[PDF] Three Essays On Users Reactions To Information Technology - eBooks Review

Three Essays On Users Reactions To Information Technology


Three Essays On Users Reactions To Information Technology
DOWNLOAD

Download Three Essays On Users Reactions To Information Technology PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Three Essays On Users Reactions To Information Technology book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page





Three Essays On Users Reactions To Information Technology


Three Essays On Users Reactions To Information Technology
DOWNLOAD
Author : Fatou Bagayogo
language : en
Publisher:
Release Date : 2014

Three Essays On Users Reactions To Information Technology written by Fatou Bagayogo and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2014 with categories.


"Although the extant literature has brought important insight to the study of individual users' reactions to information technology (IT), some limitations remain. Indeed, few studies theorize specifically about the IT artifact and incorporate these theories in the study of IT use. Also, the literature is dominated by an underlying assumption that acceptance of IT is favorable while resistance to IT is unfavorable. Another limitation is that this literature largely adopts a lean conceptualization of IT use and lacks a focus on the process of IT use (e.g. the process by which individuals make new uses of IT features). This dissertation tries to address these limitations and sheds light on important themes related to users' reactions to IT.Our first essay studies users' perceptions with regards to the modifications to an IT that occur after its implementation. Although these modifications potentially influence IT use and its impacts, they have hardly been studied from the end user's perspective. We propose and validate an artifact-focused measure of perceptions of IT modifications based on whether or not a user considers that the changes add new functionalities, improve existing functionalities, remove parts of the system, improve compatibility with other technologies and/or improve the system's speed and reliability. Our proposed measure contributes to studying users' reactions to IT, by focusing on the IT artifact; it also paves the way for further research on the very important and increasingly pervasive phenomenon of IT evolution.Our second essay proposes a framework that focuses on acceptance and resistance, and investigates the diverse set of IT- related behaviors and impacts that may be associated with them. It uncovers nuances obscured by the fact that these variables are generally considered separately, and in abstraction of the organizational context of use. With the concept of organizational intent, we show that resistance and employees' deviation from organizational IT use mandates sometimes benefit the organization. At the same time, acceptance and compliance with organizational IT use mandates may, at times, have adverse consequences. We also highlight scenarios under which employees and organizations can challenge these mandates to enable more favorable impacts. The last essay is an in-depth study of the process of using IT features in new ways, which we call 'enhanced use'. Based on interview data, we identify distinct patterns of enhanced use and the ways these patterns are influenced by task, user and system-related variables. We argue that the locus of innovation for enhanced use often differs according to the analyzability of the task and the type of system used. Also, the extent of substantive use involved in enhanced use depends largely on the complexity of the task at hand and on the IT-related knowledge used. Finally, our analysis suggests that the degree of task interdependencies and the type of system used are often associated with different patterns of adaptation for enacting enhanced use. Overall, we contribute a broad sketch of the interplay between the task-, IT- and knowledge-related variables that shape patterns of features adoption, use and extension after an IT is adopted.In sum, this dissertation enriches the research on users' reactions to IT. It focuses on important themes related to IT use including users' perceptions of IT changes, the impacts of different IT-related behaviors and the process of making new uses of IT features." --



Three Essays On Behavioral Aspects Of Information Systems


Three Essays On Behavioral Aspects Of Information Systems
DOWNLOAD
Author : Sangmi Chai
language : en
Publisher:
Release Date : 2009

Three Essays On Behavioral Aspects Of Information Systems written by Sangmi Chai and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2009 with categories.


In the information age, it is important to investigate information systems in relationship to society, in general, and various user groups, in particular. Since information technology requires interactions between people and their social structure, research in information system usage behavior needs to be based on a deep understanding of the interrelation between the technology and the social environment of the user. This dissertation adopts a socio-technical approach in order to better explore the role of information technology in the important research issues of online privacy and information assurance. This dissertation consists of three essays. The first essay investigates factors that affect the career decisions of cyber security scholars. In the recent past, cyber security has become a critical area in the Information Technology (IT) field, and the demand for such professionals has been increasing tremendously.^However, there is a shortage of qualified personnel, which is a factor that contributes greatly to the society's vulnerability to various cyber threats. To date, there is no academic extent research regarding the cyber security workforce and their career decisions. Based on the theories of planned behavior and self-efficacy, our study articulates a model to explain career selection behavior in the cyber security field. To provide validity for the proposed conceptual framework, we undertook a comprehensive empirical investigation of Scholarship for Service (SFS) Scholars who are funded by the National Science Foundation and who are studying information assurance and computer security in universities. The results of this research have implications for retaining a qualified workforce in the computer and information security fields. The second essay explores internet users' online privacy protection behavior.^Information security and privacy on the Internet are critical issues in our society. In this research, factors that influence internet users' private information sharing behavior were examined. Based on a survey of two of the most vulnerable groups on the web, 285 pre- and early teens, this essay provides a research framework that explains in the private information sharing behavior of Internet users. According to our study results, Internet users' information privacy behaviors are affected by two significant factors: the perceived importance of information privacy and information privacy self-efficacy. It was also found that users' belief in the value of online information privacy and information privacy protection behavior varies by gender. Our research findings indicate that educational opportunities regarding Internet privacy and computer security as well as concerns from other reference groups (e.g.^peers, teachers, and parents) play an important role in positively affecting Internet users' protective behavior toward online privacy. The third essay investigates knowledge sharing in the context of blogs. In the information age, web 2.0 technology is receiving growing attention as an innovative way to share information and knowledge. This study articulates a model, which enables the understanding of bloggers' knowledge sharing practices. It identifies and describes the factors affecting their knowledge sharing behavior in online social networks. The analysis of 446 surveys indicates that bloggers' trust, strength of social ties and reciprocity all have a positive impact on their knowledge sharing practices. Their online information privacy concerns, on the other hand, have a negative impact on their knowledge sharing behavior. More importantly, the amount of impact for each factor in knowledge sharing behavior varies by gender .^The research results contribute toward an understanding of the successful deployment of web 2.0 technologies as knowledge management systems and provide useful insights into understanding bloggers' knowledge sharing practices in online communities.



An Investigation Of The Dark Side Of Information Technology Use


An Investigation Of The Dark Side Of Information Technology Use
DOWNLOAD
Author : Seyed Eshagh Ashraf Vaghefi
language : en
Publisher:
Release Date : 2016

An Investigation Of The Dark Side Of Information Technology Use written by Seyed Eshagh Ashraf Vaghefi and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2016 with categories.


"Despite the overwhelming number of studies on Information Technology (IT) use and adoption, there is a growing concern among researchers in psychology, health, and IS that problematic IT usage can create serious challenges for individuals, organizations, and even society. Hence, there is a need to devote additional research efforts to better understand the dark side of IT use and to identify undesired forms of IT use, especially in regard to excessive and compulsive use behaviors. From this perspective, this dissertation adopts a multi-method, multi-essay approach to investigate issues related to IT addiction. Accordingly, the first essay investigates users' liability to IT addiction and looks at its variations among IT users. Based on data collected from in-depth interviews and exploratory open-ended surveys from smartphone users, the results allow the identification of five main types of user liability with unique usage behaviors: Addict, Fanatic, Highly Engaged, Regular, and Thoughtful. The second essay proposes a process model to explain the development of IT addiction. Using qualitative data collected from both smartphones and social network users and following a grounded theory approach, we propose a three-phase model to explain how IT addiction develops through interactions between users, technology, and environment (using technology affordances). Finally, the third essay focuses on technology craving. More precisely, we aim at explaining technology craving by discussing users' motivations and the needs that are being fulfilled by technology use. From a review of the literature, we develop a conceptual model that highlights the role of key users' needs in relation to craving in the context of social networks and the interactions between the structural features of technology and users' needs as a way to predict social network craving. " --



Essays On An Ecological Approach To User Technology Interaction


Essays On An Ecological Approach To User Technology Interaction
DOWNLOAD
Author : Mostafa Mesgari
language : en
Publisher:
Release Date : 2016

Essays On An Ecological Approach To User Technology Interaction written by Mostafa Mesgari and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2016 with categories.


This thesis consists of three essays that propose an ecological approach to look into various aspects of user-technology interaction. The overarching theme of the thesis is the role of the technological artifact in how technology is understood and adapted by users in organizations. Organizing is the social process of achieving goals, and it is always tied to the way people understand and adapt to their environment, including the information technology in that environment. The way people make sense of new technology in organizations and adapt it into their work routines brings extensive consequences to organizations. Despite the extensive body of literature examining the social and cognitive aspects of user sensemaking and adaptation to technology, there is little known about the role of the technological artifact in shaping user sensemaking and adaptation to new technology. The first essay reviews and synthesizes the extant literature on how people understand technological phenomena in organizations. Then it highlights the three shortcomings of existing sensemaking research: the neglect of the role of the IT artifact, of the discovery part of perception, and of the role of the individual action. There is limited understanding on the role that the material artifact plays in shaping users’ sensemaking of new technology, as well as how users’ actions affect their sensemaking. Moreover, the literature mostly neglects the discovery aspect of sensemaking, that is, the perception of the meaning already available rather than creating new meaning to rationalize users’ experiences. To address these issues, this essay provides a thorough review of literature on organization-technology sensemaking and synthesizes our current understanding of the phenomenon. Then it analyzes the major shortcomings in our knowledge and highlights the need to address those shortcomings. It subsequently discusses an ecological approach consistent with the tenets of critical realism that can address some of the existing shortcomings. The paper also offers some key implications of the ecological approach for research and practice. The second essay addresses the role of the technological artifact in shaping users’ understanding of technology (i.e. technology sensemaking). It proposes an ecological approach to technology sensemaking that focuses on the relation between users’ perception of technology and the technological features to which they adapt. Moreover, it advances Information Systems (IS) research by providing new conceptual and analytical tools to examine the role of the IT artifact in IS research. To empirically illustrate the proposed approach and suggested methodology, we report the findings of an empirical study that applies and validates the framework. The third essay focuses on the patterns of user adaptation to the technological artifact to contribute to research on user-centred system development. For more than a decade, the persona technique has been used in interface design practices to put user needs and preferences at the centre of all development decisions. A persona is a fictional character that represents potential users and what they want to accomplish. Persona development teams draw on qualitative or quantitative user data to develop representative personas. Despite the benefits of both approaches, qualitative methods are limited mostly by the cognitive capabilities of the persona developers, whereas quantitative methods lack contextual richness. To gain the advantages of both approaches, this essay suggests a mixed-methods approach to create user personas based on the patterns of affordances they actualize, rather than merely on the actions they take. It enriches personas by referring to the purposes fulfilled through affordance actualizations and grounds personas in readily available objective log data. This essay illustrates the practical value of the proposed methodology by empirically creating personas based on real user data. It also creates quantitative-only personas, presents independently developed qualitative-only personas, and compares them to the affordance-based personas to demonstrate the advantages of the suggested method. The three essays together suggest and empirically illustrate an ecological approach to examine the role of the IT artifact in users’ sensemaking of and adaptation to new technology. They contribute to research and practice by a) proposing the theoretical and analytical tools needed to examine users’ sensemaking of technology in relation to their adaptation to the IT artifact, and b) suggesting the mixed-methods technique to create user personas based on the patterns of affordance actualization by users.



Anthropomorphic Conversational Agents And User Trust


Anthropomorphic Conversational Agents And User Trust
DOWNLOAD
Author : Anna-Maria Seeger
language : en
Publisher:
Release Date : 2021*

Anthropomorphic Conversational Agents And User Trust written by Anna-Maria Seeger and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2021* with categories.




How Users Matter


How Users Matter
DOWNLOAD
Author : Nelly Oudshoorn
language : en
Publisher: MIT Press
Release Date : 2005-08-12

How Users Matter written by Nelly Oudshoorn and has been published by MIT Press this book supported file pdf, txt, epub, kindle and other format this book has been release on 2005-08-12 with Technology & Engineering categories.


Users have become an integral part of technology studies. The essays in this volume look at the creative capacity of users to shape technology in all phases, from design to implementation. Using a variety of theoretical approaches, including a feminist focus on users and use (in place of the traditional emphasis on men and machines), concepts from semiotics, and the cultural studies view of consumption as a cultural activity, these essays examine what users do with technology and, in turn, what technology does to users. The contributors consider how users consume, modify, domesticate, design, reconfigure, and resist technological development—and how users are defined and transformed by technology. The essays in part I show that resistance to and non-use of a technology can be a crucial factor in the eventual modification and improvement of that technology; examples considered include the introduction of the telephone into rural America and the influence of non-users of the Internet. The essays in part II look at advocacy groups and the many kinds of users they represent, particularly in the context of health care and clinical testing. The essays in part III examine the role of users in different phases of the design, testing, and selling of technology. Included here is an enlightening account of one company's design process for men's and women's shavers, which resulted in a "Ladyshave" for users assumed to be technophobes. Taken together, the essays in How Users Matter show that any understanding of users must take into consideration the multiplicity of roles they play—and that the conventional distinction between users and producers is largely artificial.



Information Technology For The Social Scientist


Information Technology For The Social Scientist
DOWNLOAD
Author : Ray Lee University of London.
language : en
Publisher: Routledge
Release Date : 2014-05-01

Information Technology For The Social Scientist written by Ray Lee University of London. and has been published by Routledge this book supported file pdf, txt, epub, kindle and other format this book has been release on 2014-05-01 with Social Science categories.


Accessible and practical overview to help social reseachers make the most of information technology in relation to research design and selection, management and analysis of research data. The book pinpoints current and future trends in computer-assisted methods.; This book is intended for postgraduate and undergraduate social research methods courses and professional social researchers in sociology, social policy and administration, social psychology and geography. Particular appeal to courses in computer applications for social scientists and researchers.



The Vuca Effects Product Innovation Performance At Turkish Global Bus Coach Industry


The Vuca Effects Product Innovation Performance At Turkish Global Bus Coach Industry
DOWNLOAD
Author : Erkan DONER
language : en
Publisher: Akademisyen Kitabevi
Release Date : 2022-06-02

The Vuca Effects Product Innovation Performance At Turkish Global Bus Coach Industry written by Erkan DONER and has been published by Akademisyen Kitabevi this book supported file pdf, txt, epub, kindle and other format this book has been release on 2022-06-02 with Technology & Engineering categories.




Programming On Purpose Iii


Programming On Purpose Iii
DOWNLOAD
Author : P. J. Plauger
language : en
Publisher: Prentice Hall
Release Date : 1993

Programming On Purpose Iii written by P. J. Plauger and has been published by Prentice Hall this book supported file pdf, txt, epub, kindle and other format this book has been release on 1993 with Computers categories.


This collection of essays drawn from Plauger's popular "Programming on Purpose" column in the magazine Computer Language, focuses on the technology of writing computer software. Plauger's style is clear without being simplistic, reducing complex themes to bite-size chunks. KEY TOPICS: Covers a number of important technical themes such as computer arithmetic, approximating math functions, human perception and artificial intelligence, encrypting data and clarifying documentation.



Three Essays On Computer And Internet Use At Home


Three Essays On Computer And Internet Use At Home
DOWNLOAD
Author : Tadesse Biru Wodajo
language : en
Publisher:
Release Date : 2008

Three Essays On Computer And Internet Use At Home written by Tadesse Biru Wodajo and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2008 with Digital divide categories.


This dissertation consists of three essays on computer and Internet (CI) use in the United States households. Surveys show that the adoption and use of these two technologies at home have been steadily increasing over time. In addition to providing information regarding the use of CI at home, the essays seek to address a number of issues. The first essay investigates the factors that determine the probability of owning a home CI and those influencing the intensity of use by employing the double-hurdle model. The double-hurdle estimation reveals that the use of a home CI is governed by two distinct decisions: the decision to acquire CI and the decision on the level of use. The estimation results also show that these two separate decisions are determined by different sets of factors. The second essay develops a theoretical model that incorporates CI use in a representative individual's preference function and examines whether the use of CI at home produces any time displacement effects on the allocation of time for market work, household production, and leisure. The study is based on the conceptual framework that the use of technological innovations at home changes the existing patterns of individuals' time allocation behavior. Empirical estimations are also employed to determine the net impacts of the parameters of the model on the choice variables under investigation. The third essay explores the dissemination of home computers and access to home Internet among various social groups in the United States, the inequalities observed among each group (known as the digital divide), the trends the groups exhibit in the acquisition of these technologies over time, and the factors contributing to these disparities. The study focuses on the digital divide observed among three demographic groups (race, ethnicity and gender) in the period 1997-2003. The digital gaps for blacks and Hispanics (compared to whites and non-Hispanics, respectively) are relatively big and slow a rising trend over time. The gender digital gap is relatively small and shows a slight declining trend. A variant of the Blinder-Oaxaca decomposition technique is employed to identify and quantify the factors that contribute to the digital gaps.