• 제목/요약/키워드: Appropriation Process

검색결과 46건 처리시간 0.02초

집단효능감이 지식경영시스템 사용자의 전유과정과 만족에 미치는 영향 (The Effect of Group Efficacy on the Appropriation Process and User Satisfaction in Knowledge Management Systems)

  • 유일;김재전;노희옥
    • 지식경영연구
    • /
    • 제9권3호
    • /
    • pp.141-158
    • /
    • 2008
  • This study introduces the construct of group efficacy and combines the construct with the Adaptive Structuration Theory(AST) and user satisfaction framework. Job efficacy and IT efficacy identified as the dimensions of group efficacy are hypothesized to influence faithfulness of appropriation and consensus on appropriation. and then the user satisfaction of knowledge management systems(KMS). Data were collected through a survey of respondents who have the experience of using KMS, and analyzed by using structural equations modelling. The major findings of this study are as follows: First, job efficacy was found to have a positive influence on consensus on appropriation and user satisfaction. Second, IT efficacy was found to have a positive effect on faithfulness of appropriation and consensus on appropriation. Third, faithfulness of appropriation was found to have a positive influence on consensus on appropriation and user satisfaction. Implications of these findings are discussed for researchers and practitioners.

  • PDF

인적자원의 인적자산화 과정과 자산유형 (Appropriation of Human Resources into Human Assets and Its Typology)

  • 정기오
    • 서비스연구
    • /
    • 제9권2호
    • /
    • pp.77-88
    • /
    • 2019
  • 서비스가 과정이라면 지식과 역량 등 인적자본은 그 실체이다. 일반적으로 자원은 공유된다. 이 자원이 시장경제의 원동력이 되는 기업 활동의 토대인 자본(capital)이 되려면 그 이전에 자산화 되어야 한다. 자원이 자산화 되는 과정에서 사유화(appropriation) 현상이 일어난다. 일찍이 존 로크는 바로 이 과정에서 개인의 인격과 자유에 기초한 사유재산권의 법철학적 기초를 찾았다. 인적자원(human resources) 또한 이러한 사유화 과정을 거쳐 인적자산(human assets)으로 전화된다. 오늘날 서비스경제 서비스경영에 대한 논의에서 일종의 블랙박스처럼 남아 있는 부분이 무형의 자원, 자산, 자본의 구별과 그 실체에 관한 탐구이다. 이 논문은 인적자원이 인적자산화 되는 과정을 연구한다. 우선 인적자원이 학습에 의하여 형성됨을 밝히고 이렇게 형성되는 인적자원이 인적자산화 되는 과정이 바로 사유화(appropriation)임을 밝힌다. 특히 서비스경제하에서 지식과 학습의 개념이 확대되면서 전통적인 왜(why)와 어떻게(how)에 관한 지식과 학습 이외에 누가 무엇을 언제 어디서에 관한 학습과 지식이 광범하게 경제적 자원 즉 공유자원으로 남겨지고 있으며 이를 사유화(appropriate)하는 과정이 지식경제 서비스경제에서 광범하게 진전되고 있음을 지적하였다. 이렇게 해서 인적자원이 인적자산화 되는 것이다. 이어 연구자는 학습행위와 사유화 행위의 주체가 일치하는 경우 불일치하는 경우를 나누어 검토하고 그에 따라 인적자산의 형태가 실체적 인적자산과 관계적 인적자산으로 나누어짐을 분석한다. 더 나아가 학력 학위를 포함한 자격법제와 무체재산법제가 실체적 관계적 인적자산을 유형화하고 공시하는 기능을 수행함을 밝힌다. 이러한 작업은 그동안 이론적으로 정립되지 못해온 지식경제 서비스경제의 토대를 이루는 무형자산법제의 실질을 밝히고 더 나아가 교육학습법제와 자격법제 및 무체재산권법제 간의 차이와 상호관계를 체계적으로 이해하고 관련 제도의 발전을 위한 토대가 될 것이다.

신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근 (A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process)

  • 최희재;이준기
    • Asia pacific journal of information systems
    • /
    • 제19권3호
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

정보보호 정책의 전유과정이 정보보호 준수의도에 미치는 영향에 대한 탐색적 연구 : 콜센터와 병원 종사자들을 중심으로 (Exploring Effects of Appropriation on the Compliance Intention to Information Security Policy)

  • 오진욱;백승익
    • 한국IT서비스학회지
    • /
    • 제19권5호
    • /
    • pp.15-31
    • /
    • 2020
  • This study explores the process in which employees adopt the information security policy. The results of this study, which surveyed 234 employees in three call centers and four hospitals, show that the employees adapt the information security policy through the social structuring process suggested by the AST model. In particular, this study identifies roles of two appropriation activities (FOA : Faithfulness of Appropriation & COA : Consensus on Appropriation) observed in the social structuring process. Regarding to the interactions between the two appropriation activities, FOA, which indicates a better understanding of the information security policy, is examined as a more critical factor than COA, which indicates the degree of agreement among employees about how to use it. FOA not only has a direct effect on compliance intention toward the information security policy, but also indirectly through COA, whereas COA has only a indirect effect through FOA. This result shows that, in order for a company to successfully implement a new information security policy, it is important for employees to understand its purpose and intention. The adaption of information security policy through two appropriation activities is observed in both hospitals and call centers, but due to the different working environments, there were differences in the preceding variables affecting the appropriation activities. The results of this study are expected to provide guidelines for companies who want to successfully adopt information security policy.

시스템의 도입과 전유 과정에 영향을 미치는 제도적 압력에 관한 연구: 병원조직의 모바일 전자의무기록 시스템을 대상으로 (A Study on the Effects of the Institutional Pressure on the Process of Implementation and Appropriation of System: M-EMRS in Hospital Organization)

  • 이준기;신호경;최희재
    • Asia pacific journal of information systems
    • /
    • 제19권2호
    • /
    • pp.95-116
    • /
    • 2009
  • Increasingly the institutional theory has been an important theoretical view of decision making process and IT adoption in many academic researches. This study used the institutional theory as a lens through which we can understand the factors that enable the effective appropriation of advanced information technology. It posits that mimetic, coercive, and normative pressures existing in an institutionalized environment could influence the participation of top managers or decision makers and the involvement of users toward an effective use of IT in their tasks. Since the introduction of IT, organizational members have been using IT in their daily tasks, creating and recreating rules and resources according to their own methods and needs. That is to say, the adaptation process of the IT and outcomes are different among organizations. The previous studies on a diverse use of IT refer to the appropriation of technology from the social technology view. Users appropriate IT through not only technology itself, but also in terms of how they use it or how they make the social practice in their use of it. In this study, the concepts of institutional pressure, appropriation, participation of decision makers, and involvement of users toward the appropriation are explored in the context of the appropriation of the mobile electronic medical record system (M-EMRS) in particularly a hospital setting. Based on the conceptual definition of institutional pressure, participation and involvement, operational measures are reconstructed. Furthermore, the concept of appropriation is measured in the aspect of three sub-constructs-consensus on appropriation, faithful appropriation, and attitude of use. Grounded in the relevant theories to appropriation of IT, we developed a research framework in which the effects of institutional pressure, participation and involvement on the appropriation of IT are analyzed. Within this theoretical framework, we formulated several hypotheses. We developed a second order institutional pressure and appropriation construct. After establishing its validity and reliability, we tested the hypotheses with empirical data from 101 users in 3 hospitals which had adopted and used the M-EMRS. We examined the mediating effect of the participation of decision makers and the involvement of users on the appropriation and empirically validated their relationships. The results show that the mimetic, coercive, and normative institutional pressure has an effect on the participation of decision makers and the involvement of users in the appropriation of IT while the participation of decision makers and the involvement of users have an effect on the appropriation of IT. The results also suggest that the institutional pressure and the participation of decision makers influence the involvement of users toward an appropriation of IT. Our results emphasize the mediating effect of the institutional pressure on the appropriation of IT. Namely, the higher degree of the participation of decision makers and the involvement of users, the more effective appropriation users will represent. These results provide strong support for institutional-based variables as predictors of appropriation. These findings also indicate that organizations should focus on the role of participation of decision makers and the involvement of users for the purpose of effective appropriation, and these are the practical implications of our study. The theoretical contribution of this study is lies in the integrated model of the effect of institutional pressure on the appropriation of IT. The results are consistent with the institutional theory and support previous studies on adaptive structuration theory.

조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구 (A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System)

  • 김민웅;정기주
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제25권3호
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

지각된 IT위협이 융합 정보시스템 성과에 미치는 영향 (The Impact of Perceived IT Threat on Convergence Information System Performance)

  • 박현호;노희옥;김용호
    • 한국융합학회논문지
    • /
    • 제6권3호
    • /
    • pp.65-71
    • /
    • 2015
  • 본 연구는 기술위협회피이론(Technology Threat Avoidance Theory: TTAT)을 기반으로 IT 위협을 지각한 사용자가 대처행위를 통해 IS성과를 달성하는 과정을 설명하고자 한다. 연구모형을 검증하기 위해 조직내 정보시스템을 사용한 경험이 있는 응답자를 대상으로 설문을 수집하고, 구조방정식모형을 이용하여 분석하였다. 연구결과 IT 위협이 문제-중심적 대처와 IS활용에 부(-)의 영향관계를 갖는 것으로 나타났다. 또한 문제-중심적 대처는 IS활용에 정(+)의 영향을 미치고, IS활용은 IS성과에 정(+)의 영향을 미친다. 즉 사용자가 IT 위협을 지각했을 때, 문제 중심적 대처를 취함으로 융합 정보시스템의 성과를 높일 수 있다.

혁신활동 결과의 전유방법에서 특허와 영업비밀의 상대적 선호 (The Relative Preference of Patent and Secrecy for Appropriation Mechanisms)

  • 김상신;최석준
    • 기술혁신연구
    • /
    • 제17권2호
    • /
    • pp.159-186
    • /
    • 2009
  • 혁신활동은 기업 및 국가의 지속적인 성장에 풍요한 요인으로 작용하고 있으며 특히 혁신활동 결과물의 전유문제가 지속적인 혁신활동을 보장하는 중요한 수단으로 작용하고 있다. 본 연구는 혁신활동 결과물의 전유방법으로써 대표적으로 대비되는 특허시스템과 영업비밀에 대한 상대적 선호에 혁신주체와 혁신결과물의 득성들이 미치는 영향을 '2005년 기술혁신조사: 제조업부분' 자료와 Ordered Logit 방법을 통해 실증분석하였다. 분석결과 공정혁신활동보다는 제품혁신활동에서 선호도에 미치는 영향이 뚜렷한 것으로 나타났다. 또한 대부분의 연구주제에서 본 연구는 기존의 연구 및 전유방법들에서처럼 본연의 특성과 일치하는 결과를 나타냈으나 혁신활동의 정보원천과 관련된 분석결과에서는 기존의 연구와 상당한 차이점이 나타났다. 이는 본 연구가 기존의 연구에 비해 최신의 자료를 이용함으로써 기존연구와의 차별성을 분석해낸 결과로 볼 수 있을 것이다.

  • PDF

GSS 환경에서 회의방식과 과업유형이 그룹의사결정에 미치는 영향 (The Effects of Meeting Modes and Task Types on Group Decision Making in a GSS Environment)

  • 유일;김재전
    • Asia pacific journal of information systems
    • /
    • 제9권2호
    • /
    • pp.151-168
    • /
    • 1999
  • The objective of this study is to investigate the effects of different meeting modes and task types on the outcomes of group decision making. The hypotheses postulate the potential effects of different meeting modes on appropriation process; different meeting modes on group outcomes; and the appropriation process on group outcomes. A laboratory experiment was conducted. A GSS was developed using Lotus Notes for this experiment. The results provide partial support for the hypotheses derived from the theoretical model. The interaction effects between meeting modes and tasks are not always observed in the analyses. However, groups using a face-to-face meeting mode in negotiation task reach significantly higher levels of perceived outcome quality, of satisfaction with the outcome, and of satisfaction with the process than groups using a dispersed-synchronous meeting mode. It suggests that a face-to-face meeting mode can enhance the effectiveness of groups working on a negotiation task such as stakeholder analysis. Furthermore, the manner in which groups appropriate the technology significantly influence the group performance. The results support the validity and usefulness of the IRT and the AST as a GSS research framework.

  • PDF

VE 대상선정을 위한 평가항목의 가중치결정방법에 관한 연구 (A Study on the Subject Selection of VE Using Decision Weights Techniques)

  • 윤동진;신병윤;정용식;이상범
    • 한국건축시공학회지
    • /
    • 제5권3호
    • /
    • pp.83-90
    • /
    • 2005
  • Was used at step space-time mainly after VE technique sponsors in domestic in the 1960s but have been expanded to design step recently. Possibility of value elevation or cost reduction must choose member that is effectively for active and effective application of VE technique. In this study, when enforce design VE examining for weight decision corrosion protection been using in weight grant composition estimation technique, target choice process wishes to suggest formality and method that can be achieved effectively Main conclusion of this study sorts valuation items step by step for weight appropriation of valuation basis and give point on article of high position point after expert which employer is included estimates article by low rank step and this presented high position method that do union item by item and establishes by item weight. Did these techniques for giving weights so that importance for weight appropriation developed estimation program, and data save of target estimation standard and target estimation standard is possible using straight sit.