• Title/Summary/Keyword: faithfulness of appropriation

Search Result 14, Processing Time 0.021 seconds

The Effect of Group Efficacy on the Appropriation Process and User Satisfaction in Knowledge Management Systems (집단효능감이 지식경영시스템 사용자의 전유과정과 만족에 미치는 영향)

  • Ryu, Il;Kim, Jae-jon;Roe, Hee-ok
    • Knowledge Management Research
    • /
    • v.9 no.3
    • /
    • pp.141-158
    • /
    • 2008
  • This study introduces the construct of group efficacy and combines the construct with the Adaptive Structuration Theory(AST) and user satisfaction framework. Job efficacy and IT efficacy identified as the dimensions of group efficacy are hypothesized to influence faithfulness of appropriation and consensus on appropriation. and then the user satisfaction of knowledge management systems(KMS). Data were collected through a survey of respondents who have the experience of using KMS, and analyzed by using structural equations modelling. The major findings of this study are as follows: First, job efficacy was found to have a positive influence on consensus on appropriation and user satisfaction. Second, IT efficacy was found to have a positive effect on faithfulness of appropriation and consensus on appropriation. Third, faithfulness of appropriation was found to have a positive influence on consensus on appropriation and user satisfaction. Implications of these findings are discussed for researchers and practitioners.

  • PDF

Moderation Effects of Computer Self-efficacy on the Relationship among Variables for Appropriation in using IT (정보기술 사용 전유에 관한 변수들 간의 관계에서 컴퓨터자기효능감의 조절효과)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.18 no.1
    • /
    • pp.25-46
    • /
    • 2009
  • According to adaptive structuration theory, faithfulness of appropriation(FOA), and consensus on appropriation(COA) are variables for measuring appropriation in use of IT. FOA is the level of interpreting and using the intentions of the IT designers objectively and COA is the level of agreement on ways of using IT among or with user group independently of designers' intention. In traditional theories of IT adoption, computer self-efficacy(CSE), self evaluation on abilities of using computer, has been considered as one of the important individual differences. which would influence on beliefs of using IT. Therefore, considering the relationship among CSE, FOA, COA and attitude, we can hypothesize that CSE would play a moderation varaible among appropriation related variables relationships, FOA-attitude and COA-attitude. The objective of this study is an analysis of CSE's moderation effects in causality relationship among appropriation measuring variables. For this purpose, we propose a research model where there are four hypotheses for moderation effects of CSE on the relationships between appropriation variables. We test these hypotheses by sampling ERP and groupware users. In result, our proposed hypotheses except moderation effect of COA-usefulness are accepted. Main contribution of this study is to identify the relationship between CSE and AST. This study implies that very careful consideration of users' CSE is necessary in order to perform managerial activities based on FOA and COA in IT management department.

The Influence of Appropriation and on Performance in Online Game: Focusing on MMORPG (온라임 게임의 전유가 게임 성과에 미치는 영향 : 대규모 다중사용자 온라인 역할수행게임을 중심으로)

  • Lee, Woong-Kyu;Kwon, Jeong-Il
    • Asia pacific journal of information systems
    • /
    • v.16 no.4
    • /
    • pp.103-119
    • /
    • 2006
  • One of the most important reasons for using online game is intrinsic motivation which relates the drive to perform a behavior for perceptions of pleasure and satisfaction from the behavior itself. Therefore, most studies for using online game have been based on theories for intrinsic motivation such as flow. However, such theories have some limitations for explaining social aspects of online games such as Massively Multiplayer Online Role Game (MMORPG), which provides a society for game players by using a virtual space for playing games so called 'persistent world'. Adaptive structuration theory (AST) is one of trying to capture the change of using IT due to social interactions between users and system. In order to explain online game players' behavior considering social interaction, we suggest a research model based on AST. Our model aims to investigate the relationship between appropriation which is determined by faithfulness of appropriation (FOA) and consensus on appropriation (COA) and performance which is represented by the relationship among perceived winning, flow, and intention of reuse. An empirical test of our model for 125 MMORPG users which is analyzed by Partial Least Square method shows very satisfactory and interesting results. While hypotheses suggested in our model are supported, the influence of COA on game performance is shown to be stronger than that of FOA.

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

The Influence Factors on Usage and Performance of Group Support System (GSS 사용과 성과 요인 : TAM, TTF, 조직구조화이론(AST) 혼합모형)

  • Kang, So-Ra;Yang, Hee-Dong;Park, Hyun-Yoe
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.63-87
    • /
    • 2008
  • This study investigates the effects of individual and group level factors on the use of GSS (Group Support System) and task performance from GSS use. GSS facilitates the group work, so that GSS adoption is not necessarily influenced only by individual perceptions on information systems as TAM insists. Adaptive Structuration. Theory (AST) joins with TAM in our study to explain the adoption and success from GSS use. AST contends that the success of IS is not necessarily the technical fit between tasks and technology, instead the political outcome among user socializations. We found that collected data from 303 individual IT staffs in a national bank. Our results demonstrate that traditional theories on TAM (Technology Acceptance Model) need to be refined, when considering the TTF(task-technology fit). TTF render high influences on PU(perceived usefulness). PEU(perceived ease of use) and FOA(faithfulness on appropriation). And FOA influences highly on our dependent variable. Implications and directions for future research are discussed.

An Influence of Appropriation on Intrinsic and Extrinsic Motivation with Ease of Use in Using Information Technology : Focus on Blog Users (정보기술 사용에서의 전유가 내재적/외재적 동기 및 사용용이성에 미치는 영향 : 블로그 사용자들을 중심으로)

  • Lee, Woong-Kyu
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.33 no.1
    • /
    • pp.131-148
    • /
    • 2008
  • Today, it is not difficult to use information technology (IT), especially, Internet based ones. Many people can not only access IT without learning how to use it but also find and develop new techniques and usages which couldn't be expected by system engineers or designers. This is owing to social interactions among users as well as advancement of IT. Theoretically, such social interactions in using IT can be well explained by adaptive structuration theory (AST) which has been considered as one of trying to capture the change of using IT due to social interactions between users and system. This study is to analyze the relationship between social interactions and motivation in using IT which can determine attitude and intention of using IT. For this purpose we provide a research model, in which two AST related variables, faithfulness of appropriation and consensus on appropriation, are independent variables and three beliefs for using IT, usefulness, ease of use and playfulness, are dependent ones. Additionally, for reflection of changing uses, usefulness is formed as second order factor by two first order factors-usefulness of self-expression and communication. An empirical test of our model for blog users which is analyzed by Partial Least Square method shows supporting most of hypotheses except one, consensus-ease of use.

Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy (정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로)

  • Oh, Jinwouk;Baek, Seung Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.15-31
    • /
    • 2020
  • This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

The Effects of Fit and Social Construction on Individual Performance

  • Im, Ghi-Young
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.29-34
    • /
    • 2008
  • This study examines the effects of information and communication technologies on individual performance. The literature has paid a considerable amount of attention to social influence as a determinant of individual behavior. We combine task-technology fit with concepts from adaptive structuration theory to specify social influence. In our model, we suggest that individuals should receive support from proper social construction to have additional performance improvement. Empirical data from 317 individuals across 43 teams in 10 companies is used to assess the theoretical model. Our theoretical model received support from the data.

  • PDF

The Effect of IT Department Service Quality on Appropriateness of Information System (IT관리부서의 서비스 품질이 정보시스템의 전유에 미치는 영향)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.16 no.1
    • /
    • pp.159-178
    • /
    • 2007
  • As generalization of using PC and the Internet information technology (IT) users in organizations are not passive clients but active producers of information services. One of the reasons for the change of users' role is social interactions with other users and IT department staffs. That is, users can find and develop new functions and usefulness of IT, especially, Web-based ones through communication with other users or IT department staffs. The objective of this study is to investigate the relationship between IT department service quality and social interactions with other users. For this purpose, we suggest a research model based on adaptive structuration theory (AST), which is to explain the changes in social structure (rules and resources) of IT by social interactions, as well as service quality theory. Our model's exogenous variable is service quality which is a second-order factor consisting of reliability, responsiveness, assurance, and empathy. As endogenous variables, we adopt two variables for appropriateness of using IT, faithfulness of appropriation and consensus on appropriation. Finally, dependent variables of ow model are usefulness and ease of use which can be considered as attitude on IT as well as other variables for appropriateness. For empirical test our model is applied to users of groupware and ERP in organizations and analyzed by partial least square. In result, all hypotheses suggested in our model are supported statistically.

  • PDF

Importance of End User's Feedback Seeking Behavior for Faithful Appropriation of Information Systems in Small and Medium Enterprises (중소기업 환경에서의 합목적적 정보시스템 활용을 위한 최종사용자 피드백 탐색행위의 중요성)

  • Shin, Young-Mee;Lee, Joo-Ryang;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.61-95
    • /
    • 2007
  • Small-and-medium sized enterprises(SMEs) represent quite a large proportion of the industry as a whole in terms of the number of enterprises or employees. However researches on information system so far have focused on large companies, probably because SMEs were not so active in introducing information systems as larger enterprises. SMEs are now increasingly bringing in information systems such as ERP(Enterprise Resource Planning Systems) and some of the companies already entered the stage of ongoing use. Accordingly, researches should deal with the use of information systems by SME s operating under different conditions from large companies. This study examined factors and mechanism inducing faithful appropriation of information systems, in particular integrative systems such as ERP, in view of individuals` active feedback-seeking behavior. There are three factors expected to affect end users` feedback-seeking behavior for faithful appropriation of information systems. They are management support, peer IT champ support, and IT staff support. The main focus of the study is on how these factors affect feedback-seeking behavior and whether the feedback-seeking behavior plays the role of mediator for realizing faithful appropriation of information systems by end users. To examine the research model and the hypotheses, this study employed an empirical method based on a field survey. The survey used measurements mostly employed and verified by previous researches, while some of the measurements had gone through minor modifications for the purpose of the study. The survey respondents are individual employees of SMEs that have been using ERP for one year or longer. To prevent common method bias, Task-Technology Fit items used as the control variable were made to be answered by different respondents. In total, 127 pairs of valid questionnaires were collected and used for the analysis. The PLS(Partial Least Squares) approach to structural equation modeling(PLS-Graph v.3.0) was used as our data analysis strategy because of its ability to model both formative and reflective latent constructs under small-and medium-size samples. The analysis shows Reliability, Construct Validity and Discriminant Validity are appropriate. The path analysis results are as follows; first, the more there is peer IT champ support, the more the end user is likely to show feedback-seeking behavior(path-coefficient=0.230, t=2.28, p<0.05). In other words, if colleagues proficient in information system use recognize the importance of their help, pass on what they have found to be an effective way of using the system or correct others' misuse, ordinary end users will be able to seek feedback on the faithfulness of their appropriation of information system without hesitation, because they know the convenience of getting help. Second, management support encourages ordinary end users to seek more feedback(path-coefficient=0.271, t=3.06, p<0.01) by affecting the end users' perceived value of feedback(path-coefficient=0.401, t=6.01, p<0.01). Management support is far more influential than other factors that when the management of an SME well understands the benefit of ERP, promotes its faithful appropriation and pays attention to employees' satisfaction with the system, employees will make deliberate efforts for faithful appropriation of the system. However, the third factor, IT staff support was found not to be conducive to feedback-seeking behavior from end users(path-coefficient=0.174, t=1.83). This is partly attributable to the fundamental reason that there is little support for end users from IT staff in SMEs. Even when IT staff provides support, end users may find it less important than that from coworkers more familiar with the end users' job. Meanwhile, the more end users seek feedback and attempt to find ways of faithful appropriation of information systems, the more likely the users will be able to deploy the system according to the purpose the system was originally meant for(path-coefficient=0.35, t=2.88, p<0.01). Finally, the mediation effect analysis confirmed the mediation effect of feedback-seeking behavior. By confirming the mediation effect of feedback-seeking behavior, this study draws attention to the importance of feedback-seeking behavior that has long been overlooked in research about information system use. This study also explores the factors that promote feedback-seeking behavior which in result could affect end user`s faithful appropriation of information systems. In addition, this study provides insight about which inducements or resources SMEs should offer to promote individual users' feedback-seeking behavior when formal and sufficient support from IT staff or an outside information system provider is hardly expected. As the study results show, under the business environment of SMEs, help from skilled colleagues and the management plays a critical role. Therefore, SMEs should seriously consider how to utilize skilled peer information system users, while the management should pay keen attention to end users and support them to make the most of information systems.