Keywords

1 Introduction

Understanding individual acceptance and use of information technology (IT) is considered as one of the most mature streams of research in the field of information systems (IS) [1]. The adoption and use related issues have been constantly examined due to two reasons: new technologies are constantly evolving and finding their place both in organizations and society, and the IS failure rate continued to be high [2]. Due to constant effort to understand adoption and diffusion related issues, many theories have been developed, adopted or adapted in IS literature to explain technology acceptance and use in various contexts [3,4,5]. This plurality often poses a challenge to IS researchers when selecting an appropriate theory for undertaking a new study. Venkatesh et al. [6] noted that many of these existing theories used similar constructs with different names. Considering that Venkatesh et al. [6] developed the unified theory of acceptance and use of technology (UTAUT) by reviewing, mapping and integrating constructs from eight dominant theories/models (generally utilized in organizational context) of technology adoption emphasizing on the utilitarian value of technology users [4, 5, 7]. The UTAUT theory postulates performance expectancy, effort expectancy and social influence as indirect determinants of use behavior through behavioral intention, whereas behavioral intention and facilitating conditions influence use behavior directly. The theory also hypothesized the relationship amongst the constructs are influenced through various combinations of its moderators namely: gender, age, experience and voluntariness of use [6, 8]. UTAUT explained about 70% of the variance in behavioral intention and about 50% of the variance in technology use [6, 9]. However, the review of 1,267 UTAUT cited papers since its publication revealed just 62 studies (approximately 5%) utilized UTAUT whereas remaining 1,205 studies (comprising 95%) just cited the article for general purposes without using UTAUT or its constructs [8]. This result was consistent with a similar earlier study by [7] on 450 UTAUT cited articles, which revealed only 43 articles (around 10%) utilized UTAUT and the remaining 407 articles (90%) employed it for general citation purpose.

Venkatesh et al. [9] extended their UTAUT for the consumer context emphasizing on hedonic value (intrinsic motivation) of technology users. The extended version of UTAUT is known as UTAUT2, which incorporated three new constructs such as hedonic motivation, price value and habit into original UATUT. However, in UTAUT2 voluntariness of use was dropped as moderator since consumers have no organizational mandate and in many situations, consumer behavior is voluntary [9]. UTAUT2 is gaining momentum in terms of its use to examine IS/IT adoption and diffusion related issues leading to a fast increase in its citations.

Besides UTAUT based theories, the most extensive theory used to study IS/IT adoption within the IS discipline was TAM [4, 6, 10]. Cross-disciplinary and extensive application of TAM since its existence attracted numerous researchers to analyze its actual performance through systemic literature review and meta-analysis approach. Instances of such efforts include Lee et al. [11], King and He [12] and Williams et al. [5, 7]. Similarly, the systematic review of UTAUT with more than 10 years of its existence revealed that UTAUT has been utilized as is or used in combination with other theories or was extended with additional constructs to evaluate a range of technologies in a variety of settings including both organizational and non-organizational [8]. The number of studies using UTAUT2 in various context of technology adoption has increased substantially in the last few years. However, none of the existing studies have conducted a systematic review of UTAUT2 citations for understanding the trend emerging from its use including its purpose of citation, its application and adaptation in various contexts. This study intends to fulfill that purpose.

Given the preceding discussion, the paper is structured as follows. Section 2 will describe the research method employed in this study; Sect. 3 will present the trend emerging from the systematic review of UTAUT2 cited articles into various categories. This will be followed by discussion in Sect. 4 and conclusion in final Sect. 5.

2 Research Method

In order to achieve objectives of this research, it was deemed appropriate to conduct a combined analysis of “cited reference search” and systematic review [4, 5, 7, 11, 13]. This study utilized “cited reference search” method in Scopus and Web of Science databases for identifying papers that cited the originating article (i.e. Venkatesh et al. [9]) of UTAUT2 theory from March 2012 to March 2017. The initial search resulted in 1320 total citations (497 from web of science and 823 citations from Scopus). Later it was found that 452 out of 1,320 total citations were overlapping amongst the two databases resulting in a total of 868 unique citations (see Fig. 1). After this step, these 868 citations were screened for the availability of full articles resulting in 650 fully downloaded articles. These articles were then systematically reviewed to reveal various patterns, application and types of UTAUT2 usage.

Fig. 1.
figure 1

Total unique citations (C = 868) for Venkatesh et al. [9] article

3 Systematic Review Findings of UTAUT2 Citations

This section presents and explains results from the systematic review based on their purpose of UTAUT2 utilization. Following the approach of Williams et al. [7] the 650 downloaded articles were broadly classified into two categories: (1) General Citation – 503 studies; and (2) UTAUT2 Utilization – 147 studies.

3.1 General Citation

This category refers to studies which just cited Venkatesh et al.’s [9] article for general purposes but did not utilize the theory in any substantial manner. This category of citations included 503 studies. We adapted Williams et al.’s [7] classification to further categories studies with no actual use of UTAUT2. In the process, some of the existing categories were removed, modified and few new categories were introduced resulting in final eight general citation categories of UTAUT2 as summarized in Table 1 and briefly discussed hereafter.

Table 1. UTAUT2 general citation categories (Approach adapted from Williams et al. [7])

3.1.1 Reference to the Evolution of Technology Adoption Theories in IS Research

The majority of the studies under general citation fell under this category 1. There were 214 studies in total which cited UTAUT2 article either in the introduction section on the discussion about the evolution of individual technology adoption or during the review of existing technology adoption theories in the theory development section. Gu et al. [15] is an example where Venkatesh et al. [9] is cited in the introduction section to support statement on the evolution of individual acceptance and use of IT. On the other hand, Chuah et al. [14] cited UTAUT2 alongside with various other technology acceptance models in the theory development section.

3.1.2 Development of Constructs

Category 2 titled development of constructs consists of 118 studies which cited UTAUT2 to define, compare and support the role of utilizing a particular construct or moderators or control variables during hypothesis development although they didn’t employ the same construct as used in UTAUT2. For instance, Gao and Bai [16] cited UTAUT2 to define “perceived usefulness” construct which is similar to “Performance expectancy” construct of UTAUT2. However, in some cases even if the studies employ few same constructs as in UTAUT2 they adapted measurement items fully or partially from other studies. This phenomenon is observed in Matt et al. [17] study which utilized habit from the UTAUT2 construct. However, the study cited UTUAT2 to compare the construct alongside with other studies and adapted the measurement items for Habit from Limayem et al. [30].

3.1.3 Supporting Findings with UTAUT2

51 studies in this category cited UTAUT2 to support their findings. UTAUT2 is cited to support outcomes evolving from relationship amongst various constructs or moderators used in these studies. For instance, the positive significant effect of the habit construct on users IS continuing intention in Wang et al. [19] was consistent with the UTAUT2 study. On the other hand, the study of Shaikh and Karjaluoto [18] cited UTAUT2 to support the negative effect of experience as a moderating variable.

3.1.4 Research Methodology Design

39 studies fell under this category which cited UTAUT2 in research methodology section. These studies either adopted similar data collection methods or adopted measurement scales from UTAUT2. However, these studies did not utilize any measurement items from UTAUT2 constructs. The study of Stock and Schulz [21] cited UTAUT2 as they employed similar data collection methods by personally contacting consumers in large public places like malls and asked them whether they have used high-tech products. In the case of Alalwan et al. [20] the study adopted the seven-point measurement scale usage pattern from UATUT2 and cited it.

3.1.5 Justification for Application of UTAUT2 in Various Contexts

Category 5 contains 24 studies which justified the application of UTAUT2 in various contexts. Samples include Hess et al. [23], which criticized the extensive application of UTAUT in an institutional context and justified the need for adoption theories such as UTAUT2 in the consumer context. Similarly, Cimperman et al. [22] cited UTAUT2 and demanded the introduction of contextual predictors which could enable more accurate understanding of users of technology in specific domains.

3.1.6 Criticism of TAM or UTAUT2

Category 6 consists of 17 studies which cited UTAUT2 while criticizing TAM or UTAUT2 theory on their various shortcomings. Chandrasekhar and Nandagopal [24] criticized TAM related theories which do not account for many new technology adoption enablers and disablers. The study cited UTAUT2 by stating that in order to make TAM relevant to current day requirements it has to be revised with additional elements. Also, UTAUT2 is not without its criticism. Choi [25] found although hedonic motivation was included as the predictor of behavioral intention and use behaviour in UTAUT2, it failed to discuss factors that lead to enjoyment.

3.1.7 Future Research Suggestion

15 studies under category 7 cited UTAUT2 by referring that it should be used in future. The majority of them are UTAUT based studies insisting to include additional UTAUT2 constructs to their model and test them in consumer context as mentioned in Chang et al. [26]. There were also instances where studies (for example, Hoehle et al. [27]) attempted to integrate their model with existing IS theories like UTAUT2 in future.

3.1.8 Others

This category contains studies which could not be readily classified into any of the other 7 categories and provides brief references to Venkatesh et al. [9] under wider technology adoption research contexts. There were 25 such studies, instances range from McLean et al. [29] study citing UTAUT2 to refer mobile interface research to Brenner et al. [28] study citing UTAUT2 to refer ‘human center design’.

3.2 UTAUT2 Utilization

This category refers to studies which utilized UTAUT2 in some form either standalone or in combination with external theories. There were 147 such studies.

3.2.1 UTAUT2 as Basis for Conceptual Model Development

15 among 147 UTAUT2 based studies were classified under this category. The studies under this category used UTAUT2 as base line model in combination with external theories and proposed a conceptual model to be empirically tested in future along various technology use contexts. The analysis of studies in Table 2 reveals ECT model and trust as most frequently used external theories alongside with UTAUT2- both of them were utilized on three occasions each. This is followed by TOE, TAM, TTF, MMT and SQM each of them being utilized twice with UTAUT2; the remaining theories were used on one instance in combination with UTAUT2. The exploration of remaining 134 UTAUT2 based studies is underway.

Table 2. Summary of external theories (Approach adapted from Dwivedi et al. [31])

Venkatesh et al. [8] provided generic baseline model for individual technology use at feature level for various cross–context research. The remaining studies proposed conceptual model to understand individual users of technology along three major contexts such as employees in organizations, consumers of various technologies and societal context - citizens using E-government services. Research on organizational technology users comprises of three studies: Alazzam et al. [34] study on Medical staffs Intention to use Electronic Health Records, Balaid et al. [35] conceptual model for examining knowledge maps adoption in software development organizations and Rosli et al. [36] study on factors influencing computer-assisted auditing tools (CAATs) acceptance in public audit firms. Two of these three studies employed TOE as an external theory alongside UTAUT2 in understanding organizational technology users signifying popularity of TOE theory in organizational context. Eight studies developed conceptual framework by utilizing UTAUT2 alongside external theories to understand consumers use intention of various technologies. These studies include consumer acceptance of smart mobile devices [37], customer repurchase behaviour in mobile service business [38], customer retention framework in mobile telecommunication services [39], consumers behavioural intention of using autonomous vehicle (AV) [44], individual use of social network sites [46], consumer acceptance behavior of mobile shopping [41] and mobile technology acceptance for library information services [40, 45]. Whereas, Nwanekezie et al. [53] study on public sector online communication channel adoption, Hassan et al. [48] study on citizens’ acceptance and use of health information application embedded in Smart National Identity Card (SNIC) and Kasaj [50] study on user’s adoption of mandatory E-government explored individual use of technology from citizen’s perspective.

4 Discussion

From the results section, it’s observed out of 650 studies only 147 studies (23%) employed UTAUT2 theory in some form. The remaining 503 studies (77%) cited it for general purpose without employing the theory in any substantial manner. Although 23% UTAUT2 utilization is way higher than the application of UTAUT where it was employed by 5% of studies (see Venkatesh et al. [8]) and 10% of studies as reported by Williams et al. [7]. The marked increase in UTAUT2 utilization can be attributed to penetration of IT exploding across the globe touching every aspect of society giving rise to various individuals in the different context to use IT and UTAUT2 is focused on consumer context [8]. We assume given its focus on consumer context, UTAUT2 has not just been utilized by IS/IT researchers but in also other related academic disciplines such as marketing.

The general citation still comprises of 77% studies with majority of them citing UTAUT2 article in introduction section referring to the evolution of technology adoption theories in IS research or during the development of conceptual model as UTAUT and UTAUT2 theories are dominant theory in the field of IS research with similar constructs from major technology adoption theories. However, the higher citation doesn’t correlate to actual usage of theory, which should serve as the caution for future researchers in IS [7].

One of the major limitations of UTAUT based theories is its complex interactions among the various attributes and moderators resulting in relatively less parsimony hindering its usage as such [8]. This shortcoming is still unaddressed in UTAUT2 as the majority of the 15 studies which utilized UTAUT2 didn’t include moderating variables during conceptual model development. The irony of UTAUT/UTATUT2 theories is that since it is comprehensive in nature, it not only hinders efforts in extending the existing theory but also hampers the further theoretical advancement [8].

In terms of methodology this study employed combination of “cited reference search” and systematic review. The results of which partly revealed although UTAUT2 is comprehensive theory many studies utilized external theories alongside UTAUT2 in their research model. This pattern is similar to results shown by Lee et al. [11] in relation to TAM and Williams et al. [7] with respect to UTAUT. This reaffirms careful consideration is required in terms of selecting constructs while developing unified models such as UTAUT in order for them to be deployed as such across various technology use contexts.

5 Conclusion

The noteworthy outcomes of this study through systematic review and findings are listed as follows: (1) there has been a proportionate increase in UTAUT2 theory utilization amongst articles which cited it in comparison to UTAUT. However, most of the studies cited it for general purposes like supporting an argument, following research methodology design rather using the actual theory in substantial manner; (2) Majority of the 15 studies which utilized UTAUT2 omitted the moderating variables due to the complexity of their relationship amongst various constructs; (3) Although UTAUT2 is considered as the most comprehensive model in the field IS/IT adoption research with addition of three new constructs to UTAUT, still most of the studies which utilized UTAUT2, did so in combination with external theories signifying UTAUT2 cannot be used standalone across all technology use context and (4) the analysis of remaining 134 studies that utilized UTAUT2 is underway which could reveal more insightful results. This systematic review of UTAUT2 citations revealed various general citation categories; most frequently used external theories alongside UTAUT2 while developing conceptual model and individual users of technology along three major contexts such as employees in organizations, consumers of various technologies and citizens using e-government services. Although, this study didn’t provide information on UTAUT2 model performance, it did provide understanding about various purposes of UTAUT2 citations which are of scholarly importance to future researchers.