438
Views
2
CrossRef citations to date
0
Altmetric
Pages 140-160 | Received 06 Jan 2015, Accepted 29 May 2015, Published online: 10 Jul 2015
 

Abstract

Diffusion of Innovation (DOI) theory is a popular model used to explain the adoption of new technologies and to analyze the movement of innovations as they spread through a population. In the changed security environment since September 11th, 2001 (9/11), DOI becomes especially relevant. This systematic literature review offers synthesized findings on how controversy impacts the DOI process by looking to existing literature to discuss barriers, incentives, and lessons learned. Results demonstrated a diverse landscape of articles addressing controversial adoption; specifically, we see potential solutions; barriers, including a lack of transparency and limited accessibility for public assessment and dialogue before implementation; and incentives offered to adopters beyond benefits associated with the core function of the new technology itself. Finally, suggestions are provided in the area of future research, including the need for specific research to supplement and validate many of the findings from the larger field of DOI studies.

Notes

[1.] Sandy Kristin Piderit, “Rethinking Resistance and Recognizing Ambivalence: A Multidimensional View of Attitudes toward an Organizational Change,” Academy of Management Review 25, no. 4 (2000): 783–94. http://www.jstor.org/stable/259206

[2.] Everett M. Rogers, Diffusion of Innovations. 5th ed. (New York, NY: Free Press, 2010).

[3.] Paul C. Nutt, Planning Methods for Health and Related Organizations (New York: Wiley, 1984).

[4.] Y. Connie Yuan, Dan Cosley, Howards T. Welser, Ling Xia, and Geri Gay, “The Diffusion of a Task Recommendation System to Facilitate Contributions to an Online Community,” Journal of Computer‐Mediated Communication 15, no. 1 (2009): 32–59.

[5.] Franziska Hofer and Olive E. Wetter, “Operational and Human Factors Issues of New Airport Security Technology - Two Case Studies,” Journal of Transportation Security 5, no. 4 (2012): 284–5.

[6.] Stuart Cameron, “Securing the Cities: Agencies Working Together to Detect Dangerous Radiological Materials,” The Police Chief 75, no. 10 (2008): 142–57; Illinois Distributes Portable Radiation Detectors for First Responders, TECHBeat, no. 1 (2012): 1–2. https://www.justnet.org/InteractiveTechBeat/summer_2012/Radiationdetectors.pdf

[7.] Tonya L. Putnam, “Communicating Nuclear Risk: Informing the Public about the Risks and Realities of Nuclear Terrorism,” in Workshop Report (Palo Alto, CA: Center for International Security and Cooperation, Stanford University, 2002).

[8.] Everett M. Rogers, Diffusion of Innovations. 5th ed. (New York, NY: Free Press, 2010).

[9.] Rogers, Diffusion of Innovations.

[10.] Joseph Tidd, Gaining Momentum: Managing the Diffusion of Innovations (London: Imperial College Press, 2010).

[11.] Rogers, Diffusion of Innovations, 44–45.

[12.] Rogers, Diffusion of Innovations, 45; Brian Oldenburg and Karen Glanz, “Diffusion of innovations,” in  Health Behavior and Health Education Theory, Research and Practice, ed. Karen Glanz, Barbara K. Rimer, and K. Viswanath (John Wiley and Sons, 2008), 313–33.

[13.] Tidd, “Gaining Momentum”, 1.

[14.] Rogers, Diffusion of Innovations, 35.

[15.] Rogers, Diffusion of Innovations.

[16.] Trisha Greenhalgh, Glenn Robert, Fraser MacFarlane, Paul Bate, and Olivia Kyriakidou, “Diffusion of Innovations in Service Organizations: Systematic Review And Recommendations,” The Milbank Quarterly 82, no. 4 (2004): 581–629.

[17.] Rogers, Diffusion of Innovations.

[18.] Rogers, Diffusion of Innovations.

[19.] Rogers, Diffusion of Innovations.

[20.] Rogers, Diffusion of Innovations.

[21.] Rogers, Diffusion of Innovations.

[22.] Oldenburg and Glanz, “Diffusion of Innovations.”

[23.] Greenhalgh et al., “Diffusion of Innovations.”

[24.] Rogers, Diffusion of Innovations.

[25.] Bruce L. Ottley, “Airport Full-Body Scanners: Improved Security or Cause for Concern,” Issues in Aviation Law and Policy, no. 9 (2009): 221–6.

[26.] Declan McCullagh, Growing backlash against TSA's “naked strip searches”, CBS News, 2010. http://www.cbsnews.com/news/growing-backlash-against-tsas-naked-strip-searches/; Ottley, “Airport Full-Body Scanners”; Shaikh Haitham Al-Haddad, “Fatwa: Nude-Body Security Scanners,” Islam21c, June 3, 2010. http://www.islam21c.com/fataawa/837-fatwa-nude-body-security-scanners/

[27.] Alex Altman, “TSA Scrambles to Combat the Outcry over Body Scanning,” Time, November 23, 2010. http://content.time.com/time/nation/article/0,8599,2032786,00.html

[28.] Lee S. Strickland and Laura E. Hunt, “Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions,” Journal of the American Society for Information Science and Technology 56, no. 3 (2005): 221–34.

[29.] Lun YH Venus, Christina WY Wong, Kee‐Hung Lai, and T.C.E. Cheng, “Institutional Perspective on the Adoption of Technology for the Security Enhancement of Container Transport,” Transport Reviews 28, no. 1 (2008): 21–33.

[30.] Rita Boland, “A Sensor in Every Pocket,” SIGNAL Magazine, August, 2010. http://www.afcea.org/content/?q=node/2356

[31.] Torin Monahan and Jennifer T. Mokos, “Crowdsourcing Urban Surveillance: The Development of Homeland Security Markets for Environmental Sensor Networks,” Geoforum no. 49 (2013): 279–88; Boland, “A Sensor in Every Pocket.”

[32.] R. A. Noulty and T. D. McLean, “Bubble Detectors—A Maturing Technology,” Radiation Measurements 27, no. 1 (1997): 1–11; Gene Aloise, “Combating Nuclear Smuggling: Efforts to Deploy Radiation Detection Equipment in the United States and in Other Countries,” DHHS Publication No. GAO-05-840T, Washington, DC, 2005.

[33.] Stuart Cameron, “Securing the Cities: Agencies Working Together to Detect Dangerous Radiological Materials,” The Police Chief 75, no. 10 (2008): 142–57; Illinois Distributes Portable Radiation Detectors for First Responders, TECHBeat, no. 1 (2012): 1–2.https://www.justnet.org/InteractiveTechBeat/summer_2012/Radiationdetectors.pdf

[34.] TECHBeat

[35.] Subgroup on Radon Epidemiology of the Advisory Group on Ionizing Radiation, Radon and Public Health (2009). http://www.hpa.org.uk/webc/hpawebfile/hpaweb_c/1243838496865; Ashok Vaseashta, P. Susmann, Eric W. Braman, and Nicolae A. Enaki, “Nuclear Terrorism- Dimensions, Options, and Perspectives in Moldova,” in Technological Innovations in Sensing and Detection of Chemical, Biological, Radiological, Nuclear Threats and Ecological Terrorism (The Netherlands: Springer, 2012), 101–14.

[36.] Joseph P. Record, “Data Logging Radiation Detector,” PhD diss., University of Maine, 2012. http://digitalcommons.library.umaine.edu/honors/75/

[37.] Holly Etchegary, Jennifer EC Lee, Louise Lemyre, and Daniel Krewski, “Canadians' Representation of Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) Terrorism: A Content Analysis,” Human and Ecological Risk Assessment 14, no. 3 (2008): 479–94.

[38.] Sherry R. Ward, “Health Smart Cards: Merging Technology and Medical Information,” Medical Reference Services Quarterly 22, no. 1 (2003): 57–65; Bratan, Stramer, and Greenhalgh, “Never Heard of It.”

[39.] Bratan et al., “Never Heard of It.”

[40.] Emily Maxson, Sachin Jain, Mat Kendall, Farzad Mostashari, and David Blumenthal, “The Regional Extension Center Program: Helping Physicians Meaningfully Use Health Information Technology,” Annals of Internal Medicine 153, no. 10 (2010): 666–70.

[41.] Francois Duguay, Lea Katsanis, and Mrugank Thakor, “The Identification of Factors Linked To The Potential Acceptance Of Transgenic Biopharmaceuticals: An Exploratory Study,” Health Marketing Quarterly 21, no. 1–2 (2003): 65–89.

[42.] Shelagh K. Genuis, “Exploring the Role of Medical and Consumer Literature in the Diffusion of Information Related to Hormone Therapy for Menopausal Women,” Journal of the American Society for Information Science and Technology 57, no. 7 (2006): 974–88.

[43.] Bradford L. Barham, Jeremy D. Foltz, Douglas Jackson-Smith, and Sunung Moon, “The Dynamics of Agricultural Biotechnology Adoption: Lessons from Series rBST Use in Wisconsin, 1994-2001,” American Journal of Agricultural Economics 86, no. 1 (2004): 61–72.

[44.] M. R. Gillick, “The Technological Imperative and the Battle For The Hearts Of America,” Perspectives in Biology and Medicine 50, no. 2 (2007): 276–94.

[45.] Hasan Cavusoglu, Nan Hu, Yingjiu Li, and Dan Ma, “Information Technology Diffusion with Influentials, Imitators, and Opponents,” Journal of Management Information Systems 27 no. 2 (2010): 305–34.

[46.] Gillick, “The Technological Imperative.”

[[47.] Laura M. Lechuga, ed., Commercial and Pre-commercial Cell Detection Technologies for Defence against Bioterror: Technology, Market and Society, vol. 39 (Ios Press, 2008).

[[48.] Wesley Willett, Paul Aoki, Neil Kumar, Sushmita Subramanian, and Allison Woodruff, “Common Sense Community: Scaffolding Mobile Sensing and Analysis for Novice Users,” in Pervasive Computing (Berlin Heidelberg: Springer, 2010), 301–18.

[[49.] Willett et al., Common Sense Community.

[50.] Elizabeth Bales, Nima Nikzad, Nichole Quick, Celal Ziftci, Kevin Patrick, and William Griswold, “Citisense: Mobile Air Quality Sensing For Individuals and Communities: Design and Deployment Of The Citisense Mobile Air-Quality System,” in Proceedings from the 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops (San Diego, CA: Institute for Electrical and Electronic Engineers, 2012).

[51.] Sophie A. Gosling, Johanna I. Westbrook, and Rosemary Spencer, “Nurses’ Use of Online Clinical Evidence,” Journal of Advanced Nursing 47, no. 2 (2004): 201–11; Shannon D. Scott, Ronald C. Plotnikoff, Nandini Karunamuni, Raphael Bize, and Wendy Rodgers, “Factors Influencing the Adoption of An Innovation: An Examination of the Uptake of the Canadian Heart Health Kit (HHK),” Implementation Science 3, no. 41 (2008): 1–8.

[52.] Lei-Shih Chen, Oi-Man Kwok, and Patricia Goodson, “US Health Educators' Likelihood of Adopting Genomic Competencies into Health Promotion,” American Journal of Public Health 98, no. 9 (2008): 1651–7.

[53.] Maja Korica and Eamonn Molloy, “Making Sense of Professional Identities: Stories of Medical Professionals and New Technologies,” Human Relations 63, no. 12 (2010): 1879–901.

[54.] Lemuria Carter and France Beélanger, “The Utilization of E-Government Services: Citizen Trust, Innovation and Acceptance Factors,” Information Systems Journal 15, no. 1 (2005): 5–25.

[55.] Putnam, “Communicating Nuclear Risk.”

[56.] Bratan et al., “Never Heard of It.”

[57.] Ljudevit Pranic, Wesley S. Roehl, and David B. West, “Acceptance and Perceived Effectiveness of Biometrics and Other Airport Security Procedures,” Acta Turistica Nova 3, no. 1 (2009): 111–36.

[58.] Etchegary et al., “Canadians’ Representations of Terrorism.”

[59.] Baruch Fischhoff, Ann Bostrom, and Marilyn Jacobs Quadrel, “Risk Perception and Communication,” Annual Review of Public Health 14, no. 1(1993): 183–203.

[60.] Cristopher M. Masi, Yolanda Suarez‐Balcazar, Margaret Z. Cassey, Leah Kinney, and Z. Harry Piotrowski, “Internet Access and Empowerment,” Journal of General Internal Medicine 18, no. 7 (2003): 525–30.

[61.] Cameron, “Securing the Cities”; TECHBeat.

[62.] Altman, “TSA scrambles”; Willett et al., Common Sense Community.

[63.] Willman, “Homeland Security Cancels Plans.”

[64.] Cameron, “Securing the Cities”; Maxson et al., “The Regional Extension Center Program”; Chen et al., “Likelihood of Adopting Genomic Competencies.”

[65.] Rogers, Diffusion of Innovations.

[66.] Ward, “Health Smart Cards.”

[67.] Jonathan P. Tomes, “Avoiding the Trap in the HITECH Act's Incentive Timeframe for Implementing the HER,” Journal of Health Care Finance 37, no. 1 (2009): 91–100.

[68.] Velayudhan, “Dissemination of Solar Photovoltaics.”

[69.] Rogers, Diffusion of Innovations.

[70.] Tomes, “Avoiding the Trap.”

[71.] Ambarish Chandra, Sumeet Gulati, and Milind Kandlikar, “Green Drivers or Free Riders? An Analysis of Tax Rebates for Hybrid Vehicles,” Journal of Environmental Economics and Management 60, no. 2 (2010): 78–93.

[72.] Hideki Hashimoto, Haruko Noguchi, Paul Heidenreich, Olga Saynina, Abigail Moreland, Shunichi Miqazaki, Shunya Ikeda, Yoshihiro Kaneko, and Naoki Ikegami, “The Diffusion of Medical Technology, Local Conditions, and Technology Re-Invention: A Comparative Case Study On Coronary Stenting,” Health Policy 79, no. 2–3 (2006): 221–30.

[73.] Bales et al., “Citisense.”

[74.] Rogers, Diffusion of Innovations, 14.

[75.] Korica and Molloy, “Making Sense of Professional Identities.”

[76.] Velayudhan, “Dissemination of Solar Photovoltaics.”

[77.] Velayudhan, “Dissemination of Solar Photovoltaics.”

[78.] Gouws and van Rheede van Oudtshoorn, “Brand Longevity and Diffusion of Innovations.”

[79.] Piderit, “Rethinking Resistance and Recognizing Ambivalence.”

[80.] Rogers, Diffusion of Innovations.

[81.] Y. Connie Yuan, Dan Cosley, Howards T. Welser, Ling Xia, and Geri Gay, “The Diffusion of a Task Recommendation System to Facilitate Contributions to an Online Community,” Journal of Computer‐Mediated Communication 15, no. 1 (2009): 32–59.

[82.] Franziska Hofer and Olive E. Wetter, “Operational and Human Factors Issues of New Airport Security Technology - Two Case Studies,” Journal of Transportation Security 5, no. 4 (2012): 284–5.

[83.] Cameron, “Securing the Cities”; Becky Lewis, “Illinois Distributes Portable Radiation Detectors for First Responders,” TECHBeat, no. 1 (2012): 9–11. https://www.ncjrs.gov/app/Publications/abstract.aspx?ID=261271

[84.] CraigVan Slyke, Virginia Ilie, Hao Lou, and Thomas Stafford, “Perceived Critical Mass and the Adoption of a Communication Technology,” European Journal of Information Systems 16, no. 3 (2007): 270–83.

[85.] Fischhoff, Bostrom, and Quadrel, “Risk Perception and Communication.”

[86.] Fischhoff, Bostrom, and Quadrel, “Risk Perception and Communication.”

[87.] Genuis, “Exploring the Role of Medical Literature.”

[88.] Cameron, “Securing the Cities.”

[89.] Gouws and van Rheede van Oudtshoorn, “Brand Longevity and Diffusion of Innovations.”

[90.] Genuis, “Exploring the Role of Medical Literature.”

[91.] Thomas F. Sanquist, Heidi Mahy, and Frederic Morris, “An Exploratory Risk Perception Study of Attitudes toward Homeland Security Systems,” Risk Analysis 28, no. 4 (2008): 1125–33.

[92.] Richard Honicky, Eric A. Brewer, Eric A., Paulos, and Richard White, “N-smarts:Networked Suite of Mobile Atmospheric Real-Time Sensors,” in Proceedings from the Second ACM SIGCOMM Workshop on Networked Systems for Developing Regions (Seattle, WA, 2008), 25–30.

[93.] Gallup, “Trust in Government,” Gallup, http://www.gallup.com/poll/5392/trust-government.aspx

[94.] Pranic, Roehl, and West, “Acceptance and Perceived Effectiveness of Biometrics.”

[95.] Ottley, “Airport Full-Body Scanners.”

Additional information

Funding

Disclaimer: The views, opinions, and/or findings contained in this article are those of the author(s) and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government. This research was funded by the Defense Advanced Research Projects Agency (DARPA) via the National Consortium for the Study of Terrorism and Responses to Terrorism (START) [grant number: W911NF-14-1-0178]. Distribution Statement: Approved for Public Release, Distribution Unlimited.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 138.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.