Browse > Article
http://dx.doi.org/10.21219/jitam.2016.23.3.035

A Mediating Effect of Internalization on Technology Adoption  

Kim, Sung Kun (School of Business, Chung-Ang University)
Publication Information
Journal of Information Technology Applications and Management / v.23, no.3, 2016 , pp. 35-47 More about this Journal
Abstract
Many technology innovations fail. Only a few of them are successfully implemented. Most of the remaining are discontinued before long or fail to be routinized. Although employees attempted to adopt the innovation for some legitimacy reasons, they have not reached the stage of internalization in which they believe in the real value of the innovation and become committed to the innovation. The deficiency of internalization was utilized in many studies as an important factor for explaining the failed innovation cases. However, few empirical studies examine the role of internalization in technology adoption. This study aims to investigate a mediating effect of internalization on technology adoption.
Keywords
Internalization; Technology Adoption; Secure Software Development Methodology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Bagozzi, R., "The Legacy of the Technology Acceptance Model and a Proposal for a Paradigm Shift", Journal of the Association for Information Systems, Vol. 8, No. 4, 2007, pp. 244-254.   DOI
2 Chan, M., Woon, I., and Kankanhalli, A., "Perceptions of Information Security in the Workplace : Linking Information Security Climate to Compliant Behavior", Journal of Information Privacy and Security, Vol. 1, No. 3, 2005, pp. 18-41.   DOI
3 Chen, J. and Wang, E., "Internalization in Technology Innovation : A Case of CRM Adoption", Proceedings of the 39th Hawaii International Conference on Systems Sciences, 2006.
4 Chiu, C., Chiu, C., and Chang, H., "Examining the integrated influence of fairness and quality on leaner's satisfaction and webbased learning continuance intention", Information System Journal, Vol. 17, pp. 271-287.
5 Collings, D. and Dick, P., "The relationship between ceremonial adoption of popular management practices and the motivation for practice adoption and diffusion in an American MNC", The International Journal of Human Resource Management, Vol. 22, No. 18, 2011, pp. 3849-3866.   DOI
6 Davis, F., "Perceived Usefulness, Perceived Ease of use, and User Acceptance of Information Technology", MIS Quarterly, Vol. 13, No. 3, 1989, pp. 318-339.
7 Davis, F., Bagozzi, R., and Warshaw, P., "User Acceptance of Computer Technology : A Comparison of Two Theoretical Models", Management Science, Vol. 35, 1989, pp. 982-1003.   DOI
8 Delone, W. and Mclean, E., "Measuring ecommerce success : Applying the DeLone and McLean information systems success model", International Journal of Electronic Commerce, Vol. 9, No. 1, 2004, pp. 31-47.   DOI
9 Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior : An introduction to theory and research, Addison-Wesley, 1975.
10 Igbaria, M. and Iivari, J., "The effects of self-efficacy on computer usage", Omega, Vol. 23, No. 6, 1995, pp. 587-605.   DOI
11 Igbaria, M., Guimaraes, T., and Davis, G., "Testing the determinants of microcomputer usage via a structural equation model", Journal of Management Information Systems, Vol. 11, No. 4, 1995, pp. 87-114.   DOI
12 Johansen, R. and Swigart, R., Upsizing the Individual in the Downsized Organization : Managing in the Wake of Reengineering, Globalization and Overwhelming Technological Change, Basic Books, 1995.
13 Kelman, H., "Further Thoughts on the Pro cesses of Compliance, Identification, and Internalization", Perspectives on Social Power, Chicago : Aldine, 1974, pp. 126-171.
14 Kostova, T., Roth, K., and Dacin, M. T., "Institutional theory in the study of multinational corporations : A critique and new directions", Academy of Management Review, Vol. 33, No. 4, 2008, pp. 994-1006.   DOI
15 Kim, S. and Kim, J., "Communal Antecedents in the Adoption of Secure Coding Methodologies", Asia Pacific Journal of Information Systems, Vol. 26, No. 2, 2016, pp. 231-246.   DOI
16 Kostova, T., "Transnational Transfer of Strategic Organizational Practices : A Contextual Perspective", The Academy of Management Review, Vol. 24, No. 2, 1999, pp. 308-324.   DOI
17 Kostova, T. and Roth, K., "Adoption of an Organizational Practice By Subsidiaries of Multinational Corporations : Institutional and Relational Effects", Academy of Management Journal, Vol. 45, No. 1, 2002, pp. 215-233.   DOI
18 Lee, Y., Kozar, K., and Larsen, K., "The technology acceptance model : Past, present, and future", Communications of the Association for Information Systems, Vol. 12, No. 1, 2003, pp. 751-780.
19 Legris, P., Ingham, J., and Collerette, P., "Why do people use information technology? A critical review of the technology acceptance model", Information and Management, Vol. 40, No. 3, 2003, pp. 191-204.   DOI
20 Mael, F. and Ashforth, B., "Alumni and their alma mater : A partial test of the reformulated model of organizational identification", Journal of Organizational Behavior, Vol. 13, No. 2, 1992, pp. 103-123.   DOI
21 Meyer, J. W. and Rowan, B., "Institutionalized organizations : Formal structure as myth and ceremony", American Journal of Sociology, 1977, pp. 340-363.
22 Nair, A. and Prajogo, D., "Internalization of ISO 9000 standards : the antecedent role of functionalist and institutionalist drivers and performance implications", International Journal of Production Research, Vol. 47, No. 16, 2009, pp. 4545-4568.   DOI
23 Recker, J., "Continued use of process modeling grammars : the impact of individual difference factors", European Journal of Information System, Vol. 19, No. 1, 2010, pp. 76-92.   DOI
24 Pierce, J. L., Kostova, T., and Dirks, K., "Toward a theory of psychological ownership in organizations", Academy of Management Review, Vol. 26, No. 2, 2001, pp. 298-310.   DOI
25 Pierce, J., Kostova, T., and Dirks, K., "The state of psychological ownership : Integrating and extending a century of research", Review of General Psychology, Vol. 7, No. 1, 2003, pp. 84-107.   DOI
26 Pfleeger, S., "Understanding and Improving Technology Transfer in Software Engineering", Journal of Systems and Software, Vol. 47, No. 2-3, 1999, pp. 111-124.   DOI
27 Riemenschneider, C., Harrison, D., and Mykytyn, P., "Understanding IT adoption decisions in small business : Integrating current theories", Information and Management, Vol. 40, 2003, pp. 269-285.   DOI
28 Riemenschneider, C., Hardgrave, B., and Davis, F., "Explaining Software Developer Acceptance of Methodologies : A Comparison of Five Theoretical Models", IEEE Transactions on Software Engineering, Vol. 28, No. 12, 2002, pp. 1135-1145.   DOI
29 Tari, J., Heras-Saizarbitoria, J., and Pereira, J., "Internalization of quality management in service organizations", Managing Service Quality, Vol. 23, No. 6, 2013, pp. 456-473.   DOI
30 Taylor, S. and Kaza, S., "Security Injections : Modules to help students remember, understand, and apply secure coding techniques", ITiCSE, 2011, pp. 27-29.
31 Turner, M., Kitchenham, B., Brereton, P., Charters, S., and Budgen, D., "Does the technology acceptance model predict actual use? A systematic literature review", Information and Software Technology, Vol. 52, No. 5, 2010, pp. 463-479.   DOI
32 Whittaker, J., "Why secure applications are difficult to write", IEEE Security and Privacy, Vol. 1, No. 2, pp. 81-83.
33 Venkatesh, V. and Davis, F., "A theoretical extension of the technology acceptance model : Four longitudinal field studies", Management Science, Vol. 46, No. 2, 2000, pp. 186-204.   DOI
34 Venkatesh, V., Morris, M., Davis, G., and Davis, D., "User acceptance of information technology : Toward a unified view", MIS Quarterly, Vol. 27, No. 3, 2003, pp. 425-478.   DOI