Skip to main content
Top
Published in: Information Systems Frontiers 4/2019

11-09-2017

Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis

Authors: Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno, Karlheinz Kautz

Published in: Information Systems Frontiers | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

IT consumerization, or the end-user’s adoption of consumer IT for work purpose, is an emerging topic which recently attracted the attention of researchers and practitioners. This research adopted social network analysis techniques to investigate the determinants of the social influence that resulted in IT consumerization, as well as the structural features of such influence’s network. By testing theoretically-based hypotheses with the exponential random graph modeling approach, our findings suggested that IT consumerization’s influence tended to occur between employees in the same department, coming especially from those who frequently gave work advice, life advice, and organizational updates to others, as well as those who were trusted for expertise by colleagues. The research revealed that IT consumerization’s influence was highly transitive, hierarchical, and non-reciprocal. The research concluded by elaborating future directions about the adoption of social network analysis techniques in technology adoption research, as well as practical recommendations about harnessing the determinants of such influence to manage IT consumerization.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems, 8(4), 244–254.CrossRef Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems, 8(4), 244–254.CrossRef
go back to reference Bastian, M., Heymann, S., & Jacomy, M. (2009). Gephi: An open source software for exploring and manipulating networks. In International AAAI Conference on Weblogs and Social Media. Bastian, M., Heymann, S., & Jacomy, M. (2009). Gephi: An open source software for exploring and manipulating networks. In International AAAI Conference on Weblogs and Social Media.
go back to reference Borgatti, S. P., & Foster, P. (2003). The network paradigm in organizational research: A review and typology. Journal of Management, 29(6), 991–1013.CrossRef Borgatti, S. P., & Foster, P. (2003). The network paradigm in organizational research: A review and typology. Journal of Management, 29(6), 991–1013.CrossRef
go back to reference Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks. Thousand Oaks: Sage Publications Ltd.. Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks. Thousand Oaks: Sage Publications Ltd..
go back to reference Davis, J. A. (1970). Clustering and hierarchy in interpersonal relations: Testing two graph theoretical models on 742 Sociomatrices. American Sociological Review, 35(5), 843–851.CrossRef Davis, J. A. (1970). Clustering and hierarchy in interpersonal relations: Testing two graph theoretical models on 742 Sociomatrices. American Sociological Review, 35(5), 843–851.CrossRef
go back to reference Dernbecher, S., Beck, R., & Weber, S. (2013). Switch to your own to work with the known: An empirical study on consumerization of IT. In 19th Americas Conference on Information Systems (pp. 1–10). Dernbecher, S., Beck, R., & Weber, S. (2013). Switch to your own to work with the known: An empirical study on consumerization of IT. In 19th Americas Conference on Information Systems (pp. 1–10).
go back to reference Dong, S., & Yang, X. (2009). An improved motivation model for people behaviors change in virtual communities based on social cognitive theory. In 2009 1st International Conference on Information Science and Engineering, ICISE 2009 (pp. 2274–2277). doi:https://doi.org/10.1109/ICISE.2009.277. Dong, S., & Yang, X. (2009). An improved motivation model for people behaviors change in virtual communities based on social cognitive theory. In 2009 1st International Conference on Information Science and Engineering, ICISE 2009 (pp. 2274–2277). doi:https://​doi.​org/​10.​1109/​ICISE.​2009.​277.
go back to reference French, J. R., Raven, B., & Cartwright, D. (1959). The bases of social power. Classics of organization theory, 7, 311–320. French, J. R., Raven, B., & Cartwright, D. (1959). The bases of social power. Classics of organization theory, 7, 311–320.
go back to reference Gallivan, M. J., Spitler, V. K., & Koufaris, M. (2005). Does information technology training really matter? A social information processing analysis of coworkers’ influence on IT usage in the workplace. Journal of Management Information Systems, 22(1), 153–192.CrossRef Gallivan, M. J., Spitler, V. K., & Koufaris, M. (2005). Does information technology training really matter? A social information processing analysis of coworkers’ influence on IT usage in the workplace. Journal of Management Information Systems, 22(1), 153–192.CrossRef
go back to reference Handcock, M. S., Raftery, A. E., & Tantrun, J. M. (2007). Model-based clustering for social networks. Journal of the Royal Statistical Society: Series A (Statistics in Society), 170(2), 301–354.CrossRef Handcock, M. S., Raftery, A. E., & Tantrun, J. M. (2007). Model-based clustering for social networks. Journal of the Royal Statistical Society: Series A (Statistics in Society), 170(2), 301–354.CrossRef
go back to reference Harris, J., Ives, B., & Junglas, I. (2011b). IT consumerization: When gadgets turn into Enterprise IT tools. MIS Quarterly Executive, 10(2), 115–117. Harris, J., Ives, B., & Junglas, I. (2011b). IT consumerization: When gadgets turn into Enterprise IT tools. MIS Quarterly Executive, 10(2), 115–117.
go back to reference Hatala, J.-P., & Lutta, J. G. (2009). Managing information sharing within an organizational setting: A social network perspective. Performance Improvement Quarterly, 21(4), 5–33.CrossRef Hatala, J.-P., & Lutta, J. G. (2009). Managing information sharing within an organizational setting: A social network perspective. Performance Improvement Quarterly, 21(4), 5–33.CrossRef
go back to reference Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). Ergm: A package to fit, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 1–29.CrossRef Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). Ergm: A package to fit, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 1–29.CrossRef
go back to reference Kirlappos, I., Parkin, S., & Sasse, M. A. (2014). Learning from “shadow security”: Why understanding non-compliant behaviors provides the basis for effective security. In USEC’14 Workshop on Usable Security. Kirlappos, I., Parkin, S., & Sasse, M. A. (2014). Learning from “shadow security”: Why understanding non-compliant behaviors provides the basis for effective security. In USEC’14 Workshop on Usable Security.
go back to reference Leenders, R. T. A. J. (2002). Modeling social influence through network autocorrelation: Constructing the weight matrix. Social Networks, 24(1), 21–47.CrossRef Leenders, R. T. A. J. (2002). Modeling social influence through network autocorrelation: Constructing the weight matrix. Social Networks, 24(1), 21–47.CrossRef
go back to reference Lewis, W., Agarwal Robert Smith, R. H., & Sambamurthy Eli, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly, 27(4), 657–678.CrossRef Lewis, W., Agarwal Robert Smith, R. H., & Sambamurthy Eli, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly, 27(4), 657–678.CrossRef
go back to reference Lusher, D., Koskinen, J., & Robins, G. (2012). Exponential random graph models for social networks: Theory, methods, and applications. New York: Cambridge University Press.CrossRef Lusher, D., Koskinen, J., & Robins, G. (2012). Exponential random graph models for social networks: Theory, methods, and applications. New York: Cambridge University Press.CrossRef
go back to reference Niehaves, B., Köffer, S., & Ortbach, K. (2012). IT consumerization – a theory and practice review. In 18th Americas Conference on Information Systems (AMCIS). Niehaves, B., Köffer, S., & Ortbach, K. (2012). IT consumerization – a theory and practice review. In 18th Americas Conference on Information Systems (AMCIS).
go back to reference Rogers, E. M. (1995). Diffusion of innovations (3rd ed.). New York: The Free Press. Rogers, E. M. (1995). Diffusion of innovations (3rd ed.). New York: The Free Press.
go back to reference Sykes, T., Venkatesh, V., & Gosain, S. (2009). Model of acceptance with peer support: A social network perspective to understand employees’ system use. MIS Quarterly, 33(2), 371–393.CrossRef Sykes, T., Venkatesh, V., & Gosain, S. (2009). Model of acceptance with peer support: A social network perspective to understand employees’ system use. MIS Quarterly, 33(2), 371–393.CrossRef
go back to reference ten Kate, S., Haverkamp, S., & Feldberg, F. (2010). Social network influences on technology acceptance : A matter of tie strength, centrality and density. In 23rd Bled eConference eTrust (pp. 18–32). ten Kate, S., Haverkamp, S., & Feldberg, F. (2010). Social network influences on technology acceptance : A matter of tie strength, centrality and density. In 23rd Bled eConference eTrust (pp. 18–32).
go back to reference Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(2), 452–478. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(2), 452–478.
go back to reference Weeger, A., & Gewald, H. (2014). Factors influencing future employees decision-making to participate in a BYOD program: Does risk matter? In 22nd European Conference on Information Systems (ECIS) (pp. 1–14). Weeger, A., & Gewald, H. (2014). Factors influencing future employees decision-making to participate in a BYOD program: Does risk matter? In 22nd European Conference on Information Systems (ECIS) (pp. 1–14).
go back to reference White, M. (2012). Digital workplaces: Vision and reality. Business Information Review, 29(4), 205–214.CrossRef White, M. (2012). Digital workplaces: Vision and reality. Business Information Review, 29(4), 205–214.CrossRef
go back to reference Zheng, K., Padman, R., Krackhardt, D., Johnson, M. P., & Diamond, H. S. (2010). Social networks and physician adoption of electronic health records: Insights from an empirical study. Journal of the American Medical Informatics Association : JAMIA, 17(3), 328–336.CrossRef Zheng, K., Padman, R., Krackhardt, D., Johnson, M. P., & Diamond, H. S. (2010). Social networks and physician adoption of electronic health records: Insights from an empirical study. Journal of the American Medical Informatics Association : JAMIA, 17(3), 328–336.CrossRef
Metadata
Title
Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis
Authors
Duy Dang-Pham
Siddhi Pittayachawan
Vince Bruno
Karlheinz Kautz
Publication date
11-09-2017
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 4/2019
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-017-9796-5

Other articles of this Issue 4/2019

Information Systems Frontiers 4/2019 Go to the issue

Premium Partner