910
Views
49
CrossRef citations to date
0
Altmetric
Original Article

Understanding Postadoptive Behaviors in Information Systems Use: A Longitudinal Analysis of System Use Problems in the Business Intelligence Context

&
Pages 291-326 | Published online: 09 Dec 2014

References

  • Barki, H.; Titah, R.; and Boffo, C. Information system use-related activity: An expanded behavioral conceptualization of individual-level information system use. Information System Research, 18, 2 (2007), 173-192.
  • Beaudry, A., and Pinsonneault, A. Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29, 3 (2005), 493-524.
  • Borgatti, R. P.; Everett, M. G.; and Freeman, L. C. UCINET for Windows: Software for Social Network Analysis. Harvard, MA: Analytic Technologies, 2002.
  • Bostrom, R. P., and Heinen, J. S. MIS problems and failures: A socio-technical perspective, part I: The causes. MIS Quarterly, 1, 3 (1977), 7-32.
  • Bostrom, R. P., and Heinen, J. S. MIS problems and failures: A socio-technical perspective, part II: The application of socio-technical theory. MIS Quarterly, 1, 4 (1977), 11-28.
  • Boudreau, M. C., and Robey, D. Enacting integrated information technology: A human agency perspective. Organization Science, 16, 1 (2005), 3-18.
  • Burton-Jones, A., and Gallivan, M. J. Toward a deeper understanding of system usage in organizations: A multilevel perspective. MIS Quarterly, 31, 4 (2007), 657-679.
  • Burton-Jones, A., and Straub, D. W. Reconceptualizing system usage: An approach and empirical test. Information Systems Research, 17, 3 (2006), 228-246.
  • Cannon-Bowers, J. A.; Salas, E.; and Converse, S. Shared mental models in expert team decision-making. In N. J. Castellan Jr. (ed.), Individual and Group Decision Making: Current Issues. Hillsdale, NJ: Lawrence Erlbaum, 1993, pp. 221-246.
  • Carlile, P. R. A pragmatic view of knowledge and boundaries: Boundary objects in new product development. Organization Science, 13, 4 (2002), 442-455.
  • Carr, C. L. Reciprocity: The golden rule of IS-user service relationship quality and cooperation. Communications of the ACM, 49, 6 (2006), 77-83.
  • Ceaparu, I.; Lazar, J.; Bessiere, K.; Robinson, J.; and Shneiderman, B. Determining causes and severity of end-user frustration. International Journal of Human-Computer Interaction, 17, 3 (2004), 333-356.
  • Das, D. Knowledge and productivity in technical support work. Management Science, 49, 4 (2003), 416-431.
  • Davenport, T. H. Putting the enterprise into the enterprise system. Harvard Business Review, 76, 4 (1998), 121-131.
  • Davis, F. Perceived usefulness, perceived ease of use, and end user acceptance of information technology. MIS Quarterly, 13, 3 (1989), 318-339.
  • Elbashir, M. Z.; Collier, P. A.; and Davern, M. J. Measuring the effects of business intelligence systems: The relationship between business process and organizational performance. International Journal of Accounting Information Systems, 9, 3 (2008), 135-153.
  • Freeman, L. C. Centrality in social networks, I: Conceptual clarification. Social Networks, 1, 3 (1979), 215-239.
  • Goodhue, D. L., and Thompson, R. L. Task-technology fit and individual performance. MIS Quarterly, 19, 2 (1995), 213-236.
  • Goodman, P. S. Missing Organizational Linkages: Tools for Cross-Level Research. Thousand Oaks, CA: Sage, 2000.
  • Hsieh, J. J. P.; Rai, A.; and Xu, S. X. Extracting business value from IT: A sensemaking perspective of post-adoptive use. Management Science, 57, 11 (2011), 1-22.
  • Jasperson, J.; Carter, P. E.; and Zmud, R. W. A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work system. MIS Quarterly, 29, 3 (2005), 525-557.
  • Lee, A. S., and Baskerville, R. L. Generalizing generalizability in information systems research. Information Systems Research, 14, 3 (2003), 221-243.
  • Leung, N. K. Y., and Lau, S. K. Information technology help desk survey: To identify the classification of simple and routine enquiries. Journal of Computer Information Systems, 47, 4 (2007), 70-81.
  • Levitt, B., and March, J. G. Organizational learning. Annual Review of Sociology, 14, 1988, 319-340.
  • Lombard, M.; Snyder-Duch, J.; and Bracken, C. C. Content analysis in mass communication: Assessment and reporting of intercoder reliability. Human Communication Research, 28, 4 (2002), 587-604.
  • Mackay, J. M., and Elam, J. J. A comparative study of how experts and novices use a decision aid to solve problems in complex knowledge domains. Information Systems Research, 3, 2 (1992), 150-172.
  • Majchrzak, A.; Rice, R. E.; Malhotra, A.; King, N.; and Ba, S. Technology adaptation: The case of a computer-supported inter-organizational virtual team. MIS Quarterly, 24, 4 (2000), 569-600.
  • Marcolin, B. L.; Compeau, D. R.; Munro, M. C.; and Huff, S. L. Assessing user competence: Conceptualization and measurement. Information Systems Research, 11, 1 (2000), 37-60.
  • Mathieu, J. E.; Heffner, T. S.; Goodwin, F. G.; Salas, E.; and Cannon-Bowers, J. A. The influence of shared mental models on team process and performance. Journal of Applied Psychology, 85, 2 (2000), 273-283.
  • Mirani, R., and King, W. R. Impacts of end-user and information center characteristics on end-user computing support. Journal of Management Information systems, 11, 1 (Summer 1994), 141-166.
  • Nan, N. Capturing bottom-up information technology use processes: A complex adaptive system model. MIS Quarterly, 35, 2 (2011), 505-532.
  • Narayanan, V. K., and Armstrong, D. J. Causal Mapping for Research in Information Technology. Hershey, PA: Idea Group, 2005.
  • Nelson, K. M.; Nadkarni, S.; Narayanan, V. K.; and Ghods, M. Understanding software operations support expertise: A revealed causal mapping approach. MIS Quarterly, 24, 3 (2000), 475-507.
  • Nelson, R. R.; Todd, P. A.; and Wixom, B. H. Antecedents of information and system quality: An empirical examination within the context of data warehousing. Journal of Management Information Systems, 21, 4 (Spring 2005), 199-235.
  • Norman, D. A. Design rules based on analyses of human error. Communications of the ACM, 26, 4 (1983), 254-258.
  • Novick, D. G.; Elizalde, E.; and Bean, N. Toward a more accurate view of when and how people seek help with computer applications. In Proceedings of the 2007 Special Interest Group on Design of Communication (SIGDOC) Conference. El Paso, TX: ACM Press, 2007, pp. 95-102.
  • Power, D. J. A brief history of decision support systems. DSSResources.com, March 10, 2007 (available at http://dssresources.com/history/dsshistory.html
  • Ravasio, P.; Schar, S. G.; and Krueger, H. In pursuit of desktop evolution: User problems and practices with modern desktop systems. ACM Transactions on Computer-Human Interaction, 11, 2 (2004), 156-180.
  • Rice, R. E., and Cooper, S. D. Organizations and Unusual Routines: A Systems Analysis of Dysfunctional Feedback Processes. New York: Cambridge University Press, 2010.
  • Rice, R. E., and Schneider, S. Information technology: Analyzing paper and electronic desktop artifacts. In C. Lin and D. Atkin (eds.), Communication Technology and Social Change: Theory, Effects, and Applications. Mahwah, NJ: Lawrence Erlbaum, 2006, pp. 101-121.
  • Robey, D.; Ross, J. W.; and Boudreau, M. C. Learning to implement enterprise systems: An exploratory study of the dialectics of change. Journal of Management Information Systems, 19, 1 (Summer 2002), 17-46.
  • Ryan, G. W., and Bernard, H. R. Data management and analysis methods. In N. Denzin and Y. Lincoln (eds.), Handbook of Qualitative Research, 2d ed. Thousand Oaks, CA: Sage, 2000, pp. 769-802.
  • Saga, V. L., and Zmud, R. W. The nature and determinants of IT acceptance, routinization and infusion. In L. Levine (ed.), Diffusion, Transfer and Implementation of Information Technology. Amsterdam: Elsevier Science, 1994, pp. 67-86.
  • Sage, A. P. Interpretive Structural Modeling: Methodology for Large-Scale Systems. New York: McGraw-Hill, 1977.
  • Santhanam, R.; Seligman, L.; and Kang, D. Postimplementation knowledge transfers to users and information technology professionals. Journal of Management Information Systems, 24, 1 (Summer 2007), 171-199.
  • Sun, H., and Zhang, P. Adaptive system use: An investigation at the system feature level. In Proceedings of the 2008 International Conference on Information Systems. Atlanta: Association for Information Systems, 2008, paper 170.
  • Sykes, T. A.; Venkatesh, V.; and Gosain, S. Model of acceptance with peer support: A social network perspective to understand employees' system use. MIS Quarterly, 33, 2 (2009), 371-393.
  • Taylor, S., and Todd, P. Assessing IT usage: The role of prior experience. MIS Quarterly, 19, 4 (1995), 561-570.
  • Turban, E.; Sharda, S.; Aronson, J. E.; and King, D. Business Intelligence: A Managerial Approach. Upper Saddle River, NJ: Pearson Prentice Hall, 2008.
  • Tyre, M. J., and Orlikowski, W. J. Windows of opportunity: Temporal patterns of technology adaptation in organizations. Organization Science, 5, 1 (1994), 98-118.
  • Venkatesh, V.; Morris, M. G.; Davis, G. B.; and Davis, F. D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 3 (2003), 425-478.
  • Volkoff, O.; Elmes, M. B.; and Strong, M. Enterprise systems, knowledge transfer and power users. Journal of Strategic Information Systems, 13, 4 (2004), 279-304.
  • Warfield, J. N., and Perino, G. H. The problematique: Evolution of an idea. Systems Research and Behavioral Science, 16, 3 (1999), 221-226.
  • Wasserman, S., and Faust, K. Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press, 1994.
  • Watson, H. J.; Fuller, C.; and Ariyachandra, T. Data warehouse governance: Best practice at Blue Cross and Blue Shield of North Carolina. Decision Support Systems, 38, 3 (2004), 435-450.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.