ph d defense heidi tscherning

41
Mobile Devices in Social Contexts PhD Dissertation by Heidi Tscherning Department of IT Management, Copenhagen Business School September 28, 2011

Upload: heidi-tscherning

Post on 24-Jun-2015

268 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Ph d defense heidi tscherning

Mobile Devices in Social Contexts

PhD Dissertation byHeidi Tscherning

Department of IT Management, Copenhagen Business SchoolSeptember 28, 2011

Page 2: Ph d defense heidi tscherning

2

The purpose of this dissertation is to explore the social context and its influences on the

early decision process as peopleacquire and use mobile devices.

Purpose of the dissertationDepartment of IT Management

Page 3: Ph d defense heidi tscherning

• Background

• Research questions

• Contribution

• Scope of dissertation

• Underlying philosophy

• Research with adoption focus– Framing, methods, and findings

• Research with use focus– Framing, methods, and findings

• Limitations and future research

Agenda

3

Department of IT Management

General overall dissertation

• Research with adoption focus– Framing, methods, and findings

• Research with use focus– Framing, methods, and findings

Article focus

• Limitations and future research General overall dissertation

Page 4: Ph d defense heidi tscherning

4

Background

Department of IT Management

Page 5: Ph d defense heidi tscherning

5

1983

Department of IT Management

2007

Background

Page 6: Ph d defense heidi tscherning

6

BackgroundDepartment of IT Management

Close when far away

Far away when close

FreedomControlEfficiencies

EnslavementChaos

InefficienciesUtilitarian use

Hedonic use

Social influence

Individual intention

Page 7: Ph d defense heidi tscherning

7

Research questions

Department of IT Management

Page 8: Ph d defense heidi tscherning

8

To what extent can an understanding of social influences, and more generally, competing forces, assist in explaining the early adoption and use of app phones?

Research questionsDepartment of IT Management

Page 9: Ph d defense heidi tscherning

9

1. How can social influences contribute to explaining the adoption and use of app phones?

2. How can competing forces of app phones contribute to explaining their adoption and use?

Research sub-questionsDepartment of IT Management

Page 10: Ph d defense heidi tscherning

10

Contribution

Department of IT Management

Page 11: Ph d defense heidi tscherning

11

ContributionDepartment of IT Management

Page 12: Ph d defense heidi tscherning

12

Scope of dissertation

Department of IT Management

Page 13: Ph d defense heidi tscherning

13

Scope of dissertationDepartment of IT Management

Page 14: Ph d defense heidi tscherning

14

Scope of dissertationDepartment of IT Management

Article 1 Article 2 Article 3 Article 4

Page 15: Ph d defense heidi tscherning

15

Underlying philosophy

Department of IT Management

Page 16: Ph d defense heidi tscherning

16

Critical realism ontology

Underlying philosophyDepartment of IT Management

Page 17: Ph d defense heidi tscherning

17

Constructivist epistemology

Underlying philosophyDepartment of IT Management

Page 18: Ph d defense heidi tscherning

18

Research with adoption focusFraming, methods, and findings

Department of IT Management

Page 19: Ph d defense heidi tscherning

19

Research with adoption focusDepartment of IT Management

Case study

Article 1 Article 2 Article 3 Article 4

Page 20: Ph d defense heidi tscherning

20

Social influence approach• Self-interest and collective action• Homophily• Contagion– Social norm– Conformity – Compliance

Framing Department of IT Management

Informative influenceNormative influenceCompetitive concernsPerformance network effectsSocial learningOpinion leaders

The Role of Early Adoption of Mobile Devices

2. The Role of Social Networks in Early Adoption of Mobile Devices

Page 21: Ph d defense heidi tscherning

21

One-shot cross-sectional study

Data collection:• Purposive (homogenous) sampling• Five participants• Semi-structured interviews– Demographics, mobile device history, iPhone

history, social network, adoption decision• Data from discussion forum• Social network profile data

Department of IT Management

Methods

The Role of Early Adoption of Mobile Devices

2. The Role of Social Networks in Early Adoption of Mobile Devices

Page 22: Ph d defense heidi tscherning

22

Data analysis:• Social influence constructs: – adoption threshold– opinion leaders– social contagion– social learning

• Atlas.TI• Storytelling

MethodsDepartment of IT Management

Article 22. The Role of Social Networks in Early Adoption of Mobile Devices

Page 23: Ph d defense heidi tscherning

Findings

23

Department of IT Management

Case study findings Article 2The Role of Early Adoption of Mobile Devices

2. The Role of Social Networks in Early Adoption of Mobile Devices

Page 24: Ph d defense heidi tscherning

24

Individual and group level dynamics:Group level technology adoption ≠ aggregated individual level adoption!A need for addressing technology adoption through multilevel research

FramingDepartment of IT Management

Article 33. A Multi-level Social Network Perspective on IT Adoption

Page 25: Ph d defense heidi tscherning

25

Development of conceptual framework based on Coleman’s diagram (1990).

Department of IT Management

Methods

Coleman (1990): “Foundations of Social Theory”

Micro mechanism a

Micro mechanism b

Phenomenon A in Society

Phenomenon B in Society

MACRO LEVEL

MICRO LEVEL

12

34

3. A Multi-level Social Network Perspective on IT Adoption

Page 26: Ph d defense heidi tscherning

26

Multilevel Framework for Technology Adoption

Department of IT Management

Findings

Adapted from Coleman (1990): “Foundations of Social Theory”

Attributes and beliefs

Adoption behavior

Discourse Diffusion

NETWORK LEVEL

INDIVIDUAL LEVEL

14

32

Intentions

Article 33. A Multi-level Social Network Perspective on IT Adoption

3. A Multi-level Social Network Perspective on IT Adoption

Page 27: Ph d defense heidi tscherning

27

Research with use focusFraming, methods, and findings

Department of IT Management

Page 28: Ph d defense heidi tscherning

28

Research with use focusDepartment of IT Management

Field study

Article 1 Article 2 Article 3 Article 4

Page 29: Ph d defense heidi tscherning

29

Competing forces approach*• Individual and social orientation• Exploration and exploitation behavior• Utilitarian and hedonic objectives

* Based on the Competing Values Framework (Quinn and Rohrbaugh, 1981, 1983)

FramingDepartment of IT Management

Competing Forces Model of Technology Assimilation

Page 30: Ph d defense heidi tscherning

30

Cross-sectional field study with multiple snapshotsDREAMS projectData collection:• 15 students from ITU• 30 semi-structured interviews• 3 surveys• 3 focus group interviews• 15 24-hour diaries• Network provided usage data (Telia)

MethodsDepartment of IT Management

Competing Forces Model of Technology Assimilation

Page 31: Ph d defense heidi tscherning

31

MethodsDepartment of IT Management

Article 4Competing Forces Model of Technology Assimilation

Page 32: Ph d defense heidi tscherning

32

Data analysis:• Three competing forces: – individual vs. social orientation– exploration vs. exploitation behavior– utilitarian vs. hedonic objectives

• Atlas.TI

MethodsDepartment of IT Management

Article 4Competing Forces Model of Technology Assimilation

Page 33: Ph d defense heidi tscherning

33

Competing Forces Model of Technology Assimilation

FindingsDepartment of IT Management

Objectives:• Utilitarian• Hedonic

Exploration behavior

Exploitation behavior

Individual orientation

Social orientation

INVESTIGATINGIndividually oriented explorative behavior with the purpose of obtaining utilitarian and hedonic objectives

INTERACTINGSocially oriented explorative

behavior with the purpose of obtaining utilitarian and hedonic

objectives

IMPROVINGIndividually oriented exploitative behavior with the purpose of obtaining utilitarian and hedonic objectives

INTEGRATINGSocially oriented exploitative behavior with the purpose of

obtaining utilitarian and hedonic objectives

Adapted from Quinn and Rohrbaugh (1981, 1983): “Competing Values Framework”

Competing Forces Framework

Page 34: Ph d defense heidi tscherning

34

Limitations and future research

Department of IT Management

Page 35: Ph d defense heidi tscherning

35

Limitations• Study of app phones without looking into

design and marketing effects of device• Consumer context• Small sample sizes two empirical studies

Limitations and future researchDepartment of IT Management

Page 36: Ph d defense heidi tscherning

36

Future research• Development of two frameworks– Multi-level Framework of Technology Adoption– Competing Forces Framework

Limitations and future researchDepartment of IT Management

Page 37: Ph d defense heidi tscherning

37

Thank you!

Department of IT Management

Page 38: Ph d defense heidi tscherning

38

Smartphones and app phonesDepartment of IT Management

Paradigm shift

Page 39: Ph d defense heidi tscherning

39

Competing Forces FrameworkDepartment of IT Management

Flexibility

Control

Internal focus

External focus

HUMAN RELATIONS MODELMeans: cohesion, morale

End: Human resource development

OPEN SYSTEMS MODELMeans: flexibility, readiness

End: growth, resource acquisition

INTERNAL PROCESS MODELMeans: information management, communication

End: Stability, control

RATIONAL GOAL MODELMeans: planning, goal setting

End: productivity, efficiency

Adapted from Quinn and Rohrbaugh (1981, 1983): “Competing Values Framework”

Competing Values Framework

Page 40: Ph d defense heidi tscherning

40

What we call our data are really our own constructions of other people’s constructions of what they and their compatriots are up to

Geertz (1973, p. 9).

Critical Realism and constructivismDepartment of IT Management

Page 41: Ph d defense heidi tscherning

41

Practical contributions1. App phones today combine multiple gadgets,

they are pervasive, and they serve both utilitarian and hedonic functions. Continued development of devices by producers and marketers.

2. Consumers are influences by their social context. Social networks and social media can be incorporated in marketing of future devices.

Practical contributionDepartment of IT Management