ph d defense heidi tscherning
TRANSCRIPT
![Page 1: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/1.jpg)
Mobile Devices in Social Contexts
PhD Dissertation byHeidi Tscherning
Department of IT Management, Copenhagen Business SchoolSeptember 28, 2011
![Page 2: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/2.jpg)
2
The purpose of this dissertation is to explore the social context and its influences on the
early decision process as peopleacquire and use mobile devices.
Purpose of the dissertationDepartment of IT Management
![Page 3: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/3.jpg)
• Background
• Research questions
• Contribution
• Scope of dissertation
• Underlying philosophy
• Research with adoption focus– Framing, methods, and findings
• Research with use focus– Framing, methods, and findings
• Limitations and future research
Agenda
3
Department of IT Management
General overall dissertation
• Research with adoption focus– Framing, methods, and findings
• Research with use focus– Framing, methods, and findings
Article focus
• Limitations and future research General overall dissertation
![Page 4: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/4.jpg)
4
Background
Department of IT Management
![Page 5: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/5.jpg)
5
1983
Department of IT Management
2007
Background
![Page 6: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/6.jpg)
6
BackgroundDepartment of IT Management
Close when far away
Far away when close
FreedomControlEfficiencies
EnslavementChaos
InefficienciesUtilitarian use
Hedonic use
Social influence
Individual intention
![Page 7: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/7.jpg)
7
Research questions
Department of IT Management
![Page 8: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/8.jpg)
8
To what extent can an understanding of social influences, and more generally, competing forces, assist in explaining the early adoption and use of app phones?
Research questionsDepartment of IT Management
![Page 9: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/9.jpg)
9
1. How can social influences contribute to explaining the adoption and use of app phones?
2. How can competing forces of app phones contribute to explaining their adoption and use?
Research sub-questionsDepartment of IT Management
![Page 10: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/10.jpg)
10
Contribution
Department of IT Management
![Page 11: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/11.jpg)
11
ContributionDepartment of IT Management
![Page 12: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/12.jpg)
12
Scope of dissertation
Department of IT Management
![Page 13: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/13.jpg)
13
Scope of dissertationDepartment of IT Management
![Page 14: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/14.jpg)
14
Scope of dissertationDepartment of IT Management
Article 1 Article 2 Article 3 Article 4
![Page 15: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/15.jpg)
15
Underlying philosophy
Department of IT Management
![Page 16: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/16.jpg)
16
Critical realism ontology
Underlying philosophyDepartment of IT Management
![Page 17: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/17.jpg)
17
Constructivist epistemology
Underlying philosophyDepartment of IT Management
![Page 18: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/18.jpg)
18
Research with adoption focusFraming, methods, and findings
Department of IT Management
![Page 19: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/19.jpg)
19
Research with adoption focusDepartment of IT Management
Case study
Article 1 Article 2 Article 3 Article 4
![Page 20: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/20.jpg)
20
Social influence approach• Self-interest and collective action• Homophily• Contagion– Social norm– Conformity – Compliance
Framing Department of IT Management
Informative influenceNormative influenceCompetitive concernsPerformance network effectsSocial learningOpinion leaders
The Role of Early Adoption of Mobile Devices
2. The Role of Social Networks in Early Adoption of Mobile Devices
![Page 21: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/21.jpg)
21
One-shot cross-sectional study
Data collection:• Purposive (homogenous) sampling• Five participants• Semi-structured interviews– Demographics, mobile device history, iPhone
history, social network, adoption decision• Data from discussion forum• Social network profile data
Department of IT Management
Methods
The Role of Early Adoption of Mobile Devices
2. The Role of Social Networks in Early Adoption of Mobile Devices
![Page 22: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/22.jpg)
22
Data analysis:• Social influence constructs: – adoption threshold– opinion leaders– social contagion– social learning
• Atlas.TI• Storytelling
MethodsDepartment of IT Management
Article 22. The Role of Social Networks in Early Adoption of Mobile Devices
![Page 23: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/23.jpg)
Findings
23
Department of IT Management
Case study findings Article 2The Role of Early Adoption of Mobile Devices
2. The Role of Social Networks in Early Adoption of Mobile Devices
![Page 24: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/24.jpg)
24
Individual and group level dynamics:Group level technology adoption ≠ aggregated individual level adoption!A need for addressing technology adoption through multilevel research
FramingDepartment of IT Management
Article 33. A Multi-level Social Network Perspective on IT Adoption
![Page 25: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/25.jpg)
25
Development of conceptual framework based on Coleman’s diagram (1990).
Department of IT Management
Methods
Coleman (1990): “Foundations of Social Theory”
Micro mechanism a
Micro mechanism b
Phenomenon A in Society
Phenomenon B in Society
MACRO LEVEL
MICRO LEVEL
12
34
3. A Multi-level Social Network Perspective on IT Adoption
![Page 26: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/26.jpg)
26
Multilevel Framework for Technology Adoption
Department of IT Management
Findings
Adapted from Coleman (1990): “Foundations of Social Theory”
Attributes and beliefs
Adoption behavior
Discourse Diffusion
NETWORK LEVEL
INDIVIDUAL LEVEL
14
32
Intentions
Article 33. A Multi-level Social Network Perspective on IT Adoption
3. A Multi-level Social Network Perspective on IT Adoption
![Page 27: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/27.jpg)
27
Research with use focusFraming, methods, and findings
Department of IT Management
![Page 28: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/28.jpg)
28
Research with use focusDepartment of IT Management
Field study
Article 1 Article 2 Article 3 Article 4
![Page 29: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/29.jpg)
29
Competing forces approach*• Individual and social orientation• Exploration and exploitation behavior• Utilitarian and hedonic objectives
* Based on the Competing Values Framework (Quinn and Rohrbaugh, 1981, 1983)
FramingDepartment of IT Management
Competing Forces Model of Technology Assimilation
![Page 30: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/30.jpg)
30
Cross-sectional field study with multiple snapshotsDREAMS projectData collection:• 15 students from ITU• 30 semi-structured interviews• 3 surveys• 3 focus group interviews• 15 24-hour diaries• Network provided usage data (Telia)
MethodsDepartment of IT Management
Competing Forces Model of Technology Assimilation
![Page 31: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/31.jpg)
31
MethodsDepartment of IT Management
Article 4Competing Forces Model of Technology Assimilation
![Page 32: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/32.jpg)
32
Data analysis:• Three competing forces: – individual vs. social orientation– exploration vs. exploitation behavior– utilitarian vs. hedonic objectives
• Atlas.TI
MethodsDepartment of IT Management
Article 4Competing Forces Model of Technology Assimilation
![Page 33: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/33.jpg)
33
Competing Forces Model of Technology Assimilation
FindingsDepartment of IT Management
Objectives:• Utilitarian• Hedonic
Exploration behavior
Exploitation behavior
Individual orientation
Social orientation
INVESTIGATINGIndividually oriented explorative behavior with the purpose of obtaining utilitarian and hedonic objectives
INTERACTINGSocially oriented explorative
behavior with the purpose of obtaining utilitarian and hedonic
objectives
IMPROVINGIndividually oriented exploitative behavior with the purpose of obtaining utilitarian and hedonic objectives
INTEGRATINGSocially oriented exploitative behavior with the purpose of
obtaining utilitarian and hedonic objectives
Adapted from Quinn and Rohrbaugh (1981, 1983): “Competing Values Framework”
Competing Forces Framework
![Page 34: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/34.jpg)
34
Limitations and future research
Department of IT Management
![Page 35: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/35.jpg)
35
Limitations• Study of app phones without looking into
design and marketing effects of device• Consumer context• Small sample sizes two empirical studies
Limitations and future researchDepartment of IT Management
![Page 36: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/36.jpg)
36
Future research• Development of two frameworks– Multi-level Framework of Technology Adoption– Competing Forces Framework
Limitations and future researchDepartment of IT Management
![Page 37: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/37.jpg)
37
Thank you!
Department of IT Management
![Page 38: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/38.jpg)
38
Smartphones and app phonesDepartment of IT Management
Paradigm shift
![Page 39: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/39.jpg)
39
Competing Forces FrameworkDepartment of IT Management
Flexibility
Control
Internal focus
External focus
HUMAN RELATIONS MODELMeans: cohesion, morale
End: Human resource development
OPEN SYSTEMS MODELMeans: flexibility, readiness
End: growth, resource acquisition
INTERNAL PROCESS MODELMeans: information management, communication
End: Stability, control
RATIONAL GOAL MODELMeans: planning, goal setting
End: productivity, efficiency
Adapted from Quinn and Rohrbaugh (1981, 1983): “Competing Values Framework”
Competing Values Framework
![Page 40: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/40.jpg)
40
What we call our data are really our own constructions of other people’s constructions of what they and their compatriots are up to
Geertz (1973, p. 9).
Critical Realism and constructivismDepartment of IT Management
![Page 41: Ph d defense heidi tscherning](https://reader036.vdocuments.site/reader036/viewer/2022081513/558a5794d8b42a7d468b4675/html5/thumbnails/41.jpg)
41
Practical contributions1. App phones today combine multiple gadgets,
they are pervasive, and they serve both utilitarian and hedonic functions. Continued development of devices by producers and marketers.
2. Consumers are influences by their social context. Social networks and social media can be incorporated in marketing of future devices.
Practical contributionDepartment of IT Management