Abstract
Technology is being applied to governmental functions with the intent to improve governmental operations. Most research on technology acceptance has focused on the private sector with less being applied to the public sector, and little applied to the domain of disaster management. As we continue to expand upon technological applications in governmental affairs, it is important to understand how the increasing role of information and communications technology (ICT) affects disaster management. Utilizing a conceptual model adapting Venkatesh et al’s (2003) unified theory of acceptance and use of technology model to an emergency management context, factors of performance expectancy, effort expectancy, and social influence along with emergency management specific factors such as threat perception, disaster history, social vulnerability, disaster exercises and emergency management collaboration are used to examine the intent to use EMDSS. Multiple regression analysis using data obtained from a survey of local emergency managers in FEMA Region VI taken in the fall of 2012 indicate that social influence, effort expectancy, community social vulnerability and collaboration among emergency management agencies influences the intent to use EMDSS technology. This study contributes to our understanding of technology adoption among local governments by showing that the factors that influence emergency management officials’ intent to use EMDSS differ from factors found in private sector applications. Most notably, in EMDSS applications, social influence and ease of use are the strongest predictors of intent to use rather than performance expectations.
References
Aedo, I., P. Díaz, V. A. Bañuls, J. H. Canós and S. R. Hiltz (2011) Information Technologies for Emergency Planning and Training. Proceedings of the 8th International ISCRAM Conference, Lisbon, Portugal: National Civil Engineering Laboratory.Search in Google Scholar
Andrew, S. A. (2009) “Regional Integration Through Contracting Networks: An Empirical Analysis of Institutional Collective Action Framework,” Urban Affairs Review, 44(3):378–401.10.1177/1078087408323941Search in Google Scholar
Andrew, S. A. and J. Carr (2013) “Mitigating Uncertainty and Risk in Planning for Regional Preparedness: The Role of Bonding and Bridging Relationships,” Urban Studies, 40(4):709–724.10.1177/0042098012455718Search in Google Scholar
Artigas, F., D. Elefante and A. Marti (2009) “Geographic Information Sharing: A Regional Approach in Northern New Jersey, USA,” Information Polity, 14(1):127–139.10.3233/IP-2009-0165Search in Google Scholar
Bharati, P. and A. Chaudhury (2004) “An Empirical Investigation of Decision-Making Satisfaction in Web-Based Decision Support Systems,” Decision Support Systems, 37(2):187–197.10.1016/S0167-9236(03)00006-XSearch in Google Scholar
Brudney, J. L. (1988) “Computers and Smaller Local Governments,” Public Productivity Review, 12(2):179–192.10.2307/3380131Search in Google Scholar
Brudney, J. L. and S. C. Selden (1995) “The Adoption of Innovation by Smaller Local Governments: The Case of Computer Technology,” The American Review of Public Administration, 25:71–86.10.1177/027507409502500105Search in Google Scholar
Buck, D. A., J. E. Trainor and B. E. Aguirre (2006) “A Critical Evaluation of the Incident Command System and NIMS,” Journal of Homeland Security and Emergency Management, 3(3):1–27.10.2202/1547-7355.1252Search in Google Scholar
Burton-Jones, A. and G. S. Hubona (2006) “The Mediation of External Variables in the Technology Acceptance Model,” Information and Management, 43(6):706–717.10.1016/j.im.2006.03.007Search in Google Scholar
Carver, L. and M. Turoff (2007) “Human Computer Interaction: The Human and Computer as a Team in Emergency Management Information Systems,” Communications of ACM, 50(3):33–38.10.1145/1226736.1226761Search in Google Scholar
Cheung, C. M., M. K. Lee and Z. Chen (2002) “Using the Internet as a Learning Medium: An Exploration of Gender Difference in the Adoption of FaBWeb.” In: Systems Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference onIEEE, Institute of Electrical and Electronic Engineers, (pp. 475–483).Search in Google Scholar
Clarke, W. (2006) Emergency Management in County Government: A National Survey. Athens, GA: Carl Vinson Institute of Government.Search in Google Scholar
Comfort, L. K. (2005) “Risk, Security and Disaster Management,” Annual Review of Political Science, 8:335–356.10.1146/annurev.polisci.8.081404.075608Search in Google Scholar
Comfort, L. K. (2006) “Cities at Risk Hurricane Katrina and the Drowning of New Orleans,” Urban Affairs Review, 41(4):501–516.10.1177/1078087405284881Search in Google Scholar
Comfort, L. K. and T. W. Haase (2006) “Communication, Coherence, and Collective Action: The Impact of Hurricane Katrina on Communications Infrastructure,” Public Works Management Policy, 10(4):328–343.10.1177/1087724X06289052Search in Google Scholar
Comfort, L. K. (2007) “Crisis Management in Hindsight: Cognition, Communication, Coordination and Control,” Public Administration Review, 67(SI):189–197.10.1111/j.1540-6210.2007.00827.xSearch in Google Scholar
Cook, C., F. Heath and R. L. Thompson (2000) “A Meta-Analysis of Response Rates in Web-or Internet-Based Surveys,” Educational and Psychological Measurement, 60(6):821–836.10.1177/00131640021970934Search in Google Scholar
Cutter, S. L., C. T. Emrich, B. J. Adams, C. K. Huyck and R. T. Eguchi (2007) “New Information Technologies in Emergency Management.” In: (W. L. Waugh, Jr. and K. Tierney, eds.) Emergency Management: Principles and Practice for Local Government. Washington, DC: ICMA, pp. 279–297.Search in Google Scholar
Davis, L. D. and F. D. Davis (1990) “The Effect of Training Techniques and Personal Characteristics on Training end Users of Information Systems,” The Journal of Management Information Systems, 7(2):93–110.10.1080/07421222.1990.11517891Search in Google Scholar
Davis, F. D., R. P. Bagozzi and P. R. Warshaw (1989) “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, 35(8):982–1003.10.1287/mnsc.35.8.982Search in Google Scholar
DeLone W. H. and E. R. McLean (2003) “The DeLone and McLean Model of Information Systems Success: A Ten-Year Update,” Journal of Management Information Systems, 19(4):9–30.10.1080/07421222.2003.11045748Search in Google Scholar
Department of Homeland Security (2007) Homeland Security Exercise and Evaluation Program (hseep), Volume I: hseep Overview and Exercise Program Management. Retrieved from https://hseep.dhs.gov/pages/1001_HSEEP7.aspx.Search in Google Scholar
Department of Homeland Security (2013) Homeland Security Exercise and Evaluation Program 2013 Doctrine. Retrieved from https://hseep.dhs.gov/pages/1001_HSEEP10.aspx.Search in Google Scholar
Drabek, T. E. (2007) “Community Processes: Coordination.” In: (H. Rodrigues, E. L. Quarantelli and R. R. Dynes, eds.) Handbook of Disaster Research. New York, NY: Springer, pp. 217–233.10.1007/978-0-387-32353-4_13Search in Google Scholar
Dynes, R. R. and H. Rodriguez (2010) “Finding and Framing Katrina,” In: (D. L. Brunsma, D. Overfelt and J. S. Picou, eds.) The Sociology of Katrina: Perspectives on a Modern Catastrophe. Lanham, MD: Roman & Littlefield Publishers, Inc., pp. 25–36.Search in Google Scholar
E-team (2011) Incident and Resource Management. Retrieved from http://www.nc4.us/ETeam.php.Search in Google Scholar
Federal Emergency Management Agency (2012) Declared Disasters by Year or State. Retrieved from http://www.fema.gov/news/disaster_totals_annual.fema.Search in Google Scholar
Federal Emergency Management Agency (2013) Professional Development Series. Retrieved from http://www.training.fema.gov/emiweb/PDS/.Search in Google Scholar
Feiock, R. C. (2004) Metropolitan Governance: Conflict, Competition and Cooperation. Washington, DC: Georgetown University Press.Search in Google Scholar
Hazards and Vulnerability Research Institute (2013) Social Vulnerability Index for the United States – 2006–2010. Retrieved from http://webra.cas.sc.edu/hvri/.Search in Google Scholar
Hoffman, D. L. and T. P. Novak (1998) “Bridging the Racial Divide on the Internet,” Science, 280(5362):390–391.10.1126/science.280.5362.390Search in Google Scholar
Igbaria, M. and S. Parsuraman (1989) “A Path Analytic Study of Individual Characteristics, Computer Anxiety and Attitudes Towards Microcomputers,” Journal of Management, 15(3):373–388.10.1177/014920638901500302Search in Google Scholar
Kendra, J. M. and T. Wachtendorf (2003) “Reconsidering Convergence and Converger Legitimacy in Response to the World Trade Center disaster,” Research in Social Problems and Public Policy, 11:97–122.10.1016/S0196-1152(03)11007-1Search in Google Scholar
Khunwishit, S. and D. A. McEntire (2012) “Testing Social Vulnerability Theory: A Quantitative Study of Hurricane Katrina’s Perceived Impact on Residents Living in FEMA Designated Disaster Areas,” Journal of Homeland Security and Emergency Management, 9(1):1–16.10.1515/1547-7355.1950Search in Google Scholar
Kittleson, M. J. (1995) “An Assessment of the Response Rate Via the Postal Service and e-Mail,” Health Values: The Journal of Health Behavior, Education & Promotion, 19(2):27–39.Search in Google Scholar
Krueger, S., E. Jennings and J. M. Kendra (2009) “Local Emergency Management Funding: An Evaluation of County Budgets,” Journal of Homeland Security and Emergency Management, 6(1):1–21.10.2202/1547-7355.1434Search in Google Scholar
Lindell, M. K. and R. W. Perry (2007) “Planning and Preparedness.” In: (W. L. Waugh, Jr. and K. Tierney, eds.) Emergency Management: Principles and Practice for Local Government. Washington, DC: ICMA, pp. 113–139.Search in Google Scholar
Marincioni, F. (2007) “Information Technologies and the Sharing of Disaster Knowledge: The Critical Role of Professional Culture,” Disasters, 31(4):459–476.10.1111/j.1467-7717.2007.01019.xSearch in Google Scholar
Mathieson, K., E. Peacock and W. W. Chin (2001) “Extending the Technology Acceptance Model: The Influence of Perceived User Resources,” The DATA BASE for Advances in Information Systems, 32(3):86–112.10.1145/506724.506730Search in Google Scholar
McEntire, D. A. (2007) Disaster Response and Recovery. Hoboken, NJ: John Wiley & Sons, Inc.Search in Google Scholar
McEntire, D. A. (2007a) “Local Emergency Management Organizations.” In: (H. Rodrigues, E. L. Quarantelli and R. R. Dynes, eds.) Handbook of Disaster Research. New York, NY: Springer, pp. 168–182.10.1007/978-0-387-32353-4_10Search in Google Scholar
Mendonça, D. (2007) “Decision support for Improvisation in Response to Extreme Events: Learning from the Response to the 2001 World Trade Center Attack,” Decision Support Systems, 43:952–957.10.1016/j.dss.2005.05.025Search in Google Scholar
Morris, M. G. and V. Venkatesh (2000) “Age Differences in Technology Adoption Decisions: Implications for a Changing Workforce,” Personnel Psychology, 53(2):375–403.10.1111/j.1744-6570.2000.tb00206.xSearch in Google Scholar
Morris, M. G., V. Venkatesh and P. L. Ackerman (2005) “Gender and Age Differences in Employee Decisions About New Technology: An Extension to the Theory of Planned Behavior,” Engineering Management, IEEE Transactions On, 52(1):69–84.10.1109/TEM.2004.839967Search in Google Scholar
NC-4: National Center for Crisis and Continuity Coordination. 2009. NC-4: About us. Retrieved from http://www.nc4.us/aboutus.php.Search in Google Scholar
Patton, A. (2007) “Collaborative Emergency Management.” In: (W. L. Waugh, Jr and K. Tierney, eds.) Emergency Management: Principles and Practice for Local Government. Washington, DC: ICMA, pp. 71–85.Search in Google Scholar
Perry, R. W. and M. K. Lindell (2003) “Preparedness for Emergency Response: Guidelines for the Emergency Planning Process,” Disasters, 27(4):336–350.10.1111/j.0361-3666.2003.00237.xSearch in Google Scholar
Reddick, C. (2011) “Information Technology and Emergency Management: Preparedness and Planning in the US States,” Disasters, 35(1):45–61.10.1111/j.1467-7717.2010.01192.xSearch in Google Scholar
Schmitt, T., J. Eisenberg and R. R. Rao (Eds.). (2007) Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery. Washington, DC: National Academies Press.Search in Google Scholar
Terzis, V. and A. A. Economides (2011) “Computer Based Assessment: Gender Differences in Perceptions and Acceptance,” Computers in Human Behavior, 27(6):2108–2122.10.1016/j.chb.2011.06.005Search in Google Scholar
Thomas, P. (2008) Information Systems Success and Technology Acceptance within a Government Organization. (Doctoral dissertation) Retrieved from Proquest Dissertations and Theses http://search.proquest.com/pqdtft/docview/304538052/ 13EA4DBEB3D5F7E9AF1/1?accountid=7113.Search in Google Scholar
Thompson, R. L., C. A. Higgens and J. M. Howell (1991) “Personal Computing: Toward a Conceptual Model of Utilization,” MIS Quarterly, 15(1):124–143.10.2307/249443Search in Google Scholar
Turoff, M., M. Chumer, B. Van de Walle and X. Yao (2004) “The Design of a Dynamic Emergency Response Information System (DERMIS),” Journal of Information Technology Theory and Application, 5(4):1–35.Search in Google Scholar
Van de Walle, B. and M. Turoff (2008) “Decision Support for Emergency Situations,” Information Systems and E-Business Management, 6(3):295–316.10.1007/s10257-008-0087-zSearch in Google Scholar
Vasileios, T. and A. A. Economides (2011) “Computer Based Assessment: Gender Differences in Perceptions and Acceptance,” Computers in Human Behavior, 27(6):2108–2122.10.1016/j.chb.2011.06.005Search in Google Scholar
Venkatesh, V., M. Morris, G. Davis and F. D. Davis (2003) “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly, 27(3):425–478.10.2307/30036540Search in Google Scholar
Waugh, W. L. Jr. (1994) “Regionalizing Emergency Management: Counties as State and Local Government,” Public Administration Review, 54(3):253–258.10.2307/976728Search in Google Scholar
Waugh, W. L. Jr. and G. Streib (2006) “Collaboration and Leadership for Effective Emergency Management,” Public Administration Review, 66(SI):131–140.10.1111/j.1540-6210.2006.00673.xSearch in Google Scholar
WebEOC (2013) WebEOC Professional. Retrieved from http://esi911.com/esi/index.php/products-mainmenu-68?id=377.Search in Google Scholar
Wenger, D., E. L. Quarantelli and R. R. Dynes (1990) “Is the Incident Command System a Plan for all Seasons and Emergency Situations?” Hazard Monthly, 10(3):8–12.Search in Google Scholar
Wisner, B., P. Blaikie, T. Cannon and I. Davis (2004) At Risk: Natural Hazards, People’s Vulnerability and Disasters (2nd ed.). London: Routledge.Search in Google Scholar
Yildiz, M. (2007) “E-government Research: Reviewing the Literature, Limitations, and Ways Forward,” Government Information Quarterly, 24(3):646–665.10.1016/j.giq.2007.01.002Search in Google Scholar
Yuen, A. H. and W. W. Ma (2002) “Gender Differences in Teacher Computer Acceptance,” Journal of Technology and Teacher Education, 10(3):365–382.Search in Google Scholar
Zahran, S., S. D. Brody, W. G. Peacock, A. Vedlitz and H. Grover (2008) Social Vulnerability and the Natural and Built Environment: A Model of Flood Casualties in Texas,” Disasters, 32(4):537–560.10.1111/j.1467-7717.2008.01054.xSearch in Google Scholar
©2015 by De Gruyter