2001
DOI: 10.1111/j.1365-2575.2001.00106.x
|View full text |Cite
|
Sign up to set email alerts
|

A multiple‐theory analysis of a diffusion of information technology case

Abstract: This paper describes a multiple-theory analysis of a diffusion of information technology case. Three innovation diffusion models, the interactive model, the linked-chain model and the emergent model, are used to develop an analysis that describes the essential knowledge that each model produces. Rather than develop conflicting stories, each model leads to distinctly different, but complementary, knowledge about the case setting. More generally, the analysis enables us to circumscribe the distinct conceptual do… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2003
2003
2015
2015

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 25 publications
0
13
0
1
Order By: Relevance
“…The first type of theory is related to the adoption and diffusion of innovations (e.g., Baskerville andPries-Heje 2001, Rogers 2003). It might be interesting to study digital natives who, as a group, can be defined as early adopters of new technologies.…”
Section: Research Question 1: How and Why Are Digital Natives Engaginmentioning
confidence: 99%
“…The first type of theory is related to the adoption and diffusion of innovations (e.g., Baskerville andPries-Heje 2001, Rogers 2003). It might be interesting to study digital natives who, as a group, can be defined as early adopters of new technologies.…”
Section: Research Question 1: How and Why Are Digital Natives Engaginmentioning
confidence: 99%
“…In many cases, the use of S & C coding procedures is completely absent, but Strauss and Corbin are referenced on other methodological aspects, including constant comparison (Schultze, 2000), the use of in vivo codes (Doherty et al, 2006), or theoretical saturation (Baskerville and Pries-Heje, 2001).…”
Section: The Use Of S and C Coding Procedures In Different Research Desmentioning
confidence: 99%
“…'[sic]' and finally onto selective coding where the density of each category is evaluated […] ' (pp. 197-198) Espinosa et al (2007) No direct reference 'We then did axial coding of the data, which involves finding relationships among these themes, which we then used to produce a template with hierarchical codes' (p. 146) Hackney et al (2007) No direct reference 'The subsequent analysis of the interview transcripts and documentary evidence closely followed the suggestions for axial and selective coding and the general suggestions given for the analysis of case study materials (Yin, 2003)' (p. 182) Keil et al (2007) Strauss and Corbin (1998), Baskerville and Pries-Heje (2001) 'These responses were subjected to content analysis following the grounded theory approach described by Strauss and Corbin (1998), which involves three coding procedures: open coding, axial coding and selective coding' (p. 74) 'The second stage of the qualitative analysis involved axial coding which is a process of systematically relating categories in terms of their properties and dimensions. Our aim was to work towards developing a qualitative model consisting of concepts identified in the study and the causal chains between them (Baskerville and Pries-Heje, 2001)' (p. 75) Larsen et al (2007) Corbin and , Strauss (1987) 'Axial coding is the final step of the causal analysis mapping process (Strauss, 1987).…”
Section: Articlementioning
confidence: 99%
“…One IT commentator summarized the situation using the following metaphor: "SMS is a gold mine accidentally run into by the Chinese portals in the Dot.com winter." 5 But the huge market value of SMS also attracted unethical and illegal groups-individuals and organizations that use illegal or unethical techniques to profits from SMS at the expense of other actors. According to a survey carried out by the China Internet Association in July 2008, the volume of unwanted SMS messages reached an astonishing 353.8 billion in 2007, an increase of 92.7 percent over the prior year.…”
Section: Information Services: Bridging Mobile Network and The Internetmentioning
confidence: 99%
“…Such models recognize the dynamic nature of diffusion. Nevertheless, the application of these models has taken mainly a narrow view; studies have often focused on a snapshot of the way users perceive the technology and the environment [30], and taken a limited genealogical microperspective [5], according to which the information technology (IT) artifact is static, offers a constant set of features, and serves a single general purpose. Because MICS and mobile commerce technologies do not meet these criteria (e.g., the IT artifact and its uses often evolve over time), we argue that a macro, dynamic, and longitudinal perspective can supplement existing views and help to explain the processional intricacies of the development and diffusion of mobile commerce technologies.…”
mentioning
confidence: 99%