• Title/Summary/Keyword: Appropriation Process

Search Result 46, Processing Time 0.026 seconds

The Effect of Group Efficacy on the Appropriation Process and User Satisfaction in Knowledge Management Systems (집단효능감이 지식경영시스템 사용자의 전유과정과 만족에 미치는 영향)

  • Ryu, Il;Kim, Jae-jon;Roe, Hee-ok
    • Knowledge Management Research
    • /
    • v.9 no.3
    • /
    • pp.141-158
    • /
    • 2008
  • This study introduces the construct of group efficacy and combines the construct with the Adaptive Structuration Theory(AST) and user satisfaction framework. Job efficacy and IT efficacy identified as the dimensions of group efficacy are hypothesized to influence faithfulness of appropriation and consensus on appropriation. and then the user satisfaction of knowledge management systems(KMS). Data were collected through a survey of respondents who have the experience of using KMS, and analyzed by using structural equations modelling. The major findings of this study are as follows: First, job efficacy was found to have a positive influence on consensus on appropriation and user satisfaction. Second, IT efficacy was found to have a positive effect on faithfulness of appropriation and consensus on appropriation. Third, faithfulness of appropriation was found to have a positive influence on consensus on appropriation and user satisfaction. Implications of these findings are discussed for researchers and practitioners.

  • PDF

Appropriation of Human Resources into Human Assets and Its Typology (인적자원의 인적자산화 과정과 자산유형)

  • Jeong, Kioh
    • Journal of Service Research and Studies
    • /
    • v.9 no.2
    • /
    • pp.77-88
    • /
    • 2019
  • Appropriation means the process of transforming resources to property. John Locke earlier investigated the appropriation process of natural resources into the land property, which grounded the jurisprudential base of the private ownership of the land. In the same way human resources are transformed into the human assets. Appropriation process, very rarely studied so far, in this case of human property is the focus of this paper. The appropriation of intangible property is by far easier than the appropriation of tangible property. Learning is a process of embodiment, which naturally mean the process of appropriation. For the material resources which exist out of human body, appropriation necessary need special philosophical and institutional justification. In the process appropriation for intangibles, investigator found, appropriator and learner either can be same, or can be differentiated. In the former case substantial human assets are created while in the latter relational human assets are built. After the discussion of appropriation process, Investigator proceeds to the problem of visualizing the invisibles. Evaluation and assessment issue were discussed in this perspective. Qualification system is particularly noted as a system to regulate substantial human assets including their issuing and registration. The work done in this paper would contribute in understanding the law of education and the law of qualification.

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy (정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로)

  • Oh, Jinwouk;Baek, Seung Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.15-31
    • /
    • 2020
  • This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

A Study on the Effects of the Institutional Pressure on the Process of Implementation and Appropriation of System: M-EMRS in Hospital Organization (시스템의 도입과 전유 과정에 영향을 미치는 제도적 압력에 관한 연구: 병원조직의 모바일 전자의무기록 시스템을 대상으로)

  • Lee, Zoon-Ky;Shin, Ho-Kyoung;Choi, Hee-Jae
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.95-116
    • /
    • 2009
  • Increasingly the institutional theory has been an important theoretical view of decision making process and IT adoption in many academic researches. This study used the institutional theory as a lens through which we can understand the factors that enable the effective appropriation of advanced information technology. It posits that mimetic, coercive, and normative pressures existing in an institutionalized environment could influence the participation of top managers or decision makers and the involvement of users toward an effective use of IT in their tasks. Since the introduction of IT, organizational members have been using IT in their daily tasks, creating and recreating rules and resources according to their own methods and needs. That is to say, the adaptation process of the IT and outcomes are different among organizations. The previous studies on a diverse use of IT refer to the appropriation of technology from the social technology view. Users appropriate IT through not only technology itself, but also in terms of how they use it or how they make the social practice in their use of it. In this study, the concepts of institutional pressure, appropriation, participation of decision makers, and involvement of users toward the appropriation are explored in the context of the appropriation of the mobile electronic medical record system (M-EMRS) in particularly a hospital setting. Based on the conceptual definition of institutional pressure, participation and involvement, operational measures are reconstructed. Furthermore, the concept of appropriation is measured in the aspect of three sub-constructs-consensus on appropriation, faithful appropriation, and attitude of use. Grounded in the relevant theories to appropriation of IT, we developed a research framework in which the effects of institutional pressure, participation and involvement on the appropriation of IT are analyzed. Within this theoretical framework, we formulated several hypotheses. We developed a second order institutional pressure and appropriation construct. After establishing its validity and reliability, we tested the hypotheses with empirical data from 101 users in 3 hospitals which had adopted and used the M-EMRS. We examined the mediating effect of the participation of decision makers and the involvement of users on the appropriation and empirically validated their relationships. The results show that the mimetic, coercive, and normative institutional pressure has an effect on the participation of decision makers and the involvement of users in the appropriation of IT while the participation of decision makers and the involvement of users have an effect on the appropriation of IT. The results also suggest that the institutional pressure and the participation of decision makers influence the involvement of users toward an appropriation of IT. Our results emphasize the mediating effect of the institutional pressure on the appropriation of IT. Namely, the higher degree of the participation of decision makers and the involvement of users, the more effective appropriation users will represent. These results provide strong support for institutional-based variables as predictors of appropriation. These findings also indicate that organizations should focus on the role of participation of decision makers and the involvement of users for the purpose of effective appropriation, and these are the practical implications of our study. The theoretical contribution of this study is lies in the integrated model of the effect of institutional pressure on the appropriation of IT. The results are consistent with the institutional theory and support previous studies on adaptive structuration theory.

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

The Impact of Perceived IT Threat on Convergence Information System Performance (지각된 IT위협이 융합 정보시스템 성과에 미치는 영향)

  • Park, Hyeon-Ho;Nho, Hee-Ock;Kim, Yong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.65-71
    • /
    • 2015
  • Based on Technology Threat Avoidance Theory, this study explains the process that the users cope with IT Threat and accomplish IS outcome. To empirically test the proposed model, data were collected through a survey of respondents who have the experience of using IS, and analyzed by using structural equations modelling. The result shows IT Threat had negative effects on Problem-Focused Coping and IS Appropriation. Also Problem-Focused Coping had significant effects on IS Appropriation and IS Appropriation had positive relation on IS Performance. In conclusion the study proposed that IT users improve Convergence Information System Performance by Problem-Focused Coping when they perceive IT Threat.

The Relative Preference of Patent and Secrecy for Appropriation Mechanisms (혁신활동 결과의 전유방법에서 특허와 영업비밀의 상대적 선호)

  • Kim, Sang-Sin;Choi, Seok-Joon
    • Journal of Technology Innovation
    • /
    • v.17 no.2
    • /
    • pp.159-186
    • /
    • 2009
  • The innovation activity is an important factor for sustained growth in nations and firms. Particularly, the problem of appropriation of results of the innovative activity is very important for innovators since it enables them to enjoy the profits generated by their innovations. This study is intended to empirically analyse relative preference of patent and secrecy that is affected by characteristics of innovators and results of innovation using data from '2005: The Korean Innovation Survey' and Ordered Logit method. As a result of this study, the preference for a specific mechanism is clearly revealed in product innovation rather than process innovation. Also, in most research, questions results of analysis are equal to the previous studies and the nature of appropriation methods. However, the result of a research question based on sources of information is very different from previous researches. This study utilized more recent data than previous studies. This result reflects that existing patterns have been changed during recent period.

  • PDF

The Effects of Meeting Modes and Task Types on Group Decision Making in a GSS Environment (GSS 환경에서 회의방식과 과업유형이 그룹의사결정에 미치는 영향)

  • Ryu, Il;Kim, Jae-Jon
    • Asia pacific journal of information systems
    • /
    • v.9 no.2
    • /
    • pp.151-168
    • /
    • 1999
  • The objective of this study is to investigate the effects of different meeting modes and task types on the outcomes of group decision making. The hypotheses postulate the potential effects of different meeting modes on appropriation process; different meeting modes on group outcomes; and the appropriation process on group outcomes. A laboratory experiment was conducted. A GSS was developed using Lotus Notes for this experiment. The results provide partial support for the hypotheses derived from the theoretical model. The interaction effects between meeting modes and tasks are not always observed in the analyses. However, groups using a face-to-face meeting mode in negotiation task reach significantly higher levels of perceived outcome quality, of satisfaction with the outcome, and of satisfaction with the process than groups using a dispersed-synchronous meeting mode. It suggests that a face-to-face meeting mode can enhance the effectiveness of groups working on a negotiation task such as stakeholder analysis. Furthermore, the manner in which groups appropriate the technology significantly influence the group performance. The results support the validity and usefulness of the IRT and the AST as a GSS research framework.

  • PDF

A Study on the Subject Selection of VE Using Decision Weights Techniques (VE 대상선정을 위한 평가항목의 가중치결정방법에 관한 연구)

  • Yun, Dong-Jin;Sin, Byung-Yoon;Jeong, Yong-Sik;Lee, Sang-Beom
    • Journal of the Korea Institute of Building Construction
    • /
    • v.5 no.3 s.17
    • /
    • pp.83-90
    • /
    • 2005
  • Was used at step space-time mainly after VE technique sponsors in domestic in the 1960s but have been expanded to design step recently. Possibility of value elevation or cost reduction must choose member that is effectively for active and effective application of VE technique. In this study, when enforce design VE examining for weight decision corrosion protection been using in weight grant composition estimation technique, target choice process wishes to suggest formality and method that can be achieved effectively Main conclusion of this study sorts valuation items step by step for weight appropriation of valuation basis and give point on article of high position point after expert which employer is included estimates article by low rank step and this presented high position method that do union item by item and establishes by item weight. Did these techniques for giving weights so that importance for weight appropriation developed estimation program, and data save of target estimation standard and target estimation standard is possible using straight sit.