Understanding Behavioral Intention in Implementation of the ICTs Based on UTAUT Model

Main Article Content

Krismadinata Krismadinata Nizwardi Jalinus Hafeasi Pitra Rosmena yahfizham yahfizham


Innovation on Information Communication and Technology (ICT) are not suddenly accepted and directly used by individuals in work and workplace, even some individuals refuse to work using adoption ICTs. Therefore this research needs to be done to reveal what factors influence this attitude. This article aims to analysis variables or factors such as performance expectancy (PE) as X1, effort expectancy (EE) as X2, social influence (SI) as X3 and facilitating condition (FC) as X4 that contribute to the behavioral intention (BI) as Y of individual in accepted or rejected innovation based on the Unified Theory of Acceptance and Use of Technology (UTAUT) model perspective. The method was applied factor analysis. A technique of collecting data using the checklist of questionnaire instrument, with total the population of 85 people, then according to tables of Isaac and Michael obtained the sample of 68 respondents who came from the Government Employees in the Disdikpora Dharmasraya Regency. The data were analyzed with the software tools of the Statistical Package for the Social Sciences (SPSS) version 22. The data collection time starts from November to December 2018. We found that X1, X2, X3, and X4 have significant effects on user acceptation based on UTAUT model.



Download data is not yet available.

Article Details

How to Cite
KRISMADINATA, Krismadinata et al. Understanding Behavioral Intention in Implementation of the ICTs Based on UTAUT Model. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, [S.l.], p. 96-107, aug. 2019. ISSN 2541-5832. Available at: <https://ojs.unud.ac.id/index.php/lontar/article/view/48809>. Date accessed: 19 sep. 2019. doi: https://doi.org/10.24843/LKJITI.2019.v10.i02.p04.


[1] E. Triandini, A. Djunaidy, and D. Siahaan, “Factors Influencing E-Commerce Adoption by SMES Indonesia: A Conceptual Model,” Lontar Komputer Jurnal Ilmiah Teknologi Informasi, vol. 4, no. 3, pp. 301–311, Dec. 2013.
[2] I. K. A. Purnawan, “Pedoman Tata Kelola Teknologi Informasi Menggunakan IT Governance Design Frame Work (Cobit) Pada PT . X,” vol. 6, no. 3, Lontar Komputer Jurnal Ilmiah Teknologi Informasi, pp. 200–205, Dec. 2015.
[3] S. Hanief, “Audit TI untuk Menemukan Pola Best Practice Pengelolaan TI pada Perbankan (Studi Kasus PT. Bank Syariah Mandiri Cabang Denpasar,” Lontar Komputer Journal Ilmiah Teknologi Informasi, vol. 4, no. 2, pp. 324–335, Dec. 2013.
[4] Krismadinata, Y. Arnovia, Syahril, and Yahfizham, “Kontribusi Ekspektasi Kinerja, Usaha, Faktor Sosial dan Fasilitas Terhadap Sikap Operator Sistem Informasi,” Jurnal Teknologi dan Sistem Informasi (TEKNOSI), vol. 4, no. 1, pp. 44–52, April 2018.
[5] C. Hsu, Y. Chun-Po, H. Li-Ting, “Understanding Exchangers’ Attitudes and Intentions to Engage in Internet Bartering Based on Social Exchange Theory (SET) and the Theory of Reasoned Action (TRA),” International Journal of Business and Information, vol. 12, no. 2, pp. 149-182, Jun. 2017.
[6] M. I. Hamid, P. Hanapi, and N. Hussin, “Technology Trust for Government and Private Sector : Approach Technologies Acceptance Model (TAM),” International Journal of Academic Research in Business and Social Sciences, vol. 7, no. 12, pp. 783–790, 2017.
[7] E. Enkel and K. Bader, “Why do experts contribute in cross-industry innovation ? A structural model of motivational factors, intention and behavior,” R&D Management, pp. 1–20, 2015.
[8] I. Ajzen, “The Theory of Planned Behavior,” Organizational Behavior And Human Decision Processes, vol. 50, pp.179-211, 1991.
[9] M. T. Dishaw and D. M. Strong, “Extending the technology acceptance model with task - technology fit constructs”, Information & Management, vol.36, pp.9–21, 1999.
[10] B. R. L. Thompson, C. A. Higgins, and J. M. Howell, “Personal Computing : Toward a Conceptual Model of Utilization”, MIS Quarterly, pp.125–143, March, 1991.
[11] T. W. Valente and E. M. Rogers, “The Origins and Development of the Diffusion of Innovations Paradigm as an Example of Scientific Growth”, Science Communication, vol. 16, no. 3, pp. 242-273, 1995.
[12] M. F. Hawkins, “Self-Efficacy: A Predictor but not A Cause of Behavior”, Journal of Behavior Therapy & Experimental Psychiatry vol. 23. no. 4, pp.251-256, 1992.
[13] V. Venkatesh, J. Y. L. Thong, X. Xu, ”Unified Theory of Acceptance and Use of Technology: A Synthesis and The Road Ahead,” Journal of the Association for Information Systems, vol. 17, no. 5, pp. 328–376, 2016.
[14] Y. Dwivedi, N. Rana, H. Chen, and M. Williams, “A Meta-analysis of the Unified Theory of Acceptance and Use of Technology (UTAUT)”, Springer, IFIP Advances in Information and Communication Technology, AICT- 366, pp.155-170, 2011.
[15] M. D. Williams, N.Rana, and Y. K. Dwivedi, “The unified theory of acceptance and use of technology (UTAUT): a literature review”, Journal of Enterprise Information Management, vol. 28, no. 3, pp.443 - 488, 2015.
[16] N. F. Ismail, M. H. Hasan, and E. E. Mustapha, “Technology Use, Emotional Connection and Their Relationship: A Literature Review”, Journal of Theoretical and Applied Information Technology, vol. 96, no. 1, pp.127-139, 2018.
[17] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D.Davis, “User Acceptance of Information Technology : Toward a Unified View", Management Information Systems, vol. 27, no. 3, pp. 425–478, 2011.
[18] B. Kaba and B. Toure, “Understanding Information and Communication Technology Behavioral Intention to Use: Applying the UTAUT Model to Social Networking Site Adoption by Young People in a Least Developed Country”,MIS Quarterly, vol. 36, no. 1, pp.157–178, 2012.
[19] M. Alshehri, S. Drew, and R. Alghamdi, “E-Government Services : Applying The UTAUT Model,” IADIS International Conference Theory and Practice in Modern Computing and Internet Applications and Research, pp. 69–76, 2012.
[20] M. Alshehri., et al, “The Effects of Website Quality on Adoption of E-Government Service : An Empirical Study Applying UTAUT Model Using SEM”, 23rd Australasian Conference On Information Systems, pp.1–13, 2012.
[21] S. Attuquayefio, and H. Addo, “Review of Studies With UTAUT as Conceptual Framework”, European Scientific Journal, vol. 10, no. 8, pp. 249–258, 2014.
[22] S. Parameswaran, R. Kishore, and P. Li, “Information & Management Within-study measurement invariance of the UTAUT instrument: An assessment with user technology engagement variables”,Information & Management, vol. 52, pp. 317–336, 2015.
[23] M. K. F. Al-Sammarraie, A. K. Faieg and M. M. Rasheed, “The factors affecting sustainable of growing development by implementing UTAUT 2: a Case study of the worst country in using ICT in the world”,ResearchGate in Conference Paper, pp.1-7, 2016.
[24] R. K. J. Bendi and S. Andayani, “Analisis Perilaku Penggunaan Sistem Informasi Menggunakan Model UTAUT”, Seminar Nasional Teknologi Informasi & Komunikasi Terapan (Semantik Semarang), pp. 277–282, 2013.
[25] M. Peris., et al, “Acceptance of Professional Web 2.0 Platforms in Regional SME Networks: An Evaluation Based on the Unified Theory of Acceptance and Use of Technology”, 46th Hawaii International Conference on System Sciences, pp. 2793–2802, 2013.
[26] V. Venkatesh, T. A. Sykes, and S. Venkatraman, “Understanding e-Government portal use in rural India: role of demographic and personality characteristics”, Information Systems Journal, vol. 24, pp. 249–269, 2013.
[27] V. Venkatesh and X. Zhang, “Unified Theory of Acceptance and Use of Technology: US Vs China”, Journal of Global Information Technology Management, vol. 13, no. 1, pp. 5-27, 2010.
[28] E. A. Abu-shanab, “Telematics and Informatics E-government familiarity influence on Jordanians ’ perceptions”,Telematics and Informatics, vol. 34, pp.103–113, 2017.
[29] B. Kaba and B. Touré, “Understanding Information and Communication Technology Behavioral Intention to Use : Applying the UTAUT Model to Social Networking Site Adoption by Young People in a Least Developed Country,” Journal of The Association for Information Science and Technology, vol. 65, no. 8, pp. 1662–1674, 2014.
[30] A. Alharbi and P. I. Hawryszkiewycz, “The Influence of Trust and subjective Norms on Citizens’ Intentions to Engage in E-participation on E-government Websites”, Australasian Conference on Information Systems, Adelaide, pp.1–12, 2015.
[31] O. Al-hujran., et al, “Computers in Human Behavior The imperative of influencing citizen attitude toward e-government adoption and use,” Computers in Human Behavior, vol. 53, pp. 189–203, 2015.
[32] L. Alzahrani, W. Al-karaghouli, and V. Weerakkody, “Analysing the critical factors in fluencing trust in e-government adoption from citizens’ perspective: A systematic review and a conceptual framework”,International Business Review, pp.1-12, 2016.
[33] F. Amagoh, “Determinants of e-government diffusion in Nigeria: An examination of theoretical models”, Information Development, pp.1-18, 2015.
[34] E. Hartati, “Analisis Faktor – faktor Yang Berpengaruh Terhadap Efektivitas Penerapan E-Government Dengan Menggunakan Metode UTAUT (Unified Theory Of Acceptanced Use Of Technology) di Kota Palembang”, Seminar Nasional Teknologi Informasi dan Multimedia, STMIK AMIKOM Yogyakarta, pp.7–12, 2013.
[35] K. J. Bwalya and S. Mutula, “A conceptual framework for e-government development in resource-constrained countries: The case of Zambia”, Information Development, pp.1-16, 2015.
[36] F. Ojaide., and B. OnyejiakaAgochukwu, “The effect of effort expectancy on computer-assisted audit techniques usage by external auditors in Nigeria”, IJMSR, vol. 3. no, 1, pp. 193–204, 2014.
[37] M. Dahi and Z. Ezziane, “Measuring e-government adoption in Abu Dhabi with technology acceptance model (TAM)”, International Journal of Electronic Governance, vol. 7, no. 3, pp. 206–231, 2015.
[38] R. Hussein., et al, “G2C Acceptance in Malaysia: Trust, Perceived Risk, and Political Efficacy”, pp.165–174, 2007.
[39] I. K. Mensah, “Citizens’ Readiness to Adopt and Use E-government Services in the City of Harbin, China,” International Journal of Public Administration, vol. 41, no. 1, pp. 1–11, 2017.
[40] N. P. Rana, Y. K. Dwivedi, and M. D. Williams, “A meta-analysis of existing research on citizen adoption of e-government”, Information System Frontier, pp. 1-17, 2013.
[41] G. Putra and M. Ariyanti, “Modified Unified Theory of Acceptance and Use of Technology 2 (UTAUT 2) Terhadap Niat Prospective Users Untuk Mengadopsi Home Digital Services PT. Telkom di Surabaya”, Jurnal Manajemen Indonesia, vol. 12, no. 4, pp. 59–76, 2013.
[42] R. K. J. Bendi dan A. Aliyanto, “Analisis Pengaruh Perbedaan Gender pada Model UTAUT”, Seminar Nasional Teknologi Informasi & Komunikasi Terapan (Semantik Semarang), pp. 228–234, 2014.
[43] N. N. Ahmad., et al, “The Application of Unified Theory of Acceptance and Use of Technology (UTAUT) for Predicting the Usage of E-Zakat Online System”, International Journal of Science and Research (IJSR), vol. 3, no. 4, pp. 63–67, 2014.
[44] A. A. Taiwo and A. G. Downe, “The Theory of User Acceptance and Use of Technology (UTAUT): A Meta-Analytic Review of Empirical Findings”, Journal of Theoretical and Applied Information Technology, vol. 49, no. 1, pp. 48-58, 2013.
[45] H. Kavandi and M. Westerlund, “Using Entrepreneurial Marketing to Foster Reseller Adoption of Smart Micro-Grid Technology”, Technology Innovation Management Review, vol. 5, no. 9, pp. 5–16, 2015.
[46] M. Gagnon., et al, “Electronic health record acceptance by physicians: Testing an integrated theoretical model,” Journal of Biomedical Informatics, vol. 48, pp. 17–27, 2014.
[47] L. Abdulwahab., et al, “A Conceptual Model of Unified Theory of Acceptance and Use of Technology (UTAUT) Modification with Management Effectiveness and Program Effectiveness in Context of Telecentre”, African Scientist, vol. 11, no. 4, pp. 267–275, 2010.
[48] A. Zolait, “Determinants of Behavioral Intentions towards Using E-Government Services in the Kingdom of Bahrain Determinants of Behavioral Intentions towards Using E-Government Services in the Kingdom of Bahrain”, International Journal of Computing and Digital Systems, vol. 5, no. 4, pp. 345-355, 2016.
[49] J-C. Oh and S-J. Yoon, “Predicting the use of online information services based on a modified UTAUT model”, Behaviour & Information Technology, vol. 33, no. 7, pp. 37–41, 2014.
[50] J. J. Sondakh, “Behavioral Intention to Use E-Tax Service System : An Application of Technology Acceptance Model”, European Research Studies Journal, vol. XX, no. 2A, pp. 48–64, 2017.
[51] K. Al-qeisi., et al, “How Viable Is the UTAUT Model in a Non-Western Context ?”,International Business Research, vol. 8, no. 2, pp. 204–219, 2015.
[52] N. A. Diep., et al, “Predicting adult learners’ online participation: Effects of altruism, performance expectancy, and social capital,” Computers & Education, pp.1-35, 2016.
[53] Y. K. Dwivedi., et al, “Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model,” Information System Frontier. pp.1-16, 2017.
[54] K. Ghalandari, “The Effect of Performance Expectancy, Effort Expectancy, Social Influence and Facilitating Conditions on Acceptance of E-Banking Services in Iran: the Moderating Role of Age and Gender”, Middle-East Journal of Scientific Research, vol. 12, no. 6, pp. 801–807, 2012.
[55] M. Bellaj, I. Zekri, and M. Albugami, “The Continued Use of E-Learning System : An Empirical Investigation Using UTAUT Model at The University of Tabuk”, Journal of Theoretical and Applied Information Technology, vol. 72, no. 3, pp. 464–475, 2015.
[56] S. A. Vannoy and P. Palvia, “The Social Influence Model of Technology Adoption”, Communications of The ACM, vol. 53, no. 6, pp. 149–153, 2010.
[57] R. Fischer, “Social influence and power”, ResearchGate in A Psicologia Social Brasileira: Principais temas e vertentes, pp. 1-35, 2015.
[58] M. Workman, “Computers in Human Behavior New media and the changing face of information technology use: The importance of task pursuit, social influence, and experience,” Computers in Human Behavior, vol. 31, pp. 111–117, 2014.
[59] P. C. Lai, “The Literature Review of Technology Adoption Models And Theories for The Novelty Technology”, JISTEM-Journal of Information Systems and Technology Management, vol. 14, no. 1, pp. 21–38, 2017.