Skip to main content
Log in

Social actor attribution to mobile phones: the case of tourists

  • Original Research
  • Published:
Information Technology & Tourism Aims and scope Submit manuscript

Abstract

This study examines social actor attribution to mobile phones in general settings and travel context. Informed by attribution theory and computing technology continuum of perspective model, the hypothesized relationships between social characteristics of mobile phones, users’ core self-evaluation, and social actor attribution to mobile phones were tested to determine the locus of causality of people’s social responses to mobile technology. Further, the influence of mobile phones use for travel-related purposes was investigated to examine the situation attribution explaining the perceived social roles of mobile phones in travel. The results demonstrate that perceived positive and negative social characters of mobile phones as well as self-efficacy, locus of control and self-esteem of users significantly influence social actor attribution to mobile phones. In a travel setting, the significant influence of situational factor on the social roles of mobile technology emphasizes the importance of anthropomorphism in the designing of mobile technology for travel. As a managerial implication, features of mobile technology should suggest the roles of mobile devices as personal travel companions and/or assistants to increase the persuasive power of mobile phones for tourists.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Bagozzi RP, Yi T (1988) On the evaluation of structural equation models. J Acad Mark Sci 16(1):74–94

    Article  Google Scholar 

  • Chang C-H, Ferris DL, Johnson RE, Rosen CC, Tan Ja (2012) Core self-evaluations: a review and evaluation of the literature. J Manag 38(1):81–128

    Google Scholar 

  • Chin W (1998) The partial least squares approach to structural equation modeling. In: Marcoulides GA (ed) Modern methods for business research. Laurence Erlbaum Associates, New Jersey, pp 295–336

  • Costa PTJ, McCrae RR (1988) Personality in adult-hood: a six-year longitudinal study of self-reports and spouse ratings on the NEO personality inventory. J Pers Soc Psychol 54:853–863

    Article  Google Scholar 

  • DeCharms R (1968) Personal causation: the internal affective determinants of behavior. Academic Press, New York

    Google Scholar 

  • Deci EL, Ryan RM (1985) Intrinsic motivation and self-determination in human behavior. Plenum, New York

    Book  Google Scholar 

  • Dillon WR, Goldstein M (1984) Multivariate analysis, methods and applications. John Wiley & Sons, New York

    Google Scholar 

  • Edwards SJ, Blythe PT, Scott S, Weihong-Guo A (2006) Tourist information delivered through mobile devices: findings from the image project. Inform Technol Tour 8:31–46

    Article  Google Scholar 

  • Eysenck HJ, Eysenck SBG (1968) Manual for the Eysenck personality inventory. Educational and Industrial Testing Service, San Diego

    Google Scholar 

  • Falaleeva N, Johnson R (2002) Influence of individual psychological traits on attribution toward computing technology. Eighth Am Conf Inform Syst 2002:1028–1033

    Google Scholar 

  • Fogg BJ (1998) Persuasive computers: perspectives and research directions. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York

  • Fogg BJ (2003) Persuasive technology: using computers to change what we think and do. Morgan Kaufmann Publishers, San Francisco

    Google Scholar 

  • Fogg BJ, Nass CI (1997) Silicon sycophants: the effect of computers that flatter. Int J Hum Comput Stud 46:551–561

    Article  Google Scholar 

  • Fornell C, Larcker DF (1981) Evaluating structural equation models with unobserved variables and measurement error. J Mark Res 18:39–50

    Article  Google Scholar 

  • Gretzel U (2011) Intelligent systems in tourism: a social science perspective. Annals Tour Res 38(3):757–779

    Article  Google Scholar 

  • Guthrie SE (1993) Faces in the clouds: a new theory of religion. Oxford University Press, New York

    Google Scholar 

  • Hall CM (2004) Tourism. Prentice-Hall, Harlow

    Google Scholar 

  • Hall B, Henningsen DD (2008) Social facilitation and human–computer interaction. Comput Hum Behav 24(6):2965–2971

    Article  Google Scholar 

  • Hayes B, Hesketh B (1989) Attribution theory, judgmental biases, and cognitive behavior modification: prospects and problems. Cogn Therapy Res 13(3):211–230

    Article  Google Scholar 

  • Heider F (1958) The psychology of interpersonal relations. Wiley, New York

    Book  Google Scholar 

  • Hu L, Bentler PM (1999) Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct Equ Model 6:1–55

    Article  Google Scholar 

  • Hung M-C, Chang I-C, Hwang H-G (2011) Exploring academic teachers’ continuance toward the web-based learning system: the role of causal attributions. Comput Educ 57(2):1530–1543

    Article  Google Scholar 

  • Igbaria M, Iivari J (1995) The effects of self-efficacy on computer usage. Omega 23(6):587–605

    Article  Google Scholar 

  • Johnson RD (2001) Tool or social actor: factors contributing to differential social attributions toward computing technology. University of Maryland, College Park

    Google Scholar 

  • Johnson RD, Marakas GM, Palmer JW (2006) Differential social attributions toward computing technology: an empirical examination. Int J Hum Comput Stud 64:446–460

    Article  Google Scholar 

  • Johnson RD, Marakas GM, Palmer JW (2008) Beliefs about the social roles and capabilities of computing technology: development of the computing technology continuum of perspective. Behav Inform Technol 27(2):169–181

    Article  Google Scholar 

  • Judge TA, Locke EA, Durham CC (1997) The dispositional causes of job satisfaction: a core evaluations approach. Res Organ Behav 19:151–188

    Google Scholar 

  • Judge TA, Erez A, Bono JE, Thoresen CJ (2002) Are measures of self-esteem, neuroticism, locus of control, and generalized self-efficacy indicators of a common core construct? J Pers Soc Psychol 83(3):693–710

    Article  Google Scholar 

  • Kabassi K (2010) Personalizing recommendations for tourists. Telematics Inform 27(1):51–66

    Article  Google Scholar 

  • Kansas State University (2011, June 28). Attachment to cellphones more about entertainment, less about communication. ScienceDaily. Retrieved January 3, 2012, from http://www.sciencedaily.com/releases/2011/06/110628113139.htm

  • Karsten R (2002) An analysis of IS professional end user causal attributions for user-system outcomes. J End User Comput 14(4):51–73

    Article  Google Scholar 

  • Kelley HH (1973) The processes of causal attribution. Am Psychol 28(2):107–128

    Article  Google Scholar 

  • Kim J, Tussyadiah IP (2013) Social networking and social support in tourism experience: the moderating role of online self-presentation strategies. J Travel Tour Market 30(1):78–92

    Article  Google Scholar 

  • Lee E-U (2010) The more humanlike, the better? How speech type and users’ cognitive style affect social responses to computers. Comput Hum Behav 26:665–672

    Article  Google Scholar 

  • Levenson H (1973) Multidimensional locus of control in psychiatric patients. J Consult Clin Psychol 41(3):397–404

    Article  Google Scholar 

  • Lindstrom M (2011, September). You love your iPhone. Literally. The New York Times. Retrieved January 3, 2012, from http://www.nytimes.com/2011/10/01/opinion/you-love-your-iphone-literally.html

  • Marakas GM, Yi MY, Johnson RD (1998) The multilevel and multifaceted character of computer self-efficacy: toward clarification of the construct and an integrative framework for research. Inform Syst Res 9(2):126–163

    Article  Google Scholar 

  • Marakas GM, Johnson RD, Palmer JW (2000) A theoretical model of differential social attributions toward computing technology: when metaphor become the model. Int J Hum Comput Stud 52:719–750

    Article  Google Scholar 

  • Martin D, Alzua A, Lamsfus C (2011) A contextual geofencing mobile tourism service. In: Law R, Fuchs M, Ricci F (eds) Information and communication technologies in tourism 2011. Springer, Vienna/New York, pp 191–202

  • Martinko MJ (1995) The nature and function of attribution theory within the organizational science. In: Martinko MJ (ed) Attribution theory: an organizational perspective. St. Lucie Press, Delray Beach, pp 7–16

    Google Scholar 

  • Mumm J, Mutlu B (2011) Designing motivational agents: the role of praise, social comparison, and embodiment in computer feedback. Comput Hum Behav 27(5):1643–1650

    Article  Google Scholar 

  • Muthén LK, Muthén BO (1998–2011). Mplus User’s Guide. 6th edn. Muthén & Muthén, Los Angeles

  • Nass C, Moon Y (2000) Machines and mindlessness: social responses to computers. J Soc Issues 56(1):81–103

    Article  Google Scholar 

  • Nass C, Steuer J, Tauber ER (1994) Computers are social actors. In: The proceedings of the SIGCHI conference on human factors in computing systems: celebrating interdependence. Boston, Massachusetts, pp 72–78

  • Nass C, Moon Y, Fogg BJ, Reeves B, Dryer C (1995) Can computer personalities be human personalities? Int J Hum Comput Stud 43:223–239

    Article  Google Scholar 

  • Ormrod JE (2006) Educational psychology: developing learners, 5th edn. Pearson/Merrill Prentice Hall, Upper Saddle River

    Google Scholar 

  • Quan S, Wang N (2004) Towards a structural model of the tourist experience: an illustration from food experiences in tourism. Tour Manag 25:297–305

    Article  Google Scholar 

  • Rasinger J, Fuchs M, Höpken W (2007) Information search with mobile tourist guides: a survey of usage intention. Inform Technol Tour 9(3–4):177–194

    Article  Google Scholar 

  • Reeves B, Nass C (1996) The media equation: how people treat computers, television, and new media like real people and places. Cambridge University Press, Stanford

    Google Scholar 

  • Rosenberg M (1965) Society and the adolescent self-image. Princeton University Press, Princeton

    Google Scholar 

  • Rotter JB (1954) Social learning and clinical psychology. Prentice-Hall, New York

    Book  Google Scholar 

  • Schmeil A, Broll W (2007) An anthropomorphic AR-based personal information manager and guide. Proceedings of HCI international 2007, July 22–27, Beijing, PR China

  • Sproull L, Subramani M, Kiesler S, Walker JH (1996) When the interface is a face. Hum Comput Interact 11:97–124

    Article  Google Scholar 

  • Thompson ER (2008) Development and validation of an international English big-five mini-markers. Personality Individ Differ 45(6):542–548

    Article  Google Scholar 

  • Turkle S (1984) The second self. Simon and Schuster, New York

    Google Scholar 

  • Tussyadiah IP (2012) A concept of location-based social network marketing. J Travel Tour Market 29(3):205–220

    Article  Google Scholar 

  • Tussyadiah IP, Fesenmaier DR (2009) Mediating tourists experiences-access to places via shared videos. Annals Tour Res 36(1), 24–40

    Google Scholar 

  • Tussyadiah IP, Zach FJ (2012) The role of geo-based technology in place experiences. Annals Tour Res 39(2):780–800

    Article  Google Scholar 

  • Wang D, Fesenmaier DR (2013) Transforming the travel experience: the use of smartphones for travel. In: Cantoni L, Xiang Z (eds) Information and communication technologies in tourism 2013. Springer, Vienna/New York

  • Wang D, Xiang Z (2012) The new landscape of travel: a comprehensive analysis of Smartphone Apps. In: Fuchs M, Ricci F, Cantoni L (eds) Information and communication technologies in tourism 2012. Springer, Vienna/New York

  • Wang D, Park S, Fesenmaier DR (2011) The role of smartphones in mediating the touristic experience. J Travel Res 51(4):371–387

    Article  Google Scholar 

  • Weiner B (1985) An attribution theory of achievement motivation and emotion. Psychol Rev 92:548–573

    Article  Google Scholar 

  • You C-S, Hung Y-C, Tsen Y-J, Wang H-B (2013) The roles of causal attribution on the continued use of e-learning systems. Int J Appl Math Stat 38(8):28–42

    Google Scholar 

  • Zhu Z, Nakata C, Shivakumar K, Grewal D (2013) Fix it or leave it? Customer recovery from self-service technology failures. J Retail 89(1):15–29

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iis P. Tussyadiah.

Appendix: Measurement items

Appendix: Measurement items

1.1 Positive social characters of mobile phones (PC)—self-developed

PC1—My cell phone is empathetic.

PC2—My cell phone is friendly.

PC3—My cell phone is kind.

PC4—My cell phone is persuasive.

PC5—My cell phone is polite.

PC6—My cell phone is sensitive.

PC7—My cell phone is trusting.

1.2 Negative social characters of mobile phones (NC)—self-developed

NC1—My cell phone is arrogant.

NC2—My cell phone is frigid.

NC3—My cell phone is grumpy.

NC4—My cell phone is judgmental.

NC5—My cell phone is manipulative.

NC6—My cell phone is mean.

NC7—My cell phone is rude.

1.3 Neuroticism (NE)—Eysenck and Eysenck (1968)

NE1—I often feel lonely.

NE2—My feelings are easily hurt.

NE3—My mood often goes up and down.

NE4—I am often troubled by feelings of guilt.

NE5—I am an irritable person.

NE6—I often feel ‘fed up’.

NE7—I am often tense of high strung.

NE8—Sometimes I feel miserable for no reason.

1.4 Mobile technology self-efficacy (MTSE)—Adapted from Johnson et al. (2008)

MT1—I believe I have the ability to make a brand new cell phone work.

MT2—I believe I have the ability to describe how a cell phone works.

MT3—I believe I have the ability to install new apps on a cell phone.

MT4—I believe I have the ability to identify and correct common operational problems on a cell phone.

MT5—I believe I have the ability to remove information from a cell phone that I no longer need.

MT6—I believe I have the ability to use a cell phone to search and display information in a desired manner.

MT7—I believe I have the ability to use a cell phone for its fullest capacity.

1.5 Locus of control (LC)—Levenson (1973)

LC1—It’s chiefly a matter of fate whether or not I have a few friends or many friends.

LC2—It’s not always wise for me to plan too far ahead because many things turn out to be a matter of good or bad fortune.

LC3—Even if I were a good leader, I would not be made a leader unless I play up to those in positions of power.

LC4—Often there is no chance of protecting my personal interest from bad luck happening.

LC5—I feel like what happens in my life is mostly determined by powerful people.

LC6—My life is chiefly controlled by powerful others.

LC7—Whether or not I get to be a leader depends on whether or not I’m lucky enough to be in the right place at the right time.

1.6 Self-esteem (SE)—Rosenberg (1965), positive statements

SE1—On the whole, I am satisfied with myself.

SE2—I am able to do things as well as most people.

SE3—I feel that I have a number of good qualities.

SE4—I feel that I am a person of worth, at least on an equal plane with others.

1.7 Mobile technology continuum of perspective (MTCP)—adapted from Johnson et al. (2008)

Perceived Intelligence of Mobile Phones (PI)

PI1—Cell phones are capable of telling people to navigate around an unfamiliar city.

PI2—Cell phones are capable of effectively guiding and educating people.

PI3—Cell phones are capable of facilitating a simultaneous discussion among many people.

PI4—Cell phones are capable of remembering things.

PI5—Cell phones are capable of telling us the answers when we have questions.

Perceived socialness of mobile phones (PS)

PS1—Cell phones are capable of learning from their experiences.

PS2—Cell phones are capable of holding intelligent conversations.

PS3—Cell phones are capable of caring for people.

Perceived control of mobile phones (PC)

PC1—Cell phones are capable of infringing on personal rights and freedom.

PC2—Cell phones are capable of invading privacy.

1.8 Mobile phone use for travel (MU)—adapted from Tussyadiah and Zach (2012)

MU1—Using mobile maps for navigation and way-finding.

MU2—Using mobile apps to search for information regarding attractions, restaurants, etc.

MU3—Using mobile guides or destination apps to learn more about the place.

MU4—Using mobile social media to find and share recommendation.

MU5—Recording travel experiences by taking pictures, videos, etc.

1.9 Social roles of mobile phones in travel (SR)—self-developed

SR1—When I travel, I see my cell phone as my friend. It accompanies me to experience places.

SR2—When I travel, I see my cell phone as my personal guide. It guides me to experience places.

SR3—When I travel, I see my cell phone as my personal assistant. It assists me to experience places.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tussyadiah, I.P. Social actor attribution to mobile phones: the case of tourists. Inf Technol Tourism 14, 21–47 (2014). https://doi.org/10.1007/s40558-013-0002-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40558-013-0002-4

Keywords

Navigation