Perceived usefulness, perceived ease of use, and user acceptance of information technology

Research output: Contribution to journalArticlepeer-review

24296 Scopus citations

Abstract

Valid measurement scales for predicting user acceptance of computers are in short supply. Most subjective measures used in practice are unvalidated, and their relationship to system usage is unknown. The present research develops and vandales new scales for two specific variables, perceived usefulness and perceived ease of use, which are hypothesized to be fundamental determinants of user acceptance. Definitions for these two variables were used to develop scale items that were pretested for content validity and then tested for reliability and construct validity in two studies involving a total of 152 users and four application programs. The measures were refined and stream-lined, resulting in two six-item scales with reliabilities of .98 for usefulness and .94 for ease of use. The scales exhibited high convergent, discriminant, and factorial validity. Perceived usefulness was significantly correlated with both self-reported current usage (r=.63, Study 1) and self-predicted future usage (r=.85, Study 2). Perceived ease of use was also significantly correlated with current usage (r=.45, Study 1) and future usage (r=.59, Study 2). In both studies, usefulness had a significantly greater correlation with usage behavior than did ease of use. Regression analyses suggest that perceived ease of use may actually be a causal antecedent to perceived usefulness, as opposed toy a parallel, direct determinant of system usage. Implications are drawn for future research on user acceptance.

Original languageEnglish
Pages (from-to)319-339
Number of pages21
JournalMIS Quarterly: Management Information Systems
Volume13
Issue number3
DOIs
StatePublished - Sep 1989

Keywords

  • End user computing
  • User acceptance
  • User measurement

Fingerprint

Dive into the research topics of 'Perceived usefulness, perceived ease of use, and user acceptance of information technology'. Together they form a unique fingerprint.

Cite this