Spelling suggestions: "subject:"symbolic adoption"" "subject:"ymbolic adoption""
1 |
Organizational Adoption of Information Technologies ¡V An Extended Fit-Viability ModelYeh, Yi-Hsuan 30 August 2011 (has links)
Organizational adoption of information technology is an important decision for modern enterprises. Proper use of technology can increase benefits and competitive advantage. Inappropriate use could cause failure. Most previous literature focuses on treating technology adoption as a rational decision based on the functional needs of an organization. In many cases, however, technology adoption is not due to functional needs but environmental or peer pressure (called symbolic or ceremonial adoption). Different motivations for adoption may lead to different outcome. In addition, there is no generally accepted organizational adoption model that can include all key factors into consideration. Therefore, this study tries to understand what factors will affect an organization¡¦s adoption of a new information technology or use an information technology and whether different purposes (intangible value vs. tangible value) will affect the adoption or usage of information technology in organizations.
The framework of this study was extended from the Fit-Viability Model to include the internal organizational factors and external environmental factors. We conducted a survey study and use PLS to analyze the collected data. The results show that the extended FV model can interpret organizational IT adoption and IT usage. The purpose of adoption did have effect on the intention to adopt information technology. In the symbolic adoption situation, TEF and viability had significant impacts on organizational intention to adopt; and in the functional adoption situation, TTF and viability had significant impacts on organizational intention to adopt. Different purposes of adoption have less significant effect on the actual use and performance of information system. TTF and actual use had significant impacts on organizational performance, and viability also had significant impacts on actual use of information technology in both situations. In other words, organizations can also benefit from IT adoption even if the original motivation was symbolic.
|
2 |
User Inclusion during ERP Implementations and its effects on Symbolic AdoptionHörnlund, Henrik, Ålander, Johannes January 2021 (has links)
Having a modern Enterprise Resource Planning (ERP) system is seen as increasingly important if an organisation wants to compete in today’s business environment. The implementation of a new ERP system can result in added automatization and the replacement and/or coupling of legacy systems. The replacement and coupling of legacy systems can help an organisation increase data integrity and accessibility by lowering data fragmentation. Previous research on the topic of ERP implementations has emphasized user participation as an important factor when aiming to succeed with an implementation. The research is however inconsistent with its use of participation and involvement where involvement is often used synonymously with participation, but sometimes it signifies that the implementation is of personal importance to the user. This study defines user participation as the user partaking in activities relating to the implementation, and user involvement is defined as the user perceiving the project or system as important. This study also introduces a new term: user inclusion, which encompasses both user participation, and if a user is on the receiving end of one-way communication, for example when receiving a newsletter. This study argues that symbolic adoption, the belief that implementing the system is a good idea, is an important part of system success and uses a combination of factors from the UTAUT model and the I/S success model as antecedents to the dimensions of symbolic adoption that has been presented in previous research. The purpose of this study is to examine how users are included in ERP implementation processes, and how their inclusion in the process affects users’ symbolic adoption. To address this purpose, a qualitative multi-case study that included two cases was conducted. In order to answer how users are included, this study divides how into three sub-questions; who; when and in what way users were included throughout the implementation. This study concludes that users’ inclusion increases over time throughout the implementation process, both in terms of influence, and in number of participating users. This study also shows that users included in project initiatives can affect the antecedents to symbolic adoption in various ways, both their own symbolic adoption, and that of their non-participating colleagues. An example of this is how intended users’ expectations can be managed through communication and when they get first-hand experience of the system, their expectations correct themselves so that they are closer to the actual performance and effort required. The antecedents, performance and effort expectancy, are in turn linked to the symbolic adoption dimension effort worthiness.
|
3 |
Quels élements d'influence pour l'adoption symbolique de la sécurité des systèmes d'information? / Which elements of influence for the information system security's symbolic adoptionFantino, Benoît 17 December 2018 (has links)
La sécurité des systèmes d’information s’inscrit dans la dépendance croissante des entreprises envers leur SI en perspective du nombre grandissant d’incidents de sécurité. Dans cette recherche, nous nous intéressons à la gestion des risques SI, pour laquelle la littérature souligne le manque d’implication des top-managers. Nous abordons cette problématique sous l’angle de la décision des dirigeants, au travers de quatre approches théoriques : modèles des perceptions managériales des risques SI, perception des risques en psychologie, théorie néo-institutionnelle et théorie sur l’adoption symbolique des innovations. L’objectif est de rendre intelligible les influences sur l’adoption symbolique de la SSI. Nous employons une méthode qualitative organisée autour de 17 études de cas dans des entreprises d’activités variées. La SSI y est observée comme un processus de décision de gestion des risques SI. Nos résultats montrent la pertinence d’étudier la SSI selon une perspective individuelle de gestion des risques. D’une part, les caractéristiques de l’évaluation psychologique des risques éclairent les biais pour la gestion du risque SI. D’autre part, l’étude de ces biais apporte une perspective nouvelle sur la compréhension de l’investissement des top-managers pour la SSI. Nous montrons l’insensibilité des top-managers à l’exposition du risque, une préférence à aborder les risques sous l’angle des menaces. Aussi, nous exposons les influences qui contribuent à adopter une SSI technique et non managériale pourtant suggérée dans la littérature. Enfin, notre analyse fait émerger des perspectives pour prolonger la compréhension d’une SSI réactive, décriée par les auteurs en SSI. / The information system security for which the interest joins in the increasing dependence of companies to them information system and in prospect of increasing number of security incidents. We are interested in the information system risk management, for whom the literature underlines the lack of involvement of top-managers.We approach the concern under the view of the decision of top executives for ISS, through four theoretical streams: the models of the managerial perceptions of IS risks, the risks perception in psychology, the institutional theory and the theory about symbolic adoption of the innovations. The aim is to make intelligible the influences on the symbolic adoption of such ISS approach. We use a qualitative method organized around 17 case studies in companies with varied activities. Our results highlight the relevance to study the ISS according to an individual perspective of risk management. On one hand, the characteristics of the psychological evaluation of the risks enlighten the biases for the management of the information system risk. On the other hand, the study of these biases brings a new perspective on the understanding of the investment of the top executives for the ISS. In particular, we underline the insensitivity of the top managers in the exposure of the risk, a preference to approach the risks under a threats point of view. We expose the influences which contribute to adopt a technical and not managerial ISS such as suggests by the Research. Finally, our analysis brings to the foreground perspectives to extend the comprehension of a reactive ISS, defame by ISS’ academics.
|
Page generated in 0.0966 seconds