197 final submission

23
Technology Adoption and Use Theory Review for Studying Scientists’ Continued Use of Cyber- infrastructure Youngseek Kim School of Information Studies Syracuse University 221 Hinds Hall Syracuse, NY 13244 [email protected] Kevin Crowston School of Information Studies Syracuse University 348 Hinds Hall Syracuse, NY 13244 [email protected] ABSTRACT In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber-infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post- adoption (continued use) research. In addition, we review studies specifically regarding cyber-infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists’ adoption and continued use of cyber-infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists’ adoption and use of cyber- infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided. Keywords Cyber-infrastructure, eScience, adoption, acceptance, use INTRODUCTION Scientists have encountered the emergence of cyber-infrastructure or eScience as a new way to conduct their research. Cyber-infrastructure refers to the constellation of ICT that support communication, coordination, collaboration, and collection, storage, analysis and dissemination of data for distributed groups of researchers. Cyber-infrastructure holds out the promise of revolutionizing the process of scientific discovery, enabling the emergence of data-centric science— sometimes called eScience—in which researchers answer questions through the integration of distributed digital This is the space reserved for copyright notices. ASIST 2011, October 9-13, 2011, New Orleans, LA, USA. Copyright notice continues right here.

Upload: richard-alboro

Post on 16-Aug-2015

216 views

Category:

Documents


0 download

DESCRIPTION

111

TRANSCRIPT

Technology Adoption and Use Theory ReviewforStudying Scientists Continued Use of Cyber-infrastructureYoungseek Kim School of Information StudiesSyracuse University 221 Hinds HallSyracuse, NY 13244ykim5!syr"eduKevin CrowstonSchool of Information StudiesSyracuse University34 Hinds HallSyracuse, NY 13244cro#ston!syr"eduABSTRACTIn this paper, we see to identify factors that !ight increasethe lielihoodof adoptionand continued use of cyber-infrastructure by scientists" To do so, we review the !ainresearchonInfor!ationandCo!!unications Technology#ICT$adoptionandusebyaddressingresearchproble!s,theories and!odels used, findings, andli!itations" %efocusparticularlyontheindividual user perspective" %ecategori&e previous studies into two groups'Adoptionresearch and post-adoption #continued use$ research" Inaddition, wereviewstudies specificallyregardingcyber-infrastructure adoption and use by scientists and otherspecial user groups" %e identify the li!itations of previoustheories, !odels andresearchfindings appearingintheliterature related to our current interest inscientistsadoption andcontinued use of cyber-infrastructure"%esynthesi&ethe previous theories and !odels used for ICTadoption and use, and then we develop a theoreticalfra!ewor for studying scientists adoption and use ofcyber-infrastructure" %ealsoproposedaresearchdesignbasedontheresearch!odel developed" I!plicationsforresearchers and practitioners are provided"KeywordsCyber-infrastructure, eScience, adoption, acceptance, useINTRODUCTIONScientists have encountered the e!ergence of cyber-infrastructureoreScienceasanewwaytoconduct theirresearch" Cyber-infrastructure refers to the constellation ofICT that support co!!unication, coordination,collaboration,and collection, storage, analysis anddisse!ination of data for distributed groups of researchers"Cyber-infrastructure holds out the pro!ise ofrevolutioni&ing the process of scientific discovery, enablingthee!ergenceof data-centricscience(so!eti!es calledeScience(inwhichresearchersanswer)uestionsthroughthe integration of distributed digital resources and facilities#*ey +Trefethen, ,--.$" As with the applications oftechnology to other inds of wor, eScience is presented ashaving substantial pro!ise to reshape and enhance the wayscienceisdone" Sciencefundingagenciesaresupportingdevelop!ent of cyber-infrastructurefor various scientificco!!unitiesas away to leveragetheir invest!entintheresearch"*owever, we believe that as with other technologies, cyber-infrastructure technologies are adopted and used less oftenthantheyaredeployed"Toachievethepro!iseofcyber-infrastructure, it is i!portant to understand scientistscyber-infrastructure or eScience adoption and use" /urresearch focuses on not only the adoption of cyber-infrastructurebutalso its continued usebyscientists" The!a0or research purpose of this article is to identify the !ainfactors influencing scientists cyber-infrastructuretechnology adoption and use by reviewing previous theoriesand !odels in technology adoption and use1 then to developaresearch!odel tostudyscientistscyber-infrastructureadoption and use"The !ain research proble!in ICT adoption and useresearch is why and how people adopt ICTs and use the!"As ICTs grow in popularity, understanding adoption and useof the! is very critical in ter!s of design and develop!entand deploy!ent of new infor!ation syste!s andtechnologies" In an organi&ational conte2t, the adoption anduseofnewICTshasagreat i!pacton0obperfor!ance,!anagerial control, and organi&ational structure" In a non-organi&ationalconte2t, theadoptionanduseofnewICTsinfluence individuals personal infor!ation!anage!ent,social relationships, and)ualityof life" 3or at least 4-years, infor!ation syste!s scholars have sought to identifyfactors that influence individual users adoption and use ofICTs" 5u!erous theories and !odels have been proposed,as we review below" In the ne2t sections, we provide so!ebacgrounds regarding scientists wor environ!ent, cyber-infrastructure technology, and ICTadoption and use ingeneral" %e also review adoption and post-adoptiontheories along with research issues and findings" Then, wepresent a research !odel to study scientists cyber-infrastructure adoption and use"BACKGROUND6efore we start, we present the research settings ofscientistsandtheparticular technologieswhoseadoptionandusewewant tostudy" This sectionis organi&edbyscientists wor environ!ent,cyber-infrastructuretechnology, and ICT adoption and use"Scientists !ork "nvironment3orthispaper, we are specificallyinterestedin scientistsadoption and use of technologies that support their research,identifyingfactorsthat leadtoindividual decisionsaboutwhat technologies to use" In taing this focus, weacnowledgethatourworis!oreapplicableto7s!all8rather than 7big science"8 76ig science8 refers to scientificpro0ects that draw on !ultiple disciplines to address a broadset of goals, which are often set by a co!!ittee that selectsthe researchers to carry out the wor" 6ig scienceincreasingly de!andseScience!ethods as the cost ofcreatingnowledge has increaseddra!aticallyfor !anyscientificventures" Inthesesettings, eydecisionsabouttechnologies to be used are liely !ade at a disciplinary ororgani&ational level"6y contrast, 7s!all science8 refers to a single investigatorworing on pro0ects of their own choosing with relativelyThis is the space reserved for copyright notices" ASIST 2011, /ctober 9-:4, ,-::, 5ew /rleans, ;A, USA"Copyright notice continues right here"!odest support, such as a graduate student or two" In s!allscience, the advantages of eScience !ethods are less clearandadoptiondecisions are !ade individually, withfewe2ternal factorsthat forceadoption" Inthesesettings, thesuccess of cyber-infrastructure develop!ent will depend onthe syste!s that scientists will adopt, e"g", because of theirperceivedusefulnessforaddressingproble!sinscientificpractice or because of influences fro!colleagues orcollaborators"Thisresearchhasfocusedontheindividuallevel decision on cyber-infrastructure adoption and use byscientists who are conducting 7s!all science"8There are fewstudies that have been done regardingscientists technologyadoptionanduse, suchas studiesregarding specific researcher groups ICT adoption and use"ata !ight co!e fro! instru!ents accessedre!otely via the Internet, or fro! increasingly volu!inousdata repositories accessed directly or via federated searches"Scientistsalsousecyber-infrastructuretosharedatawithothers" eScience applications also includecollaborativetechnologies to support scientific collaboration #%ulf,:994$, rangingfro!si!ple e!ail and !ailinglists, tonewer collaborative applications such as wiis"%e conceptuali&e cyber-infrastructure as an asse!blageofdiverse technologies, as a collection of co!puting ele!entsand software-based syste!s asse!bled to address anindividualAs diverse co!puting needs" 3or e2a!ple, inwriting this paper we used Boogle >ocs, ?icrosoft %ord,@nd5ote, Boogle Scholar and a range of library databases,acollectionof articles as 3s invarious folders onalaptop, e!ail, ?anuscriptCentral, not to !ention !oreinfrastructural technologies such as the Internet, ?ac /S C,%indows andlaptops" Theconceptionof anasse!blagee!phasi&es that digitally-enabled wor is increasingly doneby drawing on !ultiple syste!s that are rarely well-integrated and often not for!ally planned, designed,delivered or governed" /ur conceptuali&ation of digitalasse!blages e!phasi&es the ad hoc and te!poral nature oftheele!ents, thei!portanceofco!!ercial productsandco!!odifiedICT, the i!pact of environ!ental features#e"g", a ca!pus choice of learning !anage!ent syste!$ andthe functional si!ilarity across collections of differentarrange!ents of digital co!ponents"The IS literature #e"g", as reviewedbelow$ has largelyconsidered theDIT artifactas a singular technology#Carroll, ,--.$, thoughthereareso!ee2ceptions" Elingand Scacchi #:9.,$ conceptuali&ed a co!puter syste! as anense!ble of e)uip!ents and applications, which theydescribed as web !odels of technology" ;yytinen and Foo#,--,$ si!ilarly described ubi)uitous co!putingenviron!ents as a heterogeneous asse!blage of integratedsocio-technical ele!ents" Recently, scholars have alsoconsidered the adoption and use of a set of technologies #aportfolio$ rather than a singular technology #Carroll, ,--G,,--.$" Shih and Henatesh #,--I$ found that the presenceof co!ple!entary technologies led to increased variety ofuse of the co!puter #Recited fro! Carroll ,--.$"Studies of cyber-infrastructure adoption can also beinfor!ed by studies of so-called infor!ationinfrastructures" Si!ilar to our conception of a digitalasse!blage, *anseth et al" #:99J$ described an infor!ationinfrastructure as containing a huge nu!ber ofinterdependent co!ponents that alternate betweenstandardi&ation and change throughout their lifeti!es"Co!pared to a general infor!ation syste!, the infor!ationinfrastructure consists of diverse co!ponents whosecharacteristics include open, shared, evolving, socio-technical, heterogeneous #*anseth + ?onteiro, :99.$" Starand Ruhleder #:99J$ studied the ecology of infrastructuresin the particular conte2t of a syste! for scientificcollaboration" They e!phasi&ed the social relations ofinfrastructure, standards and e!beddedness and consideredthe technology as an infor!ation infrastructure by focusingon its large, interconnected nature and installed base #Star+ Ruhleder, :99J$"Figure 1. ICT Adoption Process including Pre-Adoption, Adoption, and Post-Adoption StagesICT Ado)tion &nd Use%e are focusingonICT adoptionand useresearchat theindividual level, so our research focus e2cludes research onorgani&ational technology adoption, where decisions are not!ade at the individual level but at organi&ational, division,or worgroup levels #3ich!an + Ee!erer, :99K1/rliowsi,:994$"Individuals ICT adoption andusecanbe understood in three different stages' avis,,---$" Sub0ective nor! is the sa!e construct that has beenstudiedinTRAandTavis, ,---$ and attitude #Earahanna, et al", :999$" TA?,alsoincluded diverse variables inorder toenhance thee2planatorypower, but !anyti!esTA?,e2plainedlowpercentagesofasyste!suse#;u,Fao, + Fu, ,--G$"AsTA?, was developed in order to i!prove the e2planatorypower of the original TA?, the Unified Theory ofAcceptanceandUseof Technology!odel #UTAUT$wasdeveloped to address the sa!e li!itation in TA?,#Henatesh, ?orris, >avis, + >avis, ,--4$"Unified Theory of Acceptance and Use of TechnologyUTAUT provides a refined view of how the deter!inants ofintentionandbehavior evolveover ti!e" It assu!esthatthere are three direct deter!inants of intention to use#perfor!ance e2pectancy, effort e2pectancy, and socialinfluence$andtwodirect deter!inantsofusagebehavior#intentionandfacilitatingconditions$ #Henatesh, et al",,--4$" Theserelationshipsare!oderatedbygender,age,e2perience, and voluntariness of use #Henatesh, et al",,--4$" @!pirical testing of UTAUT shows that perfor!ancee2pectancy, effort e2pectancy, andsocial influence havesignificant relationships with the intention to usetechnologies #Henatesh, et al", ,--4$" ;ater studies foundthat social influence affect perceived usefulness andperceived ease of use#S"-=" *ong + Ta!, ,--J1 ;u, et al",,--G$" *owever, in post-adoption research, social influenceon the continuance intention was inconsistent1 so!e studiesreported significant relationships #S"-=" *ong + Ta!, ,--J1S"-=" *ong, Thong, ?oon, + Ta!, ,--.$, but other studiesreported non-significant relationships #Chiu + %ang,,--.$" UTAUT is one theory that covers e2tensiveindividual difference constructs including gender, age,e2perience, and voluntariness of use as !oderatingvariables" @venthoughthereareso!einconsistenciesinprevious studies on individual differences, scholars reportedsignificant !oderating effects by individual differencessuchasgender #?" B" ?orris, Henatesh, +Acer!an,,--G1Henatesh + ?orris, ,---1Henatesh, et al", ,--4$,age #?" ?orris +Henatesh, ,---$, prior e2perience#Henatesh +>avis, :99J$, and voluntariness of use#Henatesh, et al", ,--4$"Innovation Diffusion TheoryInnovation>iffusion Theory#I>T$byRogers#,--4$hasbeen e!ployed in studying individuals technologyadoption" The !ain goal of I>T is to understand theadoption of innovation in ter!s of four ele!ents ofdiffusion including innovation, ti!e, co!!unicationchannels, and social syste!s" I>T also states that anindividuals technology adoption behavior is deter!ined byTable 1. Summary of Previous Theories and Models in ICT Adoption Researchhis or her perceptions regardingthe relative advantage,co!patibility,co!ple2ity,trialability,andobservabilityoftheinnovation, as well as social nor!s #Rogers, ,--4$"Thereareanu!ber of studies that usedtheI>Tas itstheoretical fra!ewor or co!bined the I>Twith othertheoriesand!odelstoe2plainICTadoptionanduse" ISscholars !entioned that in the conte2t of end-userco!puting !any of the classical diffusion assertions werevalid #Ritu Agarwal + oll, et al", :99.$ andanindicator of syste!success#6ailey +e;one +?c;ean, :99,1Eettinger +;ee, :99I$" Recently, scholarshavetriedtointegrate user satisfaction and technology acceptance#%i2o! + Todd, ,--G$" Studies on satisfaction found thatsatisfaction influences attitude toward an ICT #Anol6hattacher0ee +ata/5@is a US 5ationalScience 3oundation-supported >ata5et pro0ect that iscreating a set of cyber-infrastructure tools to supportresearchers in the environ!ental sciences" The pro0ectprovides federated search across data repositories, plustools for discovering, accessing, analy&ing, visuali&ing,describing and sharing data #the 7investigators toolit8$, aswell as associated resources for training and data!anage!ent" %eplan to use a !i2ed !ethod approach to e2a!ineresearchers asse!blage adoption and use of cyber-infrastructure" >uring the initial stage, we will use)ualitative and open-ended research approaches to e2pandandenrichthefra!eworpresentedabove" Intheinitialphase, we will conduct interviews and focus groups tocollect factors related to the adoption and use of the cyber-infrastructure syste!s and asse!blages" atawill beanaly&ed through iterative coding, based initial on the!odeldevelopedabove, butwithopencodingtoidentifyanye!ergent newfactors of interest" %ewill use theinterviewandfocus groupdata tofinali&e the research!odel, as well as togather infor!ationabout particularcyber-infrastructure technologies that would be a goodfocus for the ne2t stage of the research"In the second phase of the study, we will use a survey toe2a!ine the constructs and to test the hypothesi&edrelationships intheresearch!odel" Biventhee2tensivehistoryofresearchonadoptionandusage, wecanadoptpre-testedsurveyite!s fro!previous studies for !anyconstructs, perhaps with !odification to !ae the!relevant totheadoptionanduseof cyber-infrastructure"5ecessary, new survey ite!s will be developed" 6efore theactual survey, we will validate the new and !odified ite!sthrough a pre-test procedure with :GP,- current researchersto ensure content co!pleteness, readability andunderstandability"Thepri!aryoutco!e!easureswill beadoption and usage of so!e of the cyber-infrastructuretools" As a nu!ber of these syste!s have centrali&edco!ponents #e"g", thefederatedsearchanddataretrievalcapabilities$, we can !easure actual usage behavior inter!s of fre)uency and ti!e spent rather than relying solelyonself-report" Thesurveywill bead!inisteredtocyber-infrastructure users as part of the evaluation of the pro0ectand its tools" >ata/5@ has already conducted surveys onresearchers andlibrarians attitudestowardsdatauseandcyber-infrastructure, provide useful baseline data forco!parison to our results #Tenopir, et al", ,-::$" >ata fro!these surveys will be analy&ed statistically to test thestrength of the hypothesi&ed relations" DISCUSSIONSScientists cyber-infrastructure technology adoption and usecan be considered as two different stages including initialadoption stage and post adoption stage"Initi&( Ado)tion St&geAs we identified in the previous sections, the initialtechnology adoption is deter!ined by cognitive processes"Therefore, we need to sti!ulate scientists cognitiveprocesses in regards to their cyber-infrastructure technologyadoption at the initial stage" 6y synthesi&ing previousadoption theories, we identified three !ain cognitive factorsincludingperfor!ancee2pectancy, effort e2pectancy, andsub0ective nor!s" 3irst, we thin that scientistsperfor!ance e2pectancy towardcyber-infrastructuretechnologies will increase their initial adoption intention ofcyber-infrastructure" The concept of perfor!ancee2pectancy,whichisthesa!econcept ofbothperceivedusefulness in TA? and relative advantage in I>T, is one ofcritical cognitive reactions at the initial stage ofcyber-infrastructure technology adoption" Second, we believe thateffort e2pectancytowardcyber-infrastructuretechnologieswill negatively influence scientists initial adoptionintention ofcyber-infrastructuretechnologies" @fforte2pectancy is the si!ilar concept of the perceived ease ofuse in TA?and co!ple2ity in I>T" 3or e2a!ple, ifscientists believe thatcyber-infrastructuretechnologies areeasy to use, then they are !ore liely to adoption the cyber-infrastructuretechnologies" Third, thesub0ectivenor!ofscientists would increase their cyber-infrastructure adoptionat theinitialstage" avis, 3" >" #:9.9$" ", 6ago&&i, R" eci, @" #:9K:$" @ffects of e2ternally !ediated rewards onintrinsic !otivation"3ournal of personalit" an, Socials"cholog", 1$#:$, :-G-::G">e;one, %" *", +?c;ean, @" R" #:99,$" Infor!ationSyste!s Success' The Ruest for the >ependentHariable" Information S"stems Research, 2#:$, J--9G">ishaw, ?" T", +Strong, >" ?" #:999$" @2tendingthetechnology acceptance !odel with tas-technology fitconstructs" Information 1 Management, 24#:$, 9-,:">oll, %"=", *endricson, A", +>eng, C" #:99.$" Using>avisAs ecision ?aing' A Confir!atory and?ultigroup Invariance Analysis"Decision Sciences,2'#I$, .49-.J9">utton, %" *", + ?eyer, @" T" #,--., =une :.-:9$" e, 1##I$, G4,-GG-"3ich!an, R", +Ee!erer, C" #:99K$" Theassi!ilationofsoftware process innovations' An organi&ationallearning perspective"Management Science, #2#:-$,:4IG-:4J4"3ishbein, ?", + A0&en, I" #:9KG$" *elief, Attitu,e, Intention,an, *eha+ior" Reading, ?A' Addison-%esley"*anseth, /", + ?onteiro, @" #:99.$" 0hanging irre+ersi8lenet>or?s;isadvantaged"MIS !uarterl", 22#:$,9K-:,J"*sieh, =" =" "#,--4$" User Acceptanceof Infor!ationTechnology'TowardaUnifiedHiew"MIS!uarterl", 2$, I,G-IK."Henatesh, H", Speier, C", +?orris, ?" B" #,--,$" UserAcceptance @nablers inIndividual >ecision?aingAbout Technology' Toward an Integrated ?odel"Decision Sciences, 22#,$, ,9K-4:J"Herplanen, 6", Aarts, *", + van Enippenberg, A" #:99K$"*abit, Infor!ation Ac)uisition, and the