Abstract:Groupware technologies have become an important part of the business computing infrastructure in many organizations, but many groupware applications, especially those requiring significant collaboration and cooperation among users, are still not adequately used. While the successful implementation of groupware depends on many different factors, achieving a 'critical mass' of users has been recognised as the key for groupware acceptance. By extending the technology acceptance model (TAM), this paper advances a … Show more
“…Li et al [6] argued that the benefit of using a communication technology, such as IM, cannot be achieved by an individual if his or her communication partners do not use the technology. This is congruent with Lou et al [43] in that IS acceptance requires the participation of many individuals to create a sense of collective action and few people are willing to use technology on their own or in small numbers. This indicates that the use of technology will decline if critical mass is absent.…”
Section: Theory Of Critical Masssupporting
confidence: 73%
“…This contention implies that critical mass is the basis for producing collective actions [43]. Prior studies suggested that theories in social psychology, economics, and diffusion of innovations all support that critical mass, by means of increasing interconnections amid users, is important for individual choices and actions [6,28,43].…”
“…Li et al [6] argued that the benefit of using a communication technology, such as IM, cannot be achieved by an individual if his or her communication partners do not use the technology. This is congruent with Lou et al [43] in that IS acceptance requires the participation of many individuals to create a sense of collective action and few people are willing to use technology on their own or in small numbers. This indicates that the use of technology will decline if critical mass is absent.…”
Section: Theory Of Critical Masssupporting
confidence: 73%
“…This contention implies that critical mass is the basis for producing collective actions [43]. Prior studies suggested that theories in social psychology, economics, and diffusion of innovations all support that critical mass, by means of increasing interconnections amid users, is important for individual choices and actions [6,28,43].…”
“…Unlike individual technology, which aims to improve individual productivity, group technology (groupware) aims to facilitate group coordination and to support cooperation and collaboration among a group of users. User acceptance of groupware is therefore different from that of individual technology due to the unique features of groupware (Lou et al, 2000). SN's effects may be different for individual technologies such as word processing software and group technologies such as email or v-mail.…”
Section: Individual Vs Group Technologiesmentioning
confidence: 99%
“…They argued that word processing was fairly personal and individual and may be driven less by social influences compared to other technologies such as email, project management or group decision support systems, and therefore, SN may have less effect in such technological contexts . Users who have adopted the technology have the incentive to enlist more users for the technology, and they may be eager to promote the technology by sharing their experience with and offering help to potential adopters (Lou et al, 2000). Such unsolicited help from many peers due to the unique features of groupware may convince a potential user that it would not take a lot of time and effort to learn and use the groupware, which promotes their intention to use it.…”
Section: Individual Vs Group Technologiesmentioning
Along with increasing investments in new technologies, user technology acceptance becomes a frequently studied topic in the information systems discipline. The last two decades have seen user acceptance models being proposed, tested, refined, extended and unified. These models have contributed to our understanding of user technology acceptance factors and their relationships. Yet they have also presented two limitations: the relatively low explanatory power and inconsistent influences of the factors across studies. Several researchers have recently started to examine the potential moderating effects that may overcome these limitations. However, studies in this direction are far from being conclusive. This study attempts to provide a systematic analysis of the explanatory and situational limitations of existing technology acceptance studies. Ten moderating factors are identified and categorized into three groups: organizational factors, technological factors and individual factors. An integrative model is subsequently established, followed by corresponding propositions pertaining to the moderating factors. r
“…In addition to the fact that the value of network goods (such as fax, phone or MSN Messenger) per definition increases with the number of users, Shapiro and Varian (1999) also argue that there is a strong perception of safety in numbers: Few people are willing to use a technology or service on their own or in small numbers. By the same token, Lou, Luo and Strong (2000) argue that adoption of information systems requires the participation of many individuals to create a sense of collective action.…”
STRUCTURED ABSTRACT PurposeThis paper investigates the properties and attributes of networked services and proposes a general categorization scheme for such services. It is argued that services can be categorized on the basis of whether their dominant source of value stems from intrinsic-, user network-, or complement network attributes.
Design/Methodology/ApproachTwo separate studies were conducted to test the validity and applicability of the categorization scheme. First, industry experts categorized a set of pre-selected mobile services based on the services' dominant source of value. Second, a large-scale end-user study of the same services was conducted for testing cross-service differences between the proposed service categories in terms of what drives perceived customer value.
FindingsThe study results largely support the proposed categorization scheme. The two studies suggest that categorizing networked services as driven by either intrinsic-, user network-, or complement network attributes is fruitful and help pinpoint fundamentally different drivers of 3 perceived customer value. The drivers investigated in the end-user study explain 60% of the variance in customer value.
Research limitations/ImplicationsThe current categorization scheme will have stronger and clearer implications when the full array of antecedents and consequences of intrinsic-, user network-, and complement network attributes have been investigated.
Practical implicationsThe categorization scheme may provide managers with important guidelines regarding the kinds of business models and marketing means that will work best for the three different categories of networked services.
Originality/ValueThe paper contributes with a conceptual framework for understanding and categorizing both extrinsic and intrinsic drivers of service value. It extends and integrates previous work on network effects and adoption research and also offers empirical insight into an underresearched topic.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.