Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure
Identifieur interne : 000740 ( Main/Exploration ); précédent : 000739; suivant : 000741Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure
Auteurs : Youngseek Kim [États-Unis] ; Kevin Crowston [États-Unis]Source :
- Proceedings of the American Society for Information Science and Technology [ 0044-7870 ] ; 2011.
Abstract
In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.
Url:
DOI: 10.1002/meet.2011.14504801197
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000042
- to stream Istex, to step Curation: 000042
- to stream Istex, to step Checkpoint: 000160
- to stream Main, to step Merge: 000742
- to stream Main, to step Curation: 000740
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
<author><name sortKey="Kim, Youngseek" sort="Kim, Youngseek" uniqKey="Kim Y" first="Youngseek" last="Kim">Youngseek Kim</name>
</author>
<author><name sortKey="Crowston, Kevin" sort="Crowston, Kevin" uniqKey="Crowston K" first="Kevin" last="Crowston">Kevin Crowston</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1002/meet.2011.14504801197</idno>
<idno type="url">https://api.istex.fr/document/7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000042</idno>
<idno type="wicri:Area/Istex/Curation">000042</idno>
<idno type="wicri:Area/Istex/Checkpoint">000160</idno>
<idno type="wicri:doubleKey">0044-7870:2011:Kim Y:technology:adoption:and</idno>
<idno type="wicri:Area/Main/Merge">000742</idno>
<idno type="wicri:Area/Main/Curation">000740</idno>
<idno type="wicri:Area/Main/Exploration">000740</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
<author><name sortKey="Kim, Youngseek" sort="Kim, Youngseek" uniqKey="Kim Y" first="Youngseek" last="Kim">Youngseek Kim</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">État de New York</region>
</placeName>
<wicri:cityArea>School of Information Studies, Syracuse University, 221 Hinds Hall, Syracuse</wicri:cityArea>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Crowston, Kevin" sort="Crowston, Kevin" uniqKey="Crowston K" first="Kevin" last="Crowston">Kevin Crowston</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<placeName><region type="state">État de New York</region>
</placeName>
<wicri:cityArea>School of Information Studies, Syracuse University, 348 Hinds Hall, Syracuse</wicri:cityArea>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="j">Proceedings of the American Society for Information Science and Technology</title>
<title level="j" type="abbrev">Proc. Am. Soc. Info. Sci. Tech.</title>
<idno type="ISSN">0044-7870</idno>
<idno type="eISSN">1550-8390</idno>
<imprint><publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<date type="published" when="2011">2011</date>
<biblScope unit="volume">48</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="1">1</biblScope>
<biblScope unit="page" to="10">10</biblScope>
</imprint>
<idno type="ISSN">0044-7870</idno>
</series>
<idno type="istex">7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8</idno>
<idno type="DOI">10.1002/meet.2011.14504801197</idno>
<idno type="ArticleID">MEET14504801197</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0044-7870</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.</div>
</front>
</TEI>
<affiliations><list><country><li>États-Unis</li>
</country>
<region><li>État de New York</li>
</region>
</list>
<tree><country name="États-Unis"><region name="État de New York"><name sortKey="Kim, Youngseek" sort="Kim, Youngseek" uniqKey="Kim Y" first="Youngseek" last="Kim">Youngseek Kim</name>
</region>
<name sortKey="Crowston, Kevin" sort="Crowston, Kevin" uniqKey="Crowston K" first="Kevin" last="Crowston">Kevin Crowston</name>
<name sortKey="Crowston, Kevin" sort="Crowston, Kevin" uniqKey="Crowston K" first="Kevin" last="Crowston">Kevin Crowston</name>
<name sortKey="Kim, Youngseek" sort="Kim, Youngseek" uniqKey="Kim Y" first="Youngseek" last="Kim">Youngseek Kim</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000740 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000740 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= CyberinfraV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8 |texte= Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure }}
This area was generated with Dilib version V0.6.25. |