整合导致IT抵抗的观念:扩展IT身份威胁的法理网络

Q2 Decision Sciences
Kevin Craig, Varun Grover, Jason B. Thatcher
{"title":"整合导致IT抵抗的观念:扩展IT身份威胁的法理网络","authors":"Kevin Craig, Varun Grover, Jason B. Thatcher","doi":"10.1080/15228053.2023.2265786","DOIUrl":null,"url":null,"abstract":"ABSTRACTWhile there is a considerable body of research on resistance to technology, there are few works that consider the phenomenon from the user’s point of view, and few that consider task-related as well as social factors in concert. This work places the IT Identity Threat at the center of a mediation model to explain how task-related and social, as well as personal, factors work in concert to cause Resistance to IT. Prior literature and qualitative data were used to explore and describe the IT Identity Threat’s antecedents, which were refined and then tested in two separate cases. Data from two separate studies expand the nomological network surrounding the IT Identity Threat and demonstrate that Resistance to IT may best be understood as the result of how individuals feel about themselves as users of a technology. Disclosure statementThe authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.Notes1 A strictly positivist approach to research assumes an objective and quantitatively measurable reality. Positivist social science research is generally carried out by means of statistical evaluation of numeric data, collected through instruments such as the survey. One criticism of this paradigm is that it may exclude important evidence that can be collected through qualitative methods (Creswell & Creswell, Citation2005).2 The term, “nomological network” refers to a collection of constructs that are statistically related (Cronbach & Meehl, Citation1955). Over time, the elaboration and testing of the nomological network that contains a construct improves that construct’s validity and generalizability (Saad, Citation2020).3 This university was recently ranked in the top 20 Public Universities in the well-known US News and World Rankings of Best Colleges.Additional informationNotes on contributorsKevin CraigKevin Craig is an Assistant Professor at Auburn University’s Harbert College of Business. Before earning his PhD in Information Systems, he worked as a software developer and project manager for over ten years. His research examines the effects of identity and workplace stereotypes on individual behavior regarding technology. Kevin’s is an Associate Editor at European Journal of Information systems and his work appears in Journal of Management Information Systems, Journal of the Association of Information Systems, Journal of Strategic Information Systems, Journal of Business Economics, and Communications of the Association for Information Systems.Varun GroverVarun Grover is the George and Boyce Billingsley Endowed Chair and Distinguished Professor of IS at the Walton School of Business, University of Arkansas. He has published extensively in the information systems field, with over 300 publications in major refereed journals; ten recent articles ranking him among the top four researchers globally. Dr. Grover has an h-index of 96, which is ranked in the top five in the field. He is an AIS Fellow and has received the LEO Award for Lifetime Achievement from the AIS.Jason B. ThatcherJason B. Thatcher holds the Milton F. Stauffer Professorship in the Department of Management Information Systems at the Fox School of Business of Temple University. Dr. Thatcher's research examines the influence of individual beliefs and characteristics on technology use, cybersecurity, and strategic issues tied to information technology use in organizations. His work appears in MIS Quarterly, Information Systems Research, Journal of Applied Psychology, Organizational Behavior and Human Decision Processes, and Journal of the Association of Information Systems. He has served as Senior Editor at MIS Quarterly, Information Systems Research, and Journal of the Association for Information Systems.","PeriodicalId":37219,"journal":{"name":"Journal of Information Technology Case and Application Research","volume":"168 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrating the perceptions that cause Resistance to IT: Expanding the nomological network of the IT identity Threat\",\"authors\":\"Kevin Craig, Varun Grover, Jason B. Thatcher\",\"doi\":\"10.1080/15228053.2023.2265786\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACTWhile there is a considerable body of research on resistance to technology, there are few works that consider the phenomenon from the user’s point of view, and few that consider task-related as well as social factors in concert. This work places the IT Identity Threat at the center of a mediation model to explain how task-related and social, as well as personal, factors work in concert to cause Resistance to IT. Prior literature and qualitative data were used to explore and describe the IT Identity Threat’s antecedents, which were refined and then tested in two separate cases. Data from two separate studies expand the nomological network surrounding the IT Identity Threat and demonstrate that Resistance to IT may best be understood as the result of how individuals feel about themselves as users of a technology. Disclosure statementThe authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.Notes1 A strictly positivist approach to research assumes an objective and quantitatively measurable reality. Positivist social science research is generally carried out by means of statistical evaluation of numeric data, collected through instruments such as the survey. One criticism of this paradigm is that it may exclude important evidence that can be collected through qualitative methods (Creswell & Creswell, Citation2005).2 The term, “nomological network” refers to a collection of constructs that are statistically related (Cronbach & Meehl, Citation1955). Over time, the elaboration and testing of the nomological network that contains a construct improves that construct’s validity and generalizability (Saad, Citation2020).3 This university was recently ranked in the top 20 Public Universities in the well-known US News and World Rankings of Best Colleges.Additional informationNotes on contributorsKevin CraigKevin Craig is an Assistant Professor at Auburn University’s Harbert College of Business. Before earning his PhD in Information Systems, he worked as a software developer and project manager for over ten years. His research examines the effects of identity and workplace stereotypes on individual behavior regarding technology. Kevin’s is an Associate Editor at European Journal of Information systems and his work appears in Journal of Management Information Systems, Journal of the Association of Information Systems, Journal of Strategic Information Systems, Journal of Business Economics, and Communications of the Association for Information Systems.Varun GroverVarun Grover is the George and Boyce Billingsley Endowed Chair and Distinguished Professor of IS at the Walton School of Business, University of Arkansas. He has published extensively in the information systems field, with over 300 publications in major refereed journals; ten recent articles ranking him among the top four researchers globally. Dr. Grover has an h-index of 96, which is ranked in the top five in the field. He is an AIS Fellow and has received the LEO Award for Lifetime Achievement from the AIS.Jason B. ThatcherJason B. Thatcher holds the Milton F. Stauffer Professorship in the Department of Management Information Systems at the Fox School of Business of Temple University. Dr. Thatcher's research examines the influence of individual beliefs and characteristics on technology use, cybersecurity, and strategic issues tied to information technology use in organizations. His work appears in MIS Quarterly, Information Systems Research, Journal of Applied Psychology, Organizational Behavior and Human Decision Processes, and Journal of the Association of Information Systems. He has served as Senior Editor at MIS Quarterly, Information Systems Research, and Journal of the Association for Information Systems.\",\"PeriodicalId\":37219,\"journal\":{\"name\":\"Journal of Information Technology Case and Application Research\",\"volume\":\"168 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Technology Case and Application Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/15228053.2023.2265786\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Decision Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology Case and Application Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/15228053.2023.2265786","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Decision Sciences","Score":null,"Total":0}
引用次数: 0

摘要

摘要虽然有相当多的关于技术抵抗的研究,但很少有作品从用户的角度考虑这一现象,也很少有作品同时考虑与任务相关的因素和社会因素。这项工作将IT身份威胁置于中介模型的中心,以解释与任务相关的因素、社会因素以及个人因素如何协同工作,从而导致对IT的抵制。使用先前的文献和定性数据来探索和描述IT身份威胁的前因,然后在两个单独的案例中进行改进和测试。来自两项独立研究的数据扩展了围绕IT身份威胁的法理学网络,并表明对IT的抵制可能最好被理解为个人如何看待自己作为技术用户的结果。披露声明作者声明,他们没有已知的竞争经济利益或个人关系,可能会影响本文所报道的工作。注1严格的实证主义研究方法假定存在客观的、可定量测量的现实。实证主义社会科学研究通常是通过调查等工具收集的数字数据的统计评估来进行的。对这种范式的一种批评是,它可能排除了可以通过定性方法收集的重要证据(Creswell & Creswell, Citation2005)术语“逻辑网络”指的是统计上相关的结构的集合(Cronbach & Meehl, Citation1955)。随着时间的推移,对包含一个结构的法理学网络的阐述和测试提高了该结构的有效性和普遍性(Saad, Citation2020)这所大学最近在著名的《美国新闻与世界最佳大学排名》中排名前20位。本文作者凯文·克雷格是奥本大学哈伯特商学院的助理教授。在获得信息系统博士学位之前,他担任了十多年的软件开发人员和项目经理。他的研究考察了身份和工作场所的刻板印象对个人技术行为的影响。Kevin是《欧洲信息系统杂志》的副主编,他的作品发表在《管理信息系统杂志》、《信息系统协会杂志》、《战略信息系统杂志》、《商业经济学杂志》和《信息系统协会通讯》上。Varun Grover是阿肯色大学沃顿商学院乔治和博伊斯·比林斯利教授和杰出教授。他在信息系统领域发表了大量论文,在主要期刊上发表了300多篇论文;最近的十篇文章将他排在全球前四位。格罗弗博士的h指数为96,在该领域排名前五。他是一名AIS研究员,并获得了由AIS颁发的LEO终身成就奖。Jason B. Thatcher,担任天普大学福克斯商学院管理信息系统系的Milton F. Stauffer教授。撒切尔博士的研究考察了个人信仰和特征对技术使用、网络安全和与组织中信息技术使用相关的战略问题的影响。他的工作发表在MIS季刊,信息系统研究,应用心理学杂志,组织行为和人类决策过程,以及信息系统协会杂志。他曾担任MIS季刊、信息系统研究和信息系统协会杂志的高级编辑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Integrating the perceptions that cause Resistance to IT: Expanding the nomological network of the IT identity Threat
ABSTRACTWhile there is a considerable body of research on resistance to technology, there are few works that consider the phenomenon from the user’s point of view, and few that consider task-related as well as social factors in concert. This work places the IT Identity Threat at the center of a mediation model to explain how task-related and social, as well as personal, factors work in concert to cause Resistance to IT. Prior literature and qualitative data were used to explore and describe the IT Identity Threat’s antecedents, which were refined and then tested in two separate cases. Data from two separate studies expand the nomological network surrounding the IT Identity Threat and demonstrate that Resistance to IT may best be understood as the result of how individuals feel about themselves as users of a technology. Disclosure statementThe authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.Notes1 A strictly positivist approach to research assumes an objective and quantitatively measurable reality. Positivist social science research is generally carried out by means of statistical evaluation of numeric data, collected through instruments such as the survey. One criticism of this paradigm is that it may exclude important evidence that can be collected through qualitative methods (Creswell & Creswell, Citation2005).2 The term, “nomological network” refers to a collection of constructs that are statistically related (Cronbach & Meehl, Citation1955). Over time, the elaboration and testing of the nomological network that contains a construct improves that construct’s validity and generalizability (Saad, Citation2020).3 This university was recently ranked in the top 20 Public Universities in the well-known US News and World Rankings of Best Colleges.Additional informationNotes on contributorsKevin CraigKevin Craig is an Assistant Professor at Auburn University’s Harbert College of Business. Before earning his PhD in Information Systems, he worked as a software developer and project manager for over ten years. His research examines the effects of identity and workplace stereotypes on individual behavior regarding technology. Kevin’s is an Associate Editor at European Journal of Information systems and his work appears in Journal of Management Information Systems, Journal of the Association of Information Systems, Journal of Strategic Information Systems, Journal of Business Economics, and Communications of the Association for Information Systems.Varun GroverVarun Grover is the George and Boyce Billingsley Endowed Chair and Distinguished Professor of IS at the Walton School of Business, University of Arkansas. He has published extensively in the information systems field, with over 300 publications in major refereed journals; ten recent articles ranking him among the top four researchers globally. Dr. Grover has an h-index of 96, which is ranked in the top five in the field. He is an AIS Fellow and has received the LEO Award for Lifetime Achievement from the AIS.Jason B. ThatcherJason B. Thatcher holds the Milton F. Stauffer Professorship in the Department of Management Information Systems at the Fox School of Business of Temple University. Dr. Thatcher's research examines the influence of individual beliefs and characteristics on technology use, cybersecurity, and strategic issues tied to information technology use in organizations. His work appears in MIS Quarterly, Information Systems Research, Journal of Applied Psychology, Organizational Behavior and Human Decision Processes, and Journal of the Association of Information Systems. He has served as Senior Editor at MIS Quarterly, Information Systems Research, and Journal of the Association for Information Systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information Technology Case and Application Research
Journal of Information Technology Case and Application Research Decision Sciences-Information Systems and Management
CiteScore
4.70
自引率
0.00%
发文量
20
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信