Introduction of a Coding Scheme of the Source and Target in Appropriation Moves

نویسنده

  • David W. Miller
چکیده

Several studies have shown the value of categorization schemes such as the DeSanctis and Poole (1994) typologies of appropriation moves in illuminating aspects of technology adoption and use (e.g. Poole and DeSanctis, 1992; DeSanctis, et al, 1993; Chudoba, 1999). The DeSanctis and Poole typology has served as both sensitizing categories for the recognition of appropriation moves and as a tool for organizing observed appropriation moves for interpretation and analysis (Chudoba, 1999; Miller, under review). Such analyses have provided important insight into patterns of adoption and use of technology within groups. Recent study however, has shown the value of analysis that delves deeper into the complexities of appropriation moves and illuminates aspects of appropriation that analysis of the types of appropriation moves alone does not reveal (Miller, under review). In particular, research has shown that determining the initiator of an appropriation move (the source) and the person or group towards whom the move is directed (the target) offers greater understanding of the nature of appropriation moves and reveals patterns of appropriation not apparent from analysis of the types of appropriation moves. Building on that research, this paper suggests a coding scheme that identifies and categorizes the source and target in appropriation moves. This coding scheme complements the DeSanctis and Poole (1994) appropriation move typology. When combined with the appropriation moves typology, the source-target scheme provides a ready means for organizing observations for analysis of an important aspect of group interaction and technology adoption and use.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems

This paper studies interference alignment scheme and minimum mean square error (MMSE) improvement in Internet of Things (IoT)-oriented cognitive systems, where IoT devices share the licensed spectrum by cognitive radio in spectrum underlay. Target to manage the inter-tier interference caused by cognitive spectrum sharing as well as ensure an MMSE at receivers, the interference alignment algorit...

متن کامل

Image Classification via Sparse Representation and Subspace Alignment

Image representation is a crucial problem in image processing where there exist many low-level representations of image, i.e., SIFT, HOG and so on. But there is a missing link across low-level and high-level semantic representations. In fact, traditional machine learning approaches, e.g., non-negative matrix factorization, sparse representation and principle component analysis are employed to d...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Core Units of Spoken Grammar in Global ELT Textbooks

Materials evaluation studies have constantly demonstrated that there is no one fixed procedure for conducting textbook evaluation studies. Instead, the criteria must be selected according to the needs and objectives of the context in which evaluation takes place. The speaking skill as part of the communicative competence has been emphasized as an important objective in language teaching. The pr...

متن کامل

A Suitable Coding Scheme for Broadband Power-line Communication

This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008