Skip to main content

2012 | Buch

Information Systems Theory

Explaining and Predicting Our Digital Society, Vol. 1

herausgegeben von: Yogesh K. Dwivedi, Michael R. Wade, Scott L. Schneberger

Verlag: Springer New York

Buchreihe : Integrated Series in Information Systems

insite
SUCHEN

Über dieses Buch

The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives:

To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today’s digital world.

This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections.

The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others.

The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others.

Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.

Inhaltsverzeichnis

Frontmatter
Chapter 1. The Updated DeLone and McLean Model of Information Systems Success
Abstract
In order to provide a general and comprehensive definition of information systems (IS) success that covers different evaluation perspectives, DeLone and McLean reviewed the existing definitions of IS success and their corresponding ­measures, and classified them into six major categories. Thus, they created a multidimensional measuring model with interdependencies between the different success categories (DeLone and McLean 1992). Motivated by DeLone and McLean’s call for further development and validation of their model, many researchers have attempted to extend or respecify the original model. Ten years after the publication of their first model and based on the evaluation of the many contributions to it, DeLone and McLean proposed an updated IS Success Model (DeLone and McLean 2003). This chapter gives an overview of the current state of research on the IS Success Model. Thereby, it offers a concise entry point to the theory’s background and its application, which might be specifically beneficial for novice readers.
Nils Urbach, Benjamin Müller
Chapter 2. If We Build It They Will Come? The Technology Acceptance Model
Abstract
Global business markets have become more competitive as consumers demand low prices, an increasing variety of goods, and improved product quality. Businesses have turned to information technology to gain performance efficiency in this changing marketplace. Yet, as firms increase their investments in new ­information technology, they may find employees are reluctant to accept and effectively use the new technologies. The technology acceptance model is the most widely used theory by researchers to explore user acceptance. This chapter explores the development, use, and current status of the technology acceptance model, as well as critiques of the technology acceptance model.
Joseph Bradley
Chapter 3. A Bibliometric Analysis of Articles Citing the Unified Theory of Acceptance and Use of Technology
Abstract
Despite the relatively recent emergence of the Unified Theory of Acceptance and Use of Technology (UTAUT), the originating article has already been cited by a large number of studies, and hence it appears to have become a popular theoretical choice within the field of information system (IS)/information technology (IT) adoption and diffusion. However, as yet there have been no attempts to analyse the reasons for citing the originating article. Such a systematic review of citations may inform researchers and guide appropriate future use of the theory. This chapter therefore presents the results of a bibliometric analysis and systematic review of 450 citations of the originating article in an attempt to better understand the reasons for citation, and use and adaptations of the theory. Findings revealed that although a large number of studies have cited the originating article since its appearance, only 43 actually utilized the theory or its constructs in their empirical research for examining IS/IT-related issues. This chapter also classifies and discusses these citations and explores the limitations of UTAUT use in existing research.
Michael D. Williams, Nripendra P. Rana, Yogesh K. Dwivedi
Chapter 4. Why Do People Reject Technologies: A Review of User Resistance Theories
Abstract
Information systems (IS) research has offered rich insights into why people use technologies but has given much less attention to the question why ­individuals resist or reject technologies, and which factors inhibit or discourage usage (Cenfetelli 2004; Lapointe and Rivard 2005; Kim and Kankanhalli 2009). This chapter, hence, provides a literature review over those theories and models used in IS research to explain user resistance. Lapointe and Rivard (2005) have identified only four articles until 2004 that open the black box of resistance and provide theoretical explanations of how and why resistance occurs (Markus 1983; Joshi 1991; Marakas and Hornik 1996; Martinko et al. 1996). Since then, four more articles on user resistance behaviors have been published in AIS Senior Basket Journals (Cenfetelli 2004; Bhattacherjee and Hikmet 2007; Eckhardt et al. 2009; Kim and Kankanhalli 2009). This chapter illustrates these nine theories and models and concludes that IS research still lacks a unified theory of user resistance.
Sven Laumer, Andreas Eckhardt
Chapter 5. Task-Technology Fit Theory: A Survey and Synopsis of the Literature
Abstract
Over the past decade there has been a notable increase in the use of Task-Technology Fit (TTF) theory within the field of information systems. This theory argues that information system use and performance benefits are attained when an information system is well-suited to the tasks that must be performed. As such, it seeks to offer an account of two of the key outcomes of interest to information systems (IS) researchers. Continued interest in the application of TTF theory is therefore expected and, as a result, the following chapter aims to provide a brief overview of the theory and how it has been applied in prior work. Readers are presented with an overview of the diverse range of research contexts and methodologies that have been used to test and extend TTF theory. Key outcomes of interest to TTF researchers are also examined as are the various approaches that researchers have used to operationalize the notion of TTF. It is hoped that this overview will serve as a sound basis for future research and simultaneously help to ensure that IS research does not continue to tread the same ground.
Brent Furneaux
Chapter 6. Migrating Processes from Physical to Virtual Environments: Process Virtualization Theory
Abstract
Increasingly, processes that have relied on physical interaction between people, and between people and objects are being migrated to virtual environments in which physical interaction is not available. For example, medical processes that have traditionally relied on physical interaction between physician and patient are conducted virtually through telemedicine, and shopping processes that have traditionally relied on physical interaction between shoppers and products are conducted virtually via electronic commerce. I refer to this migration as process virtualization. Although the pace of process virtualization is accelerating, some processes have proven more suitable for virtualization than others. Process virtualization theory is a recently proposed theory designed to explain this variance. This chapter describes the theory by defining terms, discussing the constructs and relationships of the theory that explain and predict how suitable a process is to being conducted virtually, and discussing how the theory fits into the Information Systems discipline.
Eric Overby
Chapter 7. The Theory of Deferred Action: Purposive Design as Deferred Systems for Emergent Organisations
Abstract
The theory of deferred action explains the effect of emergence on organisation and systems design. It is applied to conceptualise information systems capable of responding to changing environments that cause systems and organisations to be emergent. These deferred information systems are based on the deferred model of reality that reflects emergence and enables appropriate responses as deferred action whilst pursuing predetermined goals.
Nandish V. Patel
Chapter 8. Resource-Based View Theory
Abstract
Resource-based view (RBV) theory has been discussed in strategic ­management and Information Systems (IS) for many years. Although many ­extensions and elaborations of RBV have been published over the years, to a considerable extent, most of them have identified critical resources and investigated the impact of resources on competitive advantage and/or other organization issues such as corporative environmental performance, profitability, and strategic alliance. Nevertheless, the orchestration of resources seems to influence these results. There still remains the issue of resource relations in an organization, the internal interaction of resources, especially IT resources with non-IT resources and the process of IT resource interaction with other resources within a firm which we have called resource impressionability. To fill these gaps in IS literature, we propose the new concept of resource orchestration in order to answer resource impressionability issues during implementation of IT projects.
Mahdieh Taher
Chapter 9. On the Business Value of Information Technology: A Theory of Slack Resources
Abstract
This chapter provides insights on the business value of IT by theorizing the concept of IT slack and explaining its effects on firm performance. We define IT slack as the cushion of actual or potential IT resources that allow organizational adaptation to internal and external pressures and jolts. We elaborate a typology of IT slack based on two dimensions: the nature of the slack (i.e., IT artifact, human resource, or time) and the type of IT asset (i.e., IT infrastructure vs. IT application). We suggest that IT slack simultaneously affects both organizational effectiveness and efficiency. IT slack is a double-edged sword. While IT slack can improve organizational effectiveness, it might reduce efficiency, because slacks is, by ­definition, excess resources that remain idle until needed. We also suggest that the relationship between IT slack and organizational effectiveness is curvilinear.
Yasser Rahrovani, Alain Pinsonneault
Chapter 10. Portfolio Theory: The Contribution of Markowitz’s Theory to Information System Area
Abstract
Portfolio theory is concerned with risk and return. However, assigning weight to the risk at least equal to the yield was the big news in the 1950s. Until then, both in academia and for the general public, the stock market was no more than a playground for speculators. So in 1952, Nobel laureate Harry Markowitz, then a young doctoral student in operations research at the University of Chicago, demonstrated mathematically, for the first time, why putting all your eggs in one basket is an unacceptable risk strategy, and that diversification is the best deal for an investor or a manager of a company. In Markowitz’s analysis, the expected return and risk of several portfolios were quantified. Therefore, portfolio theory is about maximizing the benefits of investments considering risk and return. In the area of Information Systems (IS) portfolio theory has influenced two major streams ­regarding Information Technology Portfolio Management (ITPM): (a) analysis and classification of IT investments in different dimensions and (b) analysis and classification of IT projects. Both lines of research use Markowitz’s studies as reference to evaluate the trade-off between risk and return on investments in IT projects at the organizational level of analysis. Thus, IT investments can be managed as a ­portfolio, combining risk and return to maximize the benefits of IT investment, and help ­managers to choose the best option and make the best decision.
Pietro Cunha Dolci, Antônio Carlos Gastaud Maçada
Chapter 11. The Theory of the Lemon Markets in IS Research
Abstract
The “lemon” problem was initially posed by Nobel Prize winner Akerlof in his seminal article of 1970 and showed how a market with unbalanced information, called information asymmetry, can lead to complete disappearance or to offerings with poor quality where bad products (lemons) wipe out the good ones. Empirical evidence for Akerlof’s theory came originally from the market of used cars, where the lemon is a well-known problem. However, the theoretical model of the “lemon” problem has proven also to be valid in other markets and in comparable situations like internal markets. The theory is also been used more and more in Information Systems (IS) research especially since the emerging e-Commerce ­initiatives and the continuous growth of e-markets and auctions. In this chapter we bring a description of the theory by presenting its nomological network and its linkages to other well-known theories in IS research. The relevance for the theory is shown to explain the phenomenon in the IS discipline. An overview is given of current and past IS articles using the Lemon Market theory (LMT) together with a bibliographical analysis of the references to the original Akerlof article.
Jan Devos, Hendrik Van Landeghem, Dirk Deschoolmeester
Chapter 12. The Technology–Organization–Environment Framework
Abstract
This chapter describes the Technology–Organization–Environment (TOE) framework. It begins by presenting a description of the TOE framework and its constructs. Next, a brief review of studies that have used the TOE framework is provided. In this review, an emphasis is placed on noting the type of innovation that is being adopted in each study. Also, the different ways in which the framework has been adapted for various adoption contexts are highlighted. Finally, directions for future research with the TOE framework are described. In spite of this framework’s stability since its initial development, many avenues for evolution and development appear promising.
Jeff Baker
Chapter 13. Contingency Theory in Information Systems Research
Abstract
Contingency theory, which originated in organizational theory, has been utilized in information systems (IS) research for the past 25 years. This ­theory is based on two central findings: First, there is not one best way to organize or manage a firm. Second, each specific method a firm could choose to organize or manage is not equally effective (Galbraith 1973). IS researchers have utilized the primary contingency theory variables of environment; technology, structure, and management effectiveness in their study of important topics; which include systems planning, systems design, systems implementation, performance, user involvement, and Internet adoption. This chapter describes the main contingency theory constructs which are used in IS research and the seminal work in organizational theory; the primary research methods; and lastly, the limitations of ­contingency theory.
Jeff Reinking
Chapter 14. IT and Porter’s Competitive Forces Model and Strategies
Abstract
Information Technology (IT) has revolutionized our economy and no organization can escape its impact. Using IT, new business models are being developed which could not be thought of earlier. As IT makes inroads into every aspect of organization, it is clear that strategies can be successful and have the competitive edge if they are integrated with IT. This is primarily because there have been reduction of operative cost and increase in productivity through technology adoption. As a result, IT cannot remain exclusive territory of IT/Electronic Data Processing/Computer department. Business managers now see the need to get directly involved in IT investment decisions and integration of IT with business processes and managing technological trends. Michael Porter’s theory of five forces, which defines the framework for formulating strategies through five forces, has to be integrated with technological capabilities of a firm to maintain competitive advantage. To make these integrations happen, managers need to understand IT in a holistic manner which will integrate business with IT. This chapter addresses the role of technology on the organizations’ strategies, how these five forces that Porter described are impacted by technology and how managers should plan to cope with the changing times with technology.
Sanjay Mohapatra
Chapter 15. Information Technology and Organisational Performance: Reviewing the Business Value of IT Literature
Abstract
Managing Information Technology (IT) investments continues to be a challenge for firms due to the difficulty associated with demonstrating IT ­contributions to organisational performance. Many IT contributions are not accounted for because they cannot be easily quantified. Linking IT to organisational performance is a complex problem that is informed by insights from ­multiple theoretical paradigms. The aim of this chapter is to comprehensively review work done by both academic and practitioners, and to explore why new approaches to managing IT investments are needed. To achieve this aim, we will start by defining IT assets and business value and exploring the different dimensions used to measure the business value of IT. Then, we will look at the early research on IT business value and the emergence of the Productivity Paradox. After that, we will delve into the three current theoretical paradigms: economics, management and sociology. The theoretical lenses and models used in these paradigms will also be discussed. Finally, future research directions are suggested.
Boumediene Ramdani
Chapter 16. Applying “Business Case” Construct Using the “Diffusion of Innovations” Theory Framework: Empirical Case Study in the Higher Education
Abstract
Real-world cases have highlighted the need for better understanding of the process by which risk-averse organizations introduce new enterprise systems. There is a particular need to focus on the “business case document” which comprehensively outlines the pros and cons of adopting the new system. This chapter describes the complex innovation and diffusion process of enterprise systems as not described before. It asks questions about how information on a new system is communicated to potential stakeholders. Taking the specific case of a large public sector university, it examines all the processes involved in evaluating whether a new ­system is right for an organization and convincing both end-users and upper management to approve the change. Accordingly, any document that drives this change must be as credible as possible. And so, this paper looks at the possible sources of credibility for both the document and the sponsor who writes it.
Francisco Chia Cua
Chapter 17. Punctuated Equilibrium Theory in IS Research
Abstract
Punctuated Equilibrium is a theory originating in paleobiology which has been adopted by management researchers to explain organizational change. In this theory, episodes of radical change are preceded and followed by longer periods of relative stability. Comprised of equilibrium periods, revolutionary periods, and punctuations, Punctuated Equilibrium can be contrasted with other perspectives on organizational change including persistent gradualism, tectonic shift, and turbulent adaptation. The use of the theory in IS research is identified in areas as diverse as virtual teams, IS implementation, organizational change, and strategic alignment. Finally, suggestions regarding how researchers may operationalize Punctuated Equilibrium are made focusing on key components of the definition of punctuations.
Christopher T. Street, James S. Denford
Chapter 18. Discrepancy Theory Models of Satisfaction in IS Research
Abstract
In this chapter, we present the versatility of discrepancy theory in the explanation and prediction of satisfaction in IS research models and show how to avoid many of the analytical pitfalls. First, we describe the use of discrepancy theory in other disciplines relevant to IS research. Then, we discuss satisfaction as used in IS research starting with user satisfaction followed by employee job satisfaction. In each case, we provide a brief history and show the evolution toward discrepancy models. Next comes an introduction to several common comparative models encapsulated by discrepancy theory that have been deployed in IS research. The remainder of the material in the chapter considers methodological issues and a discussion of implications for future research.
James J. Jiang, Gary Klein, Carol Saunders
Chapter 19. Institutional Change and Green IS: Towards Problem-Driven, Mechanism-Based Explanations
Abstract
There is growing global unease in relation to the environmental sustainability of business activities, particularly where climate change is concerned. Consequently, the increase in emissions of Greenhouse Gases (GHG) associated with economic growth is identified by the Organisation for Economic Cooperation and Development (OECD) as a problem of grave concern. In the EU, ambitious targets have been set for GHG emissions reductions. Both the OECD and the Global e-Sustainability Initiative (GeSI) have identified that between now and 2020 the direct and enabling effects of Green IS could help achieve significant reductions in GHG emissions across all industry sectors. In order to help understand how this objective may be achieved, this chapter presents mechanism-based explanations, which draw on institutional theory and social movement theory, to help explain and predict the adoption, implementation and use of Green IS in organizational fields. Thus, in keeping with extant perspectives in the social sciences, the study eschews the quest for universal laws or general theory, in favour of conceptual mechanism-based explanations of IS phenomena. While environmental sustainability has exercised the interest of researchers in cognate disciplines, Green IS is a new area of interest for IS researchers, hence this chapter’s contribution is timely.
Tom Butler
Chapter 20. A Multilevel Social Network Perspective on IT Adoption
Abstract
Adoption of technologies has long been a key area of research in the information systems (IS) discipline, and researchers have thus been interested in the attributes, beliefs, intentions, and behaviors of individuals and organizations that can explain information technology (IT) adoption. The focal unit of adoption has mainly been individuals and organizations, however, research at the group or social network levels as well as the interorganizational level has recently gained increased interest from information systems (IS) researchers. This recent focus views the world as being the sum of all relations. Various social network theories exist that seek to emphasize different proficiencies of social networks and explain theoretical mechanisms for behavior in social networks. The core idea of these theories is that social networks are valuable, and the relations among actors affect the behavior of individuals, groups, organizations, industries, and societies. IS researchers have also found that social network theory can help explain technology adoption. Some researchers, in addition, acknowledge that most adoption situations involve phenomena occurring at multiple levels, yet most technology adoption research applies a single level of analysis. Multilevel research can address the levels of theory, measurement, and analysis required to fully examining research questions. This chapter, therefore, adapts the Coleman diagram into the Multilevel Framework of Technology Adoption in order to explain how social network theory, at the individual and social network levels, can help explain adoption of IT. As Coleman (1990) attempts to create a link between the micro- and macro-levels in a holistic manner, his approach is applicable in explaining IT adoption.
Heidi Tscherning
Chapter 21. Expectation–Confirmation Theory in Information System Research: A Review and Analysis
Abstract
Understanding the antecedents and their effects on satisfaction is crucial, especially in consumer marketing. Most investigations in marketing research have used the Expectation–Confirmation Theory (ECT) which is used by the IS researchers too, with a few modifications and have taken the name Expectation–Confirmation Model (ECM). ECM is broadly applied to examine the continuance intention of IS users rather than just to explain satisfaction. Though the name of the model still contains expectation but practically the pre-consumption expectation is replaced by post-consumption expectations, namely, perceived usefulness which is believed to contribute a more meaningful dimension to theory. In IS research, though the dependent variable, continuance usage intention, is quite consistent but the independent variables, logically, are multi-varied as they are considered from contextual perspectives. Consequently, there is no general agreement concerning the definition, relationship, and measurement methods of the constructs neither in ECT nor in ECM. This chapter, therefore, tries to provide a comprehensive and systematic review of the literature pertaining to “expectation–confirmation” issues in order to observe current trends, ascertain the current “state of play,” and to promising lines of inquiry. Findings of this study suggest that positivist and empirical research is predominantly used with most of the samples being university students. Besides, technology acceptance model (TAM) and theory of planned behavior (TPB) are also integrated with ECT and ECM to have a better understanding of consumer behavior. The trend toward integrating and/or incorporating associated variables and constructs from various theories to ECM has a better fit in related areas of applications. Moreover, active researches are highly concentrated in USA, Hong Kong, and Taiwan. Finally, this study proposes research implications for the future.
Mohammad Alamgir Hossain, Mohammed Quaddus
Chapter 22. Stakeholder Theory and Applications in Information Systems
Abstract
Stakeholder theory is widely used in management in examining ­organizational environment, strategic management, ethical issues, business planning process, e-government, project management, environment management, etc. Recently stakeholders are also seen as a means to more successful information and communication technologies and information system development and implementation issues. In this chapter, stakeholder theory, its origin and applications in Information Systems field in literature are discussed.
Alok Mishra, Yogesh K. Dwivedi
Backmatter
Metadaten
Titel
Information Systems Theory
herausgegeben von
Yogesh K. Dwivedi
Michael R. Wade
Scott L. Schneberger
Copyright-Jahr
2012
Verlag
Springer New York
Electronic ISBN
978-1-4419-6108-2
Print ISBN
978-1-4419-6107-5
DOI
https://doi.org/10.1007/978-1-4419-6108-2