Please wait a minute...
New Technology of Library and Information Service  2013, Vol. Issue (12): 81-87    DOI: 10.11925/infotech.1003-3513.2013.12.13
Current Issue | Archive | Adv Search |
A User’s Acceptance Model of Academic Blog and Its Empirical Study
Chen Minghong1, Qi Xianjun2
1. School of Information Management, Sun Yat-Sen University, Guangzhou 510006, China;
2. School of Public Management, Guangxi University, Nanning 530004, China
Export: BibTeX | EndNote (RIS)      
Abstract  To explore key influencing factors of academic blog acceptance, this study builds a user's acceptance model of academic blog based on the Theory of Planned Behavior and Technology Acceptance Model. And the model is validated by PLS method through online questionnaire and paper questionnaire of 191valid responses from universities and scientific research institutions. The results indicate that perceived usefulness, perceived behavioral control and subject norm affect users' acceptance intentions to use academic blog, perceived ease of use is not significantly related to users' acceptance intentions to use academic blog.
Key wordsAcademic blog      Technology acceptance model      Perceived behavioral control      Subject norm     
Received: 05 August 2013      Published: 08 January 2014
:  G203  

Cite this article:

Chen Minghong, Qi Xianjun. A User’s Acceptance Model of Academic Blog and Its Empirical Study. New Technology of Library and Information Service, 2013, (12): 81-87.

URL:     OR

[1] Thomas K. Researchers Bow to the Social Web[J].Information World Review, 2008(7):4.
[2] It's Good to Blog[J]. Nature, 2009, 457:1058. doi:10.1038/4571058a.
[3] Butler D. Science in the Web Age:Joint Efforts[J]. Nature, 2005, 438:548-549.doi:10.1038/438548a.
[4] Elliott S. Science Blogs as a Vehicle for Upscale Ads[N].The New York Times, 2006-01-20(5).
[5] Tola E. To Blog or Not to Blog, Not a Real Choice There[J].Journal of Science Communication, 2008, 7(2):1-3.
[6] Hannay T. Web 2.0 in Science[J].CT Watch Quarterly, 2007, 3(3):19-25.
[7] Walker J. Blogging from Inside the Ivory Tower[A].//Bruns A, Jacobs J. Uses of Blogs[M]. New York: Peter Lang, 2006:127-138.
[8] 吕鑫, 袁勤俭, 宗乾进, 等.学术博客研究述评[J]. 图书情报工作, 2012, 56(6):64-68.(Lv Xin, Yuan Qinjian, Zong Qianjin, et al. Review of Academic Blog[J].Library and Information Service, 2012, 56(6):64-68.)
[9] 江亮.学术博客的"无形学院"交流模式探析[J]. 情报科学, 2006, 24(2):296-299.(Jiang Liang. Study on the Communication Mode in Academic Blog about Invisible College[J]. Information Science, 2006, 24(2):296-299.)
[10] Coleman A. Academic Blogs[J].Reference Librarian, 2005(3):10-17.
[11] Pomerantz J, Stutzman F.Collaborative Reference Work in the Blogosphere[J].Reference Services Review, 2006, 34(2):200-212.
[12] Stuart K. Towards an Analysis of Academic Weblogs[J].Revista Alicantina de Estudios Ingleses, 2006(19):387-404.
[13] Chong E K M.Using Blogging to Enhance the Initiation of Students into Academic Research[J].Computers & Education, 2010, 55(2):798-807.
[14] Hsu C L, Lin J C C.Acceptance of Blog Usage:The Roles of Technology Acceptance, Social Influence and Knowledge Sharing Motivation[J]. Information & Management, 2008, 45(1):65-74.
[15] Wang S M, Lin J C C.The Effect of Social Influence on Bloggers' Usage Intention[J].Online Information Review, 2011, 35(1):50-65.
[16] 王伟军, 甘春梅, 刘蕤.学术博客知识交流与共享心理诱因的实证研究[J]. 情报学报, 2012, 31(10):1026-1033. (Wang Weijun, Gan Chunmei, Liu Rui. Empirical Research on the Psychological Inducement to Knowledge Communication and Knowledge Sharing Under Academic Blogs Environment[J]. Journal of the China Society for Scientific and Technical Information, 2012, 31(10):1026-1033.)
[17] 谢佳琳, 覃鹤.基于学术博客的知识交流研究[J]. 情报杂志, 2011, 30(8):159-163.(Xie Jialin, Qin He. Studies on the Knowledge Exchange Based on Academic Blog[J].Journal of Intelligence, 2011, 30(8):159-163.)
[18] 夏立新, 翟姗姗, 陈卓群.基于学术博客的图书馆学科知识服务研究[J]. 图书馆论坛, 2011, 31(6):109-114.(Xia Lixin, Zhai Shanshan, Chen Zhuoqun.Research of Library Subject Knowledge Services Based on Academic Blogs[J].Library Tribune, 2011, 31(6):109-114.)
[19] Ajzen I, Fishbein M.Attitude-behavior Relations:A Theoretical Analysis and Review of Empirical Research[J].Psychological Bulletin, 1977, 84(5):888-918.
[20] Zhang M Y, Lee K H, Chen S C.Subscriber Behavior in Adopting 3G Value-added Services[J].African Journal of Business Management, 2012, 6(3):1089-1094.
[21] Venkatesh V. Determinants of Perceived Ease of Use:Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model[J].Information Systems Research, 2000, 11(4):342-365.
[22] Davis F D. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology[J].MIS Quarterly, 1989, 13(3):319-340.
[23] Pouratashi M, Rezvanfar A.Analysis of Factors Influencing Application of ICT by Agricultural Graduate Students[J].Journal of the American Society for Information Science and Technology, 2010, 61(1):81-87.
[24] Hong S J, Tam K Y.Understanding the Adoption of Multipurpose Information Appliances:The Case of Mobile Data Services[J].Information Systems Research, 2006, 17(2):162-179.
[25] Dishaw M T, Strong D M.Extending the Technology Acceptance Model with Task-technology Fit Constructs[J].Information & Management, 1999, 36(1):9-21.
[26] Goodhue D L, Thompson R L.Task-technology Fit and Individual Performance[J].MIS Quarterly, 1995, 19(2):213-236.
[27] Larsen T J, Sreb A M, Sreb .The Role of Task-technology Fit as Users' Motivation to Continue Information System Use[J].Computers in Human Behavior, 2009, 25(3):778-784.
[28] Wu J H, Shin S S, Heng M S H.A Methodology for ERP Misfit Analysis[J].Information & Management, 2007, 44(8):666-680.
[29] Dishaw M T, Strong D M. Supporting Software Maintenance with Software Engineering Tools[J]. Journal of Systems and Software, 1998, 44(2):107-120.
[30] Chin W W, Marcolin B L, Newsted P R.A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects:Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion/Adoption Study[J].Information Systems Research, 2003, 14(2):189-217.
[31] Burkink T.Cooperative and Voluntary Wholesale Groups:Channel Coordination and Interfirm Knowledge Transfer[J].Supply Chain Management, 2002, 7(2):60-70.
[32] Chin W W. The Partial Least Squares Approach to Structural Equation Modeling[A].//Marcoulides G A. Modern Methods for Business Research[M].Psychology Press, 1998:295-336.
[33] Wang R Y, Strong D M.Beyond Accuracy:What Data Quality Means to Data Consumers[J]. Journal of Management Information Systems, 1996, 12(4):5-33.
[34] Yen D C, Wub C S, Cheng F F, et al.Determinants of Users' Intention to Adopt Wireless Technology:An Empirical Study by Integrating TTF with TAM[J].Computers in Human Behavior, 2010, 26(5):906-915.
[35] Davis F D, Bagozzi R P, Warshaw P R.User Acceptance of Computer Technology: A Comparison of Two Theoretical Models[J].Management Science, 1989, 35(8):982-1003.
[36] Gefen D.TAM or Just Plain Habit:A Look at Experienced Online Shoppers[J].Journal of Organizational and End User Computing, 2003, 15(3):1-13.
[37] Hsu C L, Lin J C C.Acceptance of Blog Usage:The Roles of Technology Acceptance, Social Influence and Knowledge Sharing Motivation[J].Information & Management, 2008, 45(1):65-74.
[38] Lee M C.Predicting and Explaining the Adoption of Online Trading:An Empirical Study in Taiwan[J].Decision Support Systems, 2009, 47(2):133-142.
[39] Bock G W, Zmud R W, Kim Y G, et al.Behavioral Intention Formation in Knowledge Sharing:Examining the Roles of Extrinsic Motivators, Social-Psychological Factors, and Organizational Climate[J].MIS Quarterly, 2005, 29(1):87-111.
[40] Fornell C, Larcker D F. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error[J]. Journal of Marketing Research, 1981, 18(1):39-50.
[41] Cenfetelli R T, Bassellier G. Interpretation of Formative Measurement in Information Systems Research[J].MIS Quarterly, 2009, 33(4):689-707.
[42] Mason C H, Perreault Jr W D.Collinearity, Power and Interpretation of Multiple Regression Analysis[J].Journal of Marketing Research, 1991, 28(3):268-280.
[43] Sharma R, Yetton P, Crawford J.Estimating the Effect of Common Method Variance:The Method-Method Pair Technique with an Illustration from TAM Research[J]. MIS Quarterly, 2009, 33(3):473-490.
[44] Podsakoff P M, MacKenzie S B, Lee J Y, et al.Common Method Biases in Behavioral Research:A Critical Review of the Literature and Recommended Remedies[J]. Journal of Applied Psychology, 2003, 88(5):879-903.
[45] Liang H, Saraf N, Hu Q, et al.Assimilation of Enterprise Systems:The Effect of Institutional Pressures and the Mediating Role of Top Management[J]. MIS Quarterly, 2007, 31(1):59-87.
[46] Shiau W L, Chau R Y K.Understanding Blog Continuance:A Model Comparison Approach[J]. Industrial Management & Data Systems, 2012, 112(4):663-682.
[1] Zhai Shanshan, Xu Xin, Xia Lixin. A Review of User Communication and Knowledge Dissemination in Academic Blogs[J]. 现代图书情报技术, 2015, 31(7-8): 3-12.
[2] Xu Xin, Zhai Shanshan, Yao Zhanlei. Disciplinary Interaction Analysis of Academic Blogs——Taking Blog as an Example[J]. 现代图书情报技术, 2015, 31(7-8): 13-23.
[3] Tan Min, Xu Xin, Zhao Xing . Exploring the Co-recommendation Relationship and Its Core Structure Features of Academic Blogs——Taking Blog as an Example[J]. 现代图书情报技术, 2015, 31(7-8): 24-30.
[4] Tan Min, Xu Xin. The Empirical Study of h-Degree in Recommendation Network of Academic Blogs——Taking Blogs as an Example[J]. 现代图书情报技术, 2015, 31(7-8): 31-36.
[5] Xu Xiaojuan,Zhao Yuxiang,Zhu Qinghua. Explore User’s Behavior of Academic Blog Based on EDTM:Take Blog.Sciencenet as an Example[J]. 现代图书情报技术, 2014, 30(1): 79-86.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938