Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter June 23, 2015

Determinants of Emergency Management Decision Support Software Technology: An Empirical Analysis of Social Influence in Technology Adoption

Eliot Jennings, Sudha Arlikatti and Simon Andrew

Abstract

Technology is being applied to governmental functions with the intent to improve governmental operations. Most research on technology acceptance has focused on the private sector with less being applied to the public sector, and little applied to the domain of disaster management. As we continue to expand upon technological applications in governmental affairs, it is important to understand how the increasing role of information and communications technology (ICT) affects disaster management. Utilizing a conceptual model adapting Venkatesh et al’s (2003) unified theory of acceptance and use of technology model to an emergency management context, factors of performance expectancy, effort expectancy, and social influence along with emergency management specific factors such as threat perception, disaster history, social vulnerability, disaster exercises and emergency management collaboration are used to examine the intent to use EMDSS. Multiple regression analysis using data obtained from a survey of local emergency managers in FEMA Region VI taken in the fall of 2012 indicate that social influence, effort expectancy, community social vulnerability and collaboration among emergency management agencies influences the intent to use EMDSS technology. This study contributes to our understanding of technology adoption among local governments by showing that the factors that influence emergency management officials’ intent to use EMDSS differ from factors found in private sector applications. Most notably, in EMDSS applications, social influence and ease of use are the strongest predictors of intent to use rather than performance expectations.


Corresponding author: Eliot Jennings, Colorado Mesa University – Social and Behavior Sciences, 1100 North Avenue, Grand Junction, CO 81501, USA, Tel.: +970-248-1271, e-mail:

References

Aedo, I., P. Díaz, V. A. Bañuls, J. H. Canós and S. R. Hiltz (2011) Information Technologies for Emergency Planning and Training. Proceedings of the 8th International ISCRAM Conference, Lisbon, Portugal: National Civil Engineering Laboratory.Search in Google Scholar

Andrew, S. A. (2009) “Regional Integration Through Contracting Networks: An Empirical Analysis of Institutional Collective Action Framework,” Urban Affairs Review, 44(3):378–401.10.1177/1078087408323941Search in Google Scholar

Andrew, S. A. and J. Carr (2013) “Mitigating Uncertainty and Risk in Planning for Regional Preparedness: The Role of Bonding and Bridging Relationships,” Urban Studies, 40(4):709–724.10.1177/0042098012455718Search in Google Scholar

Artigas, F., D. Elefante and A. Marti (2009) “Geographic Information Sharing: A Regional Approach in Northern New Jersey, USA,” Information Polity, 14(1):127–139.10.3233/IP-2009-0165Search in Google Scholar

Bharati, P. and A. Chaudhury (2004) “An Empirical Investigation of Decision-Making Satisfaction in Web-Based Decision Support Systems,” Decision Support Systems, 37(2):187–197.10.1016/S0167-9236(03)00006-XSearch in Google Scholar

Brudney, J. L. (1988) “Computers and Smaller Local Governments,” Public Productivity Review, 12(2):179–192.10.2307/3380131Search in Google Scholar

Brudney, J. L. and S. C. Selden (1995) “The Adoption of Innovation by Smaller Local Governments: The Case of Computer Technology,” The American Review of Public Administration, 25:71–86.10.1177/027507409502500105Search in Google Scholar

Buck, D. A., J. E. Trainor and B. E. Aguirre (2006) “A Critical Evaluation of the Incident Command System and NIMS,” Journal of Homeland Security and Emergency Management, 3(3):1–27.10.2202/1547-7355.1252Search in Google Scholar

Burton-Jones, A. and G. S. Hubona (2006) “The Mediation of External Variables in the Technology Acceptance Model,” Information and Management, 43(6):706–717.10.1016/j.im.2006.03.007Search in Google Scholar

Carver, L. and M. Turoff (2007) “Human Computer Interaction: The Human and Computer as a Team in Emergency Management Information Systems,” Communications of ACM, 50(3):33–38.10.1145/1226736.1226761Search in Google Scholar

Cheung, C. M., M. K. Lee and Z. Chen (2002) “Using the Internet as a Learning Medium: An Exploration of Gender Difference in the Adoption of FaBWeb.” In: Systems Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference onIEEE, Institute of Electrical and Electronic Engineers, (pp. 475–483).Search in Google Scholar

Clarke, W. (2006) Emergency Management in County Government: A National Survey. Athens, GA: Carl Vinson Institute of Government.Search in Google Scholar

Comfort, L. K. (2005) “Risk, Security and Disaster Management,” Annual Review of Political Science, 8:335–356.10.1146/annurev.polisci.8.081404.075608Search in Google Scholar

Comfort, L. K. (2006) “Cities at Risk Hurricane Katrina and the Drowning of New Orleans,” Urban Affairs Review, 41(4):501–516.10.1177/1078087405284881Search in Google Scholar

Comfort, L. K. and T. W. Haase (2006) “Communication, Coherence, and Collective Action: The Impact of Hurricane Katrina on Communications Infrastructure,” Public Works Management Policy, 10(4):328–343.10.1177/1087724X06289052Search in Google Scholar

Comfort, L. K. (2007) “Crisis Management in Hindsight: Cognition, Communication, Coordination and Control,” Public Administration Review, 67(SI):189–197.10.1111/j.1540-6210.2007.00827.xSearch in Google Scholar

Cook, C., F. Heath and R. L. Thompson (2000) “A Meta-Analysis of Response Rates in Web-or Internet-Based Surveys,” Educational and Psychological Measurement, 60(6):821–836.10.1177/00131640021970934Search in Google Scholar

Cutter, S. L., C. T. Emrich, B. J. Adams, C. K. Huyck and R. T. Eguchi (2007) “New Information Technologies in Emergency Management.” In: (W. L. Waugh, Jr. and K. Tierney, eds.) Emergency Management: Principles and Practice for Local Government. Washington, DC: ICMA, pp. 279–297.Search in Google Scholar

Davis, L. D. and F. D. Davis (1990) “The Effect of Training Techniques and Personal Characteristics on Training end Users of Information Systems,” The Journal of Management Information Systems, 7(2):93–110.10.1080/07421222.1990.11517891Search in Google Scholar

Davis, F. D., R. P. Bagozzi and P. R. Warshaw (1989) “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, 35(8):982–1003.10.1287/mnsc.35.8.982Search in Google Scholar

DeLone W. H. and E. R. McLean (2003) “The DeLone and McLean Model of Information Systems Success: A Ten-Year Update,” Journal of Management Information Systems, 19(4):9–30.10.1080/07421222.2003.11045748Search in Google Scholar

Department of Homeland Security (2007) Homeland Security Exercise and Evaluation Program (hseep), Volume I: hseep Overview and Exercise Program Management. Retrieved from https://hseep.dhs.gov/pages/1001_HSEEP7.aspx.Search in Google Scholar

Department of Homeland Security (2013) Homeland Security Exercise and Evaluation Program 2013 Doctrine. Retrieved from https://hseep.dhs.gov/pages/1001_HSEEP10.aspx.Search in Google Scholar

Drabek, T. E. (2007) “Community Processes: Coordination.” In: (H. Rodrigues, E. L. Quarantelli and R. R. Dynes, eds.) Handbook of Disaster Research. New York, NY: Springer, pp. 217–233.10.1007/978-0-387-32353-4_13Search in Google Scholar

Dynes, R. R. and H. Rodriguez (2010) “Finding and Framing Katrina,” In: (D. L. Brunsma, D. Overfelt and J. S. Picou, eds.) The Sociology of Katrina: Perspectives on a Modern Catastrophe. Lanham, MD: Roman & Littlefield Publishers, Inc., pp. 25–36.Search in Google Scholar

E-team (2011) Incident and Resource Management. Retrieved from http://www.nc4.us/ETeam.php.Search in Google Scholar

Federal Emergency Management Agency (2012) Declared Disasters by Year or State. Retrieved from http://www.fema.gov/news/disaster_totals_annual.fema.Search in Google Scholar

Federal Emergency Management Agency (2013) Professional Development Series. Retrieved from http://www.training.fema.gov/emiweb/PDS/.Search in Google Scholar

Feiock, R. C. (2004) Metropolitan Governance: Conflict, Competition and Cooperation. Washington, DC: Georgetown University Press.Search in Google Scholar

Hazards and Vulnerability Research Institute (2013) Social Vulnerability Index for the United States – 2006–2010. Retrieved from http://webra.cas.sc.edu/hvri/.Search in Google Scholar

Hoffman, D. L. and T. P. Novak (1998) “Bridging the Racial Divide on the Internet,” Science, 280(5362):390–391.10.1126/science.280.5362.390Search in Google Scholar

Igbaria, M. and S. Parsuraman (1989) “A Path Analytic Study of Individual Characteristics, Computer Anxiety and Attitudes Towards Microcomputers,” Journal of Management, 15(3):373–388.10.1177/014920638901500302Search in Google Scholar

Kendra, J. M. and T. Wachtendorf (2003) “Reconsidering Convergence and Converger Legitimacy in Response to the World Trade Center disaster,” Research in Social Problems and Public Policy, 11:97–122.10.1016/S0196-1152(03)11007-1Search in Google Scholar

Khunwishit, S. and D. A. McEntire (2012) “Testing Social Vulnerability Theory: A Quantitative Study of Hurricane Katrina’s Perceived Impact on Residents Living in FEMA Designated Disaster Areas,” Journal of Homeland Security and Emergency Management, 9(1):1–16.10.1515/1547-7355.1950Search in Google Scholar

Kittleson, M. J. (1995) “An Assessment of the Response Rate Via the Postal Service and e-Mail,” Health Values: The Journal of Health Behavior, Education & Promotion, 19(2):27–39.Search in Google Scholar

Krueger, S., E. Jennings and J. M. Kendra (2009) “Local Emergency Management Funding: An Evaluation of County Budgets,” Journal of Homeland Security and Emergency Management, 6(1):1–21.10.2202/1547-7355.1434Search in Google Scholar

Lindell, M. K. and R. W. Perry (2007) “Planning and Preparedness.” In: (W. L. Waugh, Jr. and K. Tierney, eds.) Emergency Management: Principles and Practice for Local Government. Washington, DC: ICMA, pp. 113–139.Search in Google Scholar

Marincioni, F. (2007) “Information Technologies and the Sharing of Disaster Knowledge: The Critical Role of Professional Culture,” Disasters, 31(4):459–476.10.1111/j.1467-7717.2007.01019.xSearch in Google Scholar

Mathieson, K., E. Peacock and W. W. Chin (2001) “Extending the Technology Acceptance Model: The Influence of Perceived User Resources,” The DATA BASE for Advances in Information Systems, 32(3):86–112.10.1145/506724.506730Search in Google Scholar

McEntire, D. A. (2007) Disaster Response and Recovery. Hoboken, NJ: John Wiley & Sons, Inc.Search in Google Scholar

McEntire, D. A. (2007a) “Local Emergency Management Organizations.” In: (H. Rodrigues, E. L. Quarantelli and R. R. Dynes, eds.) Handbook of Disaster Research. New York, NY: Springer, pp. 168–182.10.1007/978-0-387-32353-4_10Search in Google Scholar

Mendonça, D. (2007) “Decision support for Improvisation in Response to Extreme Events: Learning from the Response to the 2001 World Trade Center Attack,” Decision Support Systems, 43:952–957.10.1016/j.dss.2005.05.025Search in Google Scholar

Morris, M. G. and V. Venkatesh (2000) “Age Differences in Technology Adoption Decisions: Implications for a Changing Workforce,” Personnel Psychology, 53(2):375–403.10.1111/j.1744-6570.2000.tb00206.xSearch in Google Scholar

Morris, M. G., V. Venkatesh and P. L. Ackerman (2005) “Gender and Age Differences in Employee Decisions About New Technology: An Extension to the Theory of Planned Behavior,” Engineering Management, IEEE Transactions On, 52(1):69–84.10.1109/TEM.2004.839967Search in Google Scholar

NC-4: National Center for Crisis and Continuity Coordination. 2009. NC-4: About us. Retrieved from http://www.nc4.us/aboutus.php.Search in Google Scholar

Patton, A. (2007) “Collaborative Emergency Management.” In: (W. L. Waugh, Jr and K. Tierney, eds.) Emergency Management: Principles and Practice for Local Government. Washington, DC: ICMA, pp. 71–85.Search in Google Scholar

Perry, R. W. and M. K. Lindell (2003) “Preparedness for Emergency Response: Guidelines for the Emergency Planning Process,” Disasters, 27(4):336–350.10.1111/j.0361-3666.2003.00237.xSearch in Google Scholar

Reddick, C. (2011) “Information Technology and Emergency Management: Preparedness and Planning in the US States,” Disasters, 35(1):45–61.10.1111/j.1467-7717.2010.01192.xSearch in Google Scholar

Schmitt, T., J. Eisenberg and R. R. Rao (Eds.). (2007) Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery. Washington, DC: National Academies Press.Search in Google Scholar

Terzis, V. and A. A. Economides (2011) “Computer Based Assessment: Gender Differences in Perceptions and Acceptance,” Computers in Human Behavior, 27(6):2108–2122.10.1016/j.chb.2011.06.005Search in Google Scholar

Thomas, P. (2008) Information Systems Success and Technology Acceptance within a Government Organization. (Doctoral dissertation) Retrieved from Proquest Dissertations and Theses http://search.proquest.com/pqdtft/docview/304538052/ 13EA4DBEB3D5F7E9AF1/1?accountid=7113.Search in Google Scholar

Thompson, R. L., C. A. Higgens and J. M. Howell (1991) “Personal Computing: Toward a Conceptual Model of Utilization,” MIS Quarterly, 15(1):124–143.10.2307/249443Search in Google Scholar

Turoff, M., M. Chumer, B. Van de Walle and X. Yao (2004) “The Design of a Dynamic Emergency Response Information System (DERMIS),” Journal of Information Technology Theory and Application, 5(4):1–35.Search in Google Scholar

Van de Walle, B. and M. Turoff (2008) “Decision Support for Emergency Situations,” Information Systems and E-Business Management, 6(3):295–316.10.1007/s10257-008-0087-zSearch in Google Scholar

Vasileios, T. and A. A. Economides (2011) “Computer Based Assessment: Gender Differences in Perceptions and Acceptance,” Computers in Human Behavior, 27(6):2108–2122.10.1016/j.chb.2011.06.005Search in Google Scholar

Venkatesh, V., M. Morris, G. Davis and F. D. Davis (2003) “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly, 27(3):425–478.10.2307/30036540Search in Google Scholar

Waugh, W. L. Jr. (1994) “Regionalizing Emergency Management: Counties as State and Local Government,” Public Administration Review, 54(3):253–258.10.2307/976728Search in Google Scholar

Waugh, W. L. Jr. and G. Streib (2006) “Collaboration and Leadership for Effective Emergency Management,” Public Administration Review, 66(SI):131–140.10.1111/j.1540-6210.2006.00673.xSearch in Google Scholar

WebEOC (2013) WebEOC Professional. Retrieved from http://esi911.com/esi/index.php/products-mainmenu-68?id=377.Search in Google Scholar

Wenger, D., E. L. Quarantelli and R. R. Dynes (1990) “Is the Incident Command System a Plan for all Seasons and Emergency Situations?” Hazard Monthly, 10(3):8–12.Search in Google Scholar

Wisner, B., P. Blaikie, T. Cannon and I. Davis (2004) At Risk: Natural Hazards, People’s Vulnerability and Disasters (2nd ed.). London: Routledge.Search in Google Scholar

Yildiz, M. (2007) “E-government Research: Reviewing the Literature, Limitations, and Ways Forward,” Government Information Quarterly, 24(3):646–665.10.1016/j.giq.2007.01.002Search in Google Scholar

Yuen, A. H. and W. W. Ma (2002) “Gender Differences in Teacher Computer Acceptance,” Journal of Technology and Teacher Education, 10(3):365–382.Search in Google Scholar

Zahran, S., S. D. Brody, W. G. Peacock, A. Vedlitz and H. Grover (2008) Social Vulnerability and the Natural and Built Environment: A Model of Flood Casualties in Texas,” Disasters, 32(4):537–560.10.1111/j.1467-7717.2008.01054.xSearch in Google Scholar

Published Online: 2015-6-23
Published in Print: 2015-9-1

©2015 by De Gruyter