Study of effects of functional tasks network's position and relationship on enterprise information system usage

YIN Jun, ZHENG Qingqing, GE Shilun, WANG Nianxin

Systems Engineering - Theory & Practice ›› 2018, Vol. 38 ›› Issue (2) : 444-457.

PDF(1574 KB)
PDF(1574 KB)
Systems Engineering - Theory & Practice ›› 2018, Vol. 38 ›› Issue (2) : 444-457. DOI: 10.12011/1000-6788(2018)02-0444-14

Study of effects of functional tasks network's position and relationship on enterprise information system usage

  • YIN Jun1, ZHENG Qingqing1, GE Shilun1,2, WANG Nianxin1
Author information +
History +

Abstract

The users' performance in enterprise information systems depended not only on themselves, but also on social environment. Paper used the second-hand data of a shipbuilding enterprise as a sample, and used social network analysis method to describe the functional task network, it was established on the basis of information system users used the same function. Paper measured the network environment's location and relationship features with centrality and structure hole characteristics, and empirically tested their impact on the use of information systems. The results show that the network's location and relationship characteristics have a positive effect on the use of information systems, it also finds that the interaction between location and relationship characteristics positively affects the use of information systems, which means if users with high influence have structural holes, they tend to give full play to its convergence and promote the use of information systems. This study has some theoretical contributions to explain the differentiated usage of information systems. Finally, paper gives the corresponding information management inspiration.

Key words

enterprise information system / functional tasks network / social network / information system usage

Cite this article

Download Citations
YIN Jun , ZHENG Qingqing , GE Shilun , WANG Nianxin. Study of effects of functional tasks network's position and relationship on enterprise information system usage. Systems Engineering - Theory & Practice, 2018, 38(2): 444-457 https://doi.org/10.12011/1000-6788(2018)02-0444-14

References

[1] Tornatzky L G, Eveland J D, Fleischer M. Technological innovation:Definitions and perspectives[J]. The Processes of Technological Innovation, 1990:9-25.
[2] Kanter J. Have we forgotten the fundamental IT enabler:Ease of use[J]. Information Systems Management, 2000, 17(3):71-77.
[3] Sykes T A, Venkatesh V, Gosain S. Model of acceptance with peer support:A social network perspective to understand employees' system use[J]. MIS Quarterly, 2009, 33(2):371-393.
[4] Govindarajulu C. The status of helpdesk support[J]. Communications of the ACM, 2002, 45(1):97-100.
[5] Adams D A, Nelson R R, Todd P A. Perceived usefulness, ease of use, and usage of information technology:A replication[J]. MIS Quarterly, 1992:227-247.
[6] Karahanna E, Chervany N L. Information technology adoption across time:A cross-sectional comparison of pre-adoption and post-adoption beliefs[J]. MIS Quarterly, 2016, 23(2):183-213.
[7] Sykes T A, Venkatesh V, Johnson J L. Enterprise system implementation and employee:Understanding the role of advice networks[J]. MIS Quarterly, 2014, 38(1):51-72.
[8] Brass D J, Burkhardt M E. Centrality and power in organizations[M]//Networks & Organizations Theory & Practice, 1992:191-215.
[9] Burt R S. Structural holes:The social structure of competition[M]. Boston:Harvard University Press, 1992.
[10] Sykes T A. Support structures and their impacts on employee outcomes:A longitudinal field study of an enterprise system implementation[J]. MIS Quarterly, 2015, 39:473-495.
[11] Borgatti S P, Cross R. A relational view of information seeking and learning in social networks[J]. Management Science, 2003, 49(4):432-445.
[12] 陈运森, 谢德仁. 网络位置、独立董事治理与投资效率[J]. 管理世界, 2011(7):113-127.Chen Y S, Xie D R. Network position, independent director governance and investment efficiency[J]. Management World, 2011(7):113-127.
[13] 李永奎, 乐云,何清华, 等. 基于SNA的复杂项目组织权力量化及实证[J]. 系统工程理论与实践, 2012, 32(2):312-318.Li Y K, Le Y, He Q H, et al. Complex project organization power quantification and empirical study based on SNA[J]. Systems Engineering-Theory & Practice, 2012, 32(2):312-318.
[14] 王泽宇, 王蕊, 王国锋. 科研团队领导者的社会网络交互及其对团队绩效的影响[J]. 南开管理评论, 2014, 17(1):145-150.Wang Z Y, Wang R, Wang G F. Study on social network interaction of research team leader and its impact on team performance[J]. Nankai Business Review, 2014, 17(1):145-150.
[15] Kilduff M, Brass D J. Organizational social network research:Core ideas and key debates[J]. The Academy of Management Annals, 2010, 4(1):317-357.
[16] Shah P P. Network destruction:The structural implications of downsizing[J]. Academy of Management Journal, 2000, 43(1):101-112.
[17] 罗斌, 唐锡晋. 关于大陆"社会网络"研究的iView分析及知识视图[J]. 系统工程理论与实践, 2013, 33(7):1661-1671.Luo B, Tang X J. Knowledge vision on social network and Guanxi management research in mainland China by the iView analysis[J]. Systems Engineering-Theory & Practice, 2013, 33(7):1661-1671.
[18] 李留闯, 田高良. 公司关系网络和高管薪酬:理论模型和实证[J]. 系统工程理论与实践, 2014, 34(1):54-63.Li L C, Tian G L. Relationship network of firms and executive compensation:Theoretical model and empirical findings[J]. Systems Engineering-Theory & Practice, 2014, 34(1):54-63.
[19] Reagans R, Zuckerman E, McEvily B. How to make the team:Social networks vs. demography as criteria for designing effective teams[J]. Administrative Science Quarterly, 2004, 49(1):101-133.
[20] Devaraj S, Kohli R. Performance impacts of information technology:Is actual usage the missing link?[J]. Management Science, 2003, 49(3):273-289.
[21] Burt R S. Reinforced structural holes[J]. Social Networks, 2015, 43:149-161.
[22] Burt R S. Brokerage and closure:An introduction to social capital[M]. Oxford UK:OUP Oxford, 2005.
[23] Burt R S. Network data from archival records[J]. Applied Network Analysis:A Methodological Introduction, 1983:158-174.
[24] Kane G C, Alavi M, Labianca G, et al. What's different about social media networks? A framework and research agenda[J]. MIS Quarterly, 2013, 38(1):275-304.
[25] Williams T A, Shepherd D A. Mixed method social network analysis:Combining inductive concept development, content analysis, and secondary data for quantitative analysis[J]. Organizational Research Methods, 2015, 20(2):268-298.
[26] Scott J. Social network analysis[M]. California USA:Sage, 2012.
[27] Borgatti S P, Mehra A, Brass D J, et al. Network analysis in the social sciences[J]. Science, 2009, 323(5916):892-895.
[28] Ahuja M K, Galletta D F, Carley K M. Individual centrality and performance in virtual R&D groups:An empirical study[J]. Management Science, 2003, 49(1):21-38.
[29] Burt R S. Structural holes:The social structure of competition[M]. Boston:Harvard University Press, 2009.
[30] Brass D J. Being in the right place:A structural analysis of individual influence in an organization[J]. Administrative Science Quarterly, 1984:518-539.
[31] Davenport T H. Putting the enterprise into the enterprise system[J]. Harvard Business Review, 1998, 76(4):121-131.
[32] Wang Y, Meister D B, Gray P H. Social influence and knowledge management systems use:Evidence from panel data[J]. MIS Quarterly, 2013, 37(1):299-313.
[33] Wellman B. Network analysis:Some basic principles[J]. Sociological Theory, 1983, 1(1):155-200.
[34] Ronald B. Structural holes:The social structure of competition[M]. Cambridge:Harvard University Press, 1992.
[35] Sparrowe R T, Liden R C, Wayne S J, et al. Social networks and the performance of individuals and groups[J]. Academy of Management Journal, 2001, 44(2):316-325.
[36] Labianca G, Brass D J. Exploring the social ledger:Negative relationships and negative asymmetry in social networks in organizations[J]. Academy of Management Review, 2006, 31(3):596-614.
[37] Seibert S E, Kraimer M L, Liden R C. A social capital theory of career success[J]. The Academy of Management Journal, 2001, 44(2):219-237.
[38] Purvis R L, Sambamurthy V, Zmud R W. The assimilation of knowledge platforms in organizations:An empirical investigation[J]. Organization Science, 2001, 12(2):117-135.
[39] Grewal R, Lilien G L, Mallapragada G. Location, location, location:How network embeddedness affects project success in open source systems[J]. Management Science, 2006, 52(7):1043-1056.
[40] Morrison E W. Newcomers' relationships:The role of social network ties during socialization[J]. Academy of Management Journal, 2002, 45(6):1149-1160.
[41] Fang E. Customer participation and the trade-off between new product innovativeness and speed to market[J]. Journal of Marketing, 2008, 72(4):90-104.
[42] Zollo M, Reuer J J, Singh H. Interorganizational routines and performance in strategic alliances[J]. Organization Science, 2002, 13(6):701-713.
[43] Shaw D, Edwards J S. Building user commitment to implementing a knowledge management strategy[J]. Information & Management, 2005, 42(7):977-988.
[44] Wasserman S, Faust K. Social network analysis:Methods and applications[M]. London UK:Cambridge University Press, 1994.
[45] Freeman L C. Centrality in social networks conceptual clarification[J]. Social Networks, 1979, 1(3):215-239.
[46] Granovetter M S. The strength of weak ties[J]. American Journal of Sociology, 1973:1360-1380.
[47] Borgatti S P. Centrality and network flow[J]. Social Networks, 2005, 27(1):55-71.
[48] Burkhardt M E, Brass D J. Changing patterns or patterns of change:The effects of a change in technology on social network structure and power[J]. Administrative Science Quarterly, 1990:104-127.
[49] Kilduff M, Krackhardt D. Bringing the individual back in:A structural analysis of the internal market for reputation in organizations[J]. Academy of Management Journal, 1994, 37(1):87-108.
[50] Gavetti G, Levinthal D. Looking forward and looking backward:Cognitive and experiential search[J]. Administrative Science Quarterly, 2000, 45(1):113-137.
[51] Uzzi B. Social structure and competition in interfirm networks:The paradox of embeddedness[J]. Administrative Science Quarterly, 1997:35-67.
[52] Venkatesh V, Bala H. Predicting different conceptualizations of system use:The competing roles of behavioral intention, facilitating conditions, and behavioral expectation[J]. MIS Quarterly, 2008, 32(32):483-502.
[53] 吴明隆. SPSS统计应用实务:问卷分析与应用统计[M]. 北京:科学出版社, 2003.Wu M L. SPSS statistical applications learning practice:Questionnaire analysis and applied statistics[M]. Beijing:Science Press, 2003.
[54] Venkatesh V, Morris M G. Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior[J]. MIS Quarterly, 2000:115-139.
[55] d'Astous A, Colbert F, Montpetit D. Music piracy on the web-how effective are anti-piracy arguments? Evidence from the theory of planned behaviour[J]. Journal of Consumer Policy, 2005, 28(3):289-310.
[56] Beaudry A, Pinsonneault A. Understanding user responses to information technology:A coping model of user adaptation[J]. MIS Quarterly, 2005:493-524.
[57] Leonard-Barton D. Implementation as mutual adaptation of technology and organization[J]. Research Policy, 1988, 17(5):251-267.
[58] Ibarra H. Homophily and differential returns:Sex differences in network structure and access in an advertising firm[J]. Administrative Science Quarterly, 1992, 37(3):422-447.
[59] Podolny J M, Baron J N. Resources and relationships:Social networks and mobility in the workplace[J]. American Sociological Review, 1997, 62(5):673-693.
[60] Wellman B, Gulia M. Net surfers don't ride alone:Virtual communities as communities[J]. Networks in the Global Village, 1999:331-366.
[61] Lampe C, Ellison N, Steinfield C. A face (book) in the crowd:Social searching vs. social browsing[C]//Proceedings of the 200620th Anniversary Conference on Computer Supported Cooperative Work:ACM, 2006:167-170.
[62] Burton-Jones A, Grange C. From use to effective use:A representation theory perspective[J]. Information Systems Research, 2013, 24(3):632-658.
[63] Tortoriello M. The social underpinnings of absorptive capacity:The moderating effects of structural holes on innovation generation based on external knowledge[J]. Strategic Management Journal, 2015, 36(4):586-597.
[64] Burton-Jones A, Straub Jr D W. Reconceptualizing system usage:An approach and empirical test[J]. Information Systems Research, 2006, 17(3):228-246.

Funding

Key Program of National Natural Science Foundation of China (71331003); General Program of National Natural Science Foundation of China (71271104, 71471079); Major Program of Philosophy and Social Science Basic Research of Jiangsu Colleges and Universities (2015JDXM024)
PDF(1574 KB)

403

Accesses

0

Citation

Detail

Sections
Recommended

/