Examining explorative and exploitative uses of smartphones: a user competence perspective

نویسندگان

  • Chulmo Koo
  • Namho Chung
  • Hee-Woong Kim
چکیده

Purpose – The purpose of this paper is to investigate the effects of user competence on two different usage variables related to information systems (IS) infusion: explorative use and exploitative use. Design/methodology/approach – Structural equation modeling is used to construct a predictive model of user competence toward IS infusion. Individuals’ responses to questions about attitude and intention to use smartphone were collected and analyzed. Findings – The results showed that all first-order factors of user competence were significantly linked to the second-order factor. User competence is then significantly related to IS infusion, both explorative use and exploitative use. Research limitations/implications – This study discusses individual usage behavior related to IS infusion usage. The authors conceptualized that exploitative use is different from explorative use. The findings in this study suggest that user competence must be included in IS usage models, especially IS infusion model. Practical implications – The results associated with exploitation are more certain and closer in time, while those associated with exploration are more variable. That is, users are likely to innovate through their smart devices related to IS infusion. Smartphone developers and the relevant service providers should decide which factors are more important along the stages of the information technology implementation process. As indicated in this study, knowledge-based user competence together with perceived usefulness influences the usage behavior of smartphone users. Industry players need to consider user competence when they promote their smartphone services. Originality/value – The proposed model brings together extant research on IS use and technology acceptance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Explorative and exploitative learning strategies in technology-based alliance networks

This paper aims to improve our understanding of how exploitative and explorative learning of firms is enhanced through their social capital. Both types of learning differ considerably from each other and we argue that the distinction between them may be an important contingency factor in explaining the value of direct, indirect and (non-)redundant technology-based alliances. In particular we ar...

متن کامل

An Intra-organizational Perspective

This study examines how business units manage the ratio of realized to potential absorptive capacity and reveals how absorptive capacity drives performance differences. Results from 462 business units within 150 branches show that cross-functional interfaces, participation and jobrotation especially enhance a unit’s potential absorptive capacity. Formalization and socialization tactics particul...

متن کامل

How do IT outsourcing vendors respond to shocks in client demand? A resource dependence perspective

IT outsourcing vendors depend on projects from their clients to reap gains and develop capabilities. Because of this dependence, vendors are vulnerable to shocks in client demand. However, the extant literature on how vendors mitigate the damage from demand shocks is very limited. This multiple case study examined five pairs of relationships between Chinese vendors and their Japanese clients, d...

متن کامل

Impact of human resources measures on organizational ambidexterity of smart city projects

Dealing with the tension between explorative and exploitative activities is a key issue for firms. Literature suggests that ambidexterity allows firms to manage this issue properly and provides firms with specific competitive advantages. This study was conducted aiming at investigating the impact of Human Resources measures on organizational ambidexterity in smart city projects. Method used is ...

متن کامل

Managing External Information Sources in Digital Extended Enterprises: The Roles of IT Enabled Business Intelligence Competence and Network Structure Strength

Digital extended enterprises are faced with the dual challenge of managing intra-organizational information and monitoring information from the external environment. Survival requires the effective use of information and decision technologies to gather, manage, and exploit knowledge. It also entails the extensive sharing of information with business network partners through information linkages...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IT & People

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2015