen (G2C), the government plays
an important role in facilitating the acceptance of public
e-services by citizens (Hsieh et al. 2008). But until today,
few studies have examined the governmental direct influences on public e-services acceptance/rejection. Hsieh et
al. (2008) have showed that governments may use systematic approaches to raise awareness and interest among
citizens about public e-services. They can use different
media channels, including communicating directly with
citizens, to explain the benefits of using ICT and to offer
training and technical support (e.g., Kvasny 2002; Van
der Meer and Van Winden 2003). From the citizen‟s
perspective, these institutional efforts to encourage and
facilitate ICT use convey the message that the government is committed to their interests and has taken their
needs and requirements into consideration (Kvasny and
Keil 2002). In fact, prior research has revealed that government agencies may serve as important referents whose
expectation affects individual innovation acceptance
(Lynne et al. 1995). Therefore, the government may influence individual‟s acceptance of public e-services. In
this research, the governmental influences are represented
by the construct: perceived governmental influences
(PGI).
Therefore, trust in the security is an important behavior
belief in the G2C context. Therefore, we adapt trust in
security (Chen and Barnes 2007; Gefen and al. 2002;
Hernandez and Mazzon 2007; Nah and Davis 2002) definition to the public e-services context as “the citizen‟s
perception of the government ability to protect his personal information from being hacked.”
1.2.3
Control beliefs and public e-services
Several researchers have studied the impact of control
beliefs on the public e-services acceptance by citizens
(Warkentin et al. 2002). Results found that between all
the control beliefs, trust has the most significant predictor
on the intention to accept public e-services (Gefen et al.
2002; Lee et al. 2005). Indeed, Bélanger and Carter
(2005) demonstrated that trust has a significant influence
on intention. Lee et al. (2005) also confirmed that trusting beliefs in government e-services have a significant
effect on intention to use public e-services. But they also
found that citizen‟s trust in their government have only a
marginal effects on trusting beliefs in public e-services
(Lee et al 2005). Indeed, other researches also show that
only trust related to the public e-services can have an
effect on the acceptance intention.
Dubauskas‟ (2005) results illustrate that governments are
not considering citizen privacy concerns. They also assert
that citizen‟s expectations are not being taken into consideration by the government when implementing confidentiality policies. Therefore, by adapting trust in privacy
(Chen and Barnes 2007; Hernandez and Mazzon 2007;
Nah and Davis 2002) definition to the G2C context, we
define trust as “the citizen‟s perception of the government
ability to respect his privacy by preventing the usage of
his personal information for other purposes after the
transaction has taken place.”
Gefen et al (2002) found that trust was significantly influenced by the security guarantees. Grundén (2009) asserts that from a citizen perspective, disadvantages with
Other researchers assert that many citizens see in the egovernment a way to impose more control. Therefore,
they fear from the obvious dangers of abuse of power
(Davies 2005). In his much cited book “the Future of
democracy” Bobbio (1987) asserts that the new question
today is “who controls the controllers? He argues that
today, governments can see every gesture and listen to
every word or their subjects. According to Grundén
(2009) and Griffin et al. (2007), citizen‟s also developed
a kind of a fear from the government potential control.
Therefore, we define fear from government control as
“the worrying from the fact that the government can use
the personnel data gathered through e-services in order to
increase the control over citizens activities or salaries.”
There is also the citizen‟s computer self efficacy which
can influence the acceptance. Indeed, according to Lee et
al. (2005) computer self efficacy is an important predictor
of the public e-services acceptance.
1.3
The e-services acceptance bounded
in the Lebanese context
Unfortunately, there has been no scientific research linking Lebanese culture with ICT acceptance. There is only
little research that compares Lebanon to other Arab countries. Rose and Straub (1998), Straub, Lock, and Hill
(2001), for example, compared ICT acceptance in four
Arab countries: Jordan, Saudi Arabia, Lebanon, and Sudan. They considered these four Arab countries as one
unique culture. However, Lebanese culture cannot be
considered as a pure Arab culture. Lebanon has a heterogeneous society characterized by the existing of 18 religious subgroups. Many civil wars in the 19th and 20th
centuries have plagued the Lebanese citizens. The difficult history of cohabitation between these different communities has created a highly risky and hostile environment (Yahchouchi 2009). Therefore, Lebanese developed
tools such the wasta (or connections) as methods that can
assure trust in their daily transactions (Colli 2003). Today, the public services are accessed either through local
political leaders or through religious organization. This is
a deeply rooted practice among all Lebanese communities. Citizens‟ rights are re-packaged as favours (UNDP
2009).
Lebanese is a religious person who considers his life, at
any moment as whatever the Lord wills it to become
(Yahchouchi 2009). Religious social norms are deeply
embedded in everyday life.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Factors Influencing Public E-services Acceptance
Belief
structure
Core construct
Utilitarian
comes (UO)
Out-
Hedonic
(HO)
outcomes
Social
(SO)
Outcomes
Attitudinal
Beliefs
Control
(CO)
Outcomes
Definition
The degree to which a person
believes that using public eservices would be useful.
The extent to which using
public e-services is perceived
to be enjoyable in its own
right, apart from any performance consequences that
may be anticipated.
The power that the public eservices acceptance gives to
the user within his social
group.
Refers to the perceived characteristics of the public eservices related to the control, such as compatibility,
trialability, relative cost,
declining cost, and complexity or PEU.
Perceived
social
influences to use eservices (PSI)
The general social pressure
on individual to use eservices.
Perceived government
influences
(PGI)
The perceived expectation
from the government institutions for individuals to accept e-services.
Trust in
the
eservices
security
(TSEC)
The citizen‟s perception of
the government‟s ability to
protect his personal information from being hacked.
Normative
Beliefs
Trust
Trust in
the privacy
(TPRI)
Control Beliefs
Fear from government control (FGC)
Computer self efficacy (CSE)
Perceived government support (PGS)
Table 8.
The citizen‟s perception of
the government ability to
respect his privacy by preventing the usage of his personal information for other
purposes after the transaction
has taken place.
The worrying from the fact
that the government can use
the personnel data gathered
through e-services in order to
increase the control over
citizens activities or salaries.
The individual's perceptions
of his or her ability to use
ICT in the accomplishment
of a task
The help from the government in using e-services.
References in ICT
acceptance
References in public
e-services acceptance
Davis et al. (1989; 1992);
Rogers (1995, p.15-16);
Moore and Benbasat (1991,
p.195); Compeau and Higgins (1995b); Thompson et
al. (1991); Venkatesh et al.
(2003).
Bélanger
and
Carter
(2006); Bretschneider et al.
(2003); Van Slyke et al.
(2004); Phang et al.
(2005).
Van der Heijden (2004); Sun
and Zhang (2006)
Karahana et al. (1999);
Venkatesh
and
Brown
(2001);
Brown
and
Venkatesh (2005).
Rogers (1983); Moore and
Benbasat (1991); Compeau
and Higgins (1995b); Davis
et al. (1992), Thompson et
al.‟s (1991); Venkatesh et
al.‟s (2003).
Bélanger
and
Carter
(2006); Van Slyke et al.
(2004).
Bélanger
and
Carter
(2006); Van Slyke et al.
(2004).
Perceived social influences combine Secondary Sources
Influences like Media, News, News papers, TVs, etc. (SSI),
Direct Influences from Family and Friends (FFI), Workplace
Referents‟ Influences (WRI, e.g. Venkatesh and Brown
2001), and Personal Network Exposure (PNE, e.g. Valente
1995, p. 70, Hsieh et al. 2008).
Hsieh et al. (2008); Kvasny
(2002); Keil et al. (2003);
Construct related only to the Kvasny and Keil (2002);
e-government context.
Lynne et al. (1995), Van
der Meer and Van Winden
(2003).
Adapted from Hernandez
and Mazzon (2007), Coyle
(2001), Chen and Barnes
(2007).
Gefen and al. (2002), Nah
and Davis (2002).
Adapted from Chen and
Barnes (2007), Coyle (2001),
Hernandez and Mazzon
(2007).
Dubauskas (2005),
and Davis (2002).
Construct related only to the
e-government context.
Adapted
from
Davies
(2005), Griffin et al.
(2007), Grundén (2009).
Compeau
(1995).
Lee et al. (2005).
and
Higgins
Construct related only to the
e-government context but
originally adapted from the
end user support.
Factors Influencing Public E-services Acceptance
Nah
Grundén (2009), Tan and
Teo (2000).
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
These norms have an impact on the citizen‟s beliefs.
Therefore, we will present the potential impact of the
Lebanese culture on the attitudinal, normative, and control beliefs.
1.3.1
Utilitarian, hedonic, social, and control outcomes in Lebanon
The Lebanese culture can impact the acceptance or rejection of e-services. This influence goes through the relative importance that a person gives to utilitarian, hedonic,
social, and control outcomes in Lebanon.
For example, according to some researchers, Lebanese
actions are guided more by his emotional feeling than by
calculating reasoning (Weir 2002). This makes his behavior unpredictable and little rational. Therefore, the public e-services acceptance/rejection can results from the
hedonic outcomes which reflect the impacts of the affect
or feeling in the acceptance process;
In Lebanon, like in most of Arab World, human behaviour is mostly directed towards the long-term of accumulation of prestige, standing, relationship, and respect
(Al Omian and Weir 2005). The reason behind this long
term objectives is that the status of the individual is determined primarily by his image, his family position, and
his social contacts. Typical Lebanese statements are “My
father knows the minister” or “do you know with whom
you are talking?” The individual considers his personal
contacts as distinguishing himself from the rest of the
society. Therefore, Lebanese, like the other Arab seek
membership in those groups that offer them potential for
elevating their social standing (Ali 1990; 1995). Because
of this, Lebanese social image is considered as very important. Some researchers proved that the Lebanese is
ready to adopt a certain behaviors just in order to impress
his social group (Neal et al. 2005). Therefore, social outcomes can have an important role in the individual behaviour. Acceptance or rejection of public e-services can be
the result of a
According to Ali (1995), in the Arab culture, the cost
may sometimes be the last and least important aspect of
the behavior process. There is always the question of the
appropriate behaviour that comes first. So in high context
culture, if the behaviour is seen as an inappropriate behaviour or incompatible with the individual cultural values,
the behavior is likely to be rejected (Ali 1995).
1.3.2
The role of normative beliefs in Lebanon
In Lebanon, relationships are perceived as an important
factor in human behaviour. There are also, the relatives,
the friends, and the formal and informal groups who have
a decisive influence on the individual behaviour in Lebanon (Yahchouchi 2009).
2.3.2.1. Family Influences
In Lebanon, family has a significant influence on the
individual behaviour (Fahed-Sreih and Djoundourian
2006). Indeed, Lebanese spend most of his time within
his family. It is even common to find several generations
of the same family living next door to each other.
As the family is considered as an economic unit, family
norms and rules play a significant role in the individual
behaviour. The family structure is patriarchal. The most
influential person is the father. His role is to protect and
to provide resources for the entire family. All the family
members have to respect the father‟s wishes. Family traditions sanction consultation in the conduct of all aspect
of life.
The centrality of the father figure stems from the role of
the family as an economic unit, in which the father is the
property owner and producer on whom the rest of the
family depend.
2.3.2.2. Social influences: Informal Groups, formal
groups, and peers
In Lebanon, the individual is influenced mainly by one‟s
informal and formal groups. The Lebanese is also influenced by his peers, by personal network exposure, and by
his workplace referents (Fahed-Sreih and Djoundourian
2006. In the ICT acceptance, Loch et al. (2003) found
that social norm was an important factor in explaining the
Internet adoption by Arabs. They affirmed that Arab individuals are influenced by whether others are also using
Internet.
1.3.3
The role of control beliefs in the Lebanese context
Between the control beliefs, trust is one of the most influential beliefs in the Lebanese context. Studies show
that the Lebanese consumers do not trust the online environment. This fact is demonstrated by their fear of giving
away their personal and financial information because of
privacy concern (Jarvenpaa et al. 1999). But studies also
show that Lebanese do not trust their government. Indeed, the last UNDP 2009 report shows that more then
62.7 percent of the total population does not trust the
Council of Ministers. Only 11.7 percent of the Chiite,
26.5 percent of Orthodox, 30.5 percent of Catholic, 34.5
percent of Maronite, 50.3 percent of Druze, and 64 percent of Sunni trusts the Lebanese Council of Ministers
(UNDP 2009). Only 52 percent of the Lebanese trust
their parliament (UNDP 2009). But according to Lee et al
(2005), citizen‟s trust in their government have only a
marginal effects on trusting beliefs in public e-services.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
2.
2.1
Research methods and results
Discussions of the First Phase methodology and instrument development
In the first part of this research we extracted a large number of beliefs from previous research in ICT acceptance
and public e-services acceptance. But none of these research projects specify which beliefs are operative for the
public e-services context in Lebanon. According to TRA,
from this large number of beliefs, only a relative small
number serves as determinant of the citizen‟s behavioural
attitude in a specific context. Depending on the context,
researchers need to elicit the salient beliefs from the potential adopters (Ajzen 1991; Ajzen and Fishbein 1980;
Fishbein and Ajzen 1975).
Taylor and Todd (1995a) did not use this method. They
developed the decomposed belief structure for technology
acceptance by drawing from previous research in technology acceptance. Their approach was justified on the
basis that there is a wealth of existing research on technology acceptance, thus minimizing the need to elicit
beliefs afresh for each new technology acceptance setting.
We think that the Taylor and Todd (1995a) method does
not take into consideration the specificity of the context
in which the acceptance process is embedded. Therefore,
we prefer Ajzen‟s (1991), Ajzen‟s and Fishbein‟s (1980),
and Fishbein‟s and Ajzen‟s (1975) method that better
detect the salient beliefs. From Taylor and Todd (1995a),
we choose the way they selected their items, measures, or
questions related to each belief.
Consequently, we will combine these two methods by
proposing a third way: the decomposed salient belief
structure for public e-services acceptance. The decomposed salient belief structure can reflect more the salient
beliefs in the e-government context in Lebanon and can
help the researcher in finding good measures that have
already been tested and retested for internal consistency
and reliability. Therefore, based on Fishbein‟s paradigm
(Fishbein 1968) and in order to obtain a correct specification of the causal determinants of the public e-services
acceptance intention, we used, in Phase 1, a qualitative
method: interviews with open- ended questions. Questions were asked about government e-services acceptance
intention or about reasons for non-acceptance intention.
Therefore, after explaining the government online services to the interviewees, the respondents were asked if they
would agree or accept to use government e-services and
about influencing factors in their e-services intention
acceptance or non-acceptance decision. Regardless of
their answer, they were further questioned as to the reasons for their choice. Therefore, respondents who accepted government e-services were asked to identify the
factors that led to the acceptance of e-services. Similarly,
respondents who refused to use e-services were asked to
identify the factors that led to this non-acceptance decision.
Then, open-ended responses were double coded based on
a start list of beliefs that included their definitions from
prior research (Miles and Huberman 1984, p. 58). The
salient beliefs were specified by the respondents. The
intercoder reliability was 81 percent, which is well above
the minimum of 70 percent identified by Miles and Huberman (1984). Through the qualitative data anchored in
the trichotomous classification of TPB and MATH, our
first study identified the attitudinal, normative, and control salient beliefs related to the public e-services acceptance in the Lebanese context. These beliefs are salient
only in the government to citizen (G2C) context in the
Lebanese environment.
Therefore, the decomposed salient belief structure for
public e-services acceptance in Lebanon that we developed at the end of the phase one served as reference in
the development of the research model and questionnaire.
Items or measures were selected from prior research.
2.2
Salient beliefs that influence the
acceptance or rejection of public eservices in Lebanon
To understand the Lebanese citizen‟s intention decision
regarding acceptance or rejection of public e-services, the
qualitative data were divided into three categories based
on the citizens intentions expressed in the first stage: (1)
citizens who intended to accept e-services (intenders), (2)
citizens who intended not to accept (non-intenders), and
(3) those who were uncertain about their choice.
2.2.1
Salient Beliefs Affecting the Acceptance Intention
As presented in Table 9, results show that among 188
citizens, only 33 (17.55 percent) intended to accept government e-services. For these 33 intenders, attitudinal
beliefs such as utilitarian outcomes (UO, frequency =
96.96 percent of the intenders or 17 percent of the respondents), social outcomes (SO, frequency = 21.21 percent of the intenders or 3.72 percent of the respondents),
and control outcomes represented by the perceived ease
of use (CO, frequency = 42.42 percent of the intenders or
7.44 percent of the respondents), normative beliefs such
as perceived government influences (PGI, frequency =
57.57 percent of the intenders or 10.10 percent of the
respondents), and control beliefs such as perceived government support (PGS, frequency = 57.57 percent of the
intenders or 10.10 percent of the respondents) and computer self-efficacy (CSE, frequency = 60.60 percent of
the intenders or 10.63 percent of the respondents) were
the most cited key drivers of the e-services acceptance
intention (AI).
The behavioral beliefs related to the hedonic outcomes
(HO, frequency = 6.06 percent or 1 percent of the res-
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
pondents), the normative beliefs such as the social influences (SI, frequency = 12.12 percent or 2.12 percent from
the respondents) were also cited but by a few number of
citizens.
As expected, utilitarian outcomes (UO) were the most
salient behavioral beliefs, followed by computer self efficacy (CSE), perceived government influences (PGI) and
support (PGS).
2.2.2
Salient Beliefs Affecting the NonAcceptance Intention
For the citizens who intended to not-accept or reject the
government e-services, barriers like fear of the government control (FGC), lack of trust in the public e-services
security (TSEC), lack of trust related to privacy (TPRI),
lack of support (PGS), and lack of knowledge (CSE)
were most significant. Perceived usefulless (PU) of the e-
service is also an important factor (frequency=54) that
impacts the non-intenders‟ decision (frequently mentioned as perceived privacy and computer self-efficacy).
But the fear of government control was the most important determinant, both in terms of frequency and in terms
of importance.
Results also indicated that some factors (fear of government control, Lack of trust in the privacy, and lack perceived security) may act to uniquely impede acceptance
of government e-services. According to Cenfetelli (2004),
these acceptance inhibitors are beliefs held by a citizen
that act solely to impede acceptance intention when
present (and perceived) but which have no effect when
absent (or not perceived). These acceptance inhibitors are
distinguished from acceptance enablers, as being a perception for which there is no clear, positively valanced
antipole that is psychologically meaningful.
Salient beliefs related to government e-services acceptance/rejection in Lebanon and their indicators
Attitudinal
Beliefs
Salient
beliefs
Intenders
33 citizens (17.55 %)
Frequency
% /Intenders
% /188
Non-Intenders
146 citizens (77.65 %)
Frequency
% / Intenders
% / 188
UO
32
96.96 %
17 %
54
36.98%
28.72 %
HO
2
6%
1%
19
13.01 %
10.10 %
SO
7
21.21%
3.72 %
1
0.6 %
0.5 %
14
42.42 %
7.44 %
28
19.17 %
14.89 %
PSI
4
12.12 %
2.12 %
1
0.6 %
0.5 %
PGI
19
57.57 %
10.10 %
0
0
0
TSEC
0
0
0
97
66.43 %
51.59 %
TPRI
0
0
0
54
36.98 %
28.72 %
FGC
0
0
0
119
81.50 %
63.29 %
CSE
20
60.60 %
10.63 %
53
36.30 %
28.19 %
PGS
19
57.57 %
10.10 %
63
43.15 %
33.51 %
CO
Normative
Beliefs
Control
Beliefs
Uncertain
9 citizens
Table 9. Salient beliefs related to government e-services acceptance/rejection in Lebanon and their indicators
2.3
The e-government services acceptance intention model (ITA e-Gov
Model)
Based on the above literature review and discussions, and
based on the phase one results, we developed the research
model that reflects the various elements involved in the
mental processes of Lebanese citizens‟ acceptance/rejection of public e-services. We developed the
ITA e-Gov Model based on MATH (Venkatesh and
Brown 2001, Brown and Venkatesh 2005). According to
MATH, ICT acceptance intention (IA) is a weighted
function of behavioral attitudinal beliefs (utilitarian, hedonic, social, and control outcomes), normative beliefs,
and the control beliefs structure.
In the ITA e-Gov Model, the government e-services acceptance divide (ACD) is a weighted function of three
multidimensional formative constructs (or index): (1)
attitudinal beliefs toward accepting public e-services, (2)
normative beliefs, and (3) control beliefs.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Figure 1 The research model
As shown in Figure 1, there are several planes
represented in our model. The top plane represents the
conceptual plan. The middle planes represent first and
second-order empirical abstractions. The bottom plane
represents the observational plane.
The multidimensional constructs that constitute the middle plane (attitudinal beliefs, normative beliefs, and control beliefs) are usually operationalized by means of reflective indicators. These constructs can be better captured
if approach from a formative perspective. Indeed, inspection of the items constituting these indexes reveals that
the causal priority runs from the indicators to the construct. Attitudinal beliefs are formed as a combination of
utilitarian (UO), hedonic (HO), social (SO), and control
outcomes (CO) of public e-services acceptance. Normative beliefs are formed as perceived government influences (PGI) and subjective norms (SN). Control beliefs
are composed from perceived government support/lack of
support (PGS), computer self efficacy/non efficacy
(CSE), and inhibitors such as: lack of trust in the security
(LTSEC), lack of trust in the privacy (LTPRI), and fear
of government control (FGC).
2.4
Discussions of the Second Phase
methodology and instrument development
The ITA e-Gov Model was designed to capture the inhibitors and enablers behavioral beliefs of public eservices. In order to test the model, data was collected in
the Phase 2 from a sample of 210 randomly chosen potential Lebanese public e-service users. The sample characteristics are presented in the Table 10.
To achieve a representative sample of the Lebanese population above 18 years of age, a fixed percentage of
man/women, young adults/adults/young-seniors/seniors
were required. Interviewees were randomly approached
by personal interviews according to their region.
This approach by interviews was motivated by the wish
to be representative and to fully include the so-called
“have-nots” and “knows-nots”. We wanted to know their
reasons for non-acceptance and their intension for future
use of public e-services. A triple language instrument was
used. Respondents were randomly selected in the streets
from all the Lebanese regions.
The aim of this questionnaire was to measure the weight
or the importance that citizens give to each belief. Therefore, we asked respondents to rate each factor on how
important it was in his acceptance or non-acceptance
decision, using a scale ranging from 1 (Not Important) to
7 (Very Important).
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Population
Gender
Religion
Region
Education
Monthly Income
Age
Male
Female
Christian
Muslim
Urban
Rural
Less than secondary
Between secondary and high school
(baccalauréat II)
University (1-3 years)
University (more than 3 years)
Less than 500 USD
500-900
900-1500
1500-2000
2000-2800
> 2800
< 18 years
18-28
29-42
43-64
> 64
Population Characteristics
Sample Characteristics
Nb
%
nb
%
4017095
100
210
100
1952672
49%
103
49%
2064423
51%
107
45%
1566678
39%
81
39%
2450417
61%
129
61%
2691453
67%
140
67%
1325641
33%
70
33%
1044445
26%
54
26%
1205128
30%
75
36%
1044445
26%
54
26%
723077
18%
27
12%
10
5%
63
30%
73
35%
28
13%
23
11%
13
6%
There is no accurate statistics on
this subject
1084615
27%
0
0%
1004273
25%
73
35%
956068
23.8%
79
37%
682906
17%
50
24%
289232
7.2%
8
4%
Table 10. Population and sample characteristics
2.4.1
The dependent variable
The main dependent variables to be explained were the
actual
acceptance/rejection,
intended
acceptance/rejection, and potential acceptance/rejection of the
main public e-services of the Lebanese national administration in 2008. Therefore, a part of this questionnaire
was about the actual, the intended, or the potential acceptance/rejection of a long list of public e-services proposed
by the Lebanese national administration, such as national
government
information
services
at
www.egateway.gov.lb,
or
downloadable
forms
at
www.informs.gov.lb, websites of ministries presented in
Appendix A, tax transaction services or e-taxes, health
care e-services, social services and benefits, application
for a building permit, appointment to apply for a passport, request for a certificate of birth, national identification card, or citizenship, notification of a situation change
(marriage, address change, etc). In these questions we did
not distinguish one service from another. E-services were
presented in bulk or as a set of services proposed by the
government.
The interviewees were asked if they intended to use public e-service when this is possible and when they need it.
Based on Van Dijk et al. (2008), we added the expression
“possible” because all public services are not yet available in electronic version. We added also the expression
“when you need it” because many services/e-services are
only needed incidentally (such as a passport renewal).
The first three items that measures the intention acceptance divide: “I‟m very likely to (…) to use public eservices when this is possible and when I need it”; “I
intend to (…) to use public e-services in future when this
is possible and when I need it”; “I will probably (…) to
use public e-services” on a scale going from extremely
reject to extremely accept (-3, -2, -1, 0, 1, 2, 3).
2.4.2
The independent variables
In each of three multidimensional independent constructs, we need to consider all facets of the construct.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Indeed according to Nunnally and Bernstein (1994, p.
484) failure to consider all facets will lead to an exclusion of relevant indicators and that will exclude a part of
the construct itself. For a parsimony reasons, the different
dimensions of beliefs will be measured by single-item
scales. Attitudinal beliefs (AB) will be measured with
four reflective measures: perceived utilitarian outcomes
(UO), perceived hedonic outcomes (HO), perceived social outcomes (SO), and perceived control outcomes of
public e-services acceptance (CO). Normative beliefs
(NB) will be formed with two single-items scales: perceived government influences (PGI), subjective norms
(SN). Control beliefs (CB) will be composed from five
single-items scales: perceived government support/lack of
support (PGS), computer self efficacy/non efficacy
(CSE), and the three inhibitors: lack of trust in the security (LTSEC), lack of trust in the privacy (LTPRI), and fear
of government control (FGC).
Attitudinal beliefs were measured in this way: “I think
public e-services are (…):
Extremely worthless/Extremely useful” (on a scale going from -3 to 3); “I
really (…) using public e-services” (Extremely dislike/
Extremely like on a scale -3, -2, -1, 0, 1, 2, 3); “I think
that people who use public e-services have more prestige
than those who do not” (Strongly disagree/Strongly agree
on a scale -3, -2, -1, 0, 1, 2, 3); and “I find public eservices to be (….)” (Difficult to use/easy to use on a
scale -3, -2, -1, 0, 1, 2, 3).
Normative beliefs were measured by these two measures:
“I think that the government wants me to use public eservices” and “I Think that people who are important to
me, want me to use public e-services” on a scale going
from extremely reject to extremely accept.
Control beliefs were also measured with these factors: “I
feel comfortable using the public e-services on my own”
and “I find that the government is supporting the public
e-services usage on a scale going from strongly disagree
to strongly agree on a scale; “I do trust the security of the
public e-services in Lebanon” and “I do trust that the
government will respect privacy when using the public eservices in Lebanon” on a scale going from extremely
reject to extremely accept; and finally, “I fear that the
government will use public e-services to control my activities” on a scale from strongly disagree to strongly
agree. Table 11 resumes the questionnaire.
Subsequently, we used the Structural Equation Modeling
(SEM), Partial Least Squares (PLS) techniques to analyze
data with the purpose of relating the dependent variable
(e-service non-acceptance intention or acceptance intention) to the set of independent variables. PLS was most
appropriate given the large number of constructs that
resulted when all these salient beliefs were combined.
SmartPLS (Chin and Frye 1996) was used for the analysis. The bootstrap resampling method (200 resamples)
was used to determine the significance of the paths within
the structural model.
Operationalization of the constructs
Belief
structure
Core construct
Utilitarian
Outcomes
(UO)
Attitudinal
Beliefs
Hedonic
outcomes
(HO)
Social Outcomes (SO)
Control
Outcomes
(CO)
Normative
Beliefs
Perceived
social influences to use
e-services
(PSI)
Questions
Q1. I think public e-services are:
Extremely worthless -3 -2 -1 0 1 2 3 Extremely useful
Q2. I really … using public e-services
Extremely dislike -3 - 2 -1 0 1 2 3 Extremely like
Q3. I think that people who use public e-services have
more prestige than those who do not
Strongly disagree -3 -2 -1 0 1 2 3 Strongly agree
Q4. I find public e-services to be:
Difficult to use 3 -2 -1 0 1 2 3 easy to use
Q5. I Think that people who are important to me, want me
to use public e-services
Extremely reject -3 -2 -1 0 1 2 3 Extremely accept
References in public eservices acceptance
Bélanger and Carter
(2006); Bretschneider et
al. (2003); Van Slyke et
al. (2004); Phang et al.
(2005).
Van
der
Heijden
(2004); Sun and Zhang
(2006)
Bélanger and Carter
(2006); Van Slyke et al.
(2004).
Bélanger and Carter
(2006); Van Slyke et al.
(2004).
Hsieh et al. (2008)
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Control
Beliefs
Public
e-services
acceptance/rejec
tion
Perceived
government
influences
(PGI)
Q6. I think that the government wants me to use public eservices
Trust in the
e-services
security
(TSEC)
Q7. I do trust the security of the public e-services in Lebanon
Trust in the
privacy
(TPRI)
Q8. I do trust that the government will respect privacy
when using the public e-services in Lebanon
Fear from
government
control
(FGC)
Q9. I fear that the government will use public e-services to
control my activities
Strongly agree -3 -2 -1 0 1 2 3 Strongly disagree
Adapted from Davies
(2005), Griffin et al.
(2007),
Grundén
(2009).
Computer
self efficacy
(CSE)
Q10. I feel comfortable using the public e-services on my
own
Lee et al. (2005).
Perceived
government
support
(PGS)
Q11. I find that the government is supporting the public eservices usage
Actual acceptance/reject
ion (INT1)
Q12. I‟m very likely to (…) to use public e-services when
this is possible and when I need it.
Intended
acceptance/reject
ion (INT2)
Q13. I intend to (…) to use public e-services in future
when this is possible and when I need it.
Potential
acceptance/reject
ion (INT3)
Q14. I will probably (…) to use public e-services.
Extremely reject -3 -2 -1 0 1 2 3 Extremely accept
Extremely reject -3 -2 -1 0 1 2 3 Extremely accept
Extremely reject -3 -2 -1 0 1 2 3 Extremely accept
Gefen and al. (2002),
Nah and Davis (2002).
Dubauskas (2005), Nah
and Davis (2002).
Strongly disagree -3 -2 -1 0 1 2 3 Strongly agree
Strongly disagree -3 -2 -1 0 1 2 3 Strongly agree
Grundén (2009), Tan
and Teo (2000).
van Dijk et al. (2008)
Extremely reject -3 -2 -1 0 1 2 3 Extremely accept
van Dijk et al. (2008)
Extremely reject -3 -2 -1 0 1 2 3 Extremely accept
Extremely reject -3 -2 -1 0 1 2 3 Extremely accept
Table 11
3.
Hsieh et al. (2008);
Kvasny (2002); Keil et
al. (2003); Kvasny and
Keil (2002); Lynne et
al. (1995), Van der
Meer and Van Winden
(2003).
van Dijk et al. (2008)
Operationalization of the constructs
Research Results
According to our survey, only 15 % of respondents accepted or had the intention to accept public e-services. In
order to understand which behavioral beliefs explain the
current level of actual and intended rejection/acceptance
of the e-services in Lebanon, we begin by testing the
instrumentation of the study as recommended by Straub
(1989).
All our multidimensional constructs are formatives.
Therefore, Cronbach is not the appropriate test for these
kinds of constructs. In PLS, the weights represent the
influence of individual scale items on the formative construct. Like in Loch et al. (2003), and because all data
were a seven point scale constructs, we multiplied values
by their individual PLS weights and summed them up for
each construct. Then we created a weighted score for
each measure and a composite score for each formative
construct. We used these values to run inter-item correlations as well as item-to-construct correlations (Lock et al.
2003). Results are presented in the Table 12.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
The Inter-item correlations
AB
CO
SO
UO
HO
PSI
PGI
PGS
TPRI
TSEC
CSE
FGC
INT1
INT2
INT3
0.7795
0.7801
0.8687
0.6163
0.0245
0.4559
0.0551
0.3257
0.2995
-0.0302
0.2564
0.3138
0.2556
0.4175
SN
0.4806
0.0409
0.2699
-0.3028
0.5472
0.9899
0.2483
0.2634
0.1489
0.0924
0.1488
0.1540
0.1661
0.1780
PBC
0.1556
-0.1007
0.3270
-0.0910
0.0054
0.1864
0.7926
0.8035
0.9004
0.8948
0.9197
0.6851
0.5693
0.5226
AI
0.2354
-0.0453
0.3294
-0.0374
0.0261
0.1779
-0.1308
0.6542
0.7514
-0.0994
0.8092
0.9414
0.9160
0.9573
Table 12. The Inter-item correlations
Table 12 shows that all items correlate significantly to
their constructs. All items load more highly on their re-
spective constructs than on other constructs. Table 13
resumes the outer weights of these constructs.
The outer weights of the formative constructs
AB
CO
SO
UO
HO
PSI
PGI
PGS
TPRI
TSEC
CSE
FGC
INT1
INT2
INT3
SN
PBC
AI
0.3462
0.1370
0.3404
0.6041
0.6665
0.2186
0.1600
0.2315
0.3055
0.2738
0.5397
0.1614
0.6051
0.3655
Table 13. The outer weights of the formative constructs
3.1
Discussion
Today, there is a large literature that explores the overall
beliefs about ICT acceptance/rejection.
Some researches concentrate their efforts on the object
based beliefs (DeLone and McLean 2003 with system,
information, and service qualities), others on the behavioral beliefs (Davis et al. 1989 with PU and PEU).
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Table 14. The results of the quantitative study.
A large number of researches developed models that
resume enablers of the ICT acceptance. Others much
fewer presented some object-based beliefs as inhibitors of
the usage (Cenfetelli 2004). But very few of the IS research determined the inhibitors and enablers behavioral
beliefs that can predict the public e-services acceptance/rejection.
The aim of this paper was to identify behavioral beliefs
that enable or inhibit the public e-services acceptance in
the Lebanese context. According to Cenfetelli (2004), the
inhibitors are not only the opposite of the enablers. In
this study, we show that some behavioral beliefs can act
positively or negatively on acceptance. Others can lead
solely to discourage the public e-services acceptance. The
existence of these inhibitors may explain why Lebanese
citizens reject the public online services (77.75 percent of
the qualitative sample and 85 percent of the quantitative
sample). Therefore, we developed the ITA e-Gov Model
which considers inhibitors and enablers of the public eservices in Lebanon.
After testing the model, the results show a substantial R2
of 0.482 for the intention to accept the public e-services.
Table 14 resumes the research results.
In our first qualitative research, 63 percent of respondents
refused e-services because they feared from the control of
the government. In the quantitative research the fear of
government control had also a positive strong relation
with public e-services acceptance intention (weight =
0.413). These results can be explained by the fact that
Lebanese are used to live with minimum or even without
any government control. Indeed, according to Antoun
(2009, p. 9), Lebanese are used to violate laws and regulations: they avoid tax payments, they bribe officials into
accepting incomplete or illegal applications; and they
regularly abuse public services for personal interest. In
her 2009 report supported by the UNDP, Antoun conclu-
ded that, in Lebanon, avoiding paying taxes has become
more of a culture than a practice (Antoun 2009).
For other citizens, barriers like lack of trust in the public
e-services security (TSEC), lack of trust related to privacy (TPRI), lack of government support (PGS), and lack
of computer self efficacy (CSE) were also significant.
Results of the quantitative research showed that the multidimensional construct known as the control beliefs (CB)
which combine all these control variables has a strong
prediction power on the acceptance intention ( weight =
0.608). This result can be explained by the fact that the
lack of trust in the security and the lack of trust in the
privacy are highly related to the acceptance intention
(weights = 0.300 and 0.223).
The lack of trust in the security can be explained by the
fact that when we conducted the open ended questions,
Lebanon was shocked about a discovery made by the
police concerning a tower transmission that belonged to a
private Lebanese television station in the Barouk mountains which it seems was been used by Israel to spy on
anyone using the Internet in Lebanon. During the three
weeks of the interviews the country was living through
statements and counter statements. Indeed, a large number of respondents mentioned this fact in their answers.
“How can we trust that the public e-services are secured
if the government is not capable of securing the Internet
network” said a young male from the North. We think
that this event has also influenced the interviewee‟s answers in the second quantitative research.
The lack of privacy is related to the fact that Lebanese are
sensitive to the issues of eavesdropping. During years of
Syrian occupation, telephone monitoring was an integral
part of the repressive regime. Some local unofficial reports showed that even the former Prime Minister who
was murder was and during a long period monitored by
the secret services. Recently, the Lebanese telecommunications Minister had set up a new telephone monitoring
department. This event has created a lot of reactions. That
can explain why citizens do not trust the privacy of the
ICTs usage in Lebanon.
We can also say that the climate of fear, of lack of trust in
the security and in the privacy can be seen as a result of
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
the complete political chaos that characterizes the Lebanese political system.
3.2
Contribution to theory
This paper adds to the IS literature in many ways:
The first contribution of this paper is that it integrates the
appropriate ICT and public e-services acceptance literature in order to propose a model that can capture the acceptance enablers and inhibitors of the public e-services
in the pre-acceptance stage.
The second contribution is that it assimilates previous
research findings in order to develop a coherent and
comprehensive picture of the public e-services acceptance in Lebanon.
Third, this paper introduces the ITA e-Gov Model that
integrates salient behavioural beliefs that can explain and
predict citizen‟s acceptance or rejection of public eservices.
Fourth, it introduces a new method to determine the salient behaviour beliefs by combining the TRA‟s method
of the salient beliefs structure with the DTPB‟s method of
the decomposed belief structure for ICT acceptance or
rejection. From the TRA, we took the method that aims to
extract the salient behavioural beliefs from the potential
adopters (Ajzen 1985; 1991; Ajzen and Fishbein 1980;
Fishbein and Ajzen 1975) depending on their context.
From Taylor‟s and Todd‟s (1995a) we took their decomposed method of selecting items, measures, or questions
related to each behavioural belief by drawing from previous research. Consequently, we combined these two
methods and we proposed a third way: the decomposed
salient belief structure for public e-services acceptance.
We think that this new method can reflect more the salient beliefs in a specific context and it can help the researcher in finding good measures that have already been
tested and retested for internal consistency and reliability.
Finally, its fifth contribution is that like the two-factors
theory or motivation-hygiene theory of Herzberg (Herzberg 1964), this article identifies the existence of two
categories of salient behavioural beliefs: (1) salient enablers beliefs and (2) salient inhibitors beliefs. These two
salient behavioral beliefs act independent of each other.
Salient enabler beliefs can impact positively or negatively
the ICT acceptance. The inhibitors salient beliefs act only
as unique negative effects on usage. These results are
important because the majority of research on ICT acceptance and usage has assumed that the behavioural beliefs
which impede the usage are simply the opposite of the
positive beliefs. Like Cenfetelli‟s research, this study
adds a new proof that can help to counter this paradigm
and establish that there exist enablers and inhibitors beliefs.
3.3
Implications for practice
Success of the e-services implementation projects will
depend on how the government will encourage all the
citizens to accept using online public services. Indeed,
implementing e-government and providing e-services
does not guarantee the success of the e-government
project. Heeks (2003a; 2003b) estimated that the failure
rate of e-government projects in developing countries
may be as high as 85 percent. One of the main reasons of
difficulties that developing countries face, when implementing e-government, is the low rate of e-services‟ acceptance and use by citizens (Heeks 1999; Jaeger and
Thompson 2003; Moon 2002; Odedra-Straub 2003). Despite incentives and media campaigns that encourage
them to go online for government transactions, citizens of
developing countries still hesitate and sometimes reject
the usage of the public e-services (Dwivedi et al. 2009).
Understanding the inhibitors and enablers of e-services
acceptance may provide opportunities for developing
more effective e-government policies by creating conditions for improved/ enhanced e-service usage.
The article results can help governments in persuading
their citizens to accept online public services. Based on
these results, the strategic aim is to develop a trust relationship with citizens, giving assurances that their data
(both personal and financial) will be secured, and that the
information contained on the website would be both current and accurate.
3.4
Limitations
As with any scientific research, this study has limitations.
First, it is important to recognize that the primary limitation of this study is the potential for response bias. In
order to avoid cognitive dissonance, some people seek to
maintain some coherence and consistency in their answers.
A second limitation concerns the way the e-services were
introduced by the interviewers. In other words, the way
the open-ended questionnaire was formulated might have
focused the citizen's attention on some advantages or
disadvantages of the government e-services.
A third limitation is related to the time chosen for the
field research. When we conducted the qualitative research, Lebanon was living a political chaos that created
a climate of fear between citizens and a lack of trust in
the security and in the privacy. Therefore, this empirical
study need to be replicate and tested in other political
context.
The major challenge of this study was to collect empirical
data from enough participants. Since public e-services are
still in phase II, it was difficult to know who will accept
to use it in the stage III and IV. Therefore, in the future,
we consider it necessary to send survey questionnaire to a
larger number of participants to gather sufficient data in
order to validate the conceptual model.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
In terms of comparisons, this study is limited due to the
lack of similar previous studies from Lebanon.
In this paper, we performed the first step in exploring the
public e-services inhibitors and enablers in Lebanon.
More empirical tests are needed to extend the model by
adding key demographic characteristics that can also explain the e-services acceptance or non-acceptance intention.
4.
CONCLUSION
In order to examine the inhibitors and enablers of the
citizens‟ intention to accept e-services, we combined
technological, normative, individual and psychological
factors that are related to citizens‟ subjective perception
in a unified model: ITA e-Gov Model.
A key finding in our study was the relationship between
utilitarian outcomes and e-government acceptance and
non-acceptance intention. First, the importance of UO
(perceived usefulness) of government e-services was supported by our qualitative study (open-ended questions).
The qualitative study also revealed that non-intenders
believe that online services do not offer anything relevant
for them: “No need or no reason for me to use government e-services”. Then, results of the quantitative study
show that choosing to accept e-services is also rooted in
the perceived usefulness of these e-services. The importance of this behavioral belief has been confirmed by the
weight of the variable UO in the quantitative research
(weight = 0.127). In order to increase public e-services
take-up we suggest targeting citizens who believe that
they may benefit from the online services (businessmen
and travelers). Consequently, perceived usefulness may
serve as a motivation to encourage these citizens to start
using online government services. Proving to citizens that
public e-services in Lebanon are useful can also be used
to convince those who think that it is worthless.
This study also identified skeptics concerned about government control, perceived security and perceived privacy
of government online services.
To increase the public e-services acceptance, we recommend that the Lebanese government increases the privacy
and security of their e-services. The Lebanese government must publicly promise not to use the personal data
gathered through e-services in order to control citizens‟
income or activities
We also identified a relation between the computer selfefficacy and the acceptance and non-acceptance intention. According to Dimitrova and Chen (2006), selfefficacy refers to the potential adopter‟s confidence in his
or her own ability to utilize the government e-service.
The results show that lower confidence is likely to lead to
a non-acceptance decision. The lack of confidence in
one‟s ability to use government e-services will negatively
affect the intention to accept government online service.
The Lebanese government‟s communication can promote
the usefulness and the ease of use of the government eservices.
References
Agarwal, R, Karahanna, E. (2000), “Time Flies When
You're Having Fun: Cognitive Absorption and Beliefs about Information Technology Usage,” MIS
Quarterly, (24:4), pp. 665-694.
Agarwal. R., Prasad, J. (1998), “A Conceptual and Operational Definition of Personal innovativeness in the
Domain of Information Technology,” Information
Systems Research, (9:2), pp. 204-215.
Ajzen I, Fishbein M. (2000). Attitudes and the attitudebehavior relation: reasoned and automatic processes.
In European Review of Social Psychology, ed. W
Stroebe, M Hewstone. Chichester, England: Wiley. In
press
Ajzen, I. (1991), “The Theory of Planned Behavior,”
Organizational Behavior and Human Decision
Processes, (50), pp.179-211.
Ajzen, I. (2001), “Nature and Operation of Attitudes”,
Annual Review of Psychology, (52:1), pp. 27- 32.
Ajzen, I., Fishbein, M. (1980), Understanding Attitudes
and Predicting Social Behavior. Prentice-Hall, Englewood Cliffs, NJ.
Al Omian, M., & Weir, D. (2005). Leadership in the
Arab World. University of Jordan.
Ali, A. (1990), “Management theory in a transitional
society: the Arab‟s experience,” International Studies
of Management & Organisation (20:3), pp.7-35.
Ali, A. (1995), “Cultural discontinuity and Arab management thought,” International Studies of Management & Organisation (25:3), pp.7-30.
Bagozzi, R. (2007), “The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift,”
Journal of the association for information systems,
(8:4), pp. 244-254.
Bélanger, F., Carter, L. (2005). Trust and risk in egovernment adoption. In Proceedings of the Eleventh
Americas Conference on Information Systems, Omaha, Nebraska, USA, pp. 1955- 1964).
Bélanger, F., Carter, L. (2006). “The effects of the digital
divide on EGovernment: An empirical evaluation.”
Proceedings of the 39th Hawaii International Conference on System Sciences, HICSS, 2006. Hawaii,
USA
Benbasat I., Brki. H. (2007) “Quo vadis, TAM?”, Journal
of the association for information systems, (8:4/3),
pp. 211-218.
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Bobbio, N. (1987), The Future of Democracy: a Defense
of the rules of the game, University of Minnesota
Press.
Bretschneider, S., Gant, J., and Ahn, M. (2003), A general model of e-government adoption and diffusion,
Paper presented at Public Management Research
Conference, Georgetown Public Policy Institute,Washington, DC.
Brown, S., Venkatesh, V. (2005), Model of Adoption of
Technology in Households: A Baseline Model Test
and Extension Incorporating Household Life Cycle,
MIS Quartely, (29:3), pp. 339-446.
Cenfetelli R. (2004), Inhibitors and Enablers as Dual
Factor Concepts in Technology Usage, Journal of the
Association for Information Systems, (5:11-12), pp.
472-492.
Chen, YH, Barnes, S (2007), Initial trust and online buyer behaviour. Ind. Manage. Data Syst, (107:1), pp.
21-36.
Colli, A. (2003). The history of family business 18502000. Cambridge, England: Cambridge University
Press.
Compeau, D.R. Higgins, C.A. (1995b) Application of
Social Cognitive Theory to Training for Computer
Skills. Information Systems Research, (6:2), pp. 118143.
Cooper, R.B., Zmud, R.W. (1990), “Information Technology Implementation Research: A Technological
Diffusion Approach,” Management Science, vol. 36,
N°2, pp. 123-139.
Coyle, F.P. (2001), Wireless Web: A Manager‟s Guide.
Addison Wesley, NJ.
Davies, W. (2005), The age of surveillance: a new dotcom boom, available at: www.opendemocracy.cet .
web site visited the 30-08-2008.
Davis F.D. (1993), “User acceptance of information technology: system characteristics, user perception and
behavioural impacts,” International Journal of ManMachine Studies, Vol. 38, N°3, pp. 475-487.
Davis, F.D. (1989), “Perceived Usefulness, perceived
ease of use and user acceptance of information technology,” MIS Quarterly, vol. 13, N° 3, pp.319-340.
Davis, F.D., Bagozzi, R.P., Warshaw, P.R. (1989), “User
Acceptance of Computer technology: A Comparison
of two Theoretical Models,” Management Science,
vol. 35, N° 8, pp. 982-1003.
Davis, F.D., Bagozzi, R.P., Warshaw, P.R. (1992), “Extrinsic and Intrinsic Motivation to Use Computers in
the Workplace,” Journal of Applied Social Psychology, Vol. 22, pp. 1111-1132.
Dubauskas, N. (2005). Business compliance to changing
privacy protections. In Proceedings of the 38th Hawaii International Conference on System Sciences.
Dwivedi Y.K., Weerakkody V., and Williams M. (2009)
Guest editorial: From implementation to adoption:
Challenges to successful E-Government diffusion,
Government Information Quarterly, 26, 3–4.
Fahed-Sreih, J., Djoundourian, S. (2006). Determinants
of longevity and success in Lebanese Family Businesses: An Exploratory Study. Family Business Review, 19(3), 225-234.
Fishbein, M (1968), An investigation of relationships
between beliefs about an object and the attitude towards that object, Human Relationships, 16, 233-240.
Fishbein, M., Ajzen, I. (1975), Belief, attitude, intention,
and behavior: An introduction to theory and research,
Reading Mass, Don Mills, Ontario: Addison-Wesley
Pub. Co. 1975.
Gefen, D. (2000), “E-commerce: the Role of Familiarity
and Trust,” Omega, Vol. 28, No. 6:725-737.
Gefen, D., Karahanna, E., and Straub, D.W. “Inexperience and Experience with Online Stores: The Importance of TAM and Trust,” IEEE Transactions on
Engineering Management (50:3), 2003a, pp. 307321.
Gefen, D., Karahanna, E., and Straub, D.W. “Trust and
TAM in Online Shopping: An Integrated Model,”
MIS Quarterly (27:1), 2003b, pp. 51-90
Gefen, D., Pavlou, P.A., Warkentin, M., Gregory, M.R.
(2002). E-government adoption. In Proceedings of
the Eighth Americas Conference on Information Systems, pp. 569-576).
Giddens A., (1994), Les conséquences de la modernité,
Paris, L‟Harmattan.
Gilbert, D., Balestrini, P., & Littleboy, D. (2004). Barriers and benefits in the acceptance of e-government.
The International Journal of Public Sector Management, 14(4), pp. 286-301.
Griffin, D., Trevorrow, P. & Halpin, E. (2007) Introduction e-Government: A welcome Guest or Uninvited
Stranger? In Developments in e-Government. A critical Analysis, Griffin, D., Trevorrow, P., & Halpin, E.
Amsterdam: IOS Press.
Grundén, K. (2009), A social perspective on Implementation of e-Government – A longitudinal study at the
country administration of Sweden, Electronic Journal
of e-Government, Volume 7, Issue 1, 2009. pp. 6576.
Hartwick, J., Barki H. (1994), “Explaining the Role of
User Participation in Information System Use,” Management Science, Vol. 40, N° 4, pp. 440-465.
Heeks, R. (1999) Reinventing government in the information age. International practice in IT-enabled public sector reform, New York: Routledge.
Hernandez, JMC, Mazzon, JA (2007) Adoption of internet banking: proposition and implementation of an
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
integrated methodology approach, International J.
Bank Mark, 25 (2): 72-88.
and the Theory of Planned Behavior, Journal of Economic Psychology, 16, (4), 581-598.
Hoffman, D.L., Novak, T.P., Peralta, M. (1999), “Building Consumer Trust Online,” Communications of the
ACM, Vol. 42, No. 4: pp. 80-85.
Mathieson, K. (1991), “Predicting User Intentions: Comparing the Technology Acceptance Model with the
Theory of Planned Behavior,” Information Systems
Research (2:3), pp. 173-191.
Hsieh J. J. Po-An, Rai A., Keil M. (2008), “Understanding Digital Inequality: Comparing Continued Use
Behavior Models of The Socio-Economically Advantaged and Disadvantaged,” MIS Quarterly, March,
Vol. 32, No. 1, pp. 97-126.
Jaeger, P.T., Thompson, K.M. (2003) E-Government
around the World: Lessons, Challenges, and Future
Directions, Government Information Quarterly, 20,
(40), 389-394.
Jarvenpaa, S.L., Tractinsky, N., Saarinen, L., Vitale, M.
“Consumer trust in an Internet store: A cross-cultural
validation“. Journal of Computer-Mediated Communications, (5 : 2). 1999.
Karahanna, E., Straub, D.W., Chervany, N.L. (1999),
“Information Technology Adoption Across Time: A
Cross-Sectional Comparison of Pre-Adoption and
Post-Adoption Beliefs,” MIS Quarterly, Vol. 23, N°2,
183-214.
Keil, M., Meader, G. W. and Kvasny, L. (2003) Bridging
the Digital Divide: The Story of the Free Internet Initiative in LaGrange, Georgia, in Proceedings of the
36th Annual Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer
Society Press, Vol. 5, 140.2
Kvasny, L. (2002), Problematizing the Digital Divide:
Cultural and Social Reproduction in a Community
Technology Initiative, Unpublished Doctoral Dissertation, Georgia State University, Atlanta, GA.
Kvasny, L., Keil, M. (2002), “The Challenges of Redressing the Digital Divide: A Tale of Two Cities,” in Proceedings of the 23rd International Conference on Information Systems, L. Applegate, R. Galliers, and J.
I. DeGross (eds.), Barcelona, Spain, December 15-18,
pp. 817-828.
Lee, J.K., Kim, D.J., Rao, H.R. (2005), An examination
of trust effects and pre-existing relational risks in egovernment services. In Proceedings of the Eleventh
Americas Conference on Information Systems, pp.
1949- 1954).
Miles, M., Huberman, A. M. (1984) Qualitative data
analysis. Beverly Hills, CA: Sage Publications.
Moon, J., Kim., Y. (2001), “Extending the TAM for a
World-Wide-Web Context,” Information and Management, (38:4), pp. 217-230.
Moon, M.J. (2002), “The evolution of e-Government
among Municipalities: Rhetoric or Reality,” Public
Administration Review, (62:4), pp. 424-433.
Moore, G.C, Benbasat, I. (1996), “Integrating Diffusion
of Innovations and Theory of Reasoned Action Models to Predict Utiiization of Information Technology
by End-Users,” In Diffusion and Adoption of Information Technology, K. Kautz and J. Pries-Heje
(eds.), Chapman and Hall, London, pp. 132-146.
Moore, G.C., Benbasat, I. (1991). “Development of an
instrument to measure the perceptions of adopting an
information technology innovation,” Information
Systems Research, (2,3), pp.192-222.
Nah, F.F.H., Davis, S. (2002), HCI Research Issues in
Electronic Commerce, Journal of Electronic Commerce Research, (3:3), pp. 98-113.
Odedra-Straub, M. (2003) E-commerce and Development: Whose Development? The Electronic Journal
of information Systems in Developing Countries, 11,
(2), 1-5.
Phang, C.W., Li, Y., Sutanto, J. and Kankanhalli, A.
(2005). Senior citizens‟ acceptance of e-government:
In quest of the antecedents of perceived usefulness. In
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS) 38.
Rogers, E.M. (1983), Diffusion of Innovations, 3d Ed.,
Free Press, New York.
Rose, G. and Straub, D. (1998) “Predicting General IT
Use: Applying TAM to the Arab World”, Journal of
Global Information Management, Vol 6 No 3, pp. 3946.
Lewis W., Agarwal R., Sambamurthy V. (2003),
“Sources of Influence on Beliefs about Information
Technology Use: An Empirical Study of Knowledge
Workers”, MISQ, Vol. 27, N 4, pp. 657-678.
Schwarz, A., & W. Chin, Looking Forward: Toward an
Understanding of the Nature and Definition of IT Acceptance. Journal of the association for information
systems, Volume 8, Issue 4, Article 6, pp. 230-243,
April 2007.
Loch K., Straub DW., Kamel S. “Diffusing Internet in the
Arab World: The role of social norms and technological culturation “, IEEE Transactions on Engineering Management, (50 : 1), 2003, pp.43-63
Straub, D., Burton-Jones, A. (2007), Veni, Vidi, Vici:
Breaking the TAM Logjam, Journal of the association
for information systems, Volume 8, Issue 4, Article 5,
pp. 223-229.
Lynne, G. D., Casey, C. F., Hodges, A., and Rahmani, M.
(1995) Conservation Technology Adoption Decisions
Straub, D., Lock, K., and Hill, C. (2001) Transfer of Information Technology to the Arab World: A test of
Big Brother is Watching You: inhibitors and enablers of public e-services
Antoine HARFOUCHE and Stéphane Bourliataux-Lajoinie
Cultural Influence Modeling, Journal of Global Information Management,.
Van der Heijden, H. (2004), “User Acceptance of Hedonic Information Systems,” MISQ, (28:4), pp. 695-704.
Sun, H. & Zhang, P. (2006) The role of affect in IS research: A critical Survey and a research Model. In: P.
Zhang and Galletta, Humain-Computer Interaction
and Management Information Systems-Foundations,
ME Sharpe, Inc., Armonk, NY.
Van der Meer, A., Van Winden, W. (2003), “EGovernance in Cities: A Comparison of Urban Information and Communication Technology Policies,”
Regional Studies (37:4), pp. 407-419
Tan, M. & Teo, T. (2000) Factor influencing the adoption
of Internet Banking, J.A.I.S., 1, 5, 173-191.
Taylor, S., Todd P.A. (1995b), “Understanding Information Technology Usage: A Test of Competing Models,” Information Systems Research, Vol. 6, N° 2, pp.
144-176.
Taylor, S., Todd, P.A. (1995a), Assessing IT Usage: The
Role of Prior Experience, MIS Quarterly (19:2), pp.
561-570.
Thompson, R. L., Higgins, C. A., Howell, J. M. (1991),
“Personal Computing: Toward a Conceptual Model
of Utilization,” MIS Quarterly, Vol.15, N°1, pp. 124143.
Tornatzky, L. G., Klein, K. J. (1982). “Innovation characteristics and innovation adoption-implementation: A
meta-analysis of findings,” IEEE Transactions on
Engineering Management, vol. 29, N°1, pp. 28-45.
Triandis, H.C. (1971), Attitude and Attitude Change,
John Wiley Sons Inc., New York.
Triandis, H.C. (1980), "Values, Attitudes, and Interpersonal Behavior," In H.E. Howe (ed.), Nebraska Symposium on Motivation: Beliefs, Attitudes, and Values, University of Nebraska P ress, Lincoln, NE, pp.
195-259.
Triandis, H.C. (1980), "Values, Attitudes, and Interpersonal Behavior," In H.E. Howe (ed.), Nebraska Symposium on Motivation: Beliefs, Attitudes, and Values, University of Nebraska P ress, Lincoln, NE, pp.
195-259.
UNDESA (2008) UN e-government surveys: from egovernment to connected governance, Department of
Economic and Social Affairs, Division for Public
Administration and Development Management, Report: ST/ESA/PAD/SER.E/11, ISBN 978-92-1123174-8.
UNDP (2009), Lebanon 2008 – 2009. The National Human Development Report: toward a citizen‟s state.
UNDP Publications.
UNPAN (2005), UN Global E-government Readiness
Report 2005: From E-government to E-inclusion,
Department of Economic and Social Affairs Division
for Public Administration and Development Management, UNPAN/2005/14.
Valente, T. (1995), Network Models of the Diffusion of
Innovations, New York: Hampton Press.
van Dijk, J., Peters, O., Ebbers, W. (2008), Explaining
the acceptance and use of government Internet services: A multivariate analysis of 2006 survey data in
the Netherlands, Government Information Quarterly
25 (2008), pp. 379–399.
Van Slyke, C.F, Bélanger, CL., Comunale (2004), „Factors Influencing the Acceptance of Web-Based Shopping: The Impact of Trust‟ The Data Base for Advances in Information Systems, (35:2).
Venkatesh, V., Brown, S. (2001), “A Longitudinal Investigation of Personal Computers in Homes: Adoption
Determinants and Emerging Challenges,” MIS Quarterly, (25:1), p.p. 71-102.
Venkatesh, V., Morri, M.G., Davis, G.B., Davis, F.D.
“User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly (27:3), 2003,
pp. 425-478.
Warkentin, M, Gefen, D. Pavlou, P.A., Rose, G.M.
(2002). Encouraging citizen adoption of egovernement by building trust. Electronic Markets,
12(3), pp. 157-162.
Warshaw, P.R. (1980), “A New Model for Predicting
Behavioral Intentions: An Alternative to Fishbein,”
Journal of Marketing Research. Vol. 17, N° 2, pp.
153-172.
Webster, J, Martochhio. J. (1992), “Microcomputer playfulness: Development of measure with workplace implications,” MIS Quartirly. Vol. 16, N° 2, pp. 201226.
Weir, D. (2002), “Management in the Arab World: A
fourth paradigm?,” The European Academy of Management, (EURAM 2002), Stockholm, Sweden.
Yahchouchi, G. (2009), Employees‟ Perceptions of Lebanese Managers‟ Leadership Styles and Organizational Commitment, International Journal of Leadership Studies, (4:2), pp. 127-140.