Organizational Technology Adoption Framework: Wireless LAN 802.11x
نویسندگان
چکیده
Wireless LAN (WLAN) is a recent technology that has not been extensively studied in IS research discipline. The only available literature is mostly vendor reports that glorify the success story of WLAN implementation. The current study attempts to fill this gap by undertaking a qualitative case study approach to investigate important WLAN adoption factors. Based on technology adoption constructs from previous studies, we propose a research model in an attempt to tailor technology adoption theories to the context of WLAN deployment. In order to assess the research model, we interviewed four WLAN equipped organizations. They belong to the four industry sectors that have a high WLAN rate (Cisco, 2003). The results show both similarity and disparity to findings from previous IT/IS adoption literature. In particular, there is a salient adoption difference between non-profit organizations and commercial organizations. In the last two sections, we discuss the implications of the current study to both IS researchers and practitioners and make suggestions for promising avenues of future WLAN research.
منابع مشابه
Multi-Hop Routing Cooperative Communication for Improving Throughput in IEEE 802.11x Wireless LAN
In this paper, we propose cooperative communication scheme using multiple relays to improve the throughput of IEEE 802.11x wireless LAN. The proposed scheme performs cooperative communication with a terminal supporting a high data rate in order to solve the problem that a total network throughput is greatly reduced when a terminal supporting a low data rate occupies a channel. Also, the multi-h...
متن کاملSecuring Wireless Communication Against Dictionary Attacks Without Using PKI
Geethakumar, Sarath. M.S., Purdue University, May, 2010. Securing Wireless Communication Against Dictionary Attacks Without Using PKI. Major Professors: Samuel S. Wagstaff Jr. and Melissa Dark. Security of 802.11x wireless encryption standards are increasingly coming under scrutiny as compared to other security protocols and standards. The attacks on 802.11x wireless security protocols are exac...
متن کاملW2Lan: Protocol that transforms a 802.11 mobile ad-hoc network (MANET) into an ethernet lan
To overcome the partial visibility problem that Mobile Ad-Hoc Networks (MANET) exhibit [1] data link-level (level 2 OSI) routing protocols must be considered. Examples of protocols in use are the Ad Hoc On-Demand Distance Vector (AODV) [2] routing protocol -reactiveand the Destination-Sequenced Distance Vector (DSDV) [3] routing protocol -proactive-, and reviews of other routing protocols are a...
متن کاملارائه چارچوب ابتکاری عوامل موثر بر پذیرش فناوری رایانش ابری با استفاده از رویکرد فراترکیب
Cloud computing introduces new capabilities to organizations such as: cost efficiency, scalability, access to global markets, and ease of use, flexibility and rapid adaptability against environmental changes. Cloud computing provides an important role in organizational innovation and agility. In spite of great opportunities that this technology brings to organization, in many of organization, e...
متن کاملAdvance and Green Manufacturing Technology Adoption: Classification and Literature Review of Issues
Purpose – The actual benefits of the AMT solidarity to the manufacturing system, classified as systemic, will only be acquired and identified if the current design and organizational structure become compatible with the change being introduced. The purpose of this paper is to present a review for the organizational design development related to AMT assumption and the green manufacturing (GM) in...
متن کامل