Guest editorial

Younghoon Chang (Division of Business and Management, BNU-HKBU United International College, Tangjiawan, Zhuhai, Guangdong, China)
Hwansoo Lee (Department of Convergence Security, Dankook University, Yongin-si, Gyeonggi-do, The Republic of Korea)
Jae-Nam Lee (Korea University Business School, Seongbuk-Gu, Seoul, The Republic of Korea)
Shan Wang (University of Saskatchewan, Saskatoon, Canada)

Industrial Management & Data Systems

ISSN: 0263-5577

Article publication date: 9 April 2018

1024

Citation

Chang, Y., Lee, H., Lee, J.-N. and Wang, S. (2018), "Guest editorial", Industrial Management & Data Systems, Vol. 118 No. 3, pp. 502-505. https://doi.org/10.1108/IMDS-02-2018-0075

Publisher

:

Emerald Publishing Limited

Copyright © 2018, Emerald Publishing Limited


The adoption and resistance of disruptive information technologies

With technology permeating every part of our life, both personal and at work, the issues related to its adoption have drawn concerns of the users. Technology acceptance studies have provided valuable insights and have been consistently published in various outlets (Lee and Lehto, 2013). The topic has also garnered high citation as evidenced by previous studies. As new technologies are being introduced, it is expected that the adoption and resistance issues will continue to attract user interest. The existing technology acceptance theories are old-fashioned, yet many researchers still apply them to specific contexts (e.g. developing countries, education, and health care areas). These theories may have limitations in explaining the adoption of emerging disruptive information technologies (Sun and Jeyaraj, 2013). Thus, if we fill this research gap, researchers will have better opportunities to develop and understand related topics based on the studies that are included in this special issue.

This special issue focuses on the adoption and resistance of emerging information technologies (e.g. IoT, artificial intelligence, augmented reality, virtual reality, big data, cloud computing, and FinTech), which bring disruptive changes to business activities and individual lives. A total of eight papers are accepted. Six papers focused on adoption issues of Fintech, wearable devices, Industry 4.0, the blockchain, mobile payment, and intelligent personal assistants, while two papers concentrated on resistance-related issues of feral system and intelligent CCTV.

More specifically, Shen et al. (2018) proposed a revised expectation-disconfirmation model for wearable health information systems. This study introduced a new concept “Intermittent discontinuance” on the post-adoption usage of information systems. Fan et al. (2018) proposed a research framework for mobile payment service in terms of security and trust. In this study, the authors introduced the security measure concepts (measured by security technology protection, security rules, and security responsibility commitment) and the payment culture concepts (measured by coverage of mobile payment context and uncertainty avoidance). The study also compared China and the USA based on their market penetration rate. Ryu (2018) investigated the effect of benefit and risk toward Fintech services. The study suggested antecedents of perceived risk (i.e. financial, legal, security, and operational risk) and benefit (i.e. economic benefit, seamless transaction, and convenience). The study also checked the moderating effect of different user types. Davison and Ou (2018) investigated why employees resisted the use of company’s information systems and instead chose to use unauthorized feral systems for their daily tasks. Lin et al. (2018) examined the strategic response of Industry 4.0 in Chinese automotive industry and identified critical factors for its successful implementation. The study adopted Technology-Organization-Environment framework to build the research model. Ha (2018) proposed the expanded regret theory to examine the gap between expected benefits of the current system to anticipated regret. The study focused on the effect of the future upgraded system on consumer behavior when adopting a new technology, such as intelligent CCTV. Han and Yang (2018) proposed a research model to explain user behaviors of intelligent personal assistants known as AI secretary. The study adopted parasocial relationship, such as task attraction, social attraction, and physical attraction, and privacy/security risk toward adoption of intelligent personal assistants. Zamani and Giaglis (2018) examined how new forms of digital money (e.g. Bitcoin) and technologies (e.g. blockchain) with embedded trust in decentralized networks alter markets and commerce.

Overall our special issue received a plenty of submissions, and we have accepted quality articles that are related to the aim of the special issue. These accepted articles have found meaningful results and have made valuable academic discussions. Despite the various significant contributions of this special issue, there are still a lot of challenges in developing new theories to explain the acceptance of disruptive information technologies. According to Seddon et al. (2016), there are two types of theories, variation models, and process models. First, many factors can be incorporated to study the variation of adoption success. The more intense the disruptive innovation, the greater the change required and the risks (Lyytinen and Rose, 2003). For companies, architectural changes, including both organizational and system architectural changes, should be considered for the successful adoption of disruptive information technologies (Sherif et al., 2006). Organizational architectural change needs to involve cultural factors for organizational learning, while system architecture change needs to focus on safety factors, such as security and reliability issues. Innovative attitudes, such as risk-taking, flexibility, and creativity, are also critical for the disruptive information technology adoption from the end-user perspective (Govindarajan and Kopalle, 2006). Moreover, as laws and policies tend not to keep up with the pace of technology change, information technology compliance issues will be more debatable than before. Second, since adopting disruptive information technologies involves significant changes in the organization, the process of successful adoption is also worthwhile studying. Opening the blackbox of how to make the organization architectural changes and how to match the system architectural changes with the organizational architectural changes during the adoption will shed light on our understanding the adaptation path of an organization when it disrupts itself by adopting new technologies. Therefore, it is imperative that further study can discuss the extended theories that emphasize either the factors or paths of disruptive information technology adoption.

References

Davison, R.M. and Ou, C.X.J. (2018), “Subverting organisational IS policy with feral systems: a case in China”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 570-588.

Fan, J., Shao, M., Li, Y. and Huang, X. (2018), “Understanding users’ attitude toward mobile payment use: a comparative study between China and the US”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 524-540.

Govindarajan, V. and Kopalle, P.K. (2006), “The usefulness of measuring disruptiveness of innovations ex post in making ex ante predictions”, Journal of Product Innovation Management, Vol. 23 No. 1, pp. 12-18.

Ha, Y. (2018), “Expectations gap, anticipated regret, and behavior intention in the context of rapid technology evolvement”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 606-617.

Han, S. and Yang, H. (2018), “Understanding adoption of intelligent personal assistants: a parasocial relationship perspective”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 618-636.

Lee, D.Y. and Lehto, M.R. (2013), “User acceptance of YouTube for procedural learning: an extension of the technology acceptance model”, Computers & Education, Vol. 61, pp. 193-208.

Lin, D., Lee, C.K.M., Lau, H. and Yang, Y. (2018), “Strategic response to Industry 4.0: an empirical investigation on the Chinese automotive industry”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 589-605.

Lyytinen, K. and Rose, G.M. (2003), “Disruptive information system innovation: the case of internet computing”, Information Systems Journal, Vol. 13 No. 4, pp. 301-330.

Ryu, H.S. (2018), “What makes users willing or hesitant to use Fintech? The moderating effect of user type”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 541-569.

Seddon, P.B., Constantinidis, D., Tamm, T. and Dod, H. (2016), “How does business analytics contribute to business value?”, Information Systems Journal, Vol. 27 No. 3, pp. 237-269.

Shen, X.L., Li, Y.J. and Sun, Y. (2018), “Wearable health information systems intermittent discontinuance: a revised expectation-disconfirmation model”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 506-523.

Sherif, K., Zmud, R.W. and Browne, G.J. (2006), “Managing peer-to-peer conflicts in disruptive information technology innovations: the case of software reuse”, MIS Quarterly, Vol. 30 No. 2, pp. 339-356.

Sun, Y. and Jeyaraj, A. (2013), “Information technology adoption and continuance: a longitudinal study of individuals’ behavioral intentions”, Information & Management, Vol. 50 No. 7, pp. 457-465.

Zamani, E.D. and Giaglis, G.M. (2018), “With a little help from the miners: distributed ledger technology and market disintermediation”, Industrial Management and Data Systems, Vol. 118 No. 3, pp. 637-652.

Acknowledgements

The guest editors sincerely thank Professor Alain Chong and Professor Hing Kai Chan, Editor-in-Chiefs of Industrial Management and Data Systems (IMDS) for giving the guest editors this opportunity to conduct a newer research path in disruptive information technologies. The guest editors also thank all reviewers who have spent so much of their valuable time to give quality reviews and constructive comments to the authors. The guest editors deeply appreciate their support and service for this special issue. Finally, the guest editors appreciate all the authors who have submitted their research to our special issue.

Corresponding author

Professor Hwansoo Lee is the corresponding author and can be contacted at: hanslee992@gmail.com

About the authors

Younghoon Chang is an Assistant Professor in the Division of Business and Management at BNU-HKBU United International College, Zhuhai, China. He received his PhD Degree in Business and Technology Management from Korea Advanced Institute of Science and Technology (KAIST). His research interests include IT user behavior, ICT Management, Information privacy, ICT4D, e-business, and business analytics. His articles have appeared in Industrial Management & Data Systems, Government Information Quarterly, Journal of Global Information Management, Behaviour and Information Technology, Telecommunications Policy as well as in the proceedings of international conferences. He is currently serving as an editorial review board member of Journal of Computer Information Systems.

Hwansoo Lee is an Assistant Professor in the department of convergence security at Dankook University. He received his PhD Degree from Department of Business and Technology Management at Korea Advanced Institute of Science and Technology (KAIST). His research focuses on security and privacy, electronic commerce, platform business, and enterprise information systems. His papers have appeared in Information & Management, International Journal of Mobile Communications, Behaviour & Information Technology, Journal of Artificial Societies and Social Simulation, Industrial Management and Data Systems, and other international and domestic journals. He is currently serving as an editorial review board member of Industrial Management and Data Systems.

Jae-Nam Lee is a Professor of MIS in the Business School of Korea University in Seoul, Korea. He was formerly in the faculty of the Department of Information Systems at the City University of Hong Kong. He holds MS and PhD Degrees in MIS from the Graduate School of Management of the Korea Advanced Institute of Science and Technology (KAIST). His research interests are IT outsourcing, knowledge management, information security management, e-commerce, and IT deployment and impacts on firm performance. His published research articles appear in MIS Quarterly, Information Systems Research, Journal of MIS, Journal of the AIS, Information & Management, Decision Support Systems, Communications of the AIS, IEEE Transactions on Engineering Management, European Journal of Information Systems, and others. He has served as an Associate Editor for MIS Quarterly and Information Systems Research and a Senior Editor for the Journal of the AIS. He served the Association for Information Systems as the Asia-Pacific regional representative.

Shan Wang is an Associate Professor at the Edwards School of Business at the University of Saskatchewan, Canada. Prior to joining the Edwards School of Business, she has worked as an Associate Professor for Renmin University, China. She received her PhD Degree in MIS from McMaster University and Master Degree in Economics from Queen’s University, Canada. Her research interests include electronic commerce, business to business electronic marketplaces, and IT value. Her work has been published in several peer reviewed journals, such as Information and Management, Decision Support Systems and Electronic Commerce Research and Applications.

Related articles