Decomposed TPB - Taylor & Todd (1995)
Model Identification
Model Name: Decomposed Theory of Planned Behavior
Model Abbreviation: DTPB
Target of Model: IT Adoption and Usage Behavior Prediction
Disciplinary Origin: Information Systems, Social Psychology, Behavioral Decision Making
Theory Publication Information
Authors: Shirley Taylor, Peter A. Todd
Formal Publication Date: 1995
Official Title: Understanding Information Technology Usage: A Test of Competing Models
Journal: Information Systems Research
Volume & Issue: Vol. 6, No. 2
Pages: 144-176
DOI: 10.1287/isre.6.2.144
Citation Information
APA (7th ed.)
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
Chicago (Author-Date)
Taylor, Shirley, and Peter A. Todd. 1995. āUnderstanding Information Technology Usage: A Test of Competing Models.ā Information Systems Research 6, no. 2: 144-176.
Why Was the Model Created?
Taylor and Todd developed the Decomposed Theory of Planned Behavior to advance beyond the original Theory of Planned Behavior (TPB) in predicting IT adoption and usage. While Ajzenās TPB was a robust general theory of human behavior, it operated at a relatively high level of abstraction with broad categories of beliefs (attitudes, subjective norms, and perceived control). Taylor and Todd recognized that IT adoption required more technology-specific theorizing with decomposed belief constructs that captured the unique facets influencing information systems decisions.
The authors observed that prior IT adoption models like TAM offered narrower attitudinal constructs (usefulness and ease of use) but lacked the social (subjective norm) and control (perceived behavioral control) determinants of intention present in TPB. They conceptualized DTPB as decomposing the three TPB belief categories into multiple technology-specific dimensions. Attitudinal beliefs decompose into perceived usefulness, perceived ease of use (complexity), and compatibility (from Rogers); normative beliefs decompose into peer influence and superior influence; control beliefs decompose into self-efficacy, resource facilitating conditions, and technology facilitating conditions.
The empirical research compared three models (TAM, TPB, DTPB) using 786 university students at a business school computing facility. This large-scale study enabled comprehensive model comparison revealing that DTPB provided superior fit and explained more variance in IT usage intentions than both TAM and the original TPB. The research demonstrated that decomposing general behavioral constructs into technology-specific dimensions substantially improved prediction of IT adoption behavior.
Core Concepts and Definitions
The DTPB decomposes the three TPB belief structures into technology-specific multi-dimensional constructs:
Attitudinal Belief Decomposition
- Perceived Usefulness (Relative Advantage):The degree to which using the system enhances job performance. Analogous to Rogersā relative advantage and Davisā perceived usefulness.
- Perceived Ease of Use (Complexity):The degree to which the system is perceived as easy to understand and use. Analogous to Rogersā complexity (inverse direction) and Davisā ease of use.
- Compatibility:The degree to which the system fits with the potential adopterās existing values, previous experience, and current needs. From Rogersā (1983) innovation characteristics.
Normative Belief Decomposition
- Peer Influence:Influence of peers (colleagues, other students) on the individualās adoption decision.
- Superior Influence:Influence of superiors (managers, professors) on the individualās adoption decision.
Control Belief Decomposition
- Self-Efficacy:The individualās confidence in their ability to use the system, based on Banduraās (1977) self-efficacy theory.
- Resource Facilitating Conditions: Availability of resources needed to use the system (time, money), based on Triandisā (1979) facilitating conditions concept.
- Technology Facilitating Conditions: Compatibility issues that may constrain usage (such as a lack of appropriate hardware, software, or technology support). Taylor and Todd separate these from resource conditions because technology compatibility operates independently of resource availability in the empirical data.
What Does the Model Measure?
Taylor and Todd (1995) decompose each TPB belief structure into multiple technology-specific constructs. The measured constructs are:
- Attitude (from decomposed attitudinal beliefs):
- Perceived Usefulness: Rogers-style relative advantage / TAM PU adapted to the technology context.
- Perceived Ease of Use: Davis 1989 PEOU.
- Compatibility: Rogers 1983 compatibility with values, experiences, and needs.
- Subjective Norm (from decomposed normative beliefs):
- Peer Influence: Influence of colleagues.
- Superiorās Influence: Influence of supervisors/managers.
- Perceived Behavioral Control (from decomposed control beliefs):
- Self-Efficacy:Bandura-style belief in oneās capability.
- Resource Facilitating Conditions: Access to money, time, and other resources.
- Technology Facilitating Conditions: Access to compatible technology and support.
- Behavioral Intention and Behavior: Standard TPB dependent measures.
Taylor and Todd (1995) report a field study of information center users; they provide reliability and validity evidence for the decomposed scales and compare the decomposed TPB with TAM and pure TPB.
Preceding Models or Theories
The DTPB synthesized multiple prior theoretical traditions:
- Theory of Planned Behavior (Ajzen, 1991): Foundational framework establishing attitude, subjective norm, and perceived behavioral control as intention predictors.
- Technology Acceptance Model (Davis, 1989): IS-specific model demonstrating perceived usefulness and ease of use effectiveness in predicting IT adoption.
- Diffusion of Innovations (Rogers, 1983): Provided compatibility construct and concepts of relative advantage relevant to technology adoption.
Describe the Model
DTPB specifies that behavioral intentions to use IT are determined by attitudes, subjective norms, and perceived behavioral control. Critically, each of these three intention predictors is decomposed into multiple specific belief dimensions. Attitudes toward IT use are predicted by perceived usefulness, perceived ease of use (complexity), and compatibility beliefs. Normative beliefs are predicted by peer influence and superior influence. Perceived behavioral control is predicted by self-efficacy, resource facilitating conditions, and technology facilitating conditions. Per Table 3, the model explained 60% of variance in behavioral intention (R²=.60), compared to TAM (R²=.52) and original TPB (R²=.57). The study also measured actual usage behavior by monitoring 3,780 visits to the computing resource center over a 12-week period (Methods, p.157).
What does the model measure?
- Attitudinal beliefs: Perceived usefulness, ease of use (complexity), and compatibility capturing instrumental, cognitive, and value-alignment motivations for adoption.
- Normative beliefs: Peer influence and superior influence capturing horizontal and vertical social influence pathways.
- Control beliefs: Self-efficacy, resource facilitating conditions, and technology facilitating conditions capturing individual capability confidence, resource availability, and technology compatibility constraints.
- Behavioral intentions: Likelihood of system adoption and usage predicted through multiple belief pathways.
Main Strengths
- Theoretical comprehensiveness: Integrates three distinct theoretical traditions (TPB, TAM, diffusion theory) creating more complete framework than any single theory.
- Technology-specific decomposition: Decomposes general TPB constructs into IT-relevant dimensions (usefulness, ease of use/complexity, compatibility, peer/superior influence, self-efficacy, resource and technology facilitating conditions) improving precision.
- Superior predictive power: Explains 60% of intention variance (R²=.60), outperforming TAM (R²=.52) and original TPB (R²=.57) in this sample.
- Multi-pathway modeling: Recognizes attitudes, norms, and control operate through separate pathways, none fully mediating others.
- Large-scale validation: Tested with 786 university users (582 undergraduate, 204 MBA) at a single business school computing resource center, providing adequate statistical power for complex model estimation and direct comparison of three competing theoretical models in the same sample.
- Comparative design: Direct comparison with competing theories (TAM and TPB) in same sample strengthens conclusions about relative model performance.
- Organizational relevance: Includes peer/superior influence and resource facilitating conditions reflecting real organizational adoption contexts.
Main Weaknesses
- University laboratory context: Study conducted in university computing facility with voluntary student users, limiting generalization to mandatory workplace contexts.
- Single-time measurement: Cross-sectional design at single time point prevents understanding of actual adoption trajectories or sustained usage patterns.
- Intention-behavior gap: While actual usage was monitored (3,780 visits over 12 weeks by 451 of 786 respondents), the decomposed belief structure primarily predicts intentions. The link from intention to actual behavior showed moderate strength.
- Model complexity:13-variable decomposed model (per Taylor & Todd, 1995, p.169) with multiple paths is substantially more complex than simpler alternatives like the 5-variable TAM, and only improves behavior variance explained by 2% over TAM (36% vs. 34%), raising a parsimony vs. understanding tradeoff.
- Limited moderator exploration: Does not examine whether belief-intention relationships differ by user experience, task type, or system characteristics.
- Self-report limitations: The belief and intention constructs relied on self-reported perceptions, although actual usage was tracked separately through system visit logs rather than direct behavioral observation.
- Sample homogeneity: Student sample may not represent diverse organizational roles, skill levels, and adoption motivations of heterogeneous workforces.
Key Contributions
- Theoretical integration model:Illustrated how to combine TPBās behavioral-intention framework with TAMās IT-specific constructs into a unified model.
- Decomposition methodology: Articulated an approach for making general behavioral theories technology-specific through construct decomposition.
- Superior predictive framework: Provided empirical evidence that decomposed, technology-specific theories outperform both TAM and original TPB.
- Multi-belief-pathway recognition: Articulated how attitudes, normative pressures, and control beliefs operate as independent intention predictors.
- Decomposed social and control constructs: Clarified how normative beliefs split into peer and superior influence, while control beliefs split into self-efficacy, resource facilitating conditions, and technology facilitating conditions in technology adoption models.
- IT adoption theory advancement: Created framework synthesizing behavioral intention theory with information systems adoption insights.
Internal Validity
The researchers established internal validity through comprehensive measurement and structural equation modeling:
- Multi-item measurement scales: Operationalized all constructs with multiple survey items enabling measurement error and reliability estimation.
- Reliability assessment:Reported Cronbachās alpha coefficients for all 13 scales (Table 1). Ten scales were above the conventional 0.70 threshold, but three scales fell below: PBC (α=0.68), Ease of Use (α=0.60), and Resource Facilitating Conditions (α=0.52), limiting confidence in those constructs.
- Discriminant validity: Provided evidence that model constructs are empirically distinct through correlation analysis and variance extracted comparisons.
- Structural equation modeling:Used LISREL 8 with weighted least squares (WLS) estimation (Joreskog & Sorbom, 1993) for simultaneous estimation of measurement and structural models, with fit assessed by ϲ, AGFI, RNI, and RMSEA (p.158).
- Model fit comparison: Systematically compared three competing models (TAM, TPB, DTPB) using chi-square and fit indices enabling model selection.
- Variance explained: Reported R-squared values showing 60% of intention variance explained by DTPB model (Table 3).
External Validity
External validity considerations require acknowledging both strengths and limitations:
- University sample composition: Students may be younger, more educated, and more computer-proficient than typical organizational IT users.
- Voluntary adoption context: University lab context with optional system use differs from mandatory workplace IT implementations.
- Single-system limitation: Tested on only one computing resource center (document/presentation production facility) in a single university setting, limiting generalization to other types of IT systems and organizational contexts.
- Structural generalization: Three-component belief structure of TPB is theoretically robust and generalizable across populations and technologies.
- Cross-national applicability: While specific belief dimensions may vary, the decomposition approach transfers to different cultural contexts.
- Temporal generalizability: Cross-sectional design limits understanding of whether belief-intention relationships persist over time or change as use experience accumulates.
Relevance to Technology Adoption
DTPB is directly relevant to technology adoption because it identifies multiple specific barriers and levers operating through distinct belief pathways. The model suggests that adoption strategies must address not only instrumental utility but also peer and superior influences, self-efficacy, resource facilitating conditions, and technology facilitating conditions simultaneously.
Barriers to Technology Adoption Identified
- Low perceived usefulness: When users believe systems do not enhance job performance or outcomes, attitude-based resistance emerges.
- Poor perceived compatibility: Systems perceived as misaligned with existing work practices and values face adoption friction despite potential utility.
- Weak social support: Absence of peer adoption, manager endorsement, or opinion leader influence undermines normative adoption motivation.
- Insufficient resource facilitating conditions: Inadequate training, technical help, equipment access, and management support reduce adoption likelihood by undermining perceived behavioral control.
- Perceived high complexity: Systems requiring substantial learning effort create control barriers reducing adoption intentions.
- Negative social influence: Peer skepticism, visible non-adoption by respected users, and management indifference create normative barriers.
Leadership Actions the Model Prescribes
- Establish clear usefulness narrative: Communicate specific productivity gains, time savings, or capability enhancements building usefulness beliefs.
- Demonstrate compatibility fit: Show how systems integrate with existing workflows, tools, and job tasks reducing friction and workflow disruption.
- Mobilize social influence: Identify opinion leaders, early adopters, and respected figures to publicly endorse and visibly use systems.
- Secure visible management commitment: Ensure managers and executives visibly adopt and use systems, creating strong normative pressure.
- Provide comprehensive facilitating conditions: Ensure training programs, help desk support, documentation, and easy access to required resources.
- Reduce perceived complexity: Design intuitive interfaces, provide hands-on practice, and create clear learning pathways reducing cognitive burden.
- Implement multi-level strategies: Address attitudinal barriers (usefulness, compatibility, complexity, ease-of-use), normative barriers (peer and superior influences), and control barriers (self-efficacy, resource facilitating conditions, and technology facilitating conditions) simultaneously.
Following Models or Theories
Taylor and Toddās decomposed approach influenced subsequent IT adoption research directions:
- TAM 2 (Venkatesh & Davis, 2000):Extended TAM with social influence and cognitive instrumental processes, reflecting DTPBās more differentiated treatment of adoption determinants.
- TAM 3 (Venkatesh & Bala, 2008):Further elaborated TAM by decomposing determinants of perceived usefulness and perceived ease of use in ways that parallel DTPBās decomposition approach.
- Unified Theory of Acceptance and Use of Technology (UTAUT): Integrated multiple theories including TPB, TAM, and DTPB insights into comprehensive model.
- Technology Readiness Index expansions: Applied decomposition methodology to user predispositions and technology readiness dimensions.
- Implementation science frameworks: Adopted decomposed multi-pathway approach examining fidelity, adoption, and sustainability determinants.
- Organizational change models: Incorporated multi-level decomposition acknowledging individual beliefs, group norms, and organizational structures.
References
- Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176. https://doi.org/10.1287/isre.6.2.144
- Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.ā©ļø https://doi.org/10.1016/0749-5978(91)90020-T
- Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.ā©ļø https://doi.org/10.2307/249008
- Rogers, E. M. (1983). Diffusion of innovations (3rd ed.). Free Press.ā©ļø
- Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215.ā©ļø https://doi.org/10.1037/0033-295X.84.2.191
- Triandis, H. C. (1979). Values, attitudes, and interpersonal behavior. In H. E. Howe & M. M. Page (Eds.), Nebraska Symposium on Motivation, Vol. 27 (pp. 195-259). University of Nebraska Press.ā©ļø
Further Reading
- Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Addison-Wesley.
- Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478. https://doi.org/10.2307/30036540
- Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22(14), 1111-1132. https://doi.org/10.1111/j.1559-1816.1992.tb00945.x
- Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204.
- Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273-315. https://doi.org/10.1111/j.1540-5915.2008.00192.x