Foundations and Trends® in Information Systems > Vol 6 > Issue 2

The Computer Self-Efficacy Construct: A History of Application in Information Systems Research

By George M. Marakas, Florida International University, USA, gmarakas@fiu.edu | Miguel Aguirre-Urreta, Florida International University, USA | Amin Shoja, Florida International University, USA | Eunyoung Kim, Florida International University, USA | Shangjun Wang, Florida International University, USA

 
Suggested Citation
George M. Marakas, Miguel Aguirre-Urreta, Amin Shoja, Eunyoung Kim and Shangjun Wang (2022), "The Computer Self-Efficacy Construct: A History of Application in Information Systems Research", Foundations and Trends® in Information Systems: Vol. 6: No. 2, pp 94-170. http://dx.doi.org/10.1561/2900000023

Publication Date: 24 Oct 2022
© 2022 G. M. Marakas et al.
 
Subjects
Information systems and individuals,  Information systems research methods
 

Free Preview:

Download extract

Share

Download article
In this article:
1. Introduction
2. Social Learning Theory and the Self-Efficacy Construct
3. The Birth of the Computer Self-Efficacy Construct
4. Domains of Application of Computer-Self Efficacy
5. Theoretical Development of the Computer Self-Efficacy Construct
6. Measurement and Manipulation of Computer Self-Efficacy
7. Framework for Future Research Using the Computer Self-Efficacy Construct
8. Concluding Remarks
References

Abstract

This treatise intends to provide a comprehensive history of the computer self-efficacy (CSE) construct as it has been developed and applied within the field of information systems (IS) and within the broader academic communities that benefit from reference to IS research contributions. The authors intend to present the breadth and depth of understanding of the CSE construct. A framework of extant knowledge and comprehension and a clear picture of implications for future research within this knowledge domain are offered. In addition, a comprehensive literature review is provided in the Online Appendix.

We believe the principal contribution herein is the assemblage of the bulk of our understanding and knowledge regarding this construct and its associated streams of research into a single compendium. It is intended to facilitate future researchers to access the current thinking regarding the CSE construct and direct their efforts to the continued advancement of our understanding of computer self-efficacy.

DOI:10.1561/2900000023
ISBN: 978-1-63828-080-4
92 pp. $70.00
Buy book (pb)
 
ISBN: 978-1-63828-081-1
92 pp. $145.00
Buy E-book (.pdf)
Table of contents:
1. Introduction
2. Social Learning Theory and the Self-Efficacy Construct
3. The Birth of the Computer Self-Efficacy Construct
4. Domains of Application of Computer-Self Efficacy
5. Theoretical Development of the Computer Self-Efficacy Construct
6. Measurement and Manipulation of Computer Self-Efficacy
7. Framework for Future Research Using the Computer Self-Efficacy Construct
8. Concluding Remarks
References

The Computer Self-Efficacy Construct: A History of Application in Information Systems Research

Computer self-efficacy (CSE) has captured the interest of researchers from widely diverse knowledge domains for over four decades. During that time, the realm of computer adoption and use has evolved and flourished. Along with this evolution, our understanding of CSE, its utility in behavior modeling and training development, and its relationship to a diverse array of antecedents and precedents has continued to evolve.

This monograph provides a comprehensive history of the CSE construct as it has been developed and applied within the field of information systems (IS), and within the broader academic communities that benefit from reference to IS research contributions. The authors present the breadth and depth of the CSE construct and offer a framework of extant knowledge and implications for future research within this knowledge domain. The principal contribution of this work is the assemblage of the bulk of the authors’ understanding and knowledge regarding the CSE construct and its associated streams of research into a single compendium. It is intended to facilitate future researchers to access the current thinking regarding the CSE construct and direct their efforts to the continued advancement of our understanding of computer self-efficacy.

 
ISY-023

Online Appendix | 2900000023_app.pdf

This is the article's accompanying appendix.

DOI: 10.1561/2900000023_app