Conceptualizing the dynamics of rhetorical practice and technological frame in the context of technology diffusion and adoption

Published on Dec 1, 2014in Information & Management4.12
路 DOI :10.1016/
Carol Hsu10
Estimated H-index: 10
(NTU: National Taiwan University),
Jimmy C. Huang19
Estimated H-index: 19
(Warw.: University of Warwick),
Robert D. Galliers40
Estimated H-index: 40
(Bentley University)
This paper examines and conceptualizes the process underlying the diffusion of a back office messaging system connecting the financial transaction activities of fund houses in Europe to banks in Taiwan. Drawing on the theoretical notions of rhetorical practice and technological frame, it develops a socio-cognitive process framework to conceptualize how the articulation of rhetorical situations and the deployment of rhetorical strategies influence stakeholders' sense-making toward a new technology. A conceptual framework is developed to enhance understanding of technology diffusion by taking into account the dynamic interplay between rhetorical practice and technological frame. We show that the persuasive power of rhetorical practices is largely influenced by (i) the rhetors' on-going advancement of local knowledge, assumptions and beliefs and (ii) an effective deployment of a balanced rhetorical strategy to promote the technology to different stakeholders. We demonstrate that an analysis of rhetorical practice helps explain how the phenomenon of diffusion is linguistically afforded and discursively constructed into a reality.
  • References (70)
  • Citations (4)
馃摉 Papers frequently viewed together
5 Citations
2011HICSS: Hawaii International Conference on System Sciences
5 Authors (Jimmy C. Huang, ..., Sue Newell)
2 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
#1Karin Olesen (AUT: Auckland University of Technology)H-Index: 5
Successful adoption and use of information systems is an area of continued research in the field of information systems. This prior research has shown that how we adopt and use an information system depends on how we make sense of it. The sense-making activity is carried out through our cognitive structures of knowledge that relate to technology our technological frames. The sense-making activity changes over time, as use and exposure to differing technologies occur. Most research into informati...
11 CitationsSource
#1Joe Peppard (European School of Management and Technology)H-Index: 4
#2Robert D. Galliers (Bentley University)H-Index: 40
Last. Alan Thorogood (UNSW: University of New South Wales)H-Index: 8
view all 3 authors...
78 CitationsSource
#1Christian M. Messerschmidt (Goethe University Frankfurt)H-Index: 4
#2Oliver Hinz (Technische Universit盲t Darmstadt)H-Index: 17
Grid computing can meet computational demands and offers a promising resource utilization approach. However, little research details the drivers of and obstacles to adoption of this technology. Institutional and organizational capability theory suggests an adoption model that accounts for inter- and intra-organizational influences. An empirical study with 233 high-ranking IT executives reveals that adoption results from social contagion, while organizational capabilities such as trust, firm inno...
39 CitationsSource
#1Yinglei Wang (Acadia University)H-Index: 4
#2Darren B. Meister (UWO: University of Western Ontario)H-Index: 11
Last. Peter Gray (UVA: University of Virginia)H-Index: 18
view all 3 authors...
Theory suggests that coworkers may influence individuals' technology use behaviors, but there is limited research in the technology diffusion literature that explicates how such social influence processes operate after initial adoption. We investigate how two key social influence mechanisms (identification and internalization) may explain the growth over time in individuals' use of knowledge management systems (KMS)--a technology that because of its publicly visible use provides a rich context f...
63 CitationsSource
This article analyzes the adoption of B2B-e-business technology in German automotive supplier companies during the internet hype period, i.e. in the very early stage of technology diffusion. While from the outset e-business was assumed to be used by companies in order to increase efficiency and reduce costs, some previous IOS research and theoretical considerations suggest that both efficiency and environmental expectations can be important reasons for companies to implement e-business. On this ...
22 CitationsSource
#1Gianvito Lanzolla (Lond: University of London)H-Index: 8
#2Fernando F. Suarez (BU: Boston University)H-Index: 18
A firm may readily subscribe to a new technology but then fail to use it. This article advances existing technology diffusion theory by bringing in a new construct that can explain the likelihood of technology use after adoption. The authors define contiguous user bandwagon and show how this information diffusion mechanism can help in explaining the time to technology use. They test their hypotheses using data on the adoption and use of e-procurement technology (N = 3,158) in the early phase of ...
22 CitationsSource
#1Paul M. LeonardiH-Index: 30
This chapter reviews the history of three terms increasingly used by researchers in the fields of organization studies and information systems: 鈥渕ateriality,鈥 鈥渟ociomateriality鈥 and 鈥渟ocio-technical systems.鈥 After this review, I explore ways in which these terms overlap and depart in meaning from one another in scholars鈥 writings. I suggest that materiality might be viewed as a concept that refers to properties of a technology that transcend space and time, while sociomateriality may be used to...
146 CitationsSource
#1Arti Mann (ASU: Arizona State University)H-Index: 4
#2Robert J. Kauffman (Singapore Management University)H-Index: 58
Last. Barrie R. Nault (U of C: University of Calgary)H-Index: 22
view all 4 authors...
We model the diffusion of IT outsourcing using announcements about IT outsourcing deals. We estimate a lognormal diffusion curve to test whether IT outsourcing follows a pure diffusion process or there are contagion effects involved. The methodology permits us to study the consequences of outsourcing events, especially mega-deals with IT contract amounts that exceed US$1billion. Mega-deals act, we theorize, as precipitating events that create a strong basis for contagion effects and are likely t...
12 CitationsSource
#1Shan Ling Pan (NUS: National University of Singapore)H-Index: 36
#2Barney Tan (USYD: University of Sydney)H-Index: 9
Despite an abundance of prescriptions and examples for the conduct of case research in the literature, the fact that most prescriptions tend to (1) articulate general principles/guidelines that are difficult to translate into specific, actionable steps, (2) hold only under idealized conditions and may be unworkable in the field, and (3) emphasize the need to be flexible without explaining how flexibility can be achieved, is creating a steep learning curve. To address these gaps, a structured-pra...
163 CitationsSource
#1Nicholas Berente (UGA: University of Georgia)H-Index: 15
#2Sean Hansen (RIT: Rochester Institute of Technology)H-Index: 11
Last. Patrick J. Bateman (College of Business Administration)H-Index: 8
view all 4 authors...
With the rapid pace of technological development, individuals are frequently challenged to make sense of equivocal innovative technology while being given limited information. Virtual worlds are a prime example of such an equivocal innovative technology, and this affords researchers an opportunity to study sensemaking and the construction of perspectives about the organizational value of virtual worlds. This study reports on an analysis of the written assessments of 59 business professionals who...
65 CitationsSource
Cited By4
#1Joyce Yi-Hui Lee (YZU: Yuan Ze University)H-Index: 3
#2Niki Panteli (RHUL: Royal Holloway, University of London)H-Index: 16
Last. Carol Hsu (Tongji University)H-Index: 10
view all 4 authors...
This paper explores the context of email-based communication in an established but fragile, inter-organisational partnership, which was often overlain with conflict. Drawing upon adaptation theory, this study explores how participants adapt to the use of email to handle conflict. Extensive data were obtained during a 6-month field study of a case of cross-border inter-organisational collaboration in East Asia. We observed that the individuals involved in the cross-border partnership used email a...
3 CitationsSource
#1David Edwards (UNNC: The University of Nottingham Ningbo China)H-Index: 1
#2Keith Horton (BCU: Birmingham City University)
Jan 1, 2015 in ECIS (European Conference on Information Systems)
#1David Edwards (UNNC: The University of Nottingham Ningbo China)H-Index: 1
#2Keith S. HortonH-Index: 4
This paper reports on the adoption and diffusion of information technology in three UK universities. The authors draw upon detailed longitudinal case study research of UK universities utilising an analytic framework drawing upon computerisation movements and technology action frame perspectives. The technology in question is captured within the term Managed Learning Environment. The ambitions for this technology are considerable. The research highlights a range of constraints and affordances tha...