skip to main content
research-article

Capturing user readiness to interact with information systems: an activity perspective

Published:12 May 2010Publication History
Skip Abstract Section

Abstract

Drawing on an understanding of user experiences in interacting with information systems grounded in Activity Theory, this study posits a new psychological construct, information system interaction readiness (ISIR), to capture how ready an individual is to interact with each of the systems available for a task. This construct reflects the affective, cognitive and behavioral components of user situated attitude toward taking mediated actions involving input interface, output interface and communication rules in a user-system interaction activity. Two versions (long and short) of a measurement instrument were developed, and validation studies were conducted. The results showed that the two versions had similar psychometric properties and provided supporting evidence for various aspects of measurement validity. Theoretical and practical implications were discussed.

References

  1. Alder, G. S. 2001. Employee reactions to electronic performance monitoring: A consequence of organizational culture. Journal of High Technology Management Research 12 323--342.Google ScholarGoogle Scholar
  2. Belanger, F., C. van Slyke. 2002. Abuse or learning? Communications of the ACM 45 64--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bock, G. W., S. L. Ho. 2009. Non-work related computing (NWRC): Is there a productivity payoff? Communications of the ACM 52 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Burke, W. W., G. H. Litwin. 1992. A causal model of organizational performance and change Journal of Management, 523--545.Google ScholarGoogle Scholar
  5. Cheng, Y., A. L. Kalleberg, S. J. Coakes, L. G. Steed. 1996. Employee job performance in Britain and the United States. SPSS Analysis without Anguish: Version 10.0 for Windows. Sociology(30) 115--129.Google ScholarGoogle Scholar
  6. Commanducci, M. 1998. Training can be fun: Management stimulations require proper fit with company culture. Canadian HR Reporter 11 15.Google ScholarGoogle Scholar
  7. Crow, S. M., S. J. Hartman. 2002. Organizational culture: Its impact on employee relations and discipline in health care organizations. The Heath Care Manager 21 22--28.Google ScholarGoogle Scholar
  8. DiMaggio, P. J., W. W. Powell. 1983. The Iron Cage Revisited: Institutional Isomorphism and Work Performed on Systems that Allow Electronic Monitoring (OTA-CIT-333) Washington, DC: Office of Technology Assessment.Google ScholarGoogle Scholar
  9. Friedman, W. H. 2000. Is the answer to Internet addiction Internet interdiction? H. M. Chung, ed. AMCIS 2000: Proceedings of the 2000 Americas Conference on Information Systems.Google ScholarGoogle Scholar
  10. Fry, L. W., J. W. Slocum. 1984. Technology, structure, and workgroup effectiveness: A test of a contingency model. Academy of Management Journal 27 221--246.Google ScholarGoogle Scholar
  11. Galletta, D. F., P. Polak. 2003. An empirical investigation of antecedents of Internet abuse in the workplace Proceedings of the Second Annual Workshop on HCI Research in MIS, Seattle, WA.Google ScholarGoogle Scholar
  12. Gary, D. 1982. Management Fundamentals: Modern Principles & Practices 3ed. Reston Publishing Company, VA.Google ScholarGoogle Scholar
  13. Goodhue, D. L. 1988. I/S attitudes: Toward theoretical and definition clarity. Database 19 6--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Goodhue, D. L. 1995. Understanding user evaluations of information systems. Management Science 41 1827--1844. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Goodhue, D. L., R. L. Thompson. 1995. Task-technology fit and individual performance. MIS Quarterly 19 213--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Griffiths, M. 2003. Internet abuse in the workplace: Issues and concerns for employers and employment counselors. Journal of Employment Counseling 40.Google ScholarGoogle ScholarCross RefCross Ref
  17. Guthrie, R., P. Gray. 1996. Junk computing: Is it bad for organizations? Information Systems Management 13 23--28.Google ScholarGoogle Scholar
  18. Hoffer, J. A., D. W. Straub. 1989. The 9 to 5 underground: Are you policing computer abuse? Sloan Management Review, 35--44.Google ScholarGoogle Scholar
  19. Hofstede, G. 1980. Culture's consequences. Sage, Beverly Hills, CA.Google ScholarGoogle Scholar
  20. Hofstede, G., B. Neuijen, D. D. Ohayv, G. Sanders. 1990. Measuring organizational cultures: A qualitative and quantitative study across twenty cultures. Administrative Science Quarterly 35 286--316.Google ScholarGoogle Scholar
  21. Hood, J. N., C. S. Koberg. 1989. Accounting firm cultures and creativity among accountants. Accounting Horizons 5 12--19.Google ScholarGoogle Scholar
  22. Iivari, J., M. Huisman. 2007. The relationship between organizational culture and the deployment of systems development methodologies. MIS Quarterly 31(1) 35--58. Google ScholarGoogle ScholarCross RefCross Ref
  23. Kankanhalli, A., H. Teo, B. C. Y. Tan, K. Wei. 2003. An integrative study of information systems security effectiveness. International Journal of Information Management 23 139--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. King, K. N., D. E. Wilcox. 2003. Employee-proposed discipline: How well is it working? Public Personnel Management 32 197--209.Google ScholarGoogle Scholar
  25. Kristof, A. L. 1996. Person-organization fit: An integrative review of its conceptualizations, measurement, and implications. Personnel Psychology 49 1--49.Google ScholarGoogle Scholar
  26. Kristof-Brown, A. L., K. J. Jansen, A. E. Colbert. 2002. A policy-capturing study of the simultaneous effects of fit with jobs, groups, and organizations. Journal of Applied Psychology 87 985--993.Google ScholarGoogle Scholar
  27. Lee, J., Y. Lee. 2002. A holistic model of computer abuse within organizations. Information Management & Computer Security 10 57--63.Google ScholarGoogle Scholar
  28. Lee, O. K., K. H. Lim, W. M. Wong. 2005. Why employees do non-work related computing: An exploratory investigation through multiple theoretical perspectives Hawaii International Conference of System Sciences Proceedings, Hawaii. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Lee, S. M., S. Lee, S. Yoo. 2004. An integrative model of computer abuse based on social control and general deterrence theories. Information & Management 41 707--718. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Leidner, D. E., T. Kayworth. 2006. Review: A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly 30(2) 357--399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Lim, V. K. G. 2002. The moderating effects of neutralization technique on cyberloafing and organizational justice Academy of Management Annual Meeting Proceedings, Denver.Google ScholarGoogle Scholar
  32. Lim, V. K. G., T. S. H. Teo. 2005. Prevalence, perceived seriousness, justification, and regulation of cyberloafing in Singapore: An exploratory study. Information & Management 42(8) 1081--1093. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Meyerson, D., J. Martin. 1987. Organizational culture relationships with creativity and other job-related variables. Journal of Management Studies 24 623--647.Google ScholarGoogle Scholar
  34. Middleton, P., K. Harper. 2004. Organizational alignment: A precondition for information systems success? Journal of Change Management 4(4) 327--338.Google ScholarGoogle ScholarCross RefCross Ref
  35. Mirchandani, D., J. Motwani. 2003. Reducing internet abuse in the workplace. SAM Advanced Management Journal 22--55.Google ScholarGoogle Scholar
  36. Nadler, D. A., M. L. Tushman. 1977. A diagnostic model for organizational behavior. Perspectives on behavior in organizations. McGraw-Hill, New York.Google ScholarGoogle Scholar
  37. Oravec, J. A. 2002. Constructive approaches to Internet recreation in the workplace. Communications of the ACM 45 60--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Osigweh, C. A. B., W. R. Hutchison. 1989. Positive discipline. Human Resource Management 28 367--383.Google ScholarGoogle Scholar
  39. Palanisamy, R. 2007. Organizational culture and knowledge management in ERP implementation: An empirical study. Journal of Computer Information Systems 48(2) 100--120.Google ScholarGoogle Scholar
  40. Pee, L. G., I. M. Y. K. A. Woon. 2008. Explaining non-work-related computing in the workplace: A comparison of alternative models. Information & Management 45 120--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Perrow, C. 1967. A framework for the comparative analysis of organizations. American Sociological Review 32 194--208.Google ScholarGoogle Scholar
  42. Premkumar, G., K. Ramamurthy, C. S. Saunders. 2005. Information processing view of organizations: An exploratory examination of fit in the context of interorganizational relationships. Journal of Management Information Systems 22 257--294. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Robinson, A. G., S. Stern. 1997. Corporate Creativity - How Innovation and Improvement Acutally Happen.Google ScholarGoogle Scholar
  44. Schwartz, H., S. Davis. 1981. Matching corporate culture and business strategy. Organizational Dynamics 10 30--48.Google ScholarGoogle Scholar
  45. Sharma, S. K., J. N. D. Gupta. 2003. Improving workers' productivity and reducing Internet abuse. Journal of Computer Information Systems 44 74--78.Google ScholarGoogle Scholar
  46. Shin, Y. 2008. The effects of team-level person-organization and person-job fit on team organizational citizenship behaviors and team efficacy. Korean Academy of Management Journal 16(1) 1--35.Google ScholarGoogle Scholar
  47. Siau, K., F. F. H. Nah, L. Teng. 2002. Acceptable Internet use policy. Communications of the ACM 45 75--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Simmers, C. A. 2002. Aligning Internet usage with business priorities. Communications of the ACM 42 88--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Skinner, W. F., A. M. Fream. 1997. A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency 34 495--518.Google ScholarGoogle Scholar
  50. Smircich, L. 1983. Concepts of culture and organizational analysis. Administrative Science Quarterly 28 339--358.Google ScholarGoogle Scholar
  51. Straub, D. W. 1990. Effective IS security: An empirical study. Information Systems Research 1(3) 255--276.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Swartz, M., D. Jordan. Culture: An Anthropological Perspective. Wiley, New York.Google ScholarGoogle Scholar
  53. Thadani, D. R. 2005. Are all NWRC bad? An alternative view, City University of Hong Kong.Google ScholarGoogle Scholar
  54. Thompson, J. D. 1967. Organizations in Action. McGraw-Hill., New York.Google ScholarGoogle Scholar
  55. Urbaczewski, A., L. M. Jessup. 2002. Does electronic monitoring of employee Internet usage work? Communications of the ACM 45 80--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Van de Ven, A. H., A. L. Delbecq, R. Koenig. 1976. Determinants of coordination modes within organizations. American Sociological Review 41 322--338.Google ScholarGoogle Scholar
  57. Venkatraman, N. 1989. The concept of fit in strategy research: Toward verbal and statistical correspondence. Academy of Management Journal 14 423--444.Google ScholarGoogle Scholar
  58. Wallace, E. J. 1983. Individuals and organizations: The cultural match. Training and Development Journal 37 28--36.Google ScholarGoogle Scholar

Index Terms

  1. Capturing user readiness to interact with information systems: an activity perspective

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader