Sidebar Menu
GoITSystems by Dr. M. Gottlieb
  • Home
  • Research Methods
    • Qualitative Methods
      • Literature Research
      • Case Studies
      • Action Research
      • Document Analysis
      • Formal-Deductive Analysis
      • Delphi-Methode
      • Design Science
      • Ethnography
      • Grounded Theory
      • Prototyping
      • Coding
      • Content Analysis
    • Quantitative Methods
      • Experiments
      • Questionnaire Creation
        • Known Questionnaires
      • Reference Modelling
      • Card Sorting
      • Argumentative-Deductive Analysis
      • Simulation
      • Correllation Study
      • Design Thinking
    • Quant. or Qual. Attribution
      • Conceptional-Deductive Analysis
      • Cross-sectional Analysis
      • Mixed-Method
  • Research Aid
  • Teaching
    • HowTo: AIS - "Basket of Eight"
    • AIS - Senior Scholars' List of Premier Journals
    • Scientific Writing
    • Student Theses
    • Ranking and Impact in Information Systems
  • Person

Select your language

  • Deutsch (Deutschland)
  • English (US)

Effect of Motivation on Behaviour

Motivation and Behavior in Information Systems

In business informatics, various models are used to investigate the connection between motivation and behavior. Studies such as the Technology Acceptance Model (TAM) and other models such as TAM2, Utaut, TAM3 and UTAUT2 as well as the Theory Planned Behavior Model investigate effects on motivation.

The so-called technology acceptance models under searches like the name self-explanatory especially the acceptance of information technologies. While the original model of the Theory of Planned Behavior (TPB) focuses on the impact of human behavior. The acceptance of a certain technology depends on the behavior. Therefore, it is a subset of the TPB theory.

 


Core Literature

  • Ajzen, I. 1991. "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes (50:2), 12, pp. 179-211.
  • Davis, F.D. 1986. "A Technology Acceptance Model for Empirically Testing New End-User Information Systems - Theory and Results." Cambridge: Messachussets Instiute of Technology.
  • Perugini, M., and Bagozzi, R.P. 2001. "The Role of Desires and Anticipated Emotions in Goal‐Directed Behaviours: Broadening and Deepening the Theory of Planned Behaviour," British Journal of Social Psychology (40:1), pp. 79-98.
  • Venkatesh, V., and Davis, F. 2000. "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science (46:2), pp. 186-204.
  • Venkatesh, V., Morris, M.G., Davis, G.B., and Davis, F. 2003. "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly (27:3), pp. 425-478.
  • Venkatesh, V., and Bala, H. 2008. "Technology Acceptance Model 3 and a Research Agenda on Interventions," Decision Sciences (39:2), pp. 273-315.
  • Venkatesh, V., Thong, J.Y.L., and Xu, X. 2012. "Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology," MIS Quarterly (36:1), pp. 157-178.

Further Literature

  • Ajzen, I., and Driver, B.L. 1992. "Application of the Theory of Planned Behavior to Leisure Choice," Journal of Leisure Research (24:3), pp. 207-224.
  • Parker, D., Manstread, A., and Stadling, S. 1995. "Extending the Theory of Planned Behavior. The Role of Personal Norm," British Journal of Social Psychology (34), pp. 127-137.

Introduction Research Methods

Figure from Mark Mags on Pixabay
 

Extract from the Research Methods

The aim is to bring empirical research and evaluation closer to the reader so that the individual methods can be applied in the reader's own work. The practical application should enable the reader to reach his or her goal by means of concrete topics. Each goal is based on a topic or object to be worked on, which can be worked on with certain research methods.

Research methods describe how the examination of an object is carried out.

"How" is to be understood as a process. And an object - object of research - is analyzed for characteristics.

A selection of research methods is presented to the reader, which should give a basic overview. The research methods are applied in business informatics. If you are looking for a method, you can find it here.

Research methods are divided into quantitative and qualitative methods, which are shown in Table 1. This list does not claim to be complete and is therefore continuously supplemented.

   
Literature Research Experiments
  • Laboratory experiment
  • Field experiment
  • Quasi-Experiment
  • Natural Experiment

Case Studies

(Multi) Case Studies

Surveys
  • Questionnaire Creation

Action Research

  • Canonical Action Research
  • Collaborative Action Research

Reference Modelling

Content Analysis

Coding

  • Latitudinal
  • Longitudinal

Document Analysis

Card Sorting
Descriptive Field Research
  • Formal-Deductive Analysis
  • Conceptional-Deductive Analysis
Descriptive Field Research
  • Argumentative-Deductive Analysis
  • Conceptional-Deductive Analysis
Delphi-Methode Simulation
Design Science Correlation Study
Ethnography  
Grounded Theory  
Prototyp-Modelling/-Creation/-Development
  • Agile
  • SCRUM
  • V-Modell XT
 
Qualitative Cross-sectional Analysis Quantitative Cross-sectional Analysis
Table 1: Overview of Qualitative and Quantitative Research Methods, Source: Based on Wilde, T. und Hess T. (2007)

The use of qualitative and qualitative methods is called the mix-method approach. While the use of different qualitative or different quantitative methods is called a multi-method approach.

To simplify matters, an overview of selected methods is given:

  1. Literature Research
  2. Case Studies
  3. Design Science
  4. Experiments
  5. Questionnaire Creation
  6. Card Sorting

Further Useful Methods

  • Effect of Motivation on Behavior

Core literature

Wilde, T. and Hess, T. (2007). "Forschungsmethoden der Wirtschaftsinformatik." Wirtschaftsinformatik 49(4): 280-287.

Subcategories

Qualitative Methods

Quantitative Methods

Quant. or Qual. Attribution

  1. You are here:  
  2. Home
  3. Research Methods
  4. Research Methods
  • Imprint
  • Contact
  • Privacy Policy

Publications

  • Google Scholar

Social Networks

  • Xing
  • LinkedIn