1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P199 potx

10 228 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 206,67 KB

Nội dung

1914 Competence of Information Technology Professionals in Internet-Based Ventures maintainability (Bass, Clements & Kazman, 2003; Deshpande, Murugesan, Ginige, Hansen, Schwabe & Gaedke, 2002). Another important product characteristic is its degree of innovative- ness, that is, the newness of the technology itself or in the newness of applications the technology offers to the customer. For instance, launching an E-Shop (Kollmann, 2006) can be expected to require low development efforts, because there exists a variety of ready-made Web applications for this business model. By contrast, newly fou nd businesses with highly innovative platforms (such as Google with respect to their search technology) will initially focus on the perfec- tion of their technology rather than on aspects of commercialization and generating revenues. In particular, technical problems at the beginning of business operations can be expected to give way to environmental, commercial and competitive problems in later development phases (MacInnes, 2005). Consequently, a shift from IT competence to business and transdisciplinary competence can be postulated with the passing of time. Moreover, as resource availability and thus the number of IT personnel can be expected to increase during WKHJURZWKRIWKH\RXQJ¿UP.ROOPDQQ a shift from operational to strategic tasks can be presumed (Sgobbi, 2002). While at an early stage, IT professionals need to posses entrepreneurial FRPSHWHQFHDQHI¿FLHQWSURJUDPPLQJVW\OHDQG sound technology knowledge, the later CIO is required to additionally possess business manage- ment knowledge and interpersonal competence in order to delegate operational development tasks to her IT staff. Similarly, the relevance of possessing conceptual IT knowledge and having an IT/Busi- ness vision can be expected to increase over time, as the focus moves from a short-term realization WRDORQJWHUPLQWHQVL¿FDWLRQDQGGLYHUVL¿FDWLRQ of the initial business idea (Kollmann, 2006). The aspect of changing requirements particularly ap- plies to Web 2.0 platforms whose business models and Web applications are vague at the beginning, but evolve over time (Highsmith, 2002; O’Reilly, ,QWKLVUHJDUGDQRWKHUIDFWRULQÀXHQFLQJ the value propositions of IT-related competencies is the volatility of the IT/Business environment, as it necessitates software enhancement activities such as adding, changing, and deleting software functionality in response to new and evolving business requirements (Banker & Slaughter, 2000; Zhang et al., 2003). )DFWRUVLQÀXHQFLQJYDOXHSHUFHSWLRQ In gen- eral, a respondent’s temperament determines that respondent’s view of knowledge, while knowledge views of technologists and managers are likely to GLYHUJH'XHFN$¿UVWLPSRUWDQWPRGHUDWRU is thus the respondent’s functional role, that is, the question whether the respondent is responsible for IT-related or business-related tasks. For instance, IT professionals tend to think rather conceptual than pragmatic, while they ascribe less importance to interpersonal relationships. Besides personality, views on knowledge depend on the respondent’s knowledge itself, including practical experience in an area where the respective knowledge is required. It can be argued that value perception LVGLVWRUWHGGHSHQGLQJRQWKHFRQ¿JXUDWLRQRI WKH UHVSRQGHQW¶V FRPSHWHQFH SUR¿OH DV VRFLDO psychology suggests that individuals rate other people more positively the more similar they are t o t he m s el ve s ( By r ne , 19 7 1; J a c k so n , B r et t , S e s s a , Cooper, Julin & Peyronnin, 1991). In addition, business managers are often not aware of the mul- tidimensionality of IT competence (Nakayama & Sutcliffe, 2003), while inexperienced IT profes- sionals might underestimate the importance of their business competence. In contrast, shared do- main knowledge between IT and business people positively affects a correct understanding of each RWKHU¶VFRQWULEXWLRQWRWKH¿UP5HLFK%HQEDVDW 2000). Furthermore, shared domain knowledge positively affects the degree of IT/Business align- PHQWZLWKLQWKHIRXQGLQJWHDPZKLFK³UHIHUVWR the state in which business and IT executives understand and are committed to the business and IT mission, objectives, and plans” (Reich & Benbasat, 2000, p. 81). In this context, alignment 1915 Competence of Information Technology Professionals in Internet-Based Ventures itself can be expected to clarify the value percep- tion of the competence dimensions critical to IT professionals. Misalignment, in contrast, is likely to distort the respondents’ perceptions. FUTURE TRENDS As the IT/Business environment of the Net Econ- omy will continue to evolve and remain volatile in the future, also the role of the IT professional, respectively, of the CIO in Internet-based ventures can be expected to change further on. In particu- ODUFXUUHQW:HEFRQFHSWVUHGH¿QHWKHUROHV of both Web users and Web developers, requir- ing Internet-based businesses to deliver services rather than software products and trust their cus- tomers as co-developers (O’Reilly, 2005). Some of the resulting competency changes have been discussed in this chapter. However, the impact of Web 2.0 on the core competency requirements of ,QWHUQHWEDVHG¿UPVZLOOIXUWKHULQFUHDVHLQWKH future. Furthermore, the prospective convergence of Web 2.0 and the Semantic Web (Wahlster & Dengel, 2006) will even more dramatically change the IT/Business environment of the Net Economy which will be characterized by intelligent search agents and semantic Web services in the future (Sheth, Verma & Gomadam, 2006). From an IT governance point of view, these changes will inevitably entail a need for IT professionals who understand the technology trends and the resulting managerial implications, as well as a well-aligned team of founders incorporating the wide range of skills and knowledge required for operating a business in the Net Economy. The framework presented in this chapter sets up the theoretical foundations for understanding the IT-related competence requirements and com- petence perceptions within the founding teams of Internet-based ventures. With respect to future research activities, dependencies between factors LQÀXHQFLQJWKHDFWXDOYDOXHIDFWRUVLQÀXHQFLQJ value perception and the perceived value of the individual competence dimensions need to be modelled and tested on an empirical basis. CONCLUSION Drawing upon the general IT governance prin- ciple of aligning business and IT, this chapter articulated the concept of IT-related competence LQ\RXQJ¿UPVRIWKH1HW(FRQRP\RXWOLQHG its dimensions and suggested a framework for modeling effects on the value propositions of the different dimensions as perceived by the partners. The proposed competence model comprises three dimensions, including IT competence, business (i.e., non-IT) competence, and transdisciplinary competence. According to their epistemological and functional/disciplinary characteristics, these dimensions have been subdivided in order to meet the contextual particularities of Net Econ- omy ventures, resulting in eight subdimensions (technology knowledge, conceptual knowledge, realization competence, business management knowledge, entrepreneurial competence, inter- personal competence, Net Economy competence, and IT/Business vision). With respect to exploring the value propositions of these dimensions, two NLQGVRILQÀXHQFLQJIDFWRUVKDYHEHHQLGHQWL¿HG factors that have an effect on the actual value proposition of a competence dimension (such as business model, development phase, resource availability, and environmental dynamism), and IDFWRUVWKDWLQÀXHQFHWKHSHUFHSWLRQRIWKHYDOXH proposition by the partners (such as the respec- tive partner’s functional role and competence SUR¿OHDQGWKHGHJUHHRI,7%XVLQHVVDOLJQPHQW within the team). In order to understand to what extent business and IT people contribute to value creation and how they perceive the contribution of each other’s distinct competencies, possible dependencies have exemplarily been illustrated for ERWKNLQGVRILQÀXHQFLQJIDFWRUV)XUWKHUH[SORU- ing these dependencies and relating them to IT governance principles is crucial to comprehend 1916 Competence of Information Technology Professionals in Internet-Based Ventures the complex competence requirements of Inter- net-based ventures and the mutual understand- ing of the founders’ value contributions within heterogeneous teams. REFERENCES Amit, R., & Zott, C. (2001). Value creation in e-business. Strategic Management Journal, 22(6/7), 493-520. Bailey, J. L., & Stefaniak, G. (2001). Industry perceptions of the knowledge, skills, and abilities needed by computer programmers. In Proceed- ings of the 2001 ACM SIGCPR conference on Computer personnel research (pp. 93-98). New York: ACM Press. Banker, R. D. & Slaughter, S. A. (2000). The moderating effects of structure on volatility and complexity in software enhancement. Information Systems Research, 11(3), 219-240. Bass, L., Clements, P., & Kazman, R. (2003). Software architecture in practice. Boston, MA: Addison-Wesley. Bassellier, G., & Benbasat, I. (2004). Business competence of information technology profes- VLRQDOV&RQFHSWXDOGHYHORSPHQWDQGLQÀXHQFH on IT-business partnerships. MIS Quarterly, 28(4), 673-694. Bassellier, G., Benbasat, I., & Reich, B. (2003). 7KHLQÀXHQFHRIEXVLQHVVPDQDJHUV¶,7FRPSH- tence on championing IT. Information Systems Research, 14(4), 317-336. Bassellier, G., Reich, B. H., & Benbasat, I. (2001). Information technology competence of business managers. Journal of Management Information Systems, 17(4), 159-182. Bauer, C. (2001). Strategic alignment for electronic commerce. In R. Papp (Ed.), Strategic informa- tion technology: Opportunities for competitive advantage (pp. 258-272). Hershey, PA: Idea Group Publishing. Baum, J. R., Locke, E. A., & Smith, K. G. (2001). A multidimensional model of venture growth. Acad- emy of Management Journal, 44(2), 292-303. Bhandari, G., Bliemel, M., Harold, A., & Hassa- nein, K. (2003). Flexibility in e-business strategies: A requirement for success. Global Journal of Flexible Systems Management, 5(2/3), 11-22. Byrne, D. (1971). The attraction paradigm. New York: Academic Press. Cash, E., Yoong, P., & Huff, S. (2004). The impact of e-commerce on the role of IS professionals. The DATA BASE for Advances in Information Systems, 35(3), 50-63. Chandler, G. N., & Hanks, S. (1994). Founder competence, the environment, and venture per- formance. Entrepreneurship Theory and Practice, 18(3), 77-89. Chandler, G. N., & Jansen, E. (1992). The founder’s self-assesed competence and venture performance. Journal of Business Venturing, 7(3), 223-236. Couger, J. D., Davis, G. B., Dologite, D. G., Feinstein, D. L., Gorgone, J. T., Jenkins, A. M., Kasper, G. M., Little, J. C., Longenecker, H. E. Jr., & Valacich, J. S. (1995). IS ‘95: guideline for undergraduate IS curriculum. MIS Quarterly, 19(3), 341-359. Dalal, N. P. (1994). Higher-order thinking in MIS. Journal of Computer Information Systems, 34(4), 26-30. Deshpande, Y., Murugesan, S., Ginige, A., Han- sen, S., Schwabe, D., Gaedke, M., & White, B. (2002). Web engineering. Journal of Web Engi- neering, 1(1), 3-17. Dueck, G. (2001). Views of knowledge are human views. IBM Systems Journal, 40(4), 885-888. 1917 Competence of Information Technology Professionals in Internet-Based Ventures Earl, M. J., & Feeny, D. F. (1994). Is your CIO adding value? Sloan Management Review, 35, 11-20. Fang, X., Lee, S., & Koh, S. (2005). Transition of knowledge/skills requirements for entry-level IS professionals: An exploratory study based on Recruiters’ perception. Journal of Computer Information Systems, Fall 2005, 58-70. Farwell, D., Kuramoto, L., Lee, D. M. S., Trauth, E., & Winslow, C. (1992). A new paradigm for MIS: Implications for IS professionals. Informa- tion Systems Management, 9(2), 7-14. Feeny, D. F., & Willcocks, L. P. (1998). Core IS capabilities for exploiting information technology. Sloan Management Review, 39, 9-21. Ginige, A., & Murugesan, A. (2001). Web en- gineering—An introduction. IEEE Multimedia, 8(1), 14-18. Gorgone, J. T., Davis, G. B., Valacich, J. S., Topi, H., Feinstein, D. L., & Longenecker, H. E., Jr. (2003). IS 2002 model curriculum and guidelines for undergraduate degree programs in information systems. Communications of the AIS, 2003(11), 1-53. Gottschalk, P. (2006). E-business strategy, sourc- ing and governance. Hershey, PA: Idea Group Publishing. Henderson, J. C., & Venkatraman, N. (1999). Strategic alignment: Leveraging information technology for transforming organizations. IBM Systems Journal, 38(2/3), 472-484. Highsmith, J. A. (2002). Agile software develop- ment ecosystems. Boston: Pearson Education. Horlick-Jones, T., & Sime, J. (2004). Living on the border: Knowledge, risk and transdisciplinarity. Futures, 36(4), 441-456. Jackson, S. F., Brett, J. F., Sessa, V. I., Cooper, D. M., Julin, J. A., Peyronnin, K. (1991). Some differences make a difference: Individual dis- similarity and group heterogeneity as correlates of recruitment, promotion, and turnover. Journal of Applied Psychology, 76(5), 675-689. Kollmann, T. (2006). What is e-entrepreneurship? – Fundamentals of company founding in the net economy. International Journal of Technology Management, 33(4), 322-340. Kollmann, T., & Häsel, M. (2006). Cross-chan- nel cooperation: The bundling of online and RIÀLQHEXVLQHVVPRGHOV Wiesbaden: Deutscher Universitäts-Verlag. Kollmann, T., & Häsel, M. (2007). Reverse auc- tions in the service sector: The case of LetsWorkIt. de. International Journal of E-Business Research, 3(3), 57-73. Lee, D., Trauth, E., & Farwell, D. (1995). Critical skills and knowledge requirements of IS profes- sionals: A joint academic/industry investigation. MIS Quarterly, 19(3), 313-340. Luftman, J., & Brier, T. (1999). Achieving and sustaining business-IT alignment. California Management Review, 42(1), 109-122. Lumpkin, G. T., & Dess, G. G. (2004). E-business strategies and internet business models: how the internet adds value. Organizational Dynamics, 33(2), 161-173. MacCormack, A., Verganti, R., & Iansiti, M. 'HYHORSLQJSURGXFWVRQ³,QWHUQHW7LPH´ 7KHDQDWRP\RIDÀH[LEOHGHYHORSPHQWSURFHVV Management Science, 47(1), 133-150. MacInnes, I. (2005). Dynamic business model framework for emerging technologies. Inter- national Journal of Services Technology and Management, 6(1), 3-19. Man, T. W. Y., Lau, T., & Chan, K. F. (2002). The competitiveness of small and medium enterprises: A conceptualization with focus on entrepreneurial competencies. Journal of Business Venturing, 17(2), 123-142. 1918 Competence of Information Technology Professionals in Internet-Based Ventures Matlay, H. (2004). E-entrepreneurship and small e-business development: Towards a comparative research agenda. Journal of Small Business and Enterprise Development, 11(3), 408-414. Medlin, B. D., Dave, D. S., & Vannoy, S. A. (2001). Students’ views of the importance of technical and non-technical skills for successful IT profession- als. Journal of Computer Information Systems , 42(1), 65-69. Meso, P., & Jain, R. (2006). Agile software development: Adaptive systems principles and best practices. Information Systems Manage- ment, 23(3). Murugesan, S., Deshpande, Y., Hansen, S., & Ginige, A. (2001). Web engineering: A new dis- cipline for development of web-based systems. In S. Murugesan & Y. Deshpande (Eds.), Web engineering: Managing diversity and complex- ity of web application development (pp. 3-13). Heidelberg: Springer. Nakayama, M., & Sutcliffe, N. (2003). Skills, management of skills, and IT skills requirements. In M. Nakayama & N. Sutcliffe (Eds.), Managing IT skills portfolios: Planning, acquisition and performance evaluation (pp. 1-25). Hershey, PA: Idea Group Publishing. Nelson, R. R. (1991). Educational needs as per- ceived by IS and end-user personnel: A survey of knowledge and skill requirements. MIS Quaterly, 15(4), 503-525. Nonaka, I. (1994). A dynamic theory of organiza- tional knowledge creation. Organization Science, 5(1), 14-37. O’Reilly, T. (2005). What is web 2.0: De- sign patterns and business models for the next generation of software. Retrieved May 13, 2008, from http://www.oreilly- net.com/pub/a/oreilly/tim/news/2005/09/30/ what-is-web-20.html Patel, N. V. (2004). An emerging strategy for e- business IT governance. In W. Van Grembergen (Ed.), Strategies for information technology governance (pp. 37-80). Hershey, PA: Idea Group Publishing. Peterson, R. R. (2004). Integration strategies and tactics for information technology governance. In W. Van Grembergen (Ed.), Strategies for informa- tion technology governance (pp. 37-80). Hershey, PA: Idea Group Publishing. Polanyi, M. (1967). Tacit dimension. London: Routledge & Kegan Paul. Porter, M. E. (2001). Strategy and the internet. Harvard Business Review, 79(3), 62-78. Reich, B. H., & Benbasat, I. (2000). Factors that LQÀXHQFHWKHVRFLDOGLPHQVLRQRIDOLJQPHQW between business and information technology objectives. MIS Quarterly, 24(1), 81-113. Reifer, D. (2002). Ten deadly risks in internet and intranet software development. IEEE Software, 19(2), 12-14. Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003). Shaping agility through digital options: Reconceptualizing the role of information tech- QRORJ\ LQ FRQWHPSRUDU\¿UPVMIS Quarterly, 27, 237-263. Sgobbi, F. (2002). Web design skills and compe- tencies: An empirical analysis. Human Systems Management, 21(1), 115-128. Sharma, S. K., & Gupta, J. N. D. (2004). E-strat- HJ\ PRGHO IRU FUHDWLQJ ÀH[LEOH RUJDQL]DWLRQV Global Journal of Flexible Systems Management, 5(2/3), 1-9. Sheth, A., Verma, K., & Gomadam, K. (2006). Semantics to energize the full service spectrum. Communications of the ACM, 49(7), 55-61. Shi, D., & Daniels, R. L. (2003). A survey of PDQXIDFWXULQJ ÀH[LELOLW\ ,PSOLFDWLRQV IRU H 1919 Competence of Information Technology Professionals in Internet-Based Ventures EXVLQHVVÀH[LELOLW\IBM Systems Journal, 42(3), 414-428. Sveiby, K. E., & Lloyd, T. (1987). Managing knowhow. London: Bloomsbury Publishing. Tang, H. L., Koh, S., & Lee, S. (2001). Educational gaps as perceived by IS educators: A survey of knowledge and skill requirements. Journal of Computer Information Systems, 41(2), 76-84. Taylor, M. J., England, D., & Gresty, D. (2001). Knowledge for web site development. Internet Research: Electronic Networking Applications and Policy, 11(5), 451-461. Taylor, T. (2006). Web competencies for IT students. In R. Brown (Ed.), In Proceedings 7th International Conference on Information Technol- ogy Based Higher Education and Training (pp. 297-304). Sydney: University of Technology. Todd, P. A., McKeen, J. D., & Gallupe, B. R. (1995). The evolution of IS job skills: A content analysis of IS job advertisements from 1970 to 1990. MIS Quarterly, 19(1), 1-17. Van Grembergen, W., De Haas, S., & Gulden- tops, E. (2004). Structures, processes and rela- tional mechanisms for IT governance. In W. Van Grembergen (Ed.), Strategies for information technology governance (pp. 1-35). Hershey, PA: Idea Group Publishing. Venkatraman, N. (1999). Valuing the IS con- tribution to the business. Computer Sciences Corporation. Von Krogh, G., & Roos, J. (1995). A perspective on knowledge, competence and strategy. Person- nel Review, 24(3), 56-76. Wahlster, W., & Dengel, A. (2006). Web 3.0: Convergence of web 2.0 and the semantic web. Technology Radar Feature Paper Edition II/2006. Deutsche Telekom Laboratories. Weiber, R., & Kollmann, T. (1998). Competitive advantage in virtual markets—Perspectives of ³,QIRUPDWLRQEDVHG PDUNHWLQJ´ LQ F\EHUVSDFH European Journal of Marketing, 32(7/8), 603- 615. Weill, P., & Ross, J.W. (2004). IT governance. Boston, MA: Harvard Business School Press. Youndt, M. A., Snell, S. A., Dean, J. W., Jr., & Lepak, D. P. (1996). Human resource manage- PHQWPDQXIDFW X U L QJVWUDWHJ \D QG¿ U PSHUIRUP- ance. Academy of Management Journal, 39(4), 836-866. Zhang, X., Windsor, J., & Pavur, R. (2003). De- WHUPLQDQWVRIVRIWZDUHYRODWLOLW\$¿HOGVWXG\ Journal of Software Maintanance and Evolution: Research and Practice, 15(3), 191-204. This work was previously published in Information Technology Governance and Service Management: Frameworks and Adap- tations, edited by A. Cater-Steel, pp. 239-253, copyright 2009 by Information Science Reference (an imprint of IGI Global). 1920 Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 6.13 Consumers’ Preferences and Attitudes Toward 0RELOH2IۋFH8VH A Technology Trade-Off Research Agenda Xin Luo Virginia State University, USA Merrill Warkentin Mississippi State University, USA ABSTRACT Consumer preferences, attitudes, and behavior concerning product choice can be of vital im- portance in the development process and imple- mentation of innovative products or services. The PRELOHRI¿FH02LVEHFRPLQJDFKLHYDEOHLQWKH business-to-employee (B2E) arena as more work LVFRPSOHWHGRXWVLGHWKHRI¿FHDQGWKH¿[HGRI¿FH boundaries extend well beyond the spectrum of the desktop. Potential MO providers (e.g., employ- ers) will encounter adoption resistance as users experience uncertainty. This paper investigates the critical factors in the decision models of consum- ers when evaluating the acceptance and intention to use MO. It will provide research guidelines for MO designers and developers, IT/IS managers, and IS researchers. BACKGROUND Mobile business (m-business, also known as mobile commerce or m-commerce), an emerging extension of electronic business, has received considerable interest among IS researchers, devel- opers, service providers, and end users. Varshney and Vetter (2002) anticipate that the next phase of e-business will be in the area of m-business with the widespread deployment of wireless tech- 1921 &RQVXPHUV¶3UHIHUHQFHVDQG$WWLWXGHV7RZDUG0RELOH2I¿FH8VH nologies. Mobile services have penetrated many leading-edge personal markets such as mobile SMS, mobile games, mobile handset icons, and ring tones. Wireless computing is now becoming widely deployed in the business arena as managers KDYHDSSUHFLDWHGWKHVLJQL¿FDQWDGGHGVWUDWHJLF value of having instant access to business infor- mation that can enhance work productivity, ef- ¿F L H Q F \ D Q G G H F L V L R Q  P D N L Q J  X O W L P D W HO\ O H D G L Q J  WRFRP S H W LW LYHDGYD QW DJHIRU W KH ¿ U P%X VL QHVVH V that cater to consumers’ preferences and needs and that capitalize on expanding opportunities, which arise with new technologies, can sustain competi- WLYHDGYDQWDJHVLQWRGD\¶V¿HUFHO\FRPSHWLWLYH marketplace. Deployment of mobile technology infrastructure, along with mobile devices, enables employee mobility and mobility of IT functions. This is transforming businesses processes by enhancing communication, information access, and business transactions from any device any- ZKHUHDQGDQ\WLPH3HUIRUPDQFHEHQH¿WVIURP wireless technology adoption are being realized in the business-to-employee (B2E) domain as corporations seek to achieve their business goals by growing their capabilities. The rapid development of innovative mobile technologies, along with better integration with the existing network infrastructure, presents new challenges for the enterprise. Thanks to existing wireless technologies, such as 2G and 2.5/2.75G, which introduced GPRS (general packet radio service) and EDGE (enhanced data rates for global evolution), new business opportunities are emerging through new value-added services. 3G services are beginning to receive acceptance in such Asian countries as China, South Korea, and Japan. The technological trend and challenge that mobile users are facing is how to better integrate between wireless services, as 3G technologies are being increasingly revamped and further evolved. For the 3G-based CDMA evolutions, handsets will support CDMA, CDMA 1xRTT, and CDMA 1xEV-DO with three kinds of spectrum including 850/1, 900/2, and 100MHz. For the GSM evolu- tion, handsets will support GSM, GPRS, EDGE, DQG:&'0$RSHUDWLQJLQ¿YHEDQGV 800/1 900/2 100MHz). In the near future, 4G will surface as a collection of services combining existing technologies, such as 3G and WiFi, with other types of wireless technologies including WiMAX and future evolutions of 3G. 4G will be featured by high usability anytime, anywhere, and with any technology; support for multimedia services at low transmission cost; personalization; and integrated services. As such, 4G will be less disruptive and more widely accepted if the promise is delivered upon. It is expected that 4G networks will be all-IP-based heterogeneous networks that allow users to switch any system at any time and anywhere. 4G systems will not only support data telecommunication services, but also multimedia services. And users in widely diverse locations will use the services, as users can use multiple services from any service provider at the same time. Though 4G mobile technologies may offer even greater opportunities, the gradual matura- tion and deployment of 3G technologies makes MO become an achievable goal as more work is FRPSOHWHGRXWVLGHWKHRI¿FHDQGWKH¿[HGRI¿FH boundaries extend well beyond the desktop. There is considerable prior IS research about m-business and wireless technologies (Feather- man & Pavlou, 2003; Kleijnen & Ruyter, 2003; Liang & Wei, 2004; Muthaiyah & Ehsan, 2004; Suoranta & Mattila, 2004; Varshney & Vetter, 2002; Zellweger, 1997). However, these research studies have mainly shed light on areas, such as technology acceptance and penetration, as well as technology trends and issues, leaving the domain of consumer preferences and attitudes towards the D G R S W L R Q RI L Q QRYD W L Y H S U R G X F W V  V S H F L ¿ F D O O \ 02  relatively unexplored. More research is needed to explore the factors that constitute ultimate MO adoption and use, as well as the relative importance of these factors for further diffusion of innovation. In consideration of this objective, we investigate 1922 &RQVXPHUV¶3UHIHUHQFHVDQG$WWLWXGHV7RZDUG0RELOH2I¿FH8VH the critical factors in the decision models of consumers when evaluating the acceptance and intention to use MO. Further, we provide research guidelines for MO designers and developers, IT/IS managers, and IS researchers. INTRODUCTION: MOBILE OFFICE TECHNOLOGY Most traditional business applications are de- YHORSHGDQGGHSOR\HGIRUXVHZLWKLQ¿[HGRI¿FH boundaries–using hardware that is not mobile. 7KLVFRQ¿QHPHQWUHVXOWVLQDZLGHUDQJHRIOLPLWD- WLRQVDQGGLI¿FXOWLHVLIHPSOR\HHVFDQQRWDFFHVV needed information whenever and wherever they want, causing postponement in responding to customer requests, dissemination of inaccurate information, and delivering lower-quality work output (Intel, 2004a). Advancements in wire- less technologies have triggered a proliferation of mobile devices and broadened the spectrum of solutions for new business applications and services. In the post-2G era, where the business mobile information environment is compara- tively dynamic, traditional mobile voice services cannot adequately meet customers’ business requirements. 3G networks’ throughputs are fairly equivalent to the early DSL networks that UHYROXWLRQL]HGWKHKRPHRI¿FH*UXPDQ Varshney & Vetter, 2002). Notably, according to Gruman (2005), 3G will reduce the expectation gap and delivery gap between wireless and wired connections. For businesses, there is increasing demand for mobile access to multifunctional services that can enhance communication and collaboration as well as management of business information. Liang and Wei (2004), Muthaiyah and Ehsan (2004), and Gruman (2005) indicate that emerging 3G technologies, such as CDMA- based EvDO (evolution, data optimized) and GSM-based UMTS (universal mobile telecom- munications system), and HSDPA (high-speed downlink packet access), have the potential to revolutionize MO users using notebook comput- ers and handsets over the high-speed wide area network (WAN). Due to the dynamic nature of today’s business environment, employees are spending less time ¿[HGWRWKHLUGHVNVDQGPRUHWLPHLQFROODERUDWLYH work meetings, telecommuting, and working in remote locations to accomplish their job objec- WLYHV8QOLNHD¿[HGRI¿FHZKHUHHPSOR\HHVDUH restricted in a limited environment, MO, including on the road, at home, and at work (Cisco, 2002; Gruman, 2005; IBM, 2004; Intel, 2004a, 2004b; North-Smith, 2002), expands the reach of the RI¿FHHQYLURQPHQWDQGSURYLGHVHPSOR\HHVZLWK access to their information, applications/services, and teams, in an anytime and anywhere model, WKHUHE\HOLPLQDWLQJWKHREVWDFOHVRI¿[HGRI¿FH boundaries. As more work is completed outside the RI¿FHDQGDVRI¿FHERXQGDULHVH[WHQGZHOOEH\RQG the spectrum of desktop computing, many of the VROLGEXVLQHVVEHQH¿WVIURPZLUHOHVVWHFKQRORJ\ adoption are being realized in the B2E domain. According to Kleijnen and Ruyter (2003), MO has great potential to become one of the most widely utilized m-business solutions with the global user base potentially exceeding 100 million in 2004. It can beef up productivity for employees, since having real-time access to business information is key to increasing productivity and corporate SUR¿WDELOLW\DVDZKROH7KHFRQJUXHQFHRIWKH ¿QGLQJV RI .OHLMQHQ DQG 5X\WHU  &LVFR (2002), IBM (2004), North-Smith (2002), Liang and Wei (2004), Gruman (2005), and Muthaiyah and Ehsan (2004) is that unique MO services, thanks to the revolutionarily enhanced 3G tech- nologies, consist of accelerating mobile com- munication and collaboration services (e-mail, H ID [  X Q L ¿ H G P H V V D J L Q J J UR X SZ D U H P H V V D J L Q J    mobile business information management ser- vices (real-time calendar events, address books, to-do task lists, calculator, word processor), and mobile information access services (access to 1923 &RQVXPHUV¶3UHIHUHQFHVDQG$WWLWXGHV7RZDUG0RELOH2I¿FH8VH &50 DFFHVV WR FRUSRUDWH ¿OHV DQG FRUSRUDWH databases via secure mobile portal, access to external business information services). These process facilitation services are increasingly be- coming incorporated in a mobile corporate portal that is a combination of hardware and software with integrated network development, timely information management, and seamless security mechanisms to enable communications between wireless networks and devices. Being able to create new expectations among business users who want to constantly maintain work sessions without disruption and discon- nection on the road, at home, or at work, the emerging deployment of the 3G-powered MO initiatives will greatly transform and improve the way employees work and communicate with col- leagues, customers, suppliers, and vendors. These improvements also contribute to rapid responsive- ness, decreased costs, improved productivity and ZRUNHI¿FLHQF\DQGEHWWHUZRUNOLIHEDODQFHLQ WHUPV RI PRUH ÀH[LELOLW\ DQG FKRLFHV 0DQDJ- ers, however, must understand whether and how MO would be accepted and ultimately adopted by employees/users in order to help companies achieve organizational objectives and obtain competitive advantage. Also, potential providers of MO will encounter a high uncertainty about consumers’ acceptance and intention to use. A lack of studies directly investigating the adoption and diffusion patterns of MO is to be expected due to the newness of the MO initiatives per se. Employee/user behavior in the MO context also has remained rather uncharted territory, which leads to an important topic for further research within the MIS discipline. THEORETICAL FOUNDATION The theoretical framework of this chapter is grounded in the innovation diffusion theory (IDT) and perceived characteristics of innovating (PCI). Despite the fact that there is little empirical research conducted on MO, there is a plethora of adoption theories and models that investigate and capture user behavior characteristics. In IS research area, the landmark is the technology acceptance model (TAM), proposed by Davis D Q G ' D Y L V    W K D W LG H Q W L ¿ H G ease-of-use (EOU) and usefulness as the two key determi- QDQWVLQÀXHQFLQJXVHUDGRSWLRQ+RZHYHU3ORXIIH et al. (Plouffe, Hulland, & Vandenbosch, 2001) indicate that TAM’s parsimony makes individual responses to new technologies differ depending on the context. In a bid to integrate the main user acceptance models, Venkatesh, Morris, Davis, and Davis (2003) formulated the XQL¿HGWKHRU\ of acceptance and use of technology (UTAUT), ZKLFKH[KLELWVVLJQL¿FDQWO\HQKDQFHGSUHGLFWLYH value for adoption intention, with an adjusted R square of approximately 70%. Yet, one weakness of the UTAUT model is that the empirical base did not include e-commerce or m-commerce technologies, which Venkatesh et al. (2003) identi- ¿HGDVQHHGLQJIXUWKHULQYHVWLJDWLRQDQGWHVWLQJ Consistent with Plouffeet al. (2001), Kleijnen and Ruyter (2003) argue that the narrow focus of the adoption concepts hinders us from identifying other potential drivers of m-commerce adop- tion. User acceptance of m-commerce-oriented 02FDQEHLGHQWL¿HGDVDWHFKQRORJ\DGRSWLRQ Following the recommendation of Kleijnen and Ruyter (2003), we thus focus on the adoption process in search of valuable insights for build- ing a theoretical framework for critical success factors of MO. I n t he d o m a i n o f a d o p t i o n p r o c e s s , i n n o v a t i o n , and diffusion (ID) is extensively researched and is ³perhaps one of the most widely researched and best documented social phenomena” (Mahajan & Peterson, 1985). In ID research, IDT, proposed by Rogers (1995), is the most acceptable and reliable framework that has been fairly widely validated in sociology, psychology, and commu- nications as well as IS to explain user adoption of technical innovations. According to Rogers LQQRYDWLRQLV³an idea perceived as new . align- PHQWZLWKLQWKHIRXQGLQJWHDPZKLFK³UHIHUVWR the state in which business and IT executives understand and are committed to the business and IT mission, objectives, and plans” (Reich & Benbasat, 2000, p. 81) 35(3), 50-63. Chandler, G. N., & Hanks, S. (1994). Founder competence, the environment, and venture per- formance. Entrepreneurship Theory and Practice, 18(3), 77-89. Chandler, G. N., &. Software Maintanance and Evolution: Research and Practice, 15(3), 191-204. This work was previously published in Information Technology Governance and Service Management: Frameworks and Adap- tations,

Ngày đăng: 07/07/2014, 10:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN