1 / 34

ERP FINAL PRESENTATION 指導教授 : 吳思佩 學生 :941703 陳羿婷 941720 孫楚涵 941734 葉家瑄 941737 許惠渝 941748 吳奕霆

ERP FINAL PRESENTATION 指導教授 : 吳思佩 學生 :941703 陳羿婷 941720 孫楚涵 941734 葉家瑄 941737 許惠渝 941748 吳奕霆 941750 蔣茵其. Abstract. Motive IT applications is underutilized by most users . proposal Organization need aggressive tactics to encourage users to expend their use of IT. Research objective

ricka
Download Presentation

ERP FINAL PRESENTATION 指導教授 : 吳思佩 學生 :941703 陳羿婷 941720 孫楚涵 941734 葉家瑄 941737 許惠渝 941748 吳奕霆

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ERPFINALPRESENTATION 指導教授:吳思佩 學生:941703 陳羿婷 941720孫楚涵 941734葉家瑄 941737許惠渝 941748吳奕霆 941750蔣茵其

  2. Abstract • Motive • IT applications is underutilized by most users. • proposal • Organization need aggressive tactics to encourageusers to expend their use of IT. • Research objective 1.Offer a comprehensive research modelto help research. 2. Provide a window into the rich body of research regarding IT adoption,use,and diffusion. 3.Discuss implications and recommend guidelines for research and practice. 941703

  3. Introduction • Problem: • Organization are increasingly depending on IT-enabled interorganizational value chains as the backbone of their commerce. • Organizations underutilize the functional potential of majority of this mass of installed IT applications. • Illustrate: • Approximately one-half of ERP implementations fail to meet the implementating organization’s expectations. • Most ERP life cycle models lack an explicit post-adoption stage. • Most explanations of ERP implementation failures are invariably traced to inadequate training and/or inadequate change management. 941703

  4. Research step • Step1:Present a view of post-adoptive behavior within the larger context of IT adoption and use. • Three aspects of post-adoption: • Prior use • Habit • Feature-Centric View of Technology • Step2:Develop a conceptualization of post-adoptive behavior characterized by ongoing, dynamic interactions between two level: • Representing individual cognitions. • Representing organizational drivers that stimulate these individual cognitions. • Step3:Conclude with implications for future research and practice. 941703

  5. Post-Adoptive Behavior • Three level of models stage: • Adoption activities. • Adoption decision. • Post-adoption activities. • Prior use • The majority of previous studies tend to either examine IT application use immediately after adoption or otherwise do not account for a user’s history in using a focal, much less a similar, IT application. • Habit • Past behavior has a direct effect on future behavior over and above the effect of intention. • Frequently performed behaviors should include past behavior as a predictor of both intention and of future behavior. 941703

  6. Feature- Centric View of Technology • Value • The set of IT application features recognized and used by an individual likely changes over time. 941703

  7. The Phenomenon of Post-Adoptive behavior 941748 • Three-Stage Model • Individual Feature Adoption • Individual Feature Use • Individual Feature Extension • User Actions & Organization’s Decision • Voluntary • Mandatory • Situations induce organization to apply • Regulators • Competitiors • Partners

  8. Feature-Centric of IT Adoption and Use Stage1 Organizational Application Adoption Decision (voluntary or mandatory) Stage2 Individual Application Adoption Decision (voluntary or mandatory) Stage3 Post-Adoptive Behaviors Individual Feature Adoption Decision (voluntary or mandatory) Individual Feature Extension (voluntary) Individual Feature Use (voluntary or mandatory) 941748

  9. Two-level Model of Post-Adoptive Behavior 941748 • Conceptualization • Two-level 1.Organizational Action Model (I) Strong Confirmation (II) Disconfirmation 2.Individual Cognition Model

  10. Individual Cognition Model Feedback loops • Contain two feedback loops • The series of relationships from individual cognitions to technology sensemaking and back. • The direct relationships between use history and post-adoptive behavior 941734

  11. Individual Cognition ModelUTAUT • Unified Theory of Acceptance and Use of Technology • Applied to post-adoptive behavior • Two domains: • Cognitive process- • Mental processes of perceiving, learning, remembering, thinking and understanding. • The mental activity of applying those process. • Cognitive content- • Collection of mental structures formed as a result of cognitive processing. 941734

  12. Individual Cognition ModelUTAUT • Four cognitions in influencing individuals’ adoption and use behavior: • Performance expectancy • Effort expectancy • Social influence • Facilitating conditions • Impact post-adoptive behavior: • Demographic characteristics • Cognition style • Personality characteristics 941734

  13. Individual Cognition ModelUTAUT • The individual differences of the relationship as moderators of the relationship between • The individual’s IT application feature cognitions • The individual’s post-adoptive intention • Focus on IT application features, extension to UTAUT:the influences of • Technology sensemarking • Use history • An individual’s attention to interventions 941734

  14. Individual Cognition Model Technology Sensemaking • Occur as an evaluative cognitive process • Evaluation : - Post-adoptive behavior - Pre-episode cognitions • A substantive period of technology use, an individual engaged in reflective. 941734

  15. Individual Cognition Model Technology Sensemaking • Weak confirmation (disconfirmation) outcomes • Strong confirmation (disconfirmation) outcomes 941734

  16. Individual Cognition Model Technology Sensemaking • User-initiated technology learning interventions - Technology cognitions - An individual’s interventions of other work system • Post-adoptive intentions - How to use an IT application’s features - How these features complement other work system elements 941734

  17. Individual Cognition Model Technology Sensemaking • Self-orchestrated learning • about - IT features - The potential use of those features - The work system within which the IT application is situated • Constitute crucially important means by which individuals modify their use cognitions • Example • Individual user 941734

  18. Individual Cognition Model of Post-Adoptive Behavior -Use History 941720 • Individuals gain experience with initially a novel behavior. • An individuals routinely applies an IT application feature within their work. • Much post-adoptive behavior is likely to reflect a habitualization of action where the decision to use IT application feature occurs more or less automatically via a subconscious response to a work situation. • In voluntary and mandatory environments.

  19. Individual Cognition Model of Post-Adoptive Behavior -Use History 941720 • We define use history to include both an individual’s past use behavior and an habits. • Use history as past behavior plays a role in predicting an individual’s post-adoptive intentions to engage in post-adoptive behavior.

  20. Attention to Introduced Intervention 941720 • Conscious processing occurs as a result of the following stimuli: • A situation is novel • An individual senses a discrepancy between reality and expectation • Individuals are included to deliberate regarding their behavior • Two intervention attributes are suggested as particularly relevant: • Salience of the work system likely affected by an intervention • Powerof the intervention source

  21. Implications for research Theory 941720 • Future program of research • Explore the outcomes of individual post-adoptive behaviors and the resulting feedbackthat impacts organizational action and individual cognitions • Focus on work system interventions and the manner in which those interventions prompt individuals to engage in substantive technology use

  22. Post-Adoptive Behaviors and work system outcomes 941720 • We know little about patterns of features adoption, use, and extension that occur throughout the post-adoptive stage of the cumulative impacts of those pattern on work station performance over time Technology Sensemaking • We have insufficient understanding of the technology sensemaking processes that transpire during the post-adoptive context

  23. IT adoption-Use History • Previous IT adoption and use researchers are examined quite simplistically • Use use history in order to - be the path-dependent episodes of use leading - Systematically examine the use history in influencing of post-adoptive behavior 941750

  24. Attention to Interventions • User must actively attend to intervention -scholars effort to let us understand the target users attend to intervention • Two attributes about intervention -the work system element targeted by an intervention -The power of the intervention source 941750

  25. Organization Interventions and Substantive Technology Use • Prior literature has discussed system interventions is important domain of IT implementation . • Interventions will likely observe considerable unexplained variance 941750

  26. Training Interventions • Focused on training associated with initial adoption and use behaviors • Doesn’t know when and how organization orchestrate training intervention • Encourage scholars develop rich conceptualizations of post-adoptive training strategies 941750

  27. Portfolios of Interventions • A single intervention source might initiate multiple interventions targeted at a specific user group regarding a particular IT application feature • Researchers must account for the effects of interacting interventions 941750

  28. Substantive Technology Use Periods • Scholars have ignored intensive studies of post-adoption life cycle. • Remains to be learned about managing a technology’s post-adoption life cycle. 941750

  29. Implications for research: Methodology • 1. Core versus ancillary features • 2. Designers’ versus users’ views • 3. Discreet versus bundles of features • 4. Existing versus new instrumentation 941737

  30. Core versus Ancillary features • Reasons for why researchers must decide the set of features: • Ancillary features may be unused, unknown, or ineffectual. • Exist too large and too much data for empirical studies. • A research design focus on : • The core features characterize the technology. • The features are different the specific technology from others. • The features apply in a consistent fashion. • The features most likely to stabilize or destabilize use patterns. 941737

  31. Implications for research: Methodology • 2. Designers’ versus Users’ views Example: (1)Designers’ views–study a single IT application across multiple work contexts (2)Users’ views-study overtime the evolution of user within a single community. • 3. Discreet versus bundles of features Example: 941737

  32. Implications for research: Methodology • 4. Existing versus new instrumentation (1)Examine whether or not existing instrumentation can be effectually ported to the feature level of analysis. (2)Develop instrumentation enabling researchers to measure the cognitions. (3)User behaviors associated with the dynamic interaction reflected in our reconceptualization of post-adoptive behavior.

  33. Implication for Practice • Why couldn't meet managements’ expectation? (1)A lack of functionality customized for unique business needs and processes (2)Employees lack of understanding of the IT application features, the new processes, or both. (3)A lack of continual system upgrades and enhancements. 941737

  34. Implication for Practice • What we should reconsider for an IT-enabled work system? (1)The active management of post-adoptive life cycle. ─consider reconvening the principals associated with such effort or resources. (2)The active collection of data on post-adoptive behaviors. ─consider capturing users’ post-adoptive behaviors, at a feature level of analysis. 941737

More Related