Jeoungkun Kim and Heeseok Lee - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Jeoungkun Kim and Heeseok Lee

Description:

Reexamining of Social Influence upon Acceptance of Information Technology. 1. ... when another user joins and enlarges the network' (Katz and Shapiro 1994) ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 19
Provided by: sak67
Category:
Tags: heeseok | jeoungkun | katz | kim | lee

less

Transcript and Presenter's Notes

Title: Jeoungkun Kim and Heeseok Lee


1
Reexamining of Social Influence upon Acceptance
of Information Technology
Jeoungkun Kim and Heeseok Lee 2005/11/24
2
Reexamining of Social Influence upon Acceptance
of Information Technology
2
Table of Contents
1. Introduction 2. Social influence in
technology acceptance literature 3. Social
influence in Other Domains 4. Network
externality 5. Research Model 6. Research
Administration 7. Analysis Results 8.
Conclusions and Limitations
KAIST Graduate School of Management
3
1. Introduction
Technology Acceptance and Social Influence
  • In IS field, information system usage has been a
    major research subject.
  • TAM (Technology Acceptance Model) one of the
    most influential models
  • Inconsistent Researc results MIS domain vs
    Social Psychology, Consumer Behavior Research
  • Social forces should not be neglected.

4
1. Introduction
TRA and TAM
5
1. Introduction
Research Questions
  • How does social influence effects on behavior of
    information system adoption and use ?
  • What is the key factors that makes difference of
    technology usage behavior pattern in between
    general and information system context ?

6
2. Social Influence and Technology Acceptance
Prior Technology Acceptance Studies with Social
Influence
7
2. Social Influence and Technology Acceptance
Prior Technology Acceptance Studies with Social
Influence
  • Subjective Norm (Normative Social Influence)
  • No general agreement on effect of social
    influence
  • Conditional effect of Subjective Norm
  • Mandatory usage condition
  • Pre-adoption stage
  • Inexperienced user

8
3. Social Influence and Technology Acceptance
Social Influence Research in Social Psychology
  • Asch (1955)s Experiment
  • Two Types of Social Influence Normative Social
    Influence and Informational Social Influence
    (Deutsch and Gerard 1955).
  • Normative Social Influence and compliance
  • Informational Social Influence as credible
    information

9
Network Externality as Key Information System
Characteristics
4. Network Externality
  • Network externality Definition - the value of
    membership to one user is positively affected
    when another user joins and enlarges the network
    (Katz and Shapiro 1994).
  • Network externality as a common phenomenon in IS
    domain
  • Empirical Confirmation of network externality
    effect
  • PC operating systems/video game hardware
    (Schilling 2002)
  • PC package software such as spreadsheet and word
    processor (Brancheau and Wetherbe 1990,
    Brynjolfsson and Kemerer 1996, Gandal 1994).
  • Network externality gives utility increase to
    dominant technology adopters.

10
5. Research Model
11
Conceptual Definitions, Attributes, and Sources
5. Research Model
12
Survey Administration
6. Research Administration
  • Target System Wordprocessor and Internet
    Messenger
  • 191 questionnaires were collected.
  • 184 questionnaires for final analysis (outliers
    and incomplete questionnaires were excluded ).
  • 7 point Likert-scale

13
Sample Characteristics
6. Research Administration
14
Regression Result on Behavioral Intention
7. Analysis Result
Regression Result on Perceived Usefulness
15
Conclusions
8. Conclusions And Limitations
  • Informational social influence is critical in
    information technology adoption because of its
    complexity and network externality. People tend
    to use it as an important judgment basis for
    information technology adoption behaviors.
  • Perceived network externality reinforces the
    effect of informational social influence on
    behavioral intention and perceived usefulness.

16
Limitations
8. Conclusions And Limitations
  • Generalizability problem Both target systems
    word processor and internet messenger- posit high
    network strength. This limits the
    generalizability of the study.
  • Sample representativeness Most respondents are
    in their twenties and thirties. Therefore, our
    study results may not be generalized to whole
    users.

17
Thank You
KAIST Graduate School of Management CIS Lab. Kim
jeoungkun November.24.2005
18
Construct Reliability and Validity
Appendix
Write a Comment
User Comments (0)
About PowerShow.com