Abstract
The aim of this paper is to analyze firm performance when using e-invoicing on a regular basis. We propose that the habit acquired using this information technology (IT) is an important antecedent of users’ perceptions, since it allows them to value the characteristics of and benefits derived from e-invoicing. We study the effect of habit on perceived usefulness, security and users’ trust in the IT. The sample analyzed is made up of 100 Spanish firms that use e-invoicing. The causal relationships proposed in the model are tested through structural equation modeling. Our findings show that the habit of using e-invoicing improves firms’ trust in this IT and their perceptions of its usefulness and security. These factors explain the subsequent performance of firms when using e-invoicing. To improve their performance with e-invoicing, firms should use the IT frequently. Habit creates a positive information feedback loop and will allow firms to benefit from the advantages of e-invoicing. Other aspects such as security, usefulness and trust should be also considered.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
E-invoicing is the electronic transfer of billing and payment information, via the Internet or other electronic means, between parties involved in a commercial transaction (businesses, the public sector and/or consumers) (European Commission 2009). It links the internal processes of enterprises to the commercial system and may become an important part of an efficient financial supply chain. It speeds up the transmission of information via the online communication system and its intrinsic advantages are very interesting for firms: low operational costs, fewer administrative errors and the elimination of postal delays, among others (Jimenez and Polo 1998; Hani 2001; Berez and Sheth 2007).
Since the late 1990s, e-invoicing has been considered as a possible “killer application”, which may fundamentally change the way customers receive and pay their bills (Buchanan 1998). Nevertheless, the number of user firms in the EU is still significantly lower than what was initially expected. This is probably because e-invoicing is relatively unknown by potential users and does not offer enough guarantees. Research has tried to increase the user’s initial interest in it, dealing with the expected theoretical benefits derived from its adoption, such as the improvement of competitiveness, cost savings, the development of the single market and the acceleration of payments (Hani 2001; Haq 2007; Salmony and Harald 2010). However, the continuous application of e-invoicing has hardly been studied so there is little information about post-use behavior.
Most research on information technology (IT) has been focused on pre-adoption activities and the initial employment of a new IT, using cognitive behavioral models (Jasperson et al. 2005). It tries to determine what motivational factors must be considered in order to study the adoption decision and is based on frameworks such as the Technology Acceptance Model (TAM), the Theory of Planned Behavior (TPB), the Innovation Diffusion Theory (IDT), the Decomposed TPB and the Perceived Characteristics of Innovation model (PCI). The main citations for these models are, respectively, Davis et al. (1989), Schiffer and Ajzen (1985), Rogers (1983), Taylor and Todd (1995), and Moore and Benbasat (1991). This research proposes that the adoption of a new IT is the consequence of a rational, deliberate and cognitive decision derived from the analysis of its desirable perceived outcomes. Nevertheless, it must be taken into account that IT adoption is just the first step towards the continued use of the IT. In order to achieve its general acceptance, a significant number of users should employ the IT on a regular basis (Rogers 1983; Jasperson et al. 2005; Limayem et al. 2007) so post-use behavior must be studied in depth. Factors which induce users to employ an IT initially may have different effects on their subsequent decisions (Tornatzky et al. 1983) because the use of the IT may modify certain perceptions and attitudes (Thompson et al. 1994; Gefen et al. 2003; Hernandez et al. 2010). Due to the lack of studies in the previous literature, some researchers have recently begun to analyze the post-use of ITs in more detail (e.g. Jasperson et al. 2005; Lankton et al. 2010). Habit emerges as a fundamental factor that should be taken into account to study technological behavior (Lankton et al. 2010; Lu et al. 2011). It involves previous experience acquired by users and reflects non-planned internal response that may lead to continuous IT usage. Habit allows users to appreciate the benefits of the IT and to evaluate the improvements in performance that come from its use more precisely.
The main objective of the present study is to analyze firm performance when using e-invoicing on a regular basis. We propose that, for user firms, habit developed during previous interactions with the IT is a significant predictor of its continuous use and the firms’ perceived performance. These firms rely much more on their own habit than on external information, modifying their beliefs, perceptions and trust according to their experiences (Gefen 2003; Liao et al. 2006; Chen and Chao 2011). Focusing on e-invoicing, we study the effect of habit on perceived usefulness, security and trust, since these factors were highlighted by the European Commission (2009) as crucial for firms to employ e-invoicing. We also test the influence of these factors on the performance perceived by the firm from the use of the IT, applying a perspective centered on non-financial measures because they are more closely related to the firm’s perceptions and to its long-term strategy goals. Our results will allow us to know why firms continue using an IT, which is still a critical issue for technology management researchers and practitioners (Bell 2004; Cho et al. 2009).
In order to study e-invoicing in depth, we focus on just one country since the lack of homogeneity in the application of the EU Directive (2001/115/EC) on this subject obstructs comparison between countries. We have chosen the case of Spanish user firms because this country has an adoption rate similar to the European average (12 % according to the European Commission 2009). Moreover, according to the European Commission (2009) and Billentis (2011), Spain is one of the EU member states whose public sector is more committed to e-invoicing (other countries are Denmark, Finland, Italy, Sweden, Austria and Belgium).
The paper is organized as follows. In Sects. 2, 3 and 4 the theoretical framework is explained, analyzing habit and other factors that we consider to be important for explaining e-invoicing performance. The research model is designed and the hypotheses formulated in Sect. 5. Section 6 describes the characteristics of the sample, the variables included in the study and the measurement scale assessment. The research hypotheses are tested by structural analysis and the results are explained in Sect. 7. Finally, the conclusions and managerial implications are discussed.
2 Performance
Research about inter-organizational relationships and IT has focused on concepts such as trust, satisfaction and commitment, which Ulaga and Eggert (2006) call soft variables. Nevertheless, most of these papers have not included a performance variable, which is interesting in order to evaluate the results obtained by firms and to achieve sustainable improvement (Gil-Saura et al. 2009; Trkman 2010). Performance is a concept which measures how well a firm achieves its objectives (Hamon 2003), that is, the firm’s efficiency and its effectiveness in achieving its goals (Robbins and Coulter 2002). Schermerhorn et al. (2002) consider that performance refers to the quality and quantity of individual or group work achievement.
In the IT arena, perceived performance is defined as the success or failure of technology implementation and it involves the users’ evaluation of how the technology fulfills their needs, wants and desires (Ho 2008; Cho et al. 2009; Ifinedo and Nahar 2009). This variable is similar to IT system success or effectiveness, analyzed by authors such as Delone and McLean (1992) and Gable et al. (2003), and refers to the utilization of an IT to enhance organizational goals. In this way, perceived performance is determined by the relationship existing between the evaluation of the benefits achieved and the investments carried out during the adoption and the post-use stages. If the relationship between them is positive, performance will be satisfactory and promote sustained usage of the IT, also called “routinization” (Hage and Aiken 1970; Saga and Zmud 1994). According to Bergendahl (2005), first investments are related to computers, technologies and systems. They are called technology investments and their importance depends on several factors, such as firm size, its technological development, the complexity of the IT that is implemented and the compatibility of this IT with other technologies. Once the IT has been adopted, firms must carry out other investments. These investments include the training of employees, development costs and changes made for the adaptation of the IT (Bergendahl 2005). Regarding the benefits derived from the adoption and employment of the IT, we must highlight issues such as savings in operation costs, growth in revenues, new commercial relationships, and the timeliness and flexibility obtained.
There are several perspectives to analyze the performance of the firm and the success of an IT (Ifinedo and Nahar 2009). We will explain three of the most commonly used. The first perspective is based on financial measures to quantify the performance obtained by the firm, such as earnings, return on investment, return on assets and unit costs (Willcocks et al. 2002; Banker et al. 2004). These measures rely on accounting data obtained at a certain moment and facilitate the objective analysis of the consequences derived from the use of the IT. Despite their advantages, in recent years, both practitioners and researchers have stated that financial measures do not always reflect the value of long-term oriented managerial decisions and show important limitations that must be overcome, so they have emphasized the need to use non-financial measures as a second perspective in order to study firm performance with an IT (Banker et al. 2000). Non-financial measures are also related to managerial issues and the goals achieved from IT employment (Chen et al. 2009) but, instead of quantitative data, they are measured through qualitative indicators evaluated by the firm. There are several types of non-financial measures and some of them are unique to certain ITs or sectors. For example, in e-business and e-commerce, non-financial indicators related to customer satisfaction are considered to analyze the influence of these ITs in improving customer service and in building relationships (Tempest and McFarlan 2000; Plant et al. 2003). Non-financial measures offer clear advantages over financial data (Ittner and Larcker 2000). One is that they deal with customer requirements or competitors, which may be important in achieving profitability, competitive strength and longer-term strategy goals. Another advantage of non-financial measures is that they may involve indicators of intangible benefits related to the employment of an IT. Moreover, they may be better predictors of performance and benefits resulting from decisions made now. The third perspective from which to study firm performance is the technology perspective (Plant et al. 2003; Banker et al. 2004), which employs financial and non-financial indicators to study the technological consequences of employing an IT such as technological efficiency, the effectiveness of IT personnel and resources, and specific IT-related costs and budgets (Hagedoorn and Cloodt 2003; McNaughton et al. 2010). Parker (2000) considers that using a technology can provide a deeper technological base which can be applied in other businesses and situations, so the technology perspective may involve some specific aspects of IT performance that other perspectives pass over.
In the case of e-invoicing, we consider that performance refers to consequences perceived and obtained by the firm from the employment of this IT (Ravichandran and Lertwongsatien 2005), such as increased productivity, cost reductions, improved relationships between the firm and its customers and suppliers, and firm satisfaction (Kositanurit et al. 2006; Park et al. 2007). Garcia et al. (2008) consider that performance reflects the degree of satisfaction perceived by the firm during the application of the IT, due to the benefits and competitive advantages obtained. Therefore, it is logical to consider that performance explains the intention of continuing to use the IT (Chiou 2004), which will increase its diffusion and development.
3 The role of habit
Habit is a concept that has been extensively studied in various fields including social psychology (Ouellette and Wood 1998; Aarts and Dijkstehuis 2000), health sciences (Orbell et al. 2001) and organizational behavior (March and Herbert 1958). It is commonly defined as “learned sequences of acts that become automatic responses to specific situations which may be functional in obtaining certain goals or end states” (Verplanken et al. 1998, p. 540). When behavior is repeated and becomes usual, it is guided by mechanical processes rather than by elaborate decision processes (Aarts et al. 1998; Limayem and Hirt 2003). Habit is based on the past history of the individual and on his/her ability to transform a particular behavior into cognitive schemata, independently of his/her consciousness or rational assessments (Fuji and Garling 2003; Limayem and Hirt 2003; Vance et al. 2012). The relationship between habit and future behavior has been proposed in several studies which consider that activity carried out is a good predictor of subsequent behavior. When the individual performs in a stable context, past behavior influences future responses through its impact on intentions (LaBarbera and Mazursky 1983; Ouellette and Wood 1998; Bamberg et al. 2003). Thus, more frequent past behavior is likely to yield more favorable attitudes, positive perceptions and greater control.
In the IT field, habit is defined as the extent to which using a particular IT has become non-reflective and routinized behavior through learning (Jasperson et al. 2005; Limayem et al. 2007). It is a behavioral preference in the present that guarantees that the user will then behave in the same way, effortlessly and unconsciously (Arts et al. 1998; Chaudhuri 1999; Gefen 2003; Liao et al. 2006; Lu et al. 2011). The importance of habit has emerged in recent years since its inclusion in behavioral models complements the effect of other antecedent factors (Limayem et al. 2003; Kim and Malhotra 2005; Wu and Kuo 2008; Vance et al. 2012). Unlike potential adopters, users base their IT evaluation on the experience and learning acquired during its employment, which determine its continued use and long-term viability (Karahanna et al. 1999; Kim and Malhotra 2005; Limayem et al. 2007). Once people have gained experience with an IT, habit influences their behavior and explains perceptions such as usefulness, ease of use, security and attitudes (Liao et al. 2006; Wu and Kuo 2008; Chen and Chao 2011). According to Gefen (2003), skilled users’ intentions to continue to use an IT depend not only on perceptions, but also on habit, which alone can explain a large proportion of the variance of continued use. Thus, studying the importance of habit can improve our knowledge of IT user behavior and the perceived performance of e-invoicing.
4 Perceptions and trust
4.1 Perceived security
Lack of security is one of the most important barriers to the development of e-commerce and financial transaction on the Internet (Yoon 2002; Kim et al. 2009; McCole et al. 2010). A low level of knowledge of how the Internet works increases users’ fears that hackers or a third party will gain access to their financial secrets or disclose their personal information (Pavlou 2003). Security reflects the perception of reliability of the payment methods used and the mechanisms of data transmission and storage (Kolsaker and Payne 2002; Liu et al. 2005; Kim et al. 2010a). It not only depends on technical tools, but is also determined by users’ beliefs (Yousafzai et al. 2003; Vatanasombut et al. 2008; Shin 2010). In spite of the technological advances in recent years to increase the security of web-based transactions, firms are still concerned about conducting their relationships with suppliers and customers via the Internet, so they must perceive security during their interaction in order to continue using IT (Kousaridas et al. 2008; Kim et al. 2010b).
E-invoicing must satisfy strict security requirements already imposed by Directive 2001/115/EC if it is to become part of a firm’s financial practices (Kaliontzoglou et al. 2006). Some of these security requirements refer to relationships with other agents (authentication and non-repudiation of transactions), while others are derived from the technological culture of the firm (security policy, electronic storage of e-invoicing, etc.). All these security characteristics are very important in the development of e-invoicing as they transmit a better image of its working and increase the trust of user firms.
4.2 Perceived usefulness
Perceived usefulness (PU) is a key variable in one of the most frequently used models to study IT acceptance, the TAM of Davis et al. (1989). It represents the degree to which users of an IT consider that its use will improve their performance, providing bigger organizational advantages than either the status quo or its precursor (Park et al. 2009). If users consider that the IT is necessary (Klopping and McKinney 2004), PU modifies their behavior and predicts continued IT use, as different TAM studies have shown. When users gain experience, they better appreciate the improvement in performance derived from the continued use of the IT (Karahanna et al. 1999). Therefore, to develop a post-acceptance model of an IT, PU must be included (Bhattacherjee 2001; Liao et al. 2006; Liao et al. 2009).
The attractions of e-invoicing include the intrinsic advantages of its use already mentioned in the introduction section. These advantages determine the usefulness perceived by firms and normally lead to an improvement in their performance (Hani 2001; Haq 2007). So, the perceived usefulness of e-invoicing could be one of the key drivers of its acceptance and general diffusion.
4.3 Trust
The importance of trust in e-business has been widely analyzed by previous research from several literature streams (Loebbecke 2003; Yousafzai et al. 2003; Kim 2012a). In the strategy and marketing literature, trust has been related to benefits such as richer information (Lo and Lie 2008), competitive advantage (Barney and Hansen 1994), firm performance (Garcia et al. 2008) and the attainment of long-lasting and profitable relationships (Flavián et al. 2006). From an economic perspective, trust reduces transaction costs (Bromiley and Cummings 1995) and, in the organizational literature, trust has been posited to operate as a governance mechanism (Bradach and Eccles 1989). In general, trust has been a source of fundamental positive consequences.
In IT research, there is no consensus on the definition of trust since both the type of IT considered and the context affect its meaning (Palmer et al. 2000). In the business context, we consider that trust is the subjective belief with which the firm assesses that it will perform tasks using an IT, irrespective of its ability (Doney and Cannon 1997 and Bhattacharya et al. 1998, among others). It has to do with the general reliability of the technology and its correct functioning (Grabner-Kräuter and Kaluscha 2003; Pennington et al. 2003–2004), and it reduces the risk perceived in the early stages of adoption (Pavlou and Gefen 2004; Belanger and Carter 2008; Li et al. 2008).
Some authors have analyzed the role of trust by distinguishing different stages: trust before use of the IT (pre-use trust) and after use (post-use trust) (McKnight et al. 1998; Chiou 2004). In the first stage, users are not familiar with the IT, so trust formation is based on issues such as their propensity to trust (Teo and Liu 2007). Nevertheless, once users have employed the IT, experience and previous perceptions determine their level of trust (Gefen et al. 2003; Urban et al. 2009; Bansal et al. 2010). There is a feedback loop of trust-action-learning-trust that is repeated many times (Urban et al. 2009). The present study analyzes post-use trust, since the firms studied already use e-invoicing. User firms can better evaluate the characteristics of the IT and determine their trust in it more exactly. We consider that users’ trust in the correct functioning of an e-invoicing system and in its benefits may reduce the perceived disadvantages of the change from hard-copy invoicing.
5 Research design and hypotheses
Habit can act as an antecedent or consequence of user behavior depending on the moment analyzed (Lankton et al. 2010). In the adoption stage, first perceptions and beliefs influence the generation of habit (Cao and Yin 2010; Lankton et al. 2010; Barnes 2012). In the post-use stage, habit previously developed determines users’ perceptions and behavior (Gefen 2003; Liao et al. 2006; Limayem et al. 2007; Lu et al. 2011). Interactions with an IT allow users to become more familiar with it, to shape their own perceptions and to take into account characteristics that may not have been important in their first decisions (Karahanna et al. 1999; Montoya-Weiss et al. 2003; Yu et al. 2005). Habit modifies the way in which users process information, reflects the effect generated by practice and conditions decision making (Limayem and Cheung 2008; Kim 2012b). Users learn behaviors and gain perspectives from repetition, updating their expectations over time and continuously blending prior beliefs with new information (Bentler and Speckart 1979; Bagozzi 1981; Boulding et al. 1993). In our research, we propose that habit acts as a key antecedent of users’ perceptions and trust and determines firm performance related to e-invoicing, so this factor explains why firms accept and continue to employ the IT.
Liao et al. (2006) consider that habit is a primary factor along with perceived usefulness (PU) to predict and explain consumers’ continued use of an IT. Through the habitual use of an IT and the understanding that is thus gained, users can learn more about the IT, including how to operate it and how to obtain more advantages. This increased understanding results in a greater awareness of its potential usefulness (Wu and Kuo 2008). In this way, the influence of PU on behavior becomes stronger as the user gains direct experience and acquires the habit of use (Gefen et al. 2003). Karahanna et al. (1999) also found that experienced users of an IT perceive more usefulness in a technology than users with limited experience. Perceived security refers to the users’ subjective evaluation of the electronic system’s security. It has been observed that frequent activity with an IT conditions this perception since the user gets to know how the IT works and the level of security in the interchange of information (Linck et al. 2006; Kim et al. 2010b). If users possess greater experience, obtained through the repeated use of e-invoicing, they will have a higher perception of the security of the IT. Therefore, we can state that habitual users will perceive e-invoicing as more useful and secure than users with only a limited experience of it (Karahanna et al. 1999; Gefen 2003), so we formulate the following relationships:
H1
Habitual activity with e-invoicing positively increases users’ perceived usefulness.
H2
Habitual activity with e-invoicing positively increases users’ perceived security.
Users trust in the proper functioning of a technology on the basis of their previous interactions and experiences (Tan and Thoen 2000; Liao et al. 2006). They reduce their uncertainty and gain knowledge about the IT by using it (Gefen 2000; Gefen 2003). If the IT has worked as expected, users will be more likely to trust in its performance and can anticipate the outcomes of using it. Thus, without habit, trust cannot be adequately anchored to specific favorable behavior (Luhman 1979). We propose that habit is an important precondition for the development of trust and results in greater user awareness of how e-invoicing works. Thus, we propose the following hypothesis:
H3
Habitual activity with e-invoicing positively affects users’ trust.
One of the most necessary steps in the development of online trust is to assure users that their personal data will be safe (Chen and Barnes 2007). Perceived security involves a set of procedures, mechanisms and computer programs to guarantee the integrity and privacy of the information transmitted (Tsiakis and Sthephanides 2005). Therefore, security is a key determinant affecting users’ online trust and helps them overcome the perceived risk (Pavlou 2003; Chen and Barnes 2007).
We will analyze the effect of this perception on trust in e-invoicing, in the same way as other authors have already tested this relationship for ITs such as e-banking, e-commerce and e-payment (Kim and Ahn 2006; Chen and Barnes 2007; Yu and Tao 2009; Kim et al. 2010b; Shin 2010). The employment of e-invoicing should be accompanied by a corresponding security policy, which should establish some norms related to the framework of trust (Kaliontzoglou et al. 2006). In this context, we propose the following hypothesis:
H4
Perceived security about e-invoicing has a positive effect on user trust.
The relationship between PU and trust has been controversial. While several works have found that PU influences initial user trust towards an IT (Koufaris and Hampton-Sosa 2004; Chen and Barnes 2007), other authors consider that post-use trust is an important antecedent of PU (Pavlou 2003; Gefen et al. 2003; Holsapple and Sasidharan 2005; McCloskey 2006). The latter research strand states that trust in an IT improves users’ evaluations of its usefulness (Gefen et al. 2003; Cao et al. 2005; Tung et al. 2008), provides expectations of successful interactions and improves IT employment (Pavlou and Gefen 2004; Rotchanakitumnuai and Speece 2009). We propose that, without trust in e-invoicing, PU cannot guarantee that users will actually employ this IT in their business activity (Rotchanakitumnuai and Speece 2009). Therefore, post-use trust influences the advantages perceived by users from the employment of e-invoicing, improving their perceived usefulness. We hypothesize the following relationship:
H5
Trust in e-invoicing will positively affect the user firms’ perceived usefulness.
The main behavioral consequence of the successful implementation of an IT is the improvement in performance derived from its employment, and this is determined by the experiences of users during their interaction with the IT. With respect to e-invoicing, we analyze whether the perceptions of usefulness, security and trust enhance the performance of the firm.
Research based on DeLone and McLean’s model of Information System success includes PU as a determinant of user satisfaction (Seddon and Kiew 1994; Seddon 1997; Konradt et al. 2006). Users who consider the IT useful will be more satisfied with their interaction and, therefore, value the effect of the IT on their performance more highly (Bhattacherjee 2001; Konradt et al. 2006; Tung et al. 2008). Devaraj et al. (2002) establish that the perceived usefulness of e-commerce is a significant antecedent of consumer performance. The fact that the use of e-invoicing decreases administrative errors and lowers operational costs, among others benefits, makes firms feel more satisfied with this IT and evaluate their performance positively. We hypothesize the following relationship:
H6
The perceived usefulness of e-invoicing has a positive effect on firm performance.
Moreover, if the level of perceived security in the IT is very low, users are unlikely to continue using it until solutions are implemented to allay their fears (Tsiakis and Sthephanides 2005; Yu and Tao 2009). Some studies find that users’ perception of security dominates their decisions to use e-payment systems (Yu and Tao 2009; Kim et al. 2010b). Similarly, we consider that the perceived security of e-invoicing will improve performance. We propose the following hypothesis:
H7
The perceived security of e-invoicing has a positive effect on firm performance.
Regarding the relationship between trust and performance, the lack of trust in an IT usually hinders the achievement of the desired results. Lee and Turban (2001, p. 81) consider that users’ trust is related to three factors: (1) the perceived technical competence of the IT, (2) the perceived performance level of the IT, and (3) the human operator’s understanding of the characteristics and processes of the system. The influence of trust on performance seems evident (Pavlou 2002; Pavlou and Gefen 2004) as the former improves user behavior with the IT and increases the likelihood that the expected benefits will be obtained (Lin and Wang 2006; McCole et al. 2010). Therefore, we will test the following relationship for e-invoicing:
H8
Trust in e-invoicing positively influences firms’ performance.
Figure 1 shows the research model and hypotheses.
6 Methodology
6.1 Sample
Since 2003, Spanish legislation has allowed the use of e-invoicing, giving it the same value as its paper equivalent. According to the Spanish Tax Agency, the only requirements for a firm that wishes to adopt e-invoicing are: to accept the legal conditions established by the EU, to have a computer and to establish an Internet connection. Moreover, the Tax Agency and the Spanish Banking Association have elaborated a standardized e-invoicing software called “Facturae”, which can be downloaded free of charge by any firm. In this way, they hope to eliminate hard-copy invoices and bring about savings of 15,000 million euros 1.5 % of the country’s GDP.
In order to carry out this research, a Computer Assisted Telephone Interviewing (CATI) survey was conducted. The information refers to the firm as a whole, not to each of its employees. Consequently, the questionnaires were addressed to the managers responsible for the use of IT in the firm and they were requested to answer on behalf of the firm. The data were compiled between the months of October and December 2007.Footnote 1
To guarantee the representativeness of the sample, random quota sampling was employed, according to sector and size criteria and the distribution of Spanish firms. A total of 1,443 telephone calls were made and 1,193 valid surveys were obtained. Our sample is representative of the distribution of Spanish firms with respect to the cited criteria. The sample error is 2.76 % (95.5 % degree of confidence). We selected all the firms that had employed e-invoicing: 109 firms. There were no restrictions about the system used (for example, PDF, XML, EDIFACT, html, doc, xls, or jpeg) in order to avoid limitations derived from the non-application of a specific system. After the refining process, a total of 100 valid cases were obtained, 8.38 % of the firms contacted. This percentage of e-invoicing use is similar to the acceptance rate of this IT in Spain at the time the study was carried out (6.10 %, according to Telefonica 2008).
6.2 Operationalizing variables and measures
The constructs included in our research model (shown in ellipses in Fig. 1) are all latent factors, so the observed indicators that reflect each concept must be defined. To this end, we studied the scales proposed in previous research in depth (Table 1). All of them were measured using 7-point Likert scales (1, totally disagree; 7, totally agree). Perceived Usefulness (PU) was obtained from the Technology Acceptance Model (Davis et al. 1989), and Perceived Security (PS) refers to the need for the e-invoice to guarantee the safe transmission of the information (O’Cass and Fenech 2003; Pikkarainen et al. 2004). Habit has been measured based on a scale included by Gefen (2003). Following Wang and Lead (2007), the trust construct has been selected and designed in a way that should lead to understanding how IT mechanisms affect firms’ performance. We have treated trust as a unitary concept which analyzes whether e-invoicing is trustworthy and reliable (Lee et al. 2007; Lemire et al. 2008).
Lastly, firm’s perceived performance has been measured from the non-financial perspective. This perspective is consistent with other research which chooses non-financial measures to assess global performance and tries to go beyond an exclusively technology perspective (see, for example, Weill and Olson 1989 and Ifinedo and Nahar 2009). It involves the firm’s perception of its own managerial performance and refers to benefits that the firm considers that it has obtained due to the implementation of e-invoicing. Non-financial measures have a strong relationship with the drivers of user firm behavior contained in our model since they are variables of the same nature, related to the firm’s perceptions and beliefs about the employment of the IT. Taking into account the advantages of non-financial measures explained in previous sections, we can state that, for our research, they are better predictors of performance because they contain information that is not reflected in financial data, such as the relationship with customers and suppliers, and they are more closely linked to organizational strategies than the measures in the technology perspective (Kaplan and Norton 1992; Hauser et al. 1994; Banker et al. 2000). Moreover, non-financial measures show the link between the benefits derived from IT use and the firm’s satisfaction with the IT (Stivers et al. 1998; Joseph et al. 1999). Our focus is based on the research of Park et al. (2007) and Kositanurit et al. (2006), which measures IT success through features such as enhanced productivity, task performance improvement, decision effectiveness and the time necessary to carry out a task. We develop a scale with four items, which are adapted to the characteristics of the e-invoice. The first item is derived from Igbaria et al. (1997) and Gefen et al. (2005) and describes the enhancement of the productivity of the job (PERF1). Other items are related to the reduction of the cost of performing tasks (PERF2) and to improvements in the relationships with customers and suppliers (PERF3) (Kositanurit et al. 2006). Furthermore, the degree of overall satisfaction with e-invoicing has been included (PERF4) (Park et al. 2007).
It must be highlighted that the absence of common method bias was corroborated, since Harman’s single factor test found that all the indicators do not load onto a single factor (Podsakoff et al. 2003).
Before carrying out the statistical analyses, we specify how we measure our variables and evaluate whether the scales employed to determine factors are reflective or formative in nature. Since the research of Diamantopoulos and Winklhofer (2001), the need to adequately determine the character of the constructs has been stressed, due to the serious consequences that an incorrect specification would entail for the statistical validity of the study’s findings (Jarvis et al. 2003; Mackenzie et al. 2005; Hair et al. 2012). Reflective indicators should be internally consistent and equally valid indicators of the underlying construct. Formative indicators are those which jointly cause the conceptual and empirical meaning of a construct (Jarvis et al. 2003). Dropping a formative indicator may omit a unique part of the latent construct and change the meaning of the variable.
Jarvis et al. (2003) provide a set of practical guidelines to distinguish whether a construct is reflective or formative. Firstly, we should analyze the direction of causality between construct and measure implied by the conceptual definition. In our model, the indicators were manifestations of their construct. Therefore, changes in one indicator should not cause changes in the overall construct, while changes in the underlying construct generate changes in the indicators (Fornell and Bookstein 1982). Secondly, we checked that all the indicators of a construct were conceptually interchangeable, so they had a similar content and shared a common theme. The elimination of one indicator would not alter the conceptual domain of the construct because all facets of the construct should be adequately represented by the remaining indicators (Bollen and Lennox 1991). Thirdly, we verified that indicators inherent to the same factors co-vary with each other; in such a way that, if one of these indicators experiences any change, it is also reflected in the other indicators. This is because these indicators involve the same underlying latent construct. Finally, we observed that the nomological net for the indicators of each scale does not differ, since the indicators have same antecedents and consequences. We can state that these four requirements hold for all the scales of the constructs analyzed and that, therefore, they are reflective.
6.3 Measurement scale assessment
In order to guarantee measurement reliability and validity, a confirmatory factor analysis (CFA) containing all the multi-item reflective constructs in our framework was estimated with EQS 6.1 (Bentler 1995), using the maximum likelihood method. The results obtained are shown in Table 2.
The results suggest that our measurement model provides a good fit to the data: S–B X2 = 167.91, df = 94, p = 0.00; RMSEA = 0.089; NFI = 0.875; NNFI = 0.907; CFI = 0.938. As evidence of convergent validity, the CFA results indicate that all items are significant (p < 0.01), related to their corresponding factors, whose standardized loadings are higher than 0.60 (Bagozzi and Yi 1988), and have an R2 higher than 0.50 (Jöreskog and Sörbom 1993).
Table 3 also demonstrates the high internal consistency of the constructs. The composite reliability of each factor was higher than 0.60 (Bagozzi and Yi 1988), the average variance extracted (AVE) was also greater than 0.50 (Fornell and Larcker 1981) and Cronbach’s alpha values exceeded the reference value of 0.7 (Nunnally and Bernstein 1994).
As can be seen in Table 3, evidence for the discriminant validity of the measures was provided by checking that none of the 95 % confidence intervals of the latent factor correlation matrix contained a value of 1.0 (Anderson and Gerbing 1988). On the basis of these criteria, we concluded that the measures in the study exhibited sufficient evidence of reliability and convergent and discriminant validity.
7 Results
We tested the proposed conceptual model (Fig. 1) using structural equation modeling. The empirical estimations for the main effects are shown in Table 4. The goodness of fit indices surpass the limits recommended by Hair et al. (1998): S–B X2 = 170.55; df = 96; p < 0.00; NFI = 0.874; NNFI = 0.909; CFI = 0.927; IFI = 0.928; RMSEA = 0.088. The global explanatory power of our model for performance is 60 %.
An examination of the estimated model parameters shows that habit influences the user’s perceptions of e-invoicing. The more frequently the tool is used, the higher the perceived security (β1 = 0.33), the usefulness derived from use (β2 = 0.39) and trust in the IT (β3 = 0.24). So, we can affirm that habit causes an increase of trust in e-invoicing and more awareness of security and of its benefits. H1, H2 and H3 are supported. If we only take into account the significant relationships in the model, the standarized global effect of habit on performance is 0.37. On the basis of our findings, we would recommend that user firms try to encourage the continous employment of e-invoicing in order to improve performance. This employment will promote the development of trust and favorable perceptions of the IT. The encouragement must avoid coercion, rewarding employees who apply e-invoicing with incentives related to the profits obtained by the firm from the employment of the IT. In that way, employees who use e-invoicing would try to apply it properly and generate habit in the firm since achieving a positive performance will be to their benefit.
The security perceived by the user firm significantly improves trust (β4 = 0.58) and performance (β7 = 0.25). H4 and H7 are supported. These results highlight the importance of designing secure systems of e-invoicing that ensure the correct transmission of data in order to provide users with the greatest possible guarantees and improve the firm’s performance. A firm that receives an invoice electronically needs to be sure about who it has come from and that the document has not been manipulated during the process. Thus, it is advisable for user firms to invest in security in order to transmit trust to their partners and implement other systems that enhance e-invoicing, such as the digital signature. The perceived security of e-invoicing will improve the behavior of the firm. The elaboration and transmission of a set of “good practices” for e-invoicing by its developers and public administrations, including questions of security, would also be interesting. Security regulation will increase firms’ trust in the IT and perceived performance because the intervention of the public sector guarantees its validity, authenticity and standardization.
Trust influences perceived usefulness (β5 = 0.27) but it does not have a direct effect on performance. Therefore, for the data analyzed, H5 is supported and H8 is rejected. In this way, trust in the IT will allow firms to be able to perceive the benefits of the IT more realistically, accelerate the learning process and improve future actions. We would advise firms that wish to promote trust in e-invoicing to make an effort to deal with the psychological barriers involved in its employment. These psychological barriers can be overcome via improvements in employee training, not only of those that use the tool but of all the staff in the firm. Training decreases levels of resistance, improves user habits and increases the possibility of a successful use of the IT (Bradford and Florin 2003). The firm will acquire more trust in e-invoicing if it eliminates any kind of prejudice and resistance from its employees.
Perceived usefulness is the most important factor influencing firms’ performance (β6 = 0.57). This result indicates that the greater the perceived usefulness of e-invoicing, the better the firms’ evaluation of their performance. H6 is supported. PU acts as a mediator between habit and trust in e-invoicing, on the one hand, and the firms’ final behavior, on the other. To reinforce PU, firms should adequately communicate the main advantages of e-invoicing to their employees. In this way, they will know what e-invoicing really is, consider it an opportunity instead of a threat, and better appreciate the improvements in efficiency that can be obtained. Similarly, informational advertising campaigns carried out by developers and public administrations could also increase perceived usefulness and, thus, enhance the performance derived from the application of e-invoicing.
8 Discussion and conclusions
In spite of the numerous advantages of e-invoicing, its diffusion rate is much lower than initially expected. Previous research on this IT focuses on adoption and the reasons for the first use, without considering the behavior of users after continuous employment. This work has analyzed the experiences of user firms with e-invoicing and identifies factors that promote the use and development of this IT and improve firms’ performance.
The first important conclusion is the role of habit in the diffusion of e-invoicing. The benefits of this IT cannot be derived from its first use but only from continuous use. From our results it can be concluded that, if a firm habitually uses e-invoicing, it will perceive more usefulness, security and trust in the use of the technology. These factors explain the subsequent improvement in performance from IT use, which will consolidate previously acquired habit. Habitual use leads to “tunnel vision” (Verplanken and Orbell 2003) and modifies the amount of information employed to take the adoption decision. It blurs the effect of previous evaluations and allows experienced users to modify their beliefs and decisions in the post-use context. If the user firm is in the habit of continuously employing a particular IT, it will know its features in depth, perceive greater advantages and improve its performance. Thus, habit constitutes the cornerstone for the post-use of an IT, ensuring its long-term viability (Bhattacherjee 2001; Premkumar and Bhattacherjee 2008).
Secondly, we would like to highlight the effects of perceived security, which are an important aspect in user firm behavior. For the firm to accept the IT, it must be sure that the information provided will not be used for fraudulent goals. If the firm finds security during its first interactions, it will trust in the benefits that could be obtained as well as in the achievement of the goals it initially expected, so its evaluation will be more positive. Thus, security enhances firm trust and gives the user a perception of better performance.
Thirdly, the role played by perceived usefulness in e-invoicing can be highlighted. This variable exerts a strong influence on firm performance and acts as a mediator of trust. As can be observed in various reports on e-invoicing (European Commission 2009), cutting costs and reducing administrative errors are important factors in the decision to implement this tool. Our results reaffirm these statements using information related to the direct experience of user firms and highlight the importance of the benefits obtained for the continued use of the IT. Usefulness is a sufficient condition for firms to increase e-invoicing use. Finally, it is important to stress that trust in e-invoicing enhances the firms’ performance because of the effect of trust on perceived usefulness.
8.1 Contributions
The results obtained from the present work make an important contribution to the literature and have several implications for firms.
One of the main interests of our research is that, to the best of our knowledge, it is one of the first studies that have investigated the performance of experienced users of e-invoicing. The few papers on this IT are usually descriptive and/or exploratory. Our results have helped to fill this gap, at least partially, by empirically testing the importance of habit, perceptions and trust in firms with experience in the use of e-invoicing. These firms can make a significant contribution to the diffusion of e-invoicing because, if they are satisfied with the performance obtained, they will disseminate positive word-of-mouth that may attract new firms. They will promote the idea among the firms in their environment, build support, overcome resistance and ensure that the tool is implemented. In this way, false beliefs about the adoption and subsequent use of the IT could be eradicated and the limitations that are impeding its diffusion would be overcome.
Another contribution of our research is the proposal of a comprehensive performance framework for e-invoicing based on non-financial measures. According to our results, firms interested in adopting e-invoicing will discover the benefits related to its use as well as its effects on their performance because non-financial measures give an overview of the application of the IT that goes beyond a financial or technology perspective. In order to achieve this improved performance, firms should use e-invoicing continuously and develop a habit that allows them to benefit from all the advantages of the IT. As Gefen (2003) states, habit creates a positive information feedback loop in which the IT will gain more and more market share due to the avoidance of some switching costs. Developers must design systems of e-invoicing that suit customers’ habits and encourage its diffusion.
8.2 Limitations and future lines
As with any investigation, our study has certain limitations. Firstly, we should mention our use of cross-sectional data, which means that our analysis lacks a temporal dimension so we cannot observe the evolution in firms’ acceptance of technology. Consequently, as a future line of research, we want to test the model presented here over a continuous period, thereby determining the variation in the importance of the perceptions and performance in successive years. Secondly, we would also like to analyze the perceptions of firms that have not yet adopted e-invoicing and compare them with the behavior of user firms. This comparison will allow us to identify the beliefs of non-user and user firms and define different theoretical frameworks and models for each. Lastly, in future research, we will test the development of e-invoicing in different countries, in order to make a cross-national comparison and to identify the differences in habit, perceptions, trust and performance.
Notes
According to Billentis (2011), the rate of use of e-invoicing in Spain in 2010 was only 12 % and is still increasing. The data used in our research refer to firms that use e-invoicing so the results obtained are relevant to understand the behavior of firms that have developed the habit of using this IT, independently of the year of study. Therefore, the conclusions of our research derived from the importance of habit can be applied, today, to a greater number of firms that use e-invoicing.
References
Aarts H, Dijkstehuis A (2000) Habits as knowledge structures: automaticity in goal-directed behavior. J Pers Soc Psychol 78:53–63
Aarts H, Verplanken B, van Knippenberg A (1998) Predicting behavior from actions in the past: repeated decision making or a matter of habit. J Appl Soc Psychol 28(15):1355–1374
Anderson JC, Gerbing DW (1988) Structural equation modeling in practice: a review and recommend two-step approach. Psychol Bull 103(3):411–423
Bagozzi RP (1981) Attitudes, intentions and behavior: a test of some key hypotheses. J Pers Soc Psychol 41:607–627
Bagozzi RP, Yi PR (1988) On the evaluation of structural equation models. Acad Market Sci 16(1):74–94
Bamberg S, Rolle D, Weber C (2003) Does habitual car use not lead to more resistance to change of travel mode. Transportation 30(1):97–108
Banker RJ, Potter G, Srinivasan D (2000) An empirical investigation of an incentive plan that includes nonfinancial performance measures. Account Rev 75(1):65–92
Banker RD, Chang H, Janakiraman SN, Konstans C (2004) A balanced scorecard analysis of performance metrics. Eur J Oper Res 154:423–436
Bansal G, Zahedi FM, Gefen D (2010) The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decis Support Syst 49:138–150
Barnes SJ (2012) Understanding use continuance in virtual worlds: empirical test of a research model. Inform Manag 48:313–319
Barney JB, Hansen MH (1994) Trustworthiness as a source of competitive advantage. Strateg Manag J 15:175–190
Belanger F, Carter L (2008) Trust and risk in e-government adoption. J Strat Inform Syst 17:165–176
Bell S (2004) Trapped by the wrong dependent variable: a call for individual technology routinization and infusion. In: Research proceedings of ASAC, information systems division. Quebec City, Quebec, June 2004
Bentler PM (1995) EQS structural equations program manual. Multivariate Software, Inc., CA
Bentler P, Speckart G (1979) Models of attitude-behavior relations. Psychol Rev 86(5):452–464
Berez S, Sheth A (2007) Break the paper jam in B2B payments. Harvard Bus Rev 85(11):28
Bergendahl G (2005) Models for investment in electronic commerce- financial perspectives with empirical evidence. Omega 33:363–376
Bhattacharya R, Devinney TM, Pillutla MM (1998) A formal model of trust based on outcomes. Acad Manag Rev 23(3):459–472
Bhattacherjee A (2001) An empirical analysis of the antecedents of electronic commerce service continuance. Decis Support Syst 32(2):201–214
Billentis (2011) E-invoicing/e-billing in Europe and abroad. Available in: http://www.billentis.com/e-invoicing_ebilling_market_report_EN.htm
Bollen K, Lennox R (1991) Conventional wisdom on measurement: a structural equation perspective. Psychol Bull 110(2):305–314
Boulding W, Kalra A, Staelin R, Zeithaml VA (1993) A dynamic process model of service quality: from expectations to behavioral intentions. J Mark Res 30(1):7–27
Bradach JL, Eccles RG (1989) Price, authority, and trust: from ideal types to plural forms. Ann Rev Sociol 15(1):97–118
Bradford M, Florin F (2003) Examining the role of innovation diffusion factors on the implementation success of enterprise resource planning systems. Int J Account Inform Syst 4:205–225
Bromiley P, Cummings LL (1995) Transactions costs in organizations with trust. In: Bies R, Sheppard B, Lewicki R (eds) Research on negotiation in organizations. JAI Press, Greenwich, CT
Buchanan L (1998) Killer apps. Face to Face 20(6):92–95
Cao S, Yin H (2010) Trust and habit in e-service continuance: an integrated model. J Comput Inform Syst 6(11):3595–3604
Cao M, Zhang Q, Seydel J (2005) B2C e-commerce web site quality: an empirical examination. Indus Manag Data Syst 105(5):645–661
Chaudhuri A (1999) Does brand loyalty mediate brand equity outcomes? J Market Theory Practice 7(2):136–146
Chen Y-H, Barnes S (2007) Initial trust and online buyer behavior. Indus Manag Data Syst 107(1):21–36
Chen C-F, Chao W-H (2011) Habitual or reasoned? Using the theory of planned behavior, technology acceptance model, and habit to examine switching intentions toward public transit. Transp Res 14:128–137
Chen M-Y, Huang M-J, Cheng Y-C (2009) Measuring knowledge management performance using a competitive perspective: an empirical study. Expert Syst Appl 36:8449–8459
Chiou J-S (2004) The antecedents of consumers’ loyalty toward Internet service providers. Inform Manag 41:685–695
Cho V, Cheng TCE, Hung H (2009) Continued usage of technology versus situational factors: an empirical analysis. J Eng Technol Manag 26:264–284
Davis FD, Bagozzi RP, Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Manage Sci 35(8):982–1002
DeLone WH, McLean ER (1992) Information systems success: the quest for the dependent variable. Inform Syst Res 3:60–95
Devaraj S, Fan M, Kohli R (2002) Antecedents of B2C channel satisfaction preference: validating e-commerce metrics. Inform Syst Res 13(3):316–333
Diamantopoulos A, Winklhofer HM (2001) Index construction with formative indicators: an alternative to scale development. J Mark Res 38:269–277
Doney PM, Cannon JP (1997) An examination of the nature of trust in buyer-seller relationships. J Market 61(2):35–51
European Commission Expert Group on E-Invoicing (2009) Mid-term report of the European commission expert group on e-invoicing. Available in: http://eceuropaeu/internal_market/payments/docs/einvoicing/report-2009_01_27_enpdf
Flavián C, Guinaliu M, Gurrea R (2006) The role played by perceived usability, satisfaction and consumer trust on website loyalty. Inform Manag 43:1–14
Fornell C, Bookstein FL (1982) Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. J Mark Res 19:440–452
Fornell C, Larcker D (1981) Structural equation models with unobserved variables measurement error. J Mark Res 36(3):39–50
Fuji S, Garling T (2003) Development of script-based travel mode choice after forced change. Transp Res Part F 6:117–124
Gable G, Sedera D, Chan T (2003) Enterprise systems success: a measurement model. In: Proceedings of the 24th international conference on information systems, Seattle, WA
Garcia N, Sanzo MJ, Trespalacios JA (2008) New product internal performance and market performance: evidence from Spanish firms regarding the role of trust, interfunctional integration, and innovation type. Technovation 28(11):713–725
Gefen D (2000) E-commerce: the role of familiarity and trust. Int J Manag Sci 28:725–737
Gefen D (2003) TAM o just habit plan: a look at experienced online shoppers. J End User Comput 15(3):1–13
Gefen D, Karahanna E, Straub DW (2003) Inexperience and experience with online stores: the importance of TAM and trust. IEEE Trans Eng Manage 50(3):307
Gefen D, Karahanna E, Straub DW, Ragowsky A (2005) A multilevel approach to measuring firms. Inform Syst Manag 22(11):18–25
Gil-Saura I, Frasquet-Deltoro M, Cervera-Taulet A (2009) The value of B2B relationships. Indus Manag Data Syst 109(5):593–609
Grabner-Kräuter S, Kaluscha EA (2003) Empirical research in on-line trust: a review and critical assessment. Int J Hum Comput Stud 58:783–812
Grandon E, Pearson JM (2004) Electronic commerce adoption: an empirical study of small medium US businesses. Inform Manag 1:197–216
Hage J, Aiken M (1970) Social change in complex organizations. Random House, New York
Hagedoorn J, Cloodt M (2003) Measuring innovative performance: is there an advantage in using multiple indicators. Res Policy 32:1365–1379
Hair J, Anderson R, Tatham RB (1998) Multivariate data analysis. Prentice Hall, Upper Saddle River
Hair JF, Sarstedt M, Ringle M, Mena JA (2012) An assessment of the use of partial least squares structural equation modeling in marketing research. J Acad Market Scis 40:414–433
Hamon TT (2003) Organizational effectiveness between transformational leadership and organizational performance in the largest public companies in Canada. Unpublished doctoral dissertation, Capella University, Minneapolis, MN
Hani EE (2001) The e-invoice—a legal document? Credit Management 22–24
Haq S (2007) Electronic invoicing gains as adoption barriers fall. Financ Execut 23(7):61–63
Hauser JR, Simester D, Wernerfelt B (1994) Customer satisfation incentives. Market Sci 13(4):327–350
Hernandez B, Jimenez J, Martin MJ (2010) Customer behavior in electronic commerce: the moderating effect of e-purchasing experience. J Bus Res 63(9):964–971
Ho L-A (2008) What affects organizational performance? The linking of learning and knowledge management. Indus Manag Data Syst 108(9):1234–1254
Holsapple CW, Sasidharan S (2005) The dynamics of trust in B2C e-commerce: a research model and agenda. IseB 3(4):377–403
Ifinedo P, Nahar N (2009) Interactions between contingency, organizational IT factors, and ERP success. Indus Manag Data Syst 109(1):118–137
Igbaria M, Zinatelli N, Cragg P, Cavaye ALM (1997) Personal computing acceptance factors in small firms: a structural equation model. MIS Q 21(3):279–305
Ittner C, Larcker D (2000) Non-financial performance measures: what works and what doesn’t. Financial Times’ Mastering Management series, Oct 16, 2000
Jarvis CB, MacKenzie SB, Podsakoff PM (2003) A critical review of construct indicators measurement model mispecifications in marketing consumer research. J Consum Res 30:199–218
Jasperson J, Carter PE, Zmud RW (2005) A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS Q 29(3):525–557
Jimenez J, Polo Y (1998) International diffusion of a new tool: the case of Electronic Data Interchange (EDI) in the retailing sector. Res Policy 26(7–8):811–827
Jöreskog K, Sörbom D (1993) LISREL 8 structural equation modeling with the simplis command language. Scientific Software International, Chicago-Illinois
Joseph K, Srinivasan D, Thevaranjan A (1999) Managerial myopia and nonfinancial performance measures: the case of customer satisfaction mitigating hard-selling. Working paper. University of Arkansas, Lawrence, KS, University of Pittsburgh, Pittsburgh, PA and Syracuse University, Syracuse, NY
Kaliontzoglou A, Boutsi P, Polemi D (2006) eInvoke: secure e-invoicing based on web services. Electron Commerce Res 6:337–353
Kaplan R, Norton D (1992) The balanced-scorecard: measures that drive performance. Harvard Bus Rev 70(1):71–79
Karahanna E, Straub DW, Chervany N (1999) Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Q 23(2):183–213
Kim DJ (2012a) An investigation of the effect of online consumer trust on expectation, satisfaction, and post-expectation. IseB 10(2):219–240
Kim B (2012b) The diffusion of mobile data services and applications: exploring the role of habit and its antecedents. Telecommun Policy 36:69–81
Kim H-S, Ahn J-H (2006) Comparison of trust sources of an online market-marker in the e-marketplace: buyer’s and seller’s perspectives. J Comput Inform Syst 47:84–94
Kim SS, Malhotra NK (2005) A longitudinal model of continued is use: an integrative view of four mechanisms underlying post-adoption phenomena. Manage Sci 51(5):741–755
Kim J, Jin B, Swinney J (2009) The role of e-tail quality, e-satisfaction and e-trust in online loyalty development process. J Retail Consumer Serv 16:239–247
Kim C, Tao W, Shin N, Kim KS (2010a) An empirical study of customers’ perceptions of security and trust in e-payment systems. Electron Commer Res Appl 9(1):84–95
Kim JU, Kim WJ, Park SC (2010b) Consumer perceptions on web advertisements and motivation factors to purchase in the online shopping. Comput Hum Behav 26:1208–1222
Klopping I, McKinney E (2004) Extending the technology acceptance model the task-technology fit model to consumer e-commerce. Inform Technol Learn Perform J 22(1):35–48
Kolsaker A, Payne C (2002) Engendering trust in e-commerce: a study of gender-based concerns. Market Intell Plan 20(4):206–214
Konradt U, Christophersen T, Schaeffer-Kuelz U (2006) Predicting user satisfaction, strain and system usage of employee self-services. Int J Human Comput Stud 64:1141–1153
Kositanurit B, Ngwenyama O, Osei-Bryson K (2006) An exploration of factors that impact individual performance in an ERP. Eur J Inform Syst 15(6):556–568
Koufaris M, Hampton-Sosa W (2004) The development of initial trust in an online company by new customers. Inform Manag 41:377–397
Kousaridas A, Parissis G, Apostolopoulos T (2008) An open financial services architecture based on the use of intelligent mobile devices. Electron Commer Res Appl 7(2):232–246
LaBarbera PA, Mazursky D (1983) A longitudinal assessment of consumer satisfaction dissatisfaction: the dynamic aspect of the cognitive standardization. J Mark Res 20(November):393–404
Lankton NK, Wilson EV, Mao E (2010) Antecedents and determinants of information technology habit. Inform Manag 47:300–307
Lee MKO, Turban E (2001) A trust model for consumer internet shopping. Int J Electron Commerce 6(1):75–91
Lee Z, Wagner C, Shin HK (2007) The effect of decision support system expertise on system use behavior and performance. Inform Manag 45:349–358
Lemire M, Paré G, Sicotte C, Harvey C (2008) Determinants of Internet use as a preferred source of information on personal health. Int J Med Informatics 77(11):723–734
Li X, Hess TJ, Valacich JS (2008) Why do we trust new technology? A study of initial trust formation with organizational information systems. J Strat Inform Syst 17:39–71
Liao C, Palvia P, Lin H-N (2006) The roles of habit and web site quality in e-commerce. Int J Inf Manage 26:469–483
Liao C, Palvia P, Che J-L (2009) Information technology adoption behavior life cycle: toward a Technology Continuance Theory (TCT). Int J Inf Manage 29:309–320
Limayem M, Cheung CMK (2008) Understanding information systems continuance: the case of Internet-based learning technologies. Inform Manag 45(4):227–232
Limayem M, Hirt SG (2003) Force of habit and information system usage: theory and initial validation. J Assoc Inform Syst 4:65–97
Limayem M, Hirt SG, Cheung CMK (2003) Habit in the context of IS Continuance: theory extension and scale development. ECIS proceedings, paper 90
Limayem M, Hirt SG, Cheung CMK (2007) How habit limits the predictive power of intention: the case of information systems continuance. MIS Q 31(4):705–737
Lin H–H, Wang Y-S (2006) An examination of the determinants of customer loyalty in mobile commerce contexts. Inform Manag 43(3):271–282
Linck K, Pousttchi K, Wiedemann DG (2006) Security issues in mobile payment from the customer viewpoint. In: Proceedings of the 14th European conference on information systems (ECIS 2006) Goteborg (Schweden), pp 1–11
Liu C, Marchewka JT, Lu J, Yu C-S (2005) Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inform Manag 42(2):289–304
Lo S-K, Lie T (2008) Selection of communication technologies. A perspective based on information richness theory and trust. Technovation 28(3):146–153
Loebbecke C (2003) e-Business trust concepts based on seals and insurance solutions. IseB 1(1):55–72
Lu Y, Cao Y, Wang B, Yang S (2011) A study on factors that affect users’ behavioral intention to transfer usage from the offline to the online channel. Comput Hum Behav 27(1):355–364
Luhman N (1979) Trust and power. Wiley, London
Mackenzie SB, Podsakoff PM, Jarvis CB (2005) The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions. J Appl Psychol 90(4):710–730
March JG, Herbert SA (1958) Organizations. Wiley, London
McCloskey DW (2006) The importance of ease of use, usefulness, and trust to online consumers: an examination of the technology acceptance model with older customers. J Organ End User Comput 18(3):47–65
McCole P, Ramsey E, Williams J (2010) Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. J Bus Res 63(9–10):1018–1024
McKnight DH, Cummings LL, Chervany NL (1998) Initial trust formation in new organizational relationships. Acad Manag Rev 23:473–490
McNaughton B, Ray P, Lewis L (2010) Designing an evaluation framework for IT service management. Inform Manag 47:219–225
Montoya-Weiss MM, Voss GB, Grewal D (2003) Determinants of online channel use and overall satisfaction with a relational multichannel service provider. J Acad Mark Sci 31(4):448–458
Moore GC, Benbasat I (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation. Inform Syst Res 2–3:192–222
Nunnally JC, Bernstein IJ (1994) Psychometric theory, 3rd edn. McGraw-Hill, New York
O’Cass A, Fenech T (2003) Web retailing adoption: exploring the nature of internet users web retailing behavior. Journal of Retailing Consumer Services 10:81–94
Orbell S, Blair C, Sherlock K, Conner M (2001) The theory of planned behavior and ecstasy use: roles for habit and perceived control over taking versus obtaining substances. J Appl Soc Psychol 31(1):31–47
Ouellette JA, Wood W (1998) Habit and intention in everyday life: the multiple processes by which past behavior predicts future behavior. Psychol Bull 124(1):54–74
Palmer JW, Bailey JP, Faraj S (2000) The role of intermediaries in the development of trust on the WWW: the use and prominence of trusted third parties and privacy statements. J Comput Mediat Commun 5(3)
Park J-H, Suh H-J, Yang H-D (2007) Perceived absorptive capacity of individual users in performance of Enterprise Resource Planning (ERP) usage: the case for Korean firms. Inform Manag 44:300–312
Park N, Roman R, Lee S, Chung JE (2009) User acceptance of a digital library system in developing countries: an application of the technology acceptance model. Int J Inf Manage 29:196–209
Parker AR (2000) Impact on the organizational performance if the strategy—technology policy interaction. J Bus Res 47:55–64
Pavlou PA (2002) Institutional trust in interorganizational exchange relationships: the role of electronic B2B marketplaces. J Strat Inform Syst 11(4):105–143
Pavlou PA (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int J Electron Commerce 7(3):101–134
Pavlou PA, Gefen D (2004) Building effective online marketplaces with institution-based trust. Inform Syst Res 15(1):37–59
Pennington R, Dixon H, Grover V (2003–2004) The role of system trust in business-to-consumer transactions. J Manag Inform Syst 20(3):197–226
Pikkarainen T, Pikkarainen K, Karjaluoto H, Pahnila S (2004) Consumer acceptance of online banking: an extension of the technology acceptance model. Int Res 14(3):224–235
Plant R, Willcocks L, Olson N (2003) Measuring e-business performance: towards a revised balanced scorecard approach. IseB 1:265–281
Podsakoff PM, MacKenzie SB, Lee J-Y, Podsakoff NP (2003) Common method biases in behavioral research: a critical review of the literature and recommend remedies. J Appl Psychol 88:879–903
Premkumar G, Bhattacherjee A (2008) Explaining information technology usage: a test of competing models. OMEGA 36:64–75
Ranganathan C, Ganapathy E (2002) Key dimensions of business-to-consumer web sites. Inform Manag 39(6):457–465
Ravichandran T, Lertwongsatien C (2005) Effect of information systems resources and capabilities on firm performance: a resource-based perspective. J Manag Inform Syst 21(4):237–276
Robbins PS, Coulter M (2002) Management. Prentice-Hall, Upper-Saddle River
Rogers EM (1983) Diffusion of innovations. Free Press, New York
Rotchanakitumnuai S, Speece M (2009) Modeling electronic service acceptance of an e-securities trading system. Indus Manag Data Syst 109(8):1069–1084
Saga V, Zmud R (1994) The nature and determinants of information technology acceptance, routinization and infusion. In: Levine L (ed) Diffusion. Transfer and Implementation of Information Technology, North-Holland, pp 67–86
Salmony M, Harald B (2010) e-Invoicing in Europe: now and the future. J Paym Strat Syst 4(4):371–380
Schermerhorn JR, Hunt JM, Osborn RN (2002) Organizational behavior, 7th edn. Wiley, New York
Schiffer DB, Ajzen I (1985) Intention, perceived control, and weight loss: an application of the theory of planned behavior. J Pers Soc Psychol 49(4):843–851
Seddon PB (1997) A respecification and extension of the DeLone and McLean model of IS success. Inform Syst Res 8(3):240–253
Seddon PB, Kiew M-Y (1994) A partial least test development of the DeLone McLean Model of IS success. Proc Int Conf Inform Syst Vancouver Canada ICI 94:99–110
Shin D-H (2010) The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact Comput 22:428–438
Stivers BP, Covin TJ, Hall NG, Smalt SW (1998) How nonfinancial performance measures are used. Manag Account 44:46–49
Tan YH, Thoen W (2000) Toward a generic model of trust for electronic commerce. Int J Electron Commerce 7(3):135–161
Taylor S, Todd PA (1995) Assessing IT usage: the role of prior experience. MIS Q 19(4):561–570
Telefonica (2008) La sociedad de la información en España. Avilable in: http://e-libros.fundacion.telefonica.com/sie08/aplicacion_sie.html
Tempest N, McFarlan FW (2000) Charles Schwab Corporation (A) & (B) Harvard Business School Case: 9-300-024 and 9-300-0025 Harvard Business School, Boston
Teo TSH, Liu J (2007) Consumer trust in e-commerce in the United States, Singapore and China. OMEGA 35:22–38
Thompson RL, Higgins CA, Howell JM (1994) Influence of experience on personal computer utilization: testing a conceptual model. J Manag Inform Syst 11(1):167–187
Tornatzky LG, Eveland JD, Boylan MG, Hetzner WA, Jonson EC, Roitman D, Schneider J (1983) Innovation processes and their management: a conceptual empirical and policy review of innovation process research, Washington, DG. National Science Foundation
Trkman P (2010) The critical success factors of business process management. Int J Inf Manage 30:125–134
Tsiakis T, Sthephanides G (2005) The concept of security and trust in electronic payments. Comput Sec 24:10–15
Tung F-C, Chang S-C, Chou C-M (2008) An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry. Int J Med Informatics 77:324–335
Ulaga W, Eggert A (2006) Relationship value and relationship quality broadening the nomological network of business-to-business relationships. Eur J Mark 40(3/4):311–327
Urban GL, Amyx C, Lorenzon A (2009) Online trust: state of the art, new frontiers, and research potential. J Interact Market 23:179–190
Vance A, Siponen M, Pahnila S (2012) Motivating IS security compliance: insights from habit and protection motivation theory. Inform Manag 49(3–4):190–198
Vatanasombut B, Igbaria M, Stylianou AC, Rodgers W (2008) Information systems continuance intention of web-based applications customers: the case of online banking. Inform Manag 45:419–428
Verplanken B, Orbell S (2003) Reflections on past behavior: a self-report index of habit strength. J Appl Social Psychol 33(6):1313–1330
Verplanken B, Aarts H, van Knippenberg A, Moonen A (1998) Habit versus planned behavior: a field experiment. Br J Soc Psychol 37(1):111–128
Wang F, Lead M (2007) How can the Web help build customer relationships? An empirical study on e-tailing. Inform Manag 44(2):115
Weill P, Olson MH (1989) Managing investment in information technology: mini case examples and implications. MIS Q 13(1):1–17
Willcocks L, Petherbridge P, Olson N (2002) Making IT count: strategy, delivery. Infrastructure, Butterworth
Wu M-C, Kuo F-Y (2008) An empirical investigation of habitual usage and past usage on technology acceptance evaluations and continuance intention. DATABASE Adv Inform Syst 39(4):48–73
Yoon SI (2002) The antecedents and consequences of trust in online purchase decisions. J Interact Market 16(2):47–63
Yousafzai S, Pallister JG, Foxall GR (2003) A proposed model of e-trust for electronic banking. Technovation 23:847–860
Yu CS, Tao YH (2009) Understanding business-level innovation technology adoption. Technovation 29(2):92–109
Yu J, Ha I, Choi M, Rho J (2005) Extending the TAM for a t-commerce. Inform Manag 42(77):965–976
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hernandez-Ortega, B., Jimenez-Martinez, J. Performance of e-invoicing in Spanish firms. Inf Syst E-Bus Manage 11, 457–480 (2013). https://doi.org/10.1007/s10257-012-0203-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10257-012-0203-y