Craig 2019
Craig 2019
To cite this article: Kevin Craig, Jason Bennett Thatcher & Varun Grover (2019) The IT Identity
Threat: A Conceptual Definition and Operational Measure, Journal of Management Information
Systems, 36:1, 259-288, DOI: 10.1080/07421222.2018.1550561
Journal of Management Information Systems / 2019, Vol. 36, No. 1, pp. 259–288.
Copyright © Taylor & Francis Group, LLC
ISSN 0742–1222 (print) / ISSN 1557–928X (online)
DOI: https://doi.org/10.1080/07421222.2018.1550561
260 CRAIG ET AL.
KEY WORDS AND PHRASES: IT Identity, Identity Theory, Resistance to IT, Self-Esteem,
Identity Threat.
Introduction
The faculty meeting has ended and Professor Patricia Nims is not happy. The
department is adopting “online teaching,” and starting with the next fall
semester, all faculty will be required to teach at least three credit hours
per year through an online classroom management system instead of lecturing
in person. “Professor Pat,” as her students call her, sees this as a major threat
to the way she lives her life as a faculty member. Will online lectures give the
university administration the capacity to record and distribute her most valu-
able work? And what will that do to her value as a professor, once a database
of her lectures is available online? Will she still be able to achieve the level of
excellence she is famous for, when she is forced to interact through an online
tool? Moreover, Professor Pat feels that using online tools to communicate
reflects a lack of effort. To her, taking the time to talk in person is an
important sign of how much she values other people. Considering this, she
is inclined to avoid and disparage the new system. However, she still loves
her job and believes in her ability to overcome any challenge. Considering all
these factors, what will she do?
work tasks are difficult to parse from one another [54]. For example, it is generally
recognized that resistance to IT is not fully explained by either poorly designed
artifacts or by an IT’s social effects alone [23]. Rather, perceptions of the IT
artifact’s impact on work must be integrated with its social consequences in order
to explain the problem of resistance [52].
Where prior work has extensively examined how to conceptualize and measure
why individuals accept IT, substantially fewer papers have attempted to create
a means to study the social and task-related factors of resistance in concert, based
on a parsimonious and measurable construct. For our approach, we draw from the
rich identity literature and argue that the “IT Identity Threat” is a missing and
critical integrative construct that can explain resistance behaviors. As implied by
the name, this construct and measure is based on how ITs threaten individuals’
identities: sets of beliefs about themselves as worthy members of a social group, as
valuable and competent workers, and as unique and idiosyncratic human beings.
These beliefs determine how individuals assess themselves as people, that is,
determine their levels of self-esteem; thus, a threat to these beliefs may be
a potent source of protective behaviors.
Self-esteem is a long-studied and reliably measurable construct that can be used
to apply theory across a wide range of contexts [84]. The IT Identity Threat offers
a parsimonious measure of the effects of a wide range of perceptions, because it
captures the ultimate indicator of an individual’s perceptions of an IT: namely,
levels of self-esteem as a user of that IT. In other words, the basic premise of the IT
Identity Threat is that individuals realize harm from an IT when they like them-
selves less due to using that IT, and the anticipation of further harm causes them to
resist it. This is a broad premise, but the IT Identity Threat affords a model based on
the integration of the broad range of self-esteem perceptions into a single construct.
Thus, it answers the call for theory that is broad in scope, yet parsimonious in
conceptualization [6].
To realize the IT Identity Threat’s potential to explain individual reactions to
a wide range of perceptions, this study addresses two research questions: “What is
the IT Identity Threat?” and “How can IT Identity Threats be measured?” In
examining these questions, we also assess the predictive validity of the construct
by empirically examining its relationship with resistance. Ultimately, our goal is to
use the IT Identity Threat to explain why people like “Professor Pat” may resist an
IT, and set the stage for a new understanding that may help her adjust her identity
rather than resist the IT.
We begin with an explanation of identity and follow that with a discussion of
threats and resistance to IT. This leads to an explanation of the threat-based
approach to resistance, identity threats, and how ITs can cause identity threats.
Next, we define the IT Identity Threat. Then, we develop a second-order concep-
tualization and measure of the IT Identity Threat based on reduced self-esteem. To
evaluate that measure’s reliability and validity, as well as the second-order structure
of the IT Identity Threat, we then present the results of two studies of individuals
262 CRAIG ET AL.
who have used potentially threatening ITs in distinct contexts. Finally, we discuss
our work’s contributions, implications, and proposed directions for future research
on the IT Identity Threat.
Defining Identity
“Identity” refers to the sum of beliefs held by an individual about who they are
(“self-beliefs”). Identity embodies individuals’ relationships with others, the roles
they hold, and their personal historical narratives [17]. As such, identity is thought
to cause a wide range of behaviors that individuals employ in the attempt to “enact”
identity, that is, perform actions that harmonize with who they believe themselves
to be [3]. Thus, our vignette’s Professor Pat may enact behaviors that harmonize
and reinforce her beliefs about: 1) how she relates to students and other faculty, 2)
how she fulfills her role as a teacher, and 3) her own personal history, which has
culminated in her uniqueness as a human being.
Individuals are thought to hold identities of three types: social identities, role
identities, and person identities [17]. Social identity is the sum of beliefs about the
self as the member of a group (an “in-group,” which may be contrasted with “out-
groups,” or groups the self does not belong to) [38]. Membership in an in-group that
is associated with high levels of power, prestige, and resources causes positive
feelings about the self [91]. Specifically, it raises an individual’s “self-worth,”
reflecting the value they offer as a member of an in-group [17, 21]. Experiences
that confirm beliefs in the power and prestige of an in-group reinforce beliefs that
an in-group is powerful and prestigious. Experiences that confirm membership in
an in-group strengthen beliefs that an individual embodies the power and prestige
of that in-group. As these beliefs grow in strength, perceptions of the self as worthy
and valued grow. Conversely, experiences that reduce individuals’ beliefs in the
power and prestige of their in-groups, or the extent that they themselves embody
the power and prestige of their in-groups, should lower this form of self-esteem.
Thus, levels of social identity are thought to be reflected by levels of worth-based
self-esteem [84].
Role identity refers to the part of the self that is composed of a role the individual
plays in social contexts [86]. For example, an individual who teaches has a teacher
role identity. Role identity is not just the belief that an individual performs a role; it
also encompasses beliefs about how well the individual performs the tasks asso-
ciated with that role (i.e., competence) [13]. This is because the successful enact-
ment of tasks in the domain of a role identity serves as evidence of the validity of
that role identity [17, 82]. It may help to imagine an individual who holds
a computer programmer identity. Successfully completing coding projects would
confirm self-beliefs in the programmer role identity, and these self-beliefs would
contribute to perceptions of competence in the domain of computer programming.
Because of this, role identity is reflected by levels of self-esteem based on compe-
tence [21].
THE IT IDENTITY THREAT 263
Finally, person identities consist of beliefs about the self that distinguish the self
from others [81]. Beliefs regarding the self as a unique and idiosyncratic individual
make up one’s person identity, and the sum of beliefs and characteristics that
distinguish the self as an individual comprise the idealized self [17]. Individuals
seek experiences that give them a sense of continuity regarding their person
identities, and they try to behave in ways that harmonize with an “authentic self”
that is consistent across contexts [88]. Because of this, person identity is associated
with self-esteem based on how true an individual is to his or her authentic self [84].
A single individual holds many identities; for example, Professor Pat may view
herself as a member of a university faculty (social identity), as a course instructor
and advisor to students (role identities), and as a unique and authentic individual
marked by a friendly demeanor (person identity) [17]. The three types of identity
are summarized in Table 1.
Over time, identities gradually change in a cyclical manner, in response to the life
experiences of the individual. Experiences and behaviors that are consistent with an
individual’s self-beliefs strengthen those self-beliefs, confirming identity and con-
tributing to self-esteem [83]. This increase in self-esteem, in turn, causes individuals
to seek out experiences and behaviors that are consistent with their identities [17].
This is a cycle of self-esteem and identity building; it is valuable, and individuals
work to maintain it [88]. For example, when a student enthusiastically hails the
professor in our vignette as “Professor Pat,” some of Professor Pat’s self-beliefs are
confirmed, and thus her identities are verified and strengthened. First, there is the
recognition of her as a professor, a member of the faculty (social identity), and an
instructor (role identity). Second, the student’s selection of “Professor Pat,” instead of
the more formal “Professor Nims,” is evidence of the friendliness that marks
Professor Pat as a unique and authentic individual (person identity). As a result of
this experience, Professor Pat benefits from elevated levels of self-esteem, and will
thus select behaviors that are likely to result in similar experiences.
By contrast, individuals avoid experiences that conflict with their identities [68]
in order to maintain levels of self-esteem. To extend our vignette’s example, the
idea of online teaching may harm Professor Pat’s social identity as a faculty
member, because it involves a database of lectures that could be used without the
presence of an actual professor. Such a database threatens the value of faculty, and
thus reduces Pat’s perceived value as a member of the faculty. Moreover, she may
doubt how well she will embody her instructor role identity through an online
medium: this would reduce the self-esteem she feels as a competent instructor.
Finally, Pat’s beliefs about herself as a unique and authentic individual may depend
on the emotional warmth of in-person communication, as opposed to online inter-
action. Thus, using an online teaching system may seem inconsistent with her
authentic self. As a result of these concerns, she may perceive the online teaching
system as a threat.
resist an IT for completely personal reasons, rather than focusing only on the effects
of an IT on social structure and work tasks. ITs are becoming more intrusive and
personal in their use [20]. In an extreme manifestation of this, some firms now
implant computer chips inside their employees [36]. It is easy to imagine that such
an implanted IT may help with some work tasks, but still attract intense resistance.
As technology continues to change how workers view themselves as people, it is
critical that our field develops an understanding of why a technology may be
resisted for completely personal reasons.
Second, the IT Identity Threat expands our current understanding by offering new
avenues for treatment. Existing work suggests responding to user feedback to alter
perceptions of the IT as a threat (or opportunity) and encouraging use by altering
perceptions of managerial support for the IT [44, 47]. However, these treatments
may not always be feasible. In some cases, threatening perceptions of an IT become
established before management can intervene. Additionally, since software
designers must often surrender ease of use in order to implement important features
[29], some systems may, by necessity, be challenging for new users because of the
breadth and depth of the IT’s functionality. Finally, existing works (e.g., that of Bala
and Venkatesh [7]) point to managerial support as a treatment for resistance.
However, negative perceptions of a system may be the result of perceived manage-
rial support for the IT [31, 54]. This happens when individuals see the IT as a tool
that increases management’s control and power at their expense [58]. In this kind of
situation, increasing the prominence of managerial support for the IT may exacer-
bate resistance. The IT Identity Threat expands our current state of research with
identity-based treatments that may be effective even when no managerial interven-
tion is likely to reduce perceptions of threat (as may often be the case). This is
because it is based on the identity threat framework, which is not only explores how
to reduce perceptions of threat, but also focuses on finding treatments for threats
that are inevitable [68].
Identity Threats
In the workplace, many experiences can challenge the self-beliefs that comprise
identity. When an experience contradicts identity, individuals experience a loss of
self-esteem and take action to preserve the self-esteem associated with identity. This
is the nature of the identity threat, defined by Petriglieri as “experiences appraised as
indicating potential harm to the value, meanings, or enactment of an identity” [68,
644].
The pervasive nature of IT in the workplace makes it a potent source of experi-
ences that may comprise identity threats. ITs impact work tasks and social structure,
and can cause individuals to change the way they work and achieve goals. As such,
IT’s change what individuals do. Changing what an individual does may generate
experiences that challenge, rather than confirm, the self-beliefs that comprise
identity. For example, if a hospital adopts an IT, and that IT changes how nurses
266 CRAIG ET AL.
interact with patients, then that IT has the capacity to change the social status of
nurses, the work of nurses, and even what it means to be a nurse in that hospital
[63]. In this way, an IT may change who the individual is, that is, their identity as
a nurse. The new, IT-infused, meaning of “nurse” may not appeal to some nurses.
Thus, an IT may force unwanted changes to the “nurse identity,” resulting in an IT
Identity Threat that would cause resistance to the IT [93].
How individuals react to such threats is described by the identity threat frame-
work [68]. The identity threat framework provides an abstract process model that
explains individual reactions to a broad range of stimuli that conflict with the self-
beliefs that comprise identity. The basic premise of the identity threat framework is
that individuals experience stress from these stimuli, anticipate further stress, and
are thus forced to cope with the source of such stimuli as a threat. As is the case in
much of the threat literature, this framework predicts that individuals will either
resist the source of identity threat or adapt to defuse the source of identity threat
[63]. The identity threat framework has served as a basis for research on a wide
range of topics, such as organizational identification [5] and recovering from
professional setbacks [80]. Information systems research has leveraged the identity
threat concept to theorize about individual reactions to IT. Specifically, it has been
proposed that exposure to an IT may cause a discrepancy between self-beliefs and
workplace reality, resulting in negative emotional arousal that causes a wide range
of behaviors, from resistance to the undertaking of personal change [64]. IS
research has also leveraged the concept of identity threats to explore the challenges
offshoring presents to software developers [45].
Figure 1. Process Summarized from the Identity Threat Framework (based on [68])
a work role is critical for identity maintenance. An IT can threaten the compe-
tent execution of tasks while individuals adjust to IT-enabled work routines,
possibly due to the learning curve associated with new work tasks [44]. In the
process of overcoming this learning curve, individuals will experience less
validation of their role identities. In this way, the IT prevents the verification
of role identities; this is a hallmark of identity threat sources [68]. To verify and
thus restore beliefs in competence, individuals may seek to avoid an IT and its
associated work routines, seeking instead to enact other, possibly obsolete, work
routines [57]. For example, in a 2004 study of physicians by Doolin [31],
physicians viewed an IT implementation as a tool of management to increase
efficiency at the possible expense of clinical effectiveness, which is critical to
the physician role identity. As a result, many of the physicians resisted, refusing
to enter complete data into the system and continuing to use their own indivi-
dual PC-based systems. Similarly, Marakas and Hornik [57] described a group
of managers confronted with new IT-enabled work routines. These managers
experienced stress associated with the new work routines. They coped with that
stress by avoiding the new work routines and engaging in obsolete, but familiar,
work routines [57]. From an identity perspective, these managers’ behaviors can
be interpreted as attempts to resume the role identity verification associated with
those familiar work routines.
Finally, an IT may threaten person identity. IT use has been shown to change
person identity. For example, the use of smart phones may influence self-beliefs
about conscientiousness, because smart phones increase responsiveness, as well as
expectations of responsiveness, in communication [20]. As such, ITs can change the
idiosyncratic nature of the individual, that is, change their person identity. Such
a change might not be beneficial, especially if it is not consistent with the idealized
self. It could threaten the continuity that supports the belief in an authentic self and
be resisted, even if it helps the individual overcome an admitted deficiency [88].
For example, an individual who believes that he or she is forgetful may resist the
use of a memory aid such as Google Glass (computer-enhanced spectacles) because
wearing a computer on the face may be too inconsistent with their authentic self.
Rather than become “the type of person who would wear Google Glass,” this
individual resists Google Glass and maintains authentic selfhood.
Similarly, the use of an IT in the workplace may eliminate some of the most
rewarding aspects of work through automation [89] and thus change the meanings
associated with an identity. For example, take a hypothetical case of a workshop
enforcing a rule that woodworkers must use computer-controlled lathes instead of
working by hand. In such a case, using the computer-controlled lathes may change
the meaning of being a woodworker from being one who works with wood, to one
who works with computers.
The identity threat framework proposes that individuals will react to an
identity threat primarily by engaging in protective behavior. Individuals may
attempt to defuse an identity threat by acting or speaking in opposition to the
THE IT IDENTITY THREAT 269
threat source [68], and by praising the threatened identity [33]. In the hypothe-
tical woodworking example, protective behavior may take the form of deriding
the quality of the computer-controlled lathe’s output, and of praising the quality
of hand-worked goods.
However, resistance to IT is not the only possible outcome of the IT Identity
Threat. An identity threat may be defused by changing the self rather than trying to
avoid or resist a threat source [68]. Individuals may even adopt a new identity that
incorporates the technology into their work lives [64]. However, the extent to which
individuals will try to change the self rather than resist a threat source depends on
the extent to which they believe they are capable of undergoing such a change, that
is, their levels of self-efficacy for change [68].
work routines reinforce identity through the rewards and reflected appraisals
that come with the successful accomplishment of work goals. Individuals then
invest themselves in those work routines in a cycle of work, achievement, and
identity reinforcement [16]. This cycle contributes to role identity, which is
manifested by competence-based self-esteem, i.e., the belief that one executes
their role-based tasks well [21]. An IT that interrupts this cycle of role
enactment threatens the role identity and threatens the beliefs of competence
tied to role identity. Thus, anticipated harm to role identity would be mani-
fested as reduced competence-based self-esteem. Based on this, we define loss
of competence-based self-esteem as a reduction of an individual’s belief in
their ability to perform work [26].
Finally, we propose a dimension of the IT Identity Threat that captures
anticipated harm to person identity. The desire to enact behaviors that are
consistent with an individual’s authenticity, based on “one’s internal or personal
standards as to who one really is” [84, p. 411] is a powerful source of motiva-
tion [88]. When an individual uses an IT that is not compatible with person
identity, that individual is behaving in ways inconsistent with his or her authen-
tic self [16]. Authenticity-based self-esteem reflects the extent to which indivi-
duals see themselves as unique and idealized individuals [14] and would,
therefore, be reduced when an individual believes that he or she has become
less like the idealized self. Thus, we define loss of authenticity-based self-
esteem as a reduction of the individual’s belief in the possession of traits and
personal characteristics associated with the idealized self [16].
Each the three dimensions of the IT Identity Threat reflects the perceptions that
individuals experience when exposed to one of the three threatening phenomena
identified by the identity threat framework [68]. Intergroup conflict reduces the
power and prestige of the in-group, resulting in a loss of the worth-based self-
esteem felt by individuals in the in-group. Prevention of identity enactment
reduces the beneficial outcomes normally experienced from familiar work rou-
tines, and this causes a loss of competence-based self-esteem. Finally, a change in
the meanings that underlie a workplace identity may interrupt the coherence of an
authentic self; this would be perceived as a loss of authenticity-based self-esteem.
The manifestation of these threat sources is summarized in Table 2.
Our pilot test (n = 650; sample frame: undergraduate students required to use
an online portfolio in order to graduate from a university in the United States
of America) provided evidence for a conceptualization of the IT Identity
Threat as a second-order construct with three dimensions. The internal con-
sistency of each dimension was supported by Cronbach’s alpha, with all
construct scores exceeding the recommended 0.7 [65]. Regarding factor struc-
ture, a test of competing structural equation models [18] using the software
package EQS found support for a second-order construct with three dimen-
sions. Using a X2/df test of significance, a three uncorrelated factor structure
showed a significant (p < 0.05) reduction of misfit over a single-factor
structure. A second-order factor with three dimensions showed a significant
(p < 0.05) reduction of misfit over the uncorrelated factor structure. Based on
these results, we moved forward with formal studies to validate the IT Identity
Threat as a predictor of resistance to IT.
274 CRAIG ET AL.
Survey Analysis
With our pilot-tested instrument, we next conducted formal studies to evaluate our
measure. Two cross-sectional surveys, consisting of Likert scale measures and
administered via a Web site (Qualtrics.com) were used to gather data in two
separate contexts. Items were identical across the two surveys, except for the
names of the technologies involved. Results across disparate samples contribute
to generalizability [43, 72]; thus, we selected two sample frames designed to
improve the generalizability of our study to our population of interest. Our broad
population of interest includes both students and working professionals, so we
selected the contexts of undergraduate students and of faculty in a large public
university2 located in the US. As was the case in our pre- and pilot tests, the sample
frame for one study (“Study 1”) was composed of undergraduate students who were
required to complete work using a system called ePortfolio in order to receive their
degrees. The sample frame for the other study (“Study 2”) consisted of university
faculty who were required to use a system called iRoar to manage their class
rosters, grade submissions, and other pedagogy related activities.
We selected these sample frames because each was likely to report different
sources of identity threat from their respective mandatory ITs. In the case of
students using ePortfolio, subjects during our pretest and pilot tests expressed
concerns that: 1) the IT furthered the interests of certain administrators (the
“ePortfolio people”) at the expense of students’ interests and was thus a potential
source of intergroup conflict; 2) ePortfolio forced students to use an online publish-
ing system to present their work, and many students found that system to be an
impediment to the enactment of role-based tasks such as making progress toward
graduation and seeking post-graduate employment; and 3) the ePortfolio system
forced students to perform Web development, an activity that may have been
inconsistent with their authentic selves. Students were so incensed by the system
that they organized against it, posting an online petition for its removal that
received thousands of signatures. Approximately one year after the completion of
our data gathering, the university abandoned the ePortfolio system.
Similarly, the iRoar system was perceived by many professors to be a thoughtless
intrusion on the behalf of the university’s administration, limiting their flexibility in
how they accomplished work. In this way, it was the source of intergroup conflict.
It also changed critical work tasks carried out by professors and, thus, may have
prevented the enactment of some aspects of the professor role identity and may
have had the potential to undermine the meaning of “professor” at the university by
changing the work of the professor.
Participants were recruited via an email broadcast sent through university list
services, and were motivated by the chance to win one of four tablets (approximate
value of 450 USD each). After deleting unusable responses (e.g., those with no
items answered) and outliers (see Appendix B for details of this process), we were
left with 2,109 complete and usable surveys (out of an initial total of 2,759) for
Study 1. This represents a response rate of 12.5% of the entire undergraduate
THE IT IDENTITY THREAT 275
population of 16,391 during that semester. For Study 2, we received 203 complete
and usable surveys. This represents a response rate of 17.5% of the complete
population of 1,157 faculty during that semester.3 The demographic data for our
subject pools are found in Appendix C.
Tests of Reliability
Because our items are reflective, they should all correlate highly within each of our
dimensions [73]. Accordingly, we tested each of the IT Identity Threat’s three
dimensions for internal consistency. Cronbach’s Alpha and Rho [76] were obtained
from confirmatory factor analysis using the structural equation modeling software
EQS [18]; each are presented in Table 4. All are higher than the cutoff of 0.7
recommended by Nunnally [65], indicating that the items for each dimension reflect
common latent factors. The relative strength of correlation between each item and
its construct is indicated by factor loadings, which are found in Appendix D.
Discriminant Validity
The purpose of these tests is to demonstrate the independence of our constructs
from each other. We compared subjects’ responses to the IT Identity Threat’s items
with those of other measures to demonstrate that the IT Identity Threat is a distinct
construct and not a reiteration or mere inversion of the other constructs in its
nomological net [55].
Discriminant validity is tested by comparing the correlations between constructs
with the square root of the average variance explained of each construct obtained
Table 4. Reliability
Study 1 Study 2
Dimension Alpha Rho Alpha Rho
Loss of Worth-Based Self-Esteem 0.97 0.97 0.964 0.96
Loss of Competence-Based Self-Esteem 0.96 0.97 0.943 0.94
Loss of Authenticity-Based Self-Esteem 0.98 0.99 0.977 0.97
276 CRAIG ET AL.
through factor analysis [35, 55]. As seen in Appendix D among the causal factors of
resistance (the IT Identity Threat, Lack of Value, and Colleague Opinion of the IT),
no construct correlation is higher than the square root of any construct’s AVE.
Construct 1 2 3 4
Study 1
1: Resistance 0.884
2: Loss of Worth-Based Self-Esteem 0.315 0.970
3: Loss of Competence-Based Self-Esteem 0.350 0.446 0.968
4: Loss of Authenticity-Based Self-Esteem 0.411 0.461 0.779 0.986
Study 2
1: Resistance 0.882
2: Loss of Worth-Based Self-Esteem 0.361 0.97
3: Loss of Competence-Based Self-Esteem 0.468 0.305 0.968
4: Loss of Authenticity-Based Self-Esteem 0.393 0.432 0.520 0.986
The bold text indicates the Average Variance Explained.
278 CRAIG ET AL.
Discussion
To address the research questions “What is an IT Identity Threat?” and “How can
it be measured?” we conceptualized and operationalized a second-order construct
and measure that integrates the social and task-related factors associated with
resistance to IT. We believe that the IT Identity Threat is important due to 1) its
ability to integrate a variety of manifestations of IT on social and work processes
into a parsimonious model of resistance, and 2) its relevance in a world that is
moving toward increasingly personal IT, making it important to understand resis-
tance at the individual level.
Contributions to Theory
The definition and measure of the IT Identity Threat provide important theoretical
contributions to the field of IS, and also to our reference disciplines. As
a theoretical construct grounded in identity theory, with a rigorously tested measure,
the construct offers a broader model of resistance to IT that builds on a tradition of
prior qualitative work. The IT Identity Threat offers a variance-based approach to
resistance to IT that integrates social, task-related, and personal perceptions of
threat, caused by an IT.
Table 7. Dimensionality
*For model fit purposes [18], the error terms between two items (S6, S7) were allowed to correlate, costing one degree of freedom.
279
280 CRAIG ET AL.
The IT Identity Threat deals with the most fundamental element of resis-
tance: the individual. Yet, it also accounts for factors normally treated on the
group level. It is possible to conceptualize the intergroup conflict associated
with threats to social identities according to its anticipated harm on a purely
individual level, that is, according to individual perceptions of self-worth that
are based on group membership [84]. In this regard, it answers the call for
research that reconciles individual-level resistance with group-level phenom-
ena [47].
For the field of IS research, this new construct provides a parsimonious causal
factor that helps explain resistance to IT. Existing process models offer rich insight
into how resistance and other behaviors evolve [59], but such insight may be
expanded by engaging in variance-based research [50]. Variance-based models
afford the opportunity for researchers to explore and collect data for a range of
variables and theoretical relationships [66]. Thus, they afford progress based on the
elaboration of testable models over time [87]. Moreover, because variance-based
research may explore a phenomenon across a variety of contexts, it may serve as
the basis of inferences about the general population of IT users [10,49]. Some have
tried to incorporate numerous varied perceptions that may cause resistance to IT
into a variance-based model. However, to do so without careful integration of
theory raises the risk of “ballooning” explanations and contradictory approaches.
For example, the work of Kim and Kankanhalli [44] used a variance-based
approach, and also explored social factors along with purely individual perceptions
of the IT artifact. However, their work only presents switching costs as the mediator
of a collection of perceptual measures that already have well-studied relationships
with either use or resistance to IT. To provide novel explanatory power requires the
incorporation of novel theoretical logic. In addition, offering a collection of causal
variables with limited theoretical justification for inclusion in or exclusion from
a model may result in models that lack parsimony, as future researchers incorporate
more and more variables [6]. A better approach is one that is parsimonious, with the
simplicity and predictive power of a variance-based model along with carefully
integrated theory from prior process models. The IT Identity Threat recognizes and
integrates a broad range of perceptions into a single construct through their effects
on the individual. Thus, it may serve as a foundation for building a cumulative
tradition in this area.
In addition to integrating social factors with perceptions of the IT artifact, the IT
Identity Threat addresses the emergence of more personal forms of IT. ITs are
evolving and becoming more personal in their use [75], and technologies are now
capable of changing the self in addition to impacting work tasks and social structure
[20]. Thus, future resistance to IT is more likely to be the result of personal factors,
and our field’s understanding of such factors is only just emerging [20]. As a result,
in addition to explaining the effects of perceptions of the artifact in concert with
social perceptions, the IT Identity Threat benefits the field by integrating these
perceptions with perceptions of the self alone.
THE IT IDENTITY THREAT 281
identities. Similarly, Coppola et al. [28], observed that many university professors
who initially felt threatened by an online teaching system coped by adopting new
“digital Socrates” personas. Thus, the IT Identity Threat may serve as an impetus
for the personal change and learning that is associated with high levels of computer
self-efficacy [26]. On the other hand, if individuals believe that others will collec-
tively resist the source of an identity threat, they may be more likely to engage in
resistance themselves. This is analogous to Lapointe and Rivard’s [47] observation
that individuals are likely to resist an IT when they perceive group-level resistance.
Thus, using insights from identity threat research in concert with our own
literature, future researchers may explore ways to stem resistance and possibly
even leverage the IT Identity Threat as a motivating factor that may cause indivi-
duals to learn to use a threatening IT.
In addition, it is important to note that the studies presented in this work are
limited to two contexts within the broader context of higher education. The field of
IS could benefit from studies based on the IT Identity Threat in different contexts.
Limitations
We employed surveys to collect data across our studies4; thus, the possibility that
our method of data collection was a factor in our results must be addressed.
Accordingly, we examined our data for evidence of common method bias by
evaluating correlations between unrelated marker items (found in Appendix E)
and the measures of our constructs [24, 71]. These correlations ranged from
0.023 to 0.001, indicating that common method bias was not a factor in our results.
We note that the correlation between loss of competence-based self-esteem and
loss of authenticity-based self-esteem in our first study is very high (0.779, see
Table 6). Even in a formative second-order model, however, this may be found
when a level of one dimension can influence the levels of one or more other
dimensions [73]. Person identity is thought to influence the selection of workplace
roles, and role-related experiences are impactful on person identity over time [17].
Thus, phenomena that impact person identity are likely to impact role identity, and
vice-versa [17]. Nevertheless, a comparison with the average variance explained of
each construct (in Table 6) indicates that they are distinct: related, but not the same
thing. Additionally, since our construct’s formative dimensions are correlated, we
estimated variance inflation factor scores of each dimension. The largest of these
was 2.8 (see Appendix F for all scores), which is below the threshold of concern
recommended by Petter et al. [70] of 3.3 for formative indicators.
Finally, we present the IT Identity Threat as a very broad construct that may
explain a broad range of resistance behaviors as caused by loss of self-esteem. In
doing so, we infer that it may subsume resistance factors that affect individuals’
self-esteem. However, we do not claim that it subsumes all sources of resistance to
IT. For example, temporary emotional states and inhibitors such as computer
anxiety may discourage IT use in general [90, 92]. When a system contributes to
284 CRAIG ET AL.
users’ problems rather than solve them, individuals may resist that system without
experiencing identity threat. The IT Identity Threat may contribute to research on
factors such as these, but is not intended to replace them.
Conclusion
As technology continues to infuse individuals’ lives, our research must explore the
ways it is changing lives in often harmful ways. Toward that end, this paper
develops, defines, and measures a new construct—the IT Identity Threat—which
captures the potential negative effect that IT can have on identity. Future research
based on the IT Identity Threat will be more valuable as ITs influence what it
means to be human. The IT Identity Threat can help explain why future generations
of ever-more intrusive and personal technologies may be rejected by some users.
However, because identity is malleable and can be re-formed, it also may point the
way toward helping individuals adapt in order to realize the greatest possible
benefit from emerging technologies.
Supplemental File
Supplemental data for this article can be accessed on the publisher’s website
NOTES
1. The verification of identity is an event described in the identity literature. It can be
defined as an individual’s observation, either direct or through perceptions communicated by
others, which confirms the self-beliefs that comprise an identity. In other words, when an
individual perceives that they are the kind of person that they believe they are, their identity
is verified [17] pp. 50-60.
2. This university was recently ranked in the top 20 Public Universities in the well-known
US News and World Rankings of Best Colleges.
3. It must be noted that while the list service sent invitations by email to all students and
faculty, it is not known how many of those invitations were treated as spam and ignored.
According to the list service administrator, our response rate was typical.
4. Our sample frames were selected with resistance in mind. We surveyed populations of
users that had vocally expressed discontent with the technology. For example, ePortfolio had
been subject to criticism in the student newspaper and critically evaluated in conference
papers. Also, post-implementation, iRoar had been the subject of committee meetings held
by the CIO to address faculty concerns about the system. Consequently, while we expected
variance in our sample frame, we also anticipated high levels of threat perceptions were
likely among subjects who selected to complete our survey.
REFERENCES
1. Ahuja, M.K.; and Thatcher, J.B. Moving beyond intentions and toward the theory of
trying: effects of work environment and gender on post-adoption information technology use.
MIS Quarterly, 29, 3 (2005), 427–459.
2. Ali, M.; Zhou, L.; Miller, L.; and Ieromonachou, P. User resistance in IT: A literature
review. International Journal of Information Management, 36, 1 (2016), 35–43.
THE IT IDENTITY THREAT 285
3. Ashforth, B.E. Distinguished scholar invited essay: Exploring identity and identifica-
tion in organizations: Time for some course corrections. Journal of Leadership &
Organizational Studies, 23, 4 (2016), 361–373.
4. Ashforth, B.E.; and Kreiner, G.E. “How can you do it?”: Dirty work and the
challenge of constructing a positive identity. Academy of Management Review, 24, 3
(1999), 413–434.
5. Ashforth, B.E.; Schinoff, B.S.; and Rogers, K.M. “I identify with her,”“I identify with
him”: Unpacking the dynamics of personal identification in organizations. Academy of
Management Review, 41, 1 (2016), 28–60.
6. Bacharach, S.B. Organizational theories: Some criteria for evaluation. Academy of
Management Review, 14, 4 (1989), 496–515.
7. Bala, H.; and Venkatesh, V. Adaptation to information technology: A holistic nomo-
logical network from implementation to job outcomes. Management Science, 62, 1 (2015),
156–179.
8. Beaudry, A.; and Pinsonneault, A. Understanding user responses to information tech-
nology: A coping model of user adaptation. MIS Quarterly, 29, 3 (2005), 493–524.
9. Bentler, P.M. Comparative fit indexes in structural models. Psychological Bulletin,
107, 2 (1990), 238.
10. Bhattacherjee, A. Social Science Research: Principles, Methods, and Practices.
Tampa, FL: Textbooks Collection, 2012.
11. Bhattacherjee, A.; and Hikmet, N. Physicians’ resistance toward healthcare informa-
tion technology: A theoretical model and empirical test. European Journal of Information
Systems, 16, 6 (2007), 725–737.
12. Browne, M.W.; Cudeck, R.; Bollen, K.A.; and Long, J.S. Alternative ways of assessing
model fit. Sage Focus Editions, 154, (1993), 136–136.
13. Burke, P.J. Identity processes and social stress. American Sociological Review, 56, 6
(1991), 836–849.
14. Burke, P.J. Identities and social structure: The 2003 Cooley-Mead award address.
Social Psychology Quarterly, 67, 1 (2004), 5–15.
15. Burke, P.J. Identity change. Social Psychology Quarterly, 69, 1 (2006), 81–96.
16. Burke, P.J. and Reitzes, D.C. An identity theory approach to commitment. Social
Psychology Quarterly, 54, 3 (1991), 239–251.
17. Burke, P.J.; and Stets, J.E. Identity Theory. New York, NY: Oxford University Press,
2009.
18. Byrne, B. Structural Equation Modeling with EQS. Mahwah, NJ: Lawrence Erlbaum
Associates, 2006.
19. Carr, N. Does IT Matter?: Information Technology and the Corrosion of Competitive
Advantage. Cambridge: Harvard University Press, 2004.
20. Carter, M.; and Grover, V. Me, my self, and I (T): Conceptualizing information
technology identity and its implications. Mis Quarterly, 39, 4 (2015), 931–958.
21. Cast, A.D.; and Burke, P.J. A theory of self-esteem. Social Forces, 80, 3 (2002),
1041–1068.
22. Cavusoglu, H.; Hu, N.; Li, Y.; and Ma, D. Information technology diffusion with
influentials, imitators, and opponents. Journal of Management Information Systems, 27, 2
(2010), 305–334.
23. Cenfetelli, R.T. Inhibitors and enablers as dual factor concepts in technology usage.
Journal of the Association for Information Systems, 5, 11 (2004), 16.
24. Chin, W.W.; Thatcher, J.B.; Wright, R.T.; and Steel, D. Controlling for common
method variance in PLS analysis: The measured latent marker variable approach. In H.
Abdi., W.W. Chin., V. Esposito Vinzi., G. Russolillo., and L. Trinchera (eds.), New
Perspectives in Partial Least Squares and Related Methods. New York: Springer, 2013,
pp. 231–239.
25. Churchill Jr, G.A. A paradigm for developing better measures of marketing constructs.
Journal of Marketing Research, 16, 1 (1979), 64–73.
26. Compeau, D.R.; and Higgins, C.A. Computer self-efficacy: Development of a measure
and initial test. MIS Quarterly, 19, 2 (1995), 189–211.
286 CRAIG ET AL.
49. Lee, A.S.; and Baskerville, R.L. Generalizing generalizability in information systems
research. Information Systems Research, 14, 3 (2003), 221–243.
50. Lee, S.J. Quantitative versus qualitative research methods—Two approaches to orga-
nisation studies. Asia Pacific Journal of Management, 9, 1 (1992), 87–94.
51. Lee, Y.; and Chen, A.N. Usability design and psychological ownership of a virtual
world. Journal of Management Information Systems, 28, 3 (2011), 269–308.
52. Leonardi, P.M. Materiality, sociomateriality, and socio-technical systems: What do
these terms mean? How are they related? Do we need them? Materiality and Organizing:
Social Interaction in a Technological World, 54, 5 (2012), 25–48.
53. Luhtanen, R.; and Crocker, J. A collective self-esteem scale: Self-evaluation of one’s
social identity. Personality and Social Psychology Bulletin, 18, 3 (1992), 302–318.
54. Lyytinen, K.; and Newman, M. Explaining information systems change: A punctuated
socio-technical change model. European Journal of Information Systems, 17, 6 (2008),
589–613.
55. MacKenzie, S.B.; Podsakoff, P.M.; and Podsakoff, N.P. Construct measurement and
validation procedures in MIS and behavioral research: Integrating new and existing
techniques. MIS Quarterly, 35, 2 (2011), 293–334.
56. Makkawi, A.; and Scott, C. Dirty Work. In C. Scott (ed.), The International
Encyclopedia of Organizational Communication. Hoboken, NJ: Wiley, 2017.
57. Marakas, G.M.; and Hornik, S. Passive resistance misuse: Overt support and covert
recalcitrance in IS implementation. European Journal of Information Systems, 5, 3 (1996),
208–219.
58. Markus, M.L. Power, politics, and MIS implementation. Communications of the ACM,
26, 6 (1983), 430–444.
59. Markus, M.L.; and Robey, D. Information technology and organizational change:
Causal structure in theory and research. Management Science, 34, 5 (1988), 583–598.
60. McCall, M.; and Simmons, J. Identities and Interactions. New York: Free Press, 1978.
61. Menor, L.J.; and Roth, A.V. New service development competence in retail banking:
Construct development and measurement validation. Journal of Operations Management, 25,
4 (2007), 825–846.
62. Monat, A.; and Lazarus, R. Stress and Coping: an Anthology. New York: Columbia
University Press, 1977.
63. Nach, H. Identity under challenge: Examining user’s responses to computerized
information systems. Management Research Review, 38, 7 (2015), 703–725.
64. Nach, H.; and Lejeune, A. Coping with information technology challenges to identity:
A theoretical framework. Computers in Human Behavior, 26, 4 (2010), 618–629.
65. Nunnally, J. Psychometric Theory. McGraw-Monte, New York, 1978.
66. Paré, G.; Bourdeau, S.; Marsan, J.; Nach, H.; and Shuraida, S. Re-examining the causal
structure of information technology impact research. European Journal of Information
Systems, 17, 4 (2008), 403–416.
67. Parsons, T.D.; and Rizzo, A.A. Affective outcomes of virtual reality exposure therapy
for anxiety and specific phobias: A meta-analysis. Journal of Behavior Therapy and
Experimental Psychiatry, 39, 3 (2008), 250–261.
68. Petriglieri, J.L. Under threat: Responses to and the consequences of threats to indivi-
duals’ identities. Academy of Management Review, 36, 4 (2011), 641–662.
69. Petriglieri, J.L. Under threat: Responses to and the consequences of threats to indivi-
duals’ identities. Academy of Management Review, 36, 4 (2011), 641–662.
70. Petter, S.; Straub, D.; and Rai, A. Specifying formative constructs in information
systems research. MIS Quarterly, 31, 4 (2007), 623-656.
71. Podsakoff, P.M.; MacKenzie, S.B.; and Podsakoff, N.P. Sources of method bias in
social science research and recommendations on how to control it. Annual Review of
Psychology, 63, (2012), 539–569.
72. Polit, D.F.; and Beck, C.T. Generalization in quantitative and qualitative research:
myths and strategies. International Journal of Nursing Studies, 47, 11 (2010),
1451–1458.
288 CRAIG ET AL.
73. Polites, G.L.; Roberts, N.; and Thatcher, J. Conceptualizing models using multidimen-
sional constructs: A review and guidelines for their use. European Journal of Information
Systems, 21, 1 (2012), 22–48.
74. Pratt, M.G.; Rockmann, K.W.; and Kaufmann, J.B. Constructing professional identity:
The role of work and identity learning cycles in the customization of identity among medical
residents. Academy of Management Journal, 49, 2 (2006), 235–262.
75. Ramiller, N. New Technology and the post-human self: Rethinking appropriation and
resistance. ACM SIGMIS Database: The DATABASE for Advances in Information Systems,
47, 4 (2016), 23–33.
76. Raykov, T. Estimation of composite reliability for congeneric measures. Applied
Psychological Measurement, 21, 2 (1997), 173–184.
77. Rosenberg, M. Rosenberg self-esteem scale (RSE). Acceptance and Commitment
Therapy. Measures Package, 61, (1965), 52.
78. Rubin, M.; and Hewstone, M. Social identity theory’s self-esteem hypothesis:
A review and some suggestions for clarification. Personality and Social Psychology
Review, 2, 1 (1998), 40–62.
79. Segars, A.H.; and Grover, V. Strategic information systems planning success: An
investigation of the construct and its measurement. MIS Quarterly, 22, 2 (1998), 139–163.
80. Shepherd, D.A; and Williams, T.A. Hitting rock bottom after job loss: Bouncing back
to create a new positive work identity. Academy of Management Review, 43, 1 (2018), 28–49.
81. Stets, J.E.; and Burke, P.J. Inconsistent self-views in the control identity model. Social
Science Research, 23, 3 (1994), 236–262.
82. Stets, J.E.; and Burke, P.J. Identity theory and social identity theory. Social Psychology
Quarterly, 63, 3 (2000), 224-237.
83. Stets, J.E.; and Burke, P.J. A sociological approach to self and identity. In M.R. Leary
and J.P. Tangney (eds.), Handbook of Self and Identity. New York, Guilford Press, 2003, pp.
128–152.
84. Stets, J.E.; and Burke, P.J. Self-esteem and identities. Sociological Perspectives, 57, 4
(2014), 409–433.
85. Straub, D.; Boudreau, M.-C.; and Gefen, D. Validation guidelines for IS positivist
research. The Communications of the Association for Information Systems, 13, 1 (2004), 63.
86. Stryker, S.; and Burke, P.J. The past, present, and future of an identity theory. Social
Psychology Quarterly, 63, 4 (2000), 284-297.
87. Sun, H.; and Zhang, P. The role of moderating factors in user technology acceptance.
International Journal of Human-Computer Studies, 64, 2 (2006), 53–78.
88. Swann, W.; and Buhrmester, M. Self-verification: The search for coherence. In
M. Leary and J.P. Tankney (eds.), Handbook of Self and Identity. New York: The Guilford
Press, 2003, pp. 405–424.
89. Tarafdar, M.; Tu, Q.; Ragu-Nathan, B.S.; and Ragu-Nathan, T.S. The impact of
technostress on role stress and productivity. Journal of Management Information Systems,
24, 1 (2007), 301–328.
90. Thatcher, J.B.; and Perrewe, P.L. An empirical examination of individual traits as
antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26, 4 (2002),
381–396.
91. Tyler, T.R.; Kramer, R.M.; and John, O.P. The Psychology of the Social Self.
New York: Psychology Press, 2014.
92. Venkatesh, V. Determinants of perceived ease of use: Integrating control, intrinsic
motivation, and emotion into the technology acceptance model. Information Systems
Research, 11, 4 (2000), 342–365.
93. Wilson, M. Making nursing visible? Gender, technology and the care plan as script.
Information Technology & People, 15, 2 (2002), 139–158.
94. Witte, K.; and Allen, M. A meta-analysis of fear appeals: Implications for effective
public health campaigns. Health Education & Behavior, 27, 5 (2000), 591–615.
95. Zikic, J.; and Richardson, J. What happens when you can’t be who you are:
Professional identity at the institutional periphery. Human Relations, 69, 1 (2016), 139–168.