604
Views
90
CrossRef citations to date
0
Altmetric
Original Article

Network Externalities and Technology Use: A Quantitative Analysis of Intraorganizational Blogs

, &
Pages 145-174 | Published online: 08 Dec 2014

References

  • Agarwal, R., and Prasad, J. A field study of the adoption of software process innovations by information systems professionals. IEEE Transactions on Engineering Management, 47, 3 (2000), 295-308.
  • Aguinis, H. Statistical power with moderated multiple regression in management research. Journal of Management, 21, 6 (1995), 1141.
  • Anderson, C., and Mayfield, R. Fortune 500 business blogging wiki. Socialtext, 2005 (available at www.socialtext.net/bizblogs/index.cgi?fortune_500_business_blogging_wiki
  • Aydin, C. E., and Rice, R. E. Social worlds, individual differences, and implementation: Predicting attitudes toward a medical information system. Information and Management, 20, 2 (1991), 119-136.
  • Bandura, A. Social Learning Theory. Englewood Cliffs, NJ: Prentice Hall, 1977.
  • Belsley, D. A.; Kuh, E.; and Welsch, R. E. Regression Diagnostics: Identifying Influential Data and Sources of Collinearity. New York: Wiley-Interscience, 2005.
  • Benkler, Y. The Wealth of Networks. New Haven: Yale University Press, 2006.
  • Bhattacharjee, A. Managerial influences on intra-organizational technology use: A principal-agent model. Decision Sciences, 29, 2 (1998), 139-162.
  • Boeker, W. Executive migration and strategic change: The effect of top manager movement on product-market entry. Administrative Science Quarterly, 42, 2 (1997), 213-236.
  • Boyd, D., and Heer, J. Profiles as conversation: Networked identity performance on Friendster. In R. H. Sprague (ed.), Proceedings of the 39th Annual Hawaii International Conference in System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2006 (available at www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2006.394
  • Brass, D. J.; Galaskiewicz, J.; Greve, H. R.; and Tsai, W. Taking stock of networks and organizations: A multilevel perspective. Academy of Management Journal, 47, 6 (2004), 795-817.
  • Burt, R. S. Social contagion and innovation: Cohesion versus structural equivalence. American Journal of Sociology, 92, 6 (1987), 1287-1335.
  • Contractor, N. S., and Eisenberg, E. M. Communication networks and new media in organizations. In J. Fulk and C. W. Steinfield (eds.), Organizations and Communication Technology. Newbury Park, CA: Sage, 1990, pp. 143-172.
  • Cooper, R. B., and Zmud, R. W. Information technology implementation research: A technological diffusion approach. Management Science, 36, 2 (1990), 123-139.
  • Davis, F. D.; Bagozzi, R. P.; and Warshaw, P. R. User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 8 (1989), 982-1003.
  • DeLone, W. H., and McLean, E. R. Information systems success: The quest for the dependent variable. Information Systems Research, 3, 1 (1992), 60-95.
  • Deutsch, M., and Gerard, H. B. A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology, 51, 3 (1955), 629-636.
  • Efimova, L., and Grudin, J. Crossing boundaries: A case study of employee blogging. In R. H. Sprague (ed.), Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2007 (available at http://doc.telin.nl/dsweb/Get/Document-65836/
  • Fichman, R. G. Information technology diffusion: A review of empirical research. In J. I. DeGross, J. D. Becker, and J. J. Elam (eds.), Proceedings of the Thirteenth International Conference on Information Systems. Atlanta: Association for Information Systems, 1992, pp. 195-206.
  • Fishbein, M., and Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Boston: Addison-Wesley, 1975.
  • Fulk, J. Social construction of communication technology. Academy of Management Journal, 36, 5 (1993), 921-950.
  • Fulk, J.; Schmitz, J.; and Steinfield, C. W. A social influence model of technology use. In J. Fulk and C. W. Steinfield (eds.), Organizations and Communication Technology. Newbury Park, CA: Sage, 1990, pp. 117-140.
  • Gefen, D., and Straub, D. W. Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS Quarterly, 21, 4 (1997), 389-400.
  • Goodhue, D. L., and Thompson, R. L. Task-technology fit and individual performance. MIS Quarterly, 19, 2 (1995), 213-236.
  • Grudin, J. Enterprise knowledge management and emerging technologies. In R. H. Sprague (ed.), Proceedings of the 39th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2006 (available at www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2006.156
  • Hall, D. T., and Mansfield, R. Relationships of age and seniority with career variables of engineers and scientists. Journal of Applied Psychology, 60, 2 (1975), 201-210.
  • Hansen, M. T. The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits. Administrative Science Quarterly, 44, 1 (1999), 82-85.
  • Hertel, G.; Niedner, S.; and Herrmann, S. Motivation of software developers in open source projects: An Internet-based survey of contributors to the Linux kernel. Research Policy, 32, 7 (2003), 1159-1177.
  • Igbaria, M.; Zinatelli, N.; Cragg, P.; and Cavaye, A. L. M. Personal computing acceptance factors in small firms: A structural equation model. MIS Quarterly, 21, 3 (1997), 279-305.
  • Jackson, A.; Yates, J.; and Orlikowski, W. Corporate blogging: Building community through persistent digital talk. In R. H. Sprague (ed.), Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2007 (available at www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2007.155
  • Jina, H.; Lauretta, J.; Thomas, E.; Wendy, A. K.; Rachel, K. E. B.; and John, C. T. BlogCentral: The role of internal blogs at work. In M. B. Rosson and D. Gilmore (eds.), CHI'07 Extended Abstracts on Human Factors in Computing Systems. New York: ACM Press, 2007.
  • Karahanna, E., and Straub, D. W. The psychological origins of perceived usefulness and ease-of-use. Information & Management, 35, 4 (1999), 237-250.
  • Katz, M. L., and Shapiro, C. Technology adoption in the presence of network externalities. Journal of Political Economy, 94, 4 (1986), 822-841.
  • Kolari, P.; Finin, T.; Lyons, K.; Yesha, Y.; Yesha, Y.; Perelgut, S.; and Hawkins, J. On the structure, properties and utility of internal corporate blogs. Paper presented at the International Conference on Weblogs and Social Media, Boulder, CO, 2007 (available at www.icwsm.org/papers/2-Kolari-Finin-Lyons-Yesha-Yesha-Perelgut-Hawkins.pdf
  • Kraut, R. E.; Fussell, S. R.; Brennan, S. E.; and Siegel, J. Understanding effects of proximity on collaboration: Implications for technologies to support remote collaborative work. In P. Hinds and S. Kiesler (eds.), Distributed Work. Cambridge, MA: MIT Press, 2002, pp. 137-162.
  • Kraut, R. E.; Rice, R. E.; Cool, C.; and Fish, R. S. Varieties of social influence: The role of utility and norms in the success of a new communication medium. Organization Science, 9, 4 (1998), 437-453.
  • Kumar, R.; Novak, J.; Raghavan, P.; and Tomkins, A. Structure and evolution of blogspace. Communications of the ACM, 47, 12 (2004), 35-39.
  • Lee, H. H.; Hwang, T.; and Lee, S. Corporate blogging strategies of the Fortune 500 companies. Management Decision, 44, 3 (2006), 316-334.
  • Leonard-Barton, D., and Deschamps, I. Managerial influence in the implementation of new technology. Management Science, 34, 10 (1988), 1252-1265.
  • Lewis, L. K., and Seibold, D. R. Innovation modification during intraorganizational adoption. Academy of Management Review, 18, 2 (1993), 322-354.
  • Lou, H.; Luo, W.; and Strong, D. Perceived critical mass effect on groupware acceptance. European Journal of Information Systems, 9, 2 (2000), 91-103.
  • Ma, M., and Agarwal, R. Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities. Information Systems Research, 18, 1 (2007), 42-67.
  • Markus, M. L. Electronic mail as the medium of managerial choice. Organization Science, 5, 4 (1994), 502-527.
  • Markus, M. L., and Connolly, T. Why CSCW applications fail: Problems in the adoption of interdependent work tools. In Proceedings of the 1990 ACM Conference on Computer-Supported Cooperative Work. New York: ACM Press, 1990, pp. 371-380.
  • Matutes, C., and Padilla, A. J. Shared ATM networks and banking competition. European Economic Review, 38, 5 (1994), 1113-1138.
  • Meyers, R. A.; Brashers, D. E.; Winston, L.; and Grob, L. Sex differences and group argument: A theoretical framework and empirical investigation. Communication Studies, 48, 1 (1997), 19-41.
  • Minton, H. L., and Schneider, F. W. Differential Psychology. Prospect Heights, CA: Waveland Press, 1980.
  • Monge, P. R., and Contractor, N. S. Theories of Communication Networks. New York: Oxford University Press, 2003.
  • Morris, M. G., and Venkatesh, V. Age differences in technology adoption decisions: Implications for change in the work force. Personnel Psychology, 53, 2 (2000), 375-403.
  • Morris, M. G.; Venkatesh, V.; and Ackerman, P. L. Gender and age differences in employee decisions about new technology: An extension to the theory of planned behavior. IEEE Transactions on Engineering Management, 52, 1 (2005), 69-84.
  • Nonnecke, B., and Preece, J. Shedding light on lurkers in online communities. Paper presented at the conference Ethnographic Studies in Real and Virtual Environments: Inhabited Information Spaces and Connected Communities, Edinburgh, 1999 (available at www.itu.dk/~khhp/speciale/videnskabelige%20artikler/Nonnecke_1999%20DRAFT%20Shedding%20light%20on%20lurkers%20in%20online%20com.pdf
  • Nonnecke, B., and Preece, J. Why lurkers lurk. In AMCIS 2001 Proceedings. Atlanta: Association for Information Systems, 2001 (available at http://aisel.aisnet.org/amcis2001/294/
  • Parameswaran, M., and Whinston, A. B. Social computing: An overview. Communications of the AIS, 19, 1 (2007), 762-780.
  • Plude, D. J., and Doussard-Roosevelt, J. A. Aging, selective attention, and feature integration. Psychology and Aging, 4, 1 (1989), 98-105.
  • Rice, R. E., and Aydin, C. Attitudes toward new organizational technology: Network proximity as a mechanism for social information processing. Administrative Science Quarterly, 36, 2 (1991), 219-244.
  • Rice, R. E.; Grant, A. E.; Schmitz, J.; and Torobin, J. Individual and network influences on the adoption and perceived outcomes of electronic messaging. Social Networks, 12, 1 (1990), 27-55.
  • Rogers, E. M. Diffusion of Innovations, 5th ed. New York: Free Press, 2003.
  • Sabherwal, R.; Jeyaraj, A.; and Chowa, C. Information system success: Individual and organizational determinants. Management Science, 52, 12 (2006), 1849-1864.
  • Salancik, G. R., and Pfeffer, J. A social information processing approach to job attitudes and task design. Administrative Science Quarterly, 23, 2 (1978), 224-253.
  • Schler, J.; Koppel, M.; Argamon, S.; and Pennebaker, J. Effects of age and gender on blogging. Paper presented at the AAI Spring Symposium on Computational Approaches for Analyzing Weblogs, Stanford University, 2006 (available at www.aaai.org/Papers/Symposia/Spring/2006/SS-06-03/SS06-03-039.pdf
  • Schumacher, P., and Morahan-Martin, J. Gender, Internet and computer attitudes and experiences. Computers in Human Behavior, 17, 1 (2001), 95-110.
  • Skinner, B. F. Contingencies of reinforcement: A theoretical analysis. Englewood Cliffs, NJ: Prentice Hall, 1969.
  • Thompson, R. L.; Higgins, C. A.; and Howell, J. M. Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15, 1 (1991), 125-143.
  • Van Slyke, C.; Lou, H.; and Day, J. The impact of perceived innovation characteristics on intention to use groupware. Information Resources Management Journal, 15, 1 (2002), 5-12.
  • Venkatesh, V., and Davis, F. D. A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46, 2 (2000), 186-204.
  • Venkatesh, V., and Morris, M. G. Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24, 1 (2000), 115-139.
  • Venkatesh, V.; Morris, M. G.; Davis, G. B.; and Davis, F. D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 3 (2003), 425-478.
  • Wasko, M., and Faraj, S. Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29, 1 (2005), 35-57.
  • Webster, J., and Trevino, L. K. Rational and social theories as complementary explanations of communication media choices: Two policy-capturing studies. Academy of Management Journal, 38, 6 (1995), 1544-1572.
  • Welford, A. T., and Brebner, J. M. T. Reaction Times. New York: Academic Press, 1980.
  • Yardi, S.; Golder, S. A.; and Brzozowski, M. J. Blogging at work and the corporate attention economy. In Proceedings of the 27th International Conference on Human Factors in Computing Systems. New York: ACM Press, 2009, pp. 2071-2080.
  • Zmud, R. W. An examination of push-pull theory applied to process innovation in knowledge work. Management Science, 30, 6 (1984), 727-738.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.