DOI QR코드

DOI QR Code

A Mediating Effect of Internalization on Technology Adoption

  • Received : 2016.06.22
  • Accepted : 2016.07.22
  • Published : 2016.09.30

Abstract

Many technology innovations fail. Only a few of them are successfully implemented. Most of the remaining are discontinued before long or fail to be routinized. Although employees attempted to adopt the innovation for some legitimacy reasons, they have not reached the stage of internalization in which they believe in the real value of the innovation and become committed to the innovation. The deficiency of internalization was utilized in many studies as an important factor for explaining the failed innovation cases. However, few empirical studies examine the role of internalization in technology adoption. This study aims to investigate a mediating effect of internalization on technology adoption.

Keywords

References

  1. Bagozzi, R., "The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift", Journal of the Association for Information Systems, Vol. 8, No. 4, 2007, pp. 244-254. https://doi.org/10.17705/1jais.00122
  2. Chan, M., Woon, I., and Kankanhalli, A., "Perceptions of Information Security in the Workplace : Linking Information Security Climate to Compliant Behavior", Journal of Information Privacy and Security, Vol. 1, No. 3, 2005, pp. 18-41. https://doi.org/10.1080/15536548.2005.10855772
  3. Chen, J. and Wang, E., "Internalization in Technology Innovation : A Case of CRM Adoption", Proceedings of the 39th Hawaii International Conference on Systems Sciences, 2006.
  4. Chiu, C., Chiu, C., and Chang, H., "Examining the integrated influence of fairness and quality on leaner's satisfaction and webbased learning continuance intention", Information System Journal, Vol. 17, pp. 271-287.
  5. Collings, D. and Dick, P., "The relationship between ceremonial adoption of popular management practices and the motivation for practice adoption and diffusion in an American MNC", The International Journal of Human Resource Management, Vol. 22, No. 18, 2011, pp. 3849-3866. https://doi.org/10.1080/09585192.2011.561233
  6. Davis, F., "Perceived Usefulness, Perceived Ease of use, and User Acceptance of Information Technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 318-339.
  7. Davis, F., Bagozzi, R., and Warshaw, P., "User Acceptance of Computer Technology : A Comparison of Two Theoretical Models", Management Science, Vol. 35, 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
  8. Delone, W. and Mclean, E., "Measuring ecommerce success : Applying the DeLone and McLean information systems success model", International Journal of Electronic Commerce, Vol. 9, No. 1, 2004, pp. 31-47. https://doi.org/10.1080/10864415.2004.11044317
  9. Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior : An introduction to theory and research, Addison-Wesley, 1975.
  10. Igbaria, M. and Iivari, J., "The effects of self-efficacy on computer usage", Omega, Vol. 23, No. 6, 1995, pp. 587-605. https://doi.org/10.1016/0305-0483(95)00035-6
  11. Igbaria, M., Guimaraes, T., and Davis, G., "Testing the determinants of microcomputer usage via a structural equation model", Journal of Management Information Systems, Vol. 11, No. 4, 1995, pp. 87-114. https://doi.org/10.1080/07421222.1995.11518061
  12. Johansen, R. and Swigart, R., Upsizing the Individual in the Downsized Organization : Managing in the Wake of Reengineering, Globalization and Overwhelming Technological Change, Basic Books, 1995.
  13. Kelman, H., "Further Thoughts on the Pro cesses of Compliance, Identification, and Internalization", Perspectives on Social Power, Chicago : Aldine, 1974, pp. 126-171.
  14. Kim, S. and Kim, J., "Communal Antecedents in the Adoption of Secure Coding Methodologies", Asia Pacific Journal of Information Systems, Vol. 26, No. 2, 2016, pp. 231-246. https://doi.org/10.14329/apjis.2016.26.2.231
  15. Kostova, T., "Transnational Transfer of Strategic Organizational Practices : A Contextual Perspective", The Academy of Management Review, Vol. 24, No. 2, 1999, pp. 308-324. https://doi.org/10.5465/amr.1999.1893938
  16. Kostova, T. and Roth, K., "Adoption of an Organizational Practice By Subsidiaries of Multinational Corporations : Institutional and Relational Effects", Academy of Management Journal, Vol. 45, No. 1, 2002, pp. 215-233. https://doi.org/10.2307/3069293
  17. Kostova, T., Roth, K., and Dacin, M. T., "Institutional theory in the study of multinational corporations : A critique and new directions", Academy of Management Review, Vol. 33, No. 4, 2008, pp. 994-1006. https://doi.org/10.5465/amr.2008.34422026
  18. Lee, Y., Kozar, K., and Larsen, K., "The technology acceptance model : Past, present, and future", Communications of the Association for Information Systems, Vol. 12, No. 1, 2003, pp. 751-780.
  19. Legris, P., Ingham, J., and Collerette, P., "Why do people use information technology? A critical review of the technology acceptance model", Information and Management, Vol. 40, No. 3, 2003, pp. 191-204. https://doi.org/10.1016/S0378-7206(01)00143-4
  20. Mael, F. and Ashforth, B., "Alumni and their alma mater : A partial test of the reformulated model of organizational identification", Journal of Organizational Behavior, Vol. 13, No. 2, 1992, pp. 103-123. https://doi.org/10.1002/job.4030130202
  21. Meyer, J. W. and Rowan, B., "Institutionalized organizations : Formal structure as myth and ceremony", American Journal of Sociology, 1977, pp. 340-363.
  22. Nair, A. and Prajogo, D., "Internalization of ISO 9000 standards : the antecedent role of functionalist and institutionalist drivers and performance implications", International Journal of Production Research, Vol. 47, No. 16, 2009, pp. 4545-4568. https://doi.org/10.1080/00207540701871069
  23. Pierce, J. L., Kostova, T., and Dirks, K., "Toward a theory of psychological ownership in organizations", Academy of Management Review, Vol. 26, No. 2, 2001, pp. 298-310. https://doi.org/10.5465/amr.2001.4378028
  24. Pierce, J., Kostova, T., and Dirks, K., "The state of psychological ownership : Integrating and extending a century of research", Review of General Psychology, Vol. 7, No. 1, 2003, pp. 84-107. https://doi.org/10.1037/1089-2680.7.1.84
  25. Pfleeger, S., "Understanding and Improving Technology Transfer in Software Engineering", Journal of Systems and Software, Vol. 47, No. 2-3, 1999, pp. 111-124. https://doi.org/10.1016/S0164-1212(99)00031-X
  26. Recker, J., "Continued use of process modeling grammars : the impact of individual difference factors", European Journal of Information System, Vol. 19, No. 1, 2010, pp. 76-92. https://doi.org/10.1057/ejis.2010.5
  27. Riemenschneider, C., Harrison, D., and Mykytyn, P., "Understanding IT adoption decisions in small business : Integrating current theories", Information and Management, Vol. 40, 2003, pp. 269-285. https://doi.org/10.1016/S0378-7206(02)00010-1
  28. Riemenschneider, C., Hardgrave, B., and Davis, F., "Explaining Software Developer Acceptance of Methodologies : A Comparison of Five Theoretical Models", IEEE Transactions on Software Engineering, Vol. 28, No. 12, 2002, pp. 1135-1145. https://doi.org/10.1109/TSE.2002.1158287
  29. Tari, J., Heras-Saizarbitoria, J., and Pereira, J., "Internalization of quality management in service organizations", Managing Service Quality, Vol. 23, No. 6, 2013, pp. 456-473. https://doi.org/10.1108/MSQ-06-2012-0060
  30. Taylor, S. and Kaza, S., "Security Injections : Modules to help students remember, understand, and apply secure coding techniques", ITiCSE, 2011, pp. 27-29.
  31. Turner, M., Kitchenham, B., Brereton, P., Charters, S., and Budgen, D., "Does the technology acceptance model predict actual use? A systematic literature review", Information and Software Technology, Vol. 52, No. 5, 2010, pp. 463-479. https://doi.org/10.1016/j.infsof.2009.11.005
  32. Venkatesh, V. and Davis, F., "A theoretical extension of the technology acceptance model : Four longitudinal field studies", Management Science, Vol. 46, No. 2, 2000, pp. 186-204. https://doi.org/10.1287/mnsc.46.2.186.11926
  33. Venkatesh, V., Morris, M., Davis, G., and Davis, D., "User acceptance of information technology : Toward a unified view", MIS Quarterly, Vol. 27, No. 3, 2003, pp. 425-478. https://doi.org/10.2307/30036540
  34. Whittaker, J., "Why secure applications are difficult to write", IEEE Security and Privacy, Vol. 1, No. 2, pp. 81-83.

Cited by

  1. How User's Participation in Feasibility Study Enhances Use of Business Intelligence Systems vol.24, pp.3, 2016, https://doi.org/10.21219/jitam.2017.24.3.001