Skip to main content
Log in

Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

IT consumerization, or the end-user’s adoption of consumer IT for work purpose, is an emerging topic which recently attracted the attention of researchers and practitioners. This research adopted social network analysis techniques to investigate the determinants of the social influence that resulted in IT consumerization, as well as the structural features of such influence’s network. By testing theoretically-based hypotheses with the exponential random graph modeling approach, our findings suggested that IT consumerization’s influence tended to occur between employees in the same department, coming especially from those who frequently gave work advice, life advice, and organizational updates to others, as well as those who were trusted for expertise by colleagues. The research revealed that IT consumerization’s influence was highly transitive, hierarchical, and non-reciprocal. The research concluded by elaborating future directions about the adoption of social network analysis techniques in technology adoption research, as well as practical recommendations about harnessing the determinants of such influence to manage IT consumerization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems, 8(4), 244–254.

    Article  Google Scholar 

  • Bastian, M., Heymann, S., & Jacomy, M. (2009). Gephi: An open source software for exploring and manipulating networks. In International AAAI Conference on Weblogs and Social Media.

  • Borgatti, S. P., & Cross, R. (2003). A relational view of information seeking and learning in social networks. Management Science, 49(4), 432–445. https://doi.org/10.1287/mnsc.49.4.432.14428.

    Article  Google Scholar 

  • Borgatti, S. P., & Foster, P. (2003). The network paradigm in organizational research: A review and typology. Journal of Management, 29(6), 991–1013.

    Article  Google Scholar 

  • Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks. Thousand Oaks: Sage Publications Ltd..

    Google Scholar 

  • Brechwald, W. A., & Prinstein, M. J. (2011). Beyond Homophily: A decade of advances in understanding peer influence processes. Journal of research on adolescence : the official journal of the Society for Research on Adolescence, 21(1), 166–179. https://doi.org/10.1111/j.1532-7795.2010.00721.x.

    Article  Google Scholar 

  • Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55(1974), 591–621. https://doi.org/10.1146/annurev.psych.55.090902.142015.

    Article  Google Scholar 

  • Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2016). Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace. Information Management. https://doi.org/10.1016/j.im.2016.12.003.

  • Davis, J. A. (1970). Clustering and hierarchy in interpersonal relations: Testing two graph theoretical models on 742 Sociomatrices. American Sociological Review, 35(5), 843–851.

    Article  Google Scholar 

  • Dernbecher, S., Beck, R., & Weber, S. (2013). Switch to your own to work with the known: An empirical study on consumerization of IT. In 19th Americas Conference on Information Systems (pp. 1–10).

  • Dong, S., & Yang, X. (2009). An improved motivation model for people behaviors change in virtual communities based on social cognitive theory. In 2009 1st International Conference on Information Science and Engineering, ICISE 2009 (pp. 2274–2277). doi:https://doi.org/10.1109/ICISE.2009.277.

  • French, J. R., Raven, B., & Cartwright, D. (1959). The bases of social power. Classics of organization theory, 7, 311–320.

  • Gallivan, M. J., Spitler, V. K., & Koufaris, M. (2005). Does information technology training really matter? A social information processing analysis of coworkers’ influence on IT usage in the workplace. Journal of Management Information Systems, 22(1), 153–192.

    Article  Google Scholar 

  • Gens, F., Levitas, D., & Sega, R. (2011). 2011 Consumerization of IT Study: Closing the “Consumerization Gap” (Vol. 1156). http://www.unisys.com/iview.

  • Goodreau, S. M., Handcock, M. S., Hunter, D. R., Butts, C. T., & Morris, M. (2008). A statnet Tutorial. Journal of Statistical Software, 24(9), 1–27. https://doi.org/10.1016/j.biotechadv.2011.08.021.Secreted.

    Article  Google Scholar 

  • Handcock, M. S., Raftery, A. E., & Tantrun, J. M. (2007). Model-based clustering for social networks. Journal of the Royal Statistical Society: Series A (Statistics in Society), 170(2), 301–354.

    Article  Google Scholar 

  • Harris, J. G., Ives, B., & Junglas, I. (2011a). The Genie is out of the bottle: managing the infiltration of consumer IT into the workforce. http://www.accenture.com/usen/Pages/insight-managing-infiltrationconsumer-itworkforce.aspx.

  • Harris, J., Ives, B., & Junglas, I. (2011b). IT consumerization: When gadgets turn into Enterprise IT tools. MIS Quarterly Executive, 10(2), 115–117.

    Google Scholar 

  • Hatala, J.-P., & Lutta, J. G. (2009). Managing information sharing within an organizational setting: A social network perspective. Performance Improvement Quarterly, 21(4), 5–33.

    Article  Google Scholar 

  • Hossain, L., & de Silva, A. (2009). Exploring user acceptance of technology using social networks. The Journal of High Technology Management Research, 20(1), 1–18. https://doi.org/10.1016/j.hitech.2009.02.005.

    Article  Google Scholar 

  • Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). Ergm: A package to fit, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 1–29.

    Article  Google Scholar 

  • Ibarra, H., & Andrews, S. B. (1993). Power, social influence, and sense making: Effects of network centrality and proximity on employee perceptions. Administrative Science Quarterly, 38(2), 277. https://doi.org/10.2307/2393414.

    Article  Google Scholar 

  • Kirlappos, I., Parkin, S., & Sasse, M. A. (2014). Learning from “shadow security”: Why understanding non-compliant behaviors provides the basis for effective security. In USEC’14 Workshop on Usable Security.

  • Lee, Y., Lee, J., & Lee, Z. (2006). Social influence on technology acceptance behavior: Self-identity theory perspective. Database for Advances in Information Systems, 37(2-3), 60–75. https://doi.org/10.1145/1161345.1161355.

    Article  Google Scholar 

  • Leenders, R. T. A. J. (2002). Modeling social influence through network autocorrelation: Constructing the weight matrix. Social Networks, 24(1), 21–47.

    Article  Google Scholar 

  • Lewis, W., Agarwal Robert Smith, R. H., & Sambamurthy Eli, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly, 27(4), 657–678.

    Article  Google Scholar 

  • Loose, M., Weeger, A., & Gewald, H. (2013). BYOD–the next big thing in recruiting? Examining the determinants of BYOD service adoption behavior from the perspective of future employees. In 19th Americas Conference on Information Systems (pp. 1–12). http://aisel.aisnet.org/amcis2013/EndUserIS/GeneralPresentations/12/.

  • Lusher, D., Koskinen, J., & Robins, G. (2012). Exponential random graph models for social networks: Theory, methods, and applications. New York: Cambridge University Press.

    Book  Google Scholar 

  • McPherson, M., Smith-lovin, L., & Cook, J. M. (2001). Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27(2001), 415–444. https://doi.org/10.1146/annurev.soc.27.1.415.

    Article  Google Scholar 

  • Merluzzi, J., & Burt, R. S. (2013). How many names are enough? Identifying network effects with the least set of listed contacts. Social Networks, 35(3), 331–337. https://doi.org/10.1016/j.socnet.2013.03.004.

    Article  Google Scholar 

  • Morris, M., Handcock, M. S., & Hunter, D. R. (2008). Specification of exponential-family random graph models: Terms and computational aspects. Journal of Statistical Software, 24(4), 1548–7660 http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=2481518&tool=pmcentrez&rendertype=abstract.

    Article  Google Scholar 

  • Niehaves, B., Köffer, S., & Ortbach, K. (2012). IT consumerization – a theory and practice review. In 18th Americas Conference on Information Systems (AMCIS).

  • Otte, E., & Rousseau, R. (2002). Social network analysis: A powerful strategy, also for the information sciences. Journal of Information Science, 28(6), 441–453. https://doi.org/10.1177/016555150202800601.

    Article  Google Scholar 

  • Rice, R. E., & Aydin, C. E. (1991). Attitudes toward new organizational technology: Network proximity as a mechanism for social information processing. Administrative Science Quarterly, 36(2), 219. https://doi.org/10.2307/2393354.

    Article  Google Scholar 

  • Robins, G., Pattison, P., Kalish, Y., & Lusher, D. (2007). An introduction to exponential random graph (p*) models for social networks. Social Networks, 29(2), 173–191. https://doi.org/10.1016/j.socnet.2006.08.002.

    Article  Google Scholar 

  • Rogers, E. M. (1995). Diffusion of innovations (3rd ed.). New York: The Free Press.

    Google Scholar 

  • Saint-Charles, J., & Mongeau, P. (2009). Different relationships for coping with ambiguity and uncertainty in organizations. Social Networks, 31(1), 33–39. https://doi.org/10.1016/j.socnet.2008.09.001.

    Article  Google Scholar 

  • Silic, M., & Back, A. (2014). Shadow IT – A view from behind the curtain. Computers & Security, 45, 274–283. https://doi.org/10.1016/j.cose.2014.06.007.

    Article  Google Scholar 

  • Sykes, T., Venkatesh, V., & Gosain, S. (2009). Model of acceptance with peer support: A social network perspective to understand employees’ system use. MIS Quarterly, 33(2), 371–393.

    Article  Google Scholar 

  • ten Kate, S., Haverkamp, S., & Feldberg, F. (2010). Social network influences on technology acceptance : A matter of tie strength, centrality and density. In 23rd Bled eConference eTrust (pp. 18–32).

  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(2), 452–478.

    Google Scholar 

  • Walters, R. (2013). Bringing IT out of the shadows. Network Security, 2013(4), 5–11. https://doi.org/10.1016/S1353-4858(13)70049-7.

    Article  Google Scholar 

  • Weeger, A., & Gewald, H. (2014). Factors influencing future employees decision-making to participate in a BYOD program: Does risk matter? In 22nd European Conference on Information Systems (ECIS) (pp. 1–14).

  • Wenger, E. (1998). Community of Practice: A brief introduction. Learning in doing, 15(4), 1–7. https://doi.org/10.2277/0521663636.

    Google Scholar 

  • White, M. (2012). Digital workplaces: Vision and reality. Business Information Review, 29(4), 205–214.

    Article  Google Scholar 

  • Yi, M. Y., Jackson, J. D., Park, J. S., & Probst, J. C. (2006). Understanding information technology acceptance by individual professionals: Toward an integrative view. Information Management, 43(3), 350–363. https://doi.org/10.1016/j.im.2005.08.006.

    Article  Google Scholar 

  • Zheng, K., Padman, R., Krackhardt, D., Johnson, M. P., & Diamond, H. S. (2010). Social networks and physician adoption of electronic health records: Insights from an empirical study. Journal of the American Medical Informatics Association : JAMIA, 17(3), 328–336.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Duy Dang-Pham.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dang-Pham, D., Pittayachawan, S., Bruno, V. et al. Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis. Inf Syst Front 21, 941–955 (2019). https://doi.org/10.1007/s10796-017-9796-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-017-9796-5

Keywords

Navigation