a comprehensive conceptualization of postadoptive behaviors associated with information technology...

34
A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems Author(s): 'Jon (Sean) Jasperson, Pamela E. Carter and Robert W. Zmud Source: MIS Quarterly, Vol. 29, No. 3 (Sep., 2005), pp. 525-557 Published by: Management Information Systems Research Center, University of Minnesota Stable URL: http://www.jstor.org/stable/25148694 . Accessed: 01/01/2014 07:15 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]. . Management Information Systems Research Center, University of Minnesota is collaborating with JSTOR to digitize, preserve and extend access to MIS Quarterly. http://www.jstor.org This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AM All use subject to JSTOR Terms and Conditions

Upload: lee-bom

Post on 24-Nov-2015

27 views

Category:

Documents


2 download

DESCRIPTION

medical field

TRANSCRIPT

  • A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with InformationTechnology Enabled Work SystemsAuthor(s): 'Jon (Sean) Jasperson, Pamela E. Carter and Robert W. ZmudSource: MIS Quarterly, Vol. 29, No. 3 (Sep., 2005), pp. 525-557Published by: Management Information Systems Research Center, University of MinnesotaStable URL: http://www.jstor.org/stable/25148694 .Accessed: 01/01/2014 07:15

    Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .http://www.jstor.org/page/info/about/policies/terms.jsp

    .

    JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range ofcontent in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new formsof scholarship. For more information about JSTOR, please contact [email protected].

    .

    Management Information Systems Research Center, University of Minnesota is collaborating with JSTOR todigitize, preserve and extend access to MIS Quarterly.

    http://www.jstor.org

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    ^ m.C[!\M \^fc_r^ _[^^ Research Article

    A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems1

    By: 'Jon (Sean) Jasperson Mays Business School Texas A&M University 4217 TAMU College Station, TX 77843-4217 U.S.A.

    jjasperson@[email protected]

    Pamela E. Carter

    College of Business Florida State University Tallahassee, FL 32306-1110 U.S.A.

    [email protected]

    Robert W. Zmud Michael F. Price College of Business

    University of Oklahoma 307 W. Brooks, Room 307E Norman, OK 73019-4006 U.S.A.

    [email protected]

    1 Jane Webster was the accepting senior editor for this

    paper. Anitesh Barua was the associate editor. Terri Griffith served as reviewer.

    Abstract

    For the last 25 years, organizations have invested

    heavily in information technology to support their work processes. In today's organizations, intra

    and interorganizational work systems are in

    creasingly IT-enabled. Available evidence, how ever, suggests the functional potential of these installed IT applications is underutilized. Most IT users apply a narrow band of features, operate at

    low levels of feature use, and rarely initiate exten sions of the available features. We argue that organizations need aggressive tactics to en

    courage users to expand their use of installed IT enabled work systems.

    This article strives to accomplish three primary research objectives. First, we offer a compre hensive research model aimed both at coalescing existing research on post-adoptive IT use be haviors and at directing future research on those factors that influence users to (continuously) exploit and extend the functionality built into IT

    applications. Second, in developing this compre hensive research model, we provide a window (for researchers across a variety of scientific disci

    plines interested in technology management) into the rich body of research regarding IT adoption, use, and diffusion. Finally, we discuss implications

    MIS Quarterly Vol. 29 No. 3, pp. 525-557/September 2005 525

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    and recommend guidelines for research and

    practice.

    Keywords: IT adoption, IT use, post-adoptive behavior, IT value

    Introduction _--HH-_--H_-_-__-_-_-_!

    Organizations have made huge investments in information technology over the last 25 years, resulting in many, if not most, intra-organizational

    work systems being IT-enabled. Further, organi zations are increasingly depending on IT-enabled

    interorganizational value chains as the backbone of their commerce with clients, customers, sup

    pliers, and partners (Davenport 1998; Mabert et al.

    2000,2001). However, existing evidence strongly suggests that organizations underutilize the func tional potential of the majority of this mass of installed IT applications: users employ quite narrow feature breadths, operate at low levels of feature use, and rarely initiate technology- or task related extensions of the available features

    (Davenport 1998; Lyytinen and Hirschheim 1987; Mabert et al. 2001; Osterland 2000; Rigby et al.

    2002; Ross and Weill 2002).

    Investments in enterprise resource planning implementations nicely illustrate this phenomenon.

    The costs of an ERP implementation are high: it is not unusual for large organizations to spend over $100 million on their ERP implementations (Robey et al. 2002; Seddon et al. 2003), with an estimated $300 billion worldwide on ERP systems during the 1990s (James and Wolf 2000). How ever, approximately one-half of ERP implemen tations fail to meet the implementing organization's expectations (Adam and O'Doherty 2003). An

    explanation for an organization's failure to realize

    expectations regarding an ERP implementation might lie in the fact that most ERP life cycle models lack an explicit post-adoption stage. Pragmatically, the post-adoption stage is the

    longest phase of the ERP project life cycle, and the phase during which benefits from the investment begin to accrue. Thus, without explicit plans for realizing benefits through the software,

    the organization falls short of its implementation expectations (Rosemann 2003). Most explana tions of ERP implementation failures are invariably traced to inadequate training (Duplaga and Astani 2003; Kien and Soh 2003; Robey et al. 2002) and/or inadequate change management (Adam and O'Doherty 2003; Bagchi et al. 2003; James and Wolf 2000; Robey et al. 2002; Ross et al.

    2003). Training and change management inter ventions are critical in the post-adoptive context; they allow the organization to benefit from previous learning and adjust to ongoing changes in the work

    system. Yet, because we have not systematically defined and examined the post-adoptive (in this case, ERP) context, information systems researchers and practitioners often overlook the

    potential of these and other post-adoptive inter ventions.

    In general, organizations may be able to achieve considerable economic benefits (via relatively low incremental investment) by successfully inducing and enabling users to (appropriately) enrich their use of already-installed IT-enabled work systems during the post-adoption stage. For example, Lassila and Brancheau (1999) report that com

    panies in expanding and high-integration utilization

    states, where users had more freedom to adjust both software features and the organizational

    processes that could take advantage of those fea tures, realized greater benefits than companies in standard adoption and low-integration utilization states.

    The goals of this paper are to conceptualize the

    post-adoptive behavior construct, to provide a

    synthesis of the factors shown in prior research to influence post-adoptive behavior, and to situate these factors within a nomological net to facilitate future research in this domain. To guide this

    effort, we focus on the following research question: What influences current users of installed IT appli cations to learn about, use, and extend the full

    range of features built into these applications? We

    organize the paper as follows. First, we present a view of post-adoptive behavior within the larger context of IT adoption and use. We identify three

    aspects of post-adoptive behavior that have not been fully addressed in prior research: prior use,

    526 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    habit, and a feature-centric view of technology. Next, we develop a conceptualization of post adoptive behavior characterized by ongoing, dyna mic interactions between two levels: one level

    representing individual cognitions and the other

    representing organizational drivers that stimulate these individual cognitions. Finally, we conclude with implications for future research and practice.

    Post-Adoptive Behavior -_-_ _

    The research stream examining the adoption and use of new IT has evolved into one of the richest and most mature research streams in the information systems field (Hu et al. 1999; Venka tesh et al. 2003). Much of this research has been framed around stage models that represent the decisions and activities associated with the

    adoption and diffusion of IT applications (see Cooper and Zmud 1990; Kwon and Zmud 1987; Rogers 1995). While these stage models typically incorporate three high-level stages (i.e., pre adoption activities, the adoption decision, and

    post-adoption activities) (Rogers 1995), the

    majority of prior research has focused on the reflective cognitive processing (e.g., resulting in

    cognitions regarding a technology's usefulness and ease of use) associated with individuals' pre adoption activities, the adoption decision, and initial use behaviors.

    Where research attention does address post adoptive behavior, such behaviors have generally been modeled (explicitly or implicitly) as being influenced by the same set of factors that lead to

    acceptance and initial use (Bhattacherjee 2001; Kettinger and Grover 1997; Thompson etal. 1994; Venkatesh et al. 2000; Venkatesh et al. 2003). Often, researchers conceptualize post-adoptive use of an IT application as increasing (e.g., more use, greater frequency of use, etc.) as individuals

    gain experience in using the application. In reality, post-adoptive behaviors not only intensify, but may also diminish over time, as the various features of an IT application are resisted, treated with indifference, used in a limited fashion, routinized

    within ongoing work activities, championed, or

    extended (Hartwick and Barki 1994; Hiltz and Turoff 1981; Kay and Thomas 1995; Thompson et al. 1991, 1994). Understanding the factors and

    dynamics that influence these behaviors is central to this work.

    We agree that the cumulative tradition of research on technology acceptance and initial use should enrich our understanding of individual post adoptive behaviors. Indeed, because of the path dependent nature of IT adoption and use pro cesses in general (Gersick 1991; Rogers 1995)? and post-adoptive IT behaviors in particular?post adoptive behavior must be framed within this

    larger context. However, distinctions have been observed between pre-adoption and post-adoption beliefs and behaviors (Agarwal and Karahanna 2000; Karahanna etal. 1999; Oliver 1980), and the IS literature has argued that political and learning

    models might better explain post-adoptive behaviors while rational task-technology fit models

    might better explain pre-adoption and adoption behaviors (Cooper and Zmud 1989, 1990; Kling and lacono 1984; Markus 1983; Robey et al.

    2002). It appears, thus, that factors not ade

    quately explored in prior research may influence

    post-adoptive user behaviors. We focus on three aspects of post-adoptive behavior that have been under-researched: prior use, habit, and a feature

    centric view of technology.

    Prior Use

    By its nature, the study of post-adoptive behavior situates an individual's use of an IT application within a stream of use experiences, some of which

    have already occurred and some of which have yet to occur. However, as can be seen from Table 1, the majority of previous studies tend to either examine IT application use immediately after

    adoption or otherwise do not account for a user's

    history in using a focal, much less a similar, IT

    application. In studies that have considered the direct impact of prior use on post-adoptive behaviors, as might be expected, researchers found prior use to be a significant antecedent of post-adoptive behavior.

    MIS Quarterly Vol. 29 No. 3/September 2005 527

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Table 1. Role of Prior Use in Illustrative IT Adoption and Use Research

    Prior Use Not Considered Adams et al. 1992; Agarwal and Prasad 1997; Bhattacherjee 1998; Compeau and Higgins 1995b; Compeau et al. 1999; Davis et al. 1989; Fuerst and Cheney 1982; Fulk 1993; Gefen and Straub 1997; Ginzberg 1981; Goodhue and Thompson 1995; Guimaraes and Igbaria 1997; Hartwick and Barki 1994; Howard and Mendelow 1991; Igbaria and Guimaraes 1994; Igbaria and livari 1995; Igbaria et al. 1997; livari 1996; Jobber and Watts 1986; Karahanna et al. 1999; King and Rodriguez 1981; Leonard-Barton and Deschamps 1988; Lucas 1975; Lucas and Spitler 1999; Rai et al. 2002; Robey 1979; Schewe 1976; Straub et al. 1995; Swanson 1974; Szajna 1996; Taylor and Todd 1995a, 1995b; Teo et al. 1999; Thompson et al. 1991; Venkatesh and Davis 2000

    Prior Use Considered Indirectly Confirmation ? Bhattacherjee 2001

    Changes in user perceptions over time ? Burkarhdt 1994

    Changes in feature use over time ? Hiltz and Turoff 1981

    Changes in choices and use of commands over time ?

    Kay and Thomas 1995

    Changes in individual, task, and social variables over time ?Kraut et al. 1998

    Changes in use over time ? Orlikowski 2000; Orlikowski et al. 1995; Tyre and Orlikowski 1994;

    Webster 1998; Yates et al. 1999

    Changes in predictors of intention over time ?

    Taylor and Todd 1995a; Venkatesh 2000; Venkatesh and Morris 2000; Venkatesh et al. 2000; Venkatesh et al. 2003; Xia and Lee 2000

    Changes in predictors of use over time ?

    Taylor and Todd 1995a

    Prior Use Considered Directly Computer experience

    ? Igbaria 1990, 1993; Igbaria et al. 1995; Igbaria et al. 1996; Thompson et al.

    1994 Computer skill

    ? Kraut et al. 1999 Extent of prior e-mail use (in months)

    ? Kettinger and Gover 1997

    Prior use ? Kraut et al. 1999; Venkatesh et al. 2000; Venkatesh et al. 2002

    Habit

    During the initial use of an IT feature, individuals most likely engage in active cognitive processing in determining post-adoptive intention or behavior; however, with any repetitive behavior, reflective

    cognitive processing dissipates overtime, leading to non-reflective, routinized behavior (Bargh 1989, 1994; Logan 1989; Ouellette and Wood 1998).

    Psychologists have been studying the role of habit in individual behavior for many years (see Bargh 1989; Eagly and Chaiken 1993; James 1890;

    Ouellette and Wood 1998; Triandis 1971, 1980). Ouellette and Wood (T998) provide an extensive

    review of previous research on the role of habit in

    predicting future intentions and behavior and find substantial empirical evidence supportive of a direct relationship between past behavior and intentions regarding future behavior. Most impor tant, with stable contexts, past behavior has a direct effect on future behavior over and above the effect of intention (Ouellette and Wood 1998). Connor and Armitage (1998) also find empirical evidence of a direct relationship between past behavior and intentions, as well as between past behavior and future behavior, and propose that future research applying the theory of planned behavior (TPB) in the context of frequently per formed behaviors should include past behavior as

    528 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    a predictor of both intention and of future behavior.2

    Feature-Centric View of Technology

    In the social construction of technology (e.g., DeSanctis and Poole 1994; Griffith 1999; Griffith and Northcraft 1994; Orlikowski 1992; Walsham 1993; Weick 1990), features of a technology are

    interpreted (and possibly adapted) by individual users so as to constitute a technology-in-use

    (DeSanctis and Poole 1994; Garud and Rappa 1994; Griffith 1999; Orlikowski and Gash 1994).

    As such,

    Organizations where implementers are able to determine which features users

    mentally bring to the social construction

    process should ultimately be able to

    improve technology design, implemen tation, use, and redesign. Without such

    knowledge, technology implementation (indeed, any organizational change) pro ceeds on limited information, and organi zations, thus, can less proactively

    manage the implementation process.

    (Griffith 1999, p. 473)

    In the post-adoptive context, after an individual has

    begun to actively learn about and use the application, awareness of the existence, nature,

    2Ajzen (2002) and his colleagues (Ajzen and Fishbein 2000; Bamberg et al. 2003) discuss, discount, and dis miss previous work that suggests habit should be added to TPB.

    The observed correlation between frequency of prior and later behavior is no more (or less) than an indication that the behavior in ques tion is stable over time....Thus, behavioral

    stability may be attributable not to habituation but to the influence of cognitive and motiva tional factors that remain unchanged and are

    present every time the behavior is observed.

    (Ajzen 2002, p. 110)

    We echo Ajzen's (2002) call for future research that establishes a measure of habit independent of prior behavior frequency.

    and potential usefulness of the application's features arise and, over time, are fleshed out.

    Therefore, a feature-centric view of technology is valuable because the set of IT application features

    recognized and used by an individual likely changes over time, and it is the specific features in use at any point in time that influence and determine work outcomes (DeSanctis and Poole 1994; Goodhue 1995; Goodhue and Thompson 1995; Griffith 1999; Hiltz and Turoff 1981; Kay and Thomas 1995; Tyre and Orlikowski 1994). Here, we define a technology's features as the building blocks or components of the technology (Griffith 1999; Griffith and Northcraft 1994). Some of these features reflect the core of the technology, collec

    tively representing its identity. Other features, however, are not defining components and their use may be optional (DeSanctis and Poole 1994; Griffith 1999).

    Although prior research has examined the use of a variety of technologies (see Table 2), most researchers tend to study IT applications as a black box rather than as a collection of specific feature sets. We found only five studies that have

    empirically examined IT use at a feature level of

    analysis (Bhattacherjee 1998; Ginzberg 1981; Hiltz and Turoff 1981; Kay and Thomas 1995; Straub et al. 1995). In each study, the researchers found variation in the number of technology features used. In addition, two studies found that feature selection and use varied over time. Hiltz and Turoff (1981), in their study of an electronic infor mation exchange system, found that the number of features considered "extremely valuable" or "fairly useful" varied with a user's experience in using the application. Kay and Thomas (1995) found that users of a Unix-based text editor adopted an

    increasing number of commands as their use

    became more sophisticated and that later-adopted features tended to be more complex and powerful than early-adopted features.

    However, a simple increase in the number of features used may not necessarily correlate with an increase in performance outcomes. Individuals can apply features in nonproductive ways or they may be overwhelmed by the presence of too many features, resulting in an inability to choose among feature sets or to apply the features effectively in

    MIS Quarterly Vol. 29 No. 3/September 2005 529

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Table 2. Technologies Studied in Illustrative IT Adoption and Use Research

    Business Process Applications Account management system

    ? Venkatesh and Davis 2000

    Accounting system ? Venkatesh et al. 2003

    Activity report system ? Swanson 1974

    Banking system ?

    Bhattacherjee 2001 Batch report system

    ? Schewe 1976 CASE tool ? livari 1996; Tyre and Orlikowski 1994; Xia and Lee 2000 Computer systems

    ? Goodhue and Thompson 1995; Hartwick and Barki 1994 Customer service management system

    ? Venkatesh et al. 2003 Data retrieval system ? Venkatesh and Morris 2000; Venkatesh et al. 2000; Venkatesh et al. 2002 Database of product standards ? Venkatesh et al. 2003 DSS ? Bhattacherjee 1998f; Fuerst and Cheney 1982; Igbaria and Guimaraes 1994; King and

    Rodriguez 1981

    Expert system ? Leonard-Barton and Deschamps 1988

    Interactive report system ? Schewe 1976

    Market system ? Lucas and Spitler 1999

    Marketing information system ? Jobber and Watts 1986

    Online help desk system ? Venkatesh 2000

    Portfolio management system ?

    Ginzberg 19811; Venkatesh and Davis 2000; Venkatesh et al. 2003 Property management system

    ? Venkatesh 2000 Sales information system

    ? Lucas 1975; Robey 1979

    Scheduling system ? Venkatesh and Davis 2000

    Student information system ? Rai et al. 2002

    Communications and Collaboration Systems Computer conferencing system

    ? Orlikowski et al. 1995; Yates et al. 1999 Electronic information exchange system ? Hiltz and Turoff 1981 +

    Electronic mail ? Adams et al. 1992; Fulk 1993; Gefen and Straub 1997; Kettinger and Grover 1997; Kraut et al. 1999; Szajna 1996

    Lotus Notes ? Orlikowski 2000 Online meeting manager

    ? Venkatesh et al. 2003 Video telephone system

    ? Kraut et al. 1998; Webster 1998 Voice mail system

    ? Adams et al. 1992; Straub et al. 1995*

    Computers Computing resource center

    ? Taylor and Todd 1995a, 1995b

    Computers ?

    Igbaria 1990, 1993; Igbaria et al. 1995; Igbaria and livari 1995; Igbaria et al. 1996 PC ? Compeau and Higgins 1995b; Compeau et al. 1999; Howard and Mendelow 1991; Igbaria et

    al. 1997; Thompson et al. 1991; Thompson et al. 1994

    Office Applications Graphics

    ? Adams et al. 1992 Office systems

    ? Lucas and Spitler 1999; Tyre and Orlikowski 1994 Spreadsheet

    ? Adams et al. 1992 Text editor ? Kay and Thomas 1995* Word processing

    ? Adams et al. 1992; Davis et al. 1989

    530 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Table 2. Technologies Studied in Illustrative IT Adoption and Use Research

    (Continued)

    System Software Client/Server system

    ? Guimaraes and Igbaria 1997 In-house LAN ? Burkhardt 1994

    Mainframe systems ? Lucas and Spitler 1999

    Windows operating system ? Karahanna et al. 1999; Venkatesh 2000; Venkatesh and Davis 2000

    World Wide Web/Internet Internet ? Kraut et al. 1999; Teo et al. 1999

    WWW ? Agarwal and Prasad 1997

    Examined feature level use.

    their work (Silver 1990; Trice and Treacy 1988). Positive performance benefits are most likely to occur when individuals recognize a match between the requirements of a work task and an appli cation's features and subsequently alter their post adoptive behaviors by selectively applying features to leverage the synergy offered by this fit between the task and the technology (Goodhue 1995; Goodhue and Thompson 1995; Todd and Ben basat 2000). By examining individual post-adop tive behavior both at a feature level of analysis and over time, researchers may increase our under

    standing of why different users evolve very differing patterns of feature use and, as a result, extract differential value from an IT application.

    In summary, despite more than 20 years of research examining IT adoption and use, we believe our collective understanding of post adoptive behavior is at an early stage of develop ment. Further, the three shortcomings just iden tified resonate through the existing literature and

    impede the intellectual development of the post adoptive behavior construct. Because of these

    shortcomings, prior research has, for the most

    part, inhibited penetrating examinations of how individuals selectively adopt and apply, and then

    exploit and extend the feature sets of IT appli cations introduced to enable organizational work

    systems. Recognition of these three deficiencies has greatly influenced the lens applied here in

    developing a fresh conceptualization of post adoptive behavior.

    The Phenomenon of Post-Adoptive Behavior

    We define post-adoptive behavior as the myriad feature adoption decisions, feature use behaviors, and feature extension behaviors made by an individual user after an IT application has been installed, made accessible to the user, and applied by the user in accomplishing his/her work activities.3 Figure 1 situates post-adoptive be havior, at the individual level of analysis, within a broader three-stage model of IT adoption and use.

    Stage one reflects an organization's decision to

    adopt a technology. This decision might be volun

    tary or mandatory,4 with a mandatory decision

    reflecting situations where regulators, competitors, and/or partners induce the organization to both

    adopt a technology and force organization mem bers to apply the technology (Hartwick and Barki

    1994). After the organization has adopted and installed the IT application, stage two occurs when intended, as well as unintended, users make indi

    3Through the remainder of this article, our use of the term post-adoptive behavior denotes an individual's use of a single feature (or a select subset of features) available in an IT application.

    4Some researchers have applied the terms discretionary or nondiscretionary use (see Howard and Mendelow

    1991) to represent the same idea represented by our use of the terms voluntary or mandatory use.

    MIS Quarterly Vol. 29 No. 3/September 2005 531

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Organizational Application Adoption Decision

    (voluntary or mandatory)

    \ Individual Application Adoption Decision

    (voluntary or mandatory) _

    J^^^ Post-Adoptive Behaviors ?s.

    / Individual Feature \ / Adoption Decision s. \

    / (voluntary or mandatory) \. , \

    / N, Individual Feature \ I Extension j \ ^ (voluntary) /

    \ Individual Feature Use ^^^ / \ (voluntary or mandatory) /

    Figure 1. Feature-Centric View of IT Adoption and Use

    vidual decisions to adopt the technology (Leonard Barton and Deschamps 1988). This secondary adoption decision reflects an explicit acceptance by an individual that s/he will use the technology to

    carry out assigned work tasks, and it may also be

    voluntary or mandatory. A mandatory decision reflects the situation where an organization embeds the IT application within a work system, thus forcing the user to adopt the application to

    complete his/her work assignments.

    After an individual commits to using an IT applica tion during stage two, stage three occurs as the individual actively chooses to explore, adopt, use,

    and possibly extend one or more of the appli cation's features. These tertiary feature-level

    decisions may occur voluntarily or, particularly with

    initial use experiences, as an organizational

    mandate; typically, though, IT applications have many more features than those mandated for work

    accomplishment. After some individuals have

    gained experience in using a specific feature (or set of features), they may discover ways to apply the feature that go beyond the uses delineated by the application's designers or implementers, thereby engaging in feature extension behaviors

    (Cooper and Zmud 1990; Goodhue and Thompson 1995; Kwon and Zmud 1987; Morrison etal. 2000; Saga and Zmud 1994). By definition, feature extensions are always voluntary.5 In our concep

    5ln general, we believe that feature extensions are

    always voluntary; however, we recognize that after one individual's voluntary feature extension, the organization

    532 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    tualization, feature adoption, use, and extension all

    fall within the realm of post-adoptive behaviors.

    Although the IT adoption and use literature has

    primarily focused on voluntary use contexts, the

    conceptualization developed here applies to both

    mandatory and voluntary contexts. Even when an

    organization mandates the use of an IT appli cation, individuals retain considerable discretion

    regarding their use of the features of the appli cation (Hartwick and Barki 1994).

    A Two-level Model of Post Adoptive Behavior _ __-_

    _ _ _

    Organizations are "social systems of collective action that structure and regulate the actions and

    cognitions of organizational participants through rules, resources, and social relations" (Oscasio

    2000, p. 42). As such, the rich and dynamic inter

    play that occurs within systems of collective action

    (i.e., the organizational context) shapes and influences individuals' cognitive processing and

    cognitive content (Bandura 1986, 1995; Weick 1979a, 1979b, 1995). This desirability to accom

    modate both organizational and individual levels of

    analysis is particularly important with complex IT enabled work systems, such as ERP systems, as noted by others.

    Although people described individual ad

    justments to ERP's technical complexity and changes in jobs, learning was not concentrated at the individual level. Rather, the structures and processes of

    entire divisions needed to change, and occasional references to cultural change reflected the organizational scope of the

    learning process. (Robey et al. 2002, p. 38)

    may realize the value of the extension and subsequently mandate use of the extension for other users. In such situations, the organization has redefined the feature

    (i.e., enacted a technology-in-use definition of the feature; see Orlikowski 2000); therefore, use of this feature by individuals other than the innovator would not be considered a feature extension.

    Applying such notions, our conceptualization of

    post-adoptive behavior involves two levels of

    analysis (see Figure 2): one operating at the level of an individual's cognitions and behaviors

    regarding feature adoption, use, and extension;

    and the other operating at the level of the

    organizational context within which these individual

    cognitions are situated. Here, the individual cogni tions that determine post-adoptive intentions or behaviors are seen as becoming stabilized

    (resulting in routinized behaviors) unless stimu lated by interventions emanating from the organi zation level (i.e., work system interventions), the individual level (i.e., user-initiated interventions), or both. By modeling individual cognition and organi zational action separately but interdependent^, the exercise of accommodating the multiple threads of behavior involved becomes conceptually less

    complex.

    The logic underlying the conceptual model

    depicted in Figure 2 captures the dynamic inter actions between the two sub-models (i.e., individual cognition model and organizational action model). Three major theoretical lenses lend

    support for this two-level model of post-adoptive behavior.

    First, psychologists argue that cognitive scripts (derived from prior cognitions) drive habitualized individual behavior (Bargh 1989, 1994; Logan 1989; Ouellette and Wood 1998; Triandis 1971, 1980). Individuals may alter habitual behavior in situations in which the individual deliberates her/his actions (Louis and Sutton 1991). Such deliberations lead to changes in cognitions which in turn lead to novel behaviors (Ajzen 2002; Louis and Sutton 1991). Over time, the new behaviors become routinized and the individual returns to a state of habitual behavior (Bargh 1989, 1994). If individuals do not encounter situations which induce them to significantly alter their cognitions, the ingrained cognitive script will only reinforce these habitual behaviors (Bargh 1989; Logan 1989; Louis and Sutton 1991; Ouellette and Wood

    1998).

    Second, punctuated equilibrium theory proposes that deep structures (i.e., deep, less-reflective

    MIS Quarterly Vol. 29 No. 3/September 2005 533

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    j Organizational Action Model WlM

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    new structural entities?the constitution of organi zational and technology structures (Giddens 1979, 1984; Orlikowski 1992; Orlikowski and Robey 1991).

    In summary, central to our conceptualization of

    post-adoptive behavior is the notion that, over

    time, post-adoptive behaviors become habitualized unless interventions occur to disrupt the formation of these deep, non-reflective mental scripts. When individuals attend to these interventions, the interventions produce periods of substantive

    technology use, defined as a state in which an individual reflectively engages with one or more features of an IT application.6 In the absence of a substantive period of technology use, post adoptive behavior likely transitions to a state of habitual behavior in which an individual engages in a recurring pattern of using a selected subset of

    technology features in his/her work (Bargh 1989, 1994; Conner and Armitage 1998; Edmondson et al. 2001; Limayem et al. 2001; Logan 1989; Ouellette and Wood 1998; Venkatesh et al. 2000; Venkatesh et al. 2002). Where these habitual behaviors lead to satisfactory outcomes and where the work context is stable, such behaviors might very well be viewed as appropriate. Often, however, these two conditions do not jointly hold

    (Edmondson etal. 2001).

    Organizational Action Model of Post-Adoptive Behavior

    The organizational action model of post-adoptive behavior situates an individual's use of an IT

    application's features within a complex set of

    organizational actions that, when attended to, induce episodes of substantive technology use.

    The work system represents the context within which organizational members perform their

    assigned work (Gibson et al. 1994; Schippmann 1999). Thus, the work system includes organiza

    6Through the remainder of this article, our use of the term substantive technology use denotes an individual's reflective consideration to use a single feature (or a select subset of features) available in an IT application.

    tional members, the work tasks undertaken by members, work processes, technology features that enable or support work tasks and processes, and social structures that direct organizational members both in their work-related behaviors and in their interactions with each other. Social struc tures include both performance-related (e.g., performance evaluation and feedback, promotion, merit pay, bonuses, etc.) and personal-related (e.g., social recognition, reputation, social inter

    action, etc.) incentives and disincentives that prior research suggests are likely to influence individual behaviors, including IT use (Ba et al. 2001; Bhattacherjee 1998; Eisenhardt 1989; Howard and Mendelow 1991; Stajkovic and Luthans 2001). An

    organization's members are obviously core

    elements of the work system, both in performing work-related roles and as users of work-enabling technologies. Most important, given that an

    organization's members continuously interpret their work context (Brousseau 1983; Dunham etal. 1977; Gibson et al. 1994; Orlikowski 2000), their

    work system sensemaking becomes an especially critical subcomponent of the work system.

    Work system sensemaking occurs via observa

    tions regarding work system outcome expectation gaps (as perceived by users, by peers of these users, by technology or work system experts, or by managers).7 Organizations and their members introduce new IT applications with the expectation that certain work system outcomes?again, characterized as being performance-related,

    personal-related, or both?will occur (Zuboff 1988). In this specific context of post-adoptive behaviors,

    we are concerned with work system outcomes that arise, either intentionally or unintentionally, as a result of applying IT application features in the conduct of organizational work, such as performing a task in a more effective and/or efficient manner, enhancing power (for an individual or group) through control of a critical information resource,

    7The focal actor of the organizational action model could be one of any number of individuals employed by the

    organization. Here we mention four specific organiza tional roles (user, peer, expert, or manager) that might be

    played by these individuals. These organizational roles

    correspond to intervention sources to be discussed later.

    MIS Quarterly Vol. 29 No. 3/September 2005 535

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    etc. The work system outcome expectation gap represents the difference between desired and

    perceived work system outcomes?a difference that, if sufficiently large, triggers a need to resolve the dissonance caused by the expectation outcome conflict. To resolve expectation gaps,

    organizational members engender interventions that have the potential to induce work system changes, which in turn directly influence work

    system outcomes.

    All such interventions have a source and a target. Intervention sources include the individual user, the user's peers, work and technology experts, and managers.8 The interventions that induce

    periods of substantive technology use target reshaping existing cognitions regarding IT appli cation features, cognitions regarding work

    systems, or cognitions regarding both. In essence, such interventions induce, or perhaps mandate,

    the individual to apply unused features, to apply already-used features at higher levels of use, to discover new uses of existing features, or to

    identify the need to incorporate new features into the IT application. In other words, these inter ventions pick up the pace in the mutual adaptation of organizational structures, task structures, and

    technology structures that accompanies organi zational life and that, invariably, produce both

    intended and unintended consequences (DeSanctis and Poole 1994; Leonard-Barton 1995; Majchrzak et al. 2000; Orlikowski 1992; Tyre and Orlikowski 1994).

    Although many types of work system interventions

    might be initiated, the interventions of primary interest here are those that represent either

    purposeful or emergent actions directed at

    disrupting established patterns of technology feature use (or nonuse) (Orlikowski et al. 1995; Yates et al. 1999). For the sake of simplicity, we do not attempt to develop a complete taxonomy of

    possible interventions or to model the complex

    8Although technology itself might be considered an intervention source (e.g., built-in wizards, online help, etc.), it is our belief that the initial impetus of such an intervention lies with these four identified intervention sources.

    relationships that might exist between and among interventions and their outcomes. Table 3 references articles that provide further descriptions of each intervention source and provides examples of interventions undertaken by each source.

    Individual Cognition Model of Post-Adoptive Behavior

    The individual cognition model contains two

    distinctly different feedback loops directly asso ciated with post-adoptive behavior. One loop (characterized by reflective thought and repre sented by the solid line relationships in Figure 2) contains the series of relationships from individual

    cognitions to technology sensemaking and back. The logic of this feedback loop is founded in reflective consideration whereby an individual com mences reflection with a preexisting set of

    cognitions and then mindfully considers and pro cesses surrounding informational cues regarding an IT application's features (Langer 1989; Langer et al. 1978; Langer and Piper 1987; Louis and Sutton 1991). This reflective cognitive processing may modify the individual's (already existent) post adoptive intentions, which then direct future post adoptive behaviors. Subsequent to these be

    haviors, the individual again engages in reflection

    (i.e., technology sensemaking) regarding this most recent post-adoptive experience. Then, based on

    the strength of confirmation or disconfirmation associated with this technology sensemaking, the individual either adjusts his/her cognitions about

    technology features accordingly (weak confir

    mation) or initiates a work system intervention and/or a personal technology-learning intervention

    (strong confirmation).

    The second feedback loop in the individual

    cognition model (characterized by non-reflective

    thought and represented by the dashed line

    relationships in Figure 2) consists of the direct

    relationships between use history and post adoptive behavior. In this loop, reflective consi deration does not drive post-adoptive behavior.

    Instead, habitual behavior, captured in use history, determines post-adoptive behavior. In this routin

    536 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et a I./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Table 3. Description of Intervention Sources and Illustrative Intervention Actions

    Intervention Source Description/Citations Intervention Actions

    Users Community of users associated with an Self-orchestrated learning such as IT application formal/informal training, external

    documentation, observations of others,

    Bagchi et al. 2003; Hartiwck and Barki experimentation with IT features, 1994; Igbaria and Guimaraes 1994; King experimentation with work tasks and Rodriguez 1981; Manning 1996; Direct actions taken toward modifying McKersie and Walton 1991; Morrison et or enhancing the IT application and/or

    al. 2000 work tasks/processes

    Peers Coworkers from the same or different Designing, leading, or directing formal work units and workers in other and informal training sessions organizations Direct actions taken toward modifying

    or enhancing the IT application and/or Contractor et al. 1996; Fulk 1993; Fulk et work tasks/processes al. 1990; Kraut et al 1998; Lucas and Joint actions taken with users toward

    Spitler 1999; Markus 1990 modifying or enhancing the IT applica tion and/or work tasks/processes

    Experts Internal and external professionals (i.e., Designing, leading, or directing formal (Work and consultants, contractors, or technologists and informal training sessions

    Technology) in partner firms) housed in central or Direct actions taken toward modifying distributed work units or enhancing the IT application and/or

    work tasks/processes Boynton and Zmud 1987; Earl 1993; Joint actions taken with users toward Markus and Bj0rn-Andersen 1987; modifying or enhancing the IT applica Nelson and Cheney 1987; Venkatesh tion and/or work tasks/processes and Speier 1999; Venkatesh et al. 2002; Xia and Lee 2000; Yates et al. 1999

    Managers Direct supervisors, middle managers, Indirect Actions and senior executives Sponsoring or championing

    Providing resources Ba et al. 2001; Bhattacherjee 1998; Issuing directives and/or mandates Guimaraes and Igbaria 1997; Howard and Mendelow 1991; Igbaria 1990, 1993; Direct Actions

    Igbaria and Guimaraes 1994; Igbaria and IT application feature use livari 1995; Igbaria et al. 1996; Leonard- Work task/process involvement barton 1988; Orlikowski 2000; Orlikowski Incentive structures et al. 1995; Purvis et al. 2001; Stajkovic Inputs/influence into design of user, and Luthans 2001; Yates et al. 1999 peer, or technologist interventions

    Directing modification or enhancement of IT application, incentive structures, or work tasks/processes

    MIS Quarterly Vol. 29 No. 3/September 2005 537

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    ized mode of IT application use, individuals use

    only those IT application features they have

    previously used (Bargh 1989, 1994; Conner and

    Armitage 1998; Logan 1989; Ouellette and Wood

    1998). In the absence of a period of substantive

    technology use, this non-reflective loop becomes the primary driver of an individual's post-adoptive behavior.

    The individual cognition model in Figure 2 applies both to explaining a single instance of post adoptive behavior (e.g., cognitions, intentions, behavior, technology sensemaking, and use

    history relative to a specific IT application feature) and to understanding the evolution over time of individual post-adoptive behavior (e.g., the rich

    portfolio of cognitions, intentions, behaviors, technology sensemaking, and use history relative to an IT application). Here, it is most critical to

    recognize that each individual exposes a unique pattern of post-adoptive behavior represented by the collection of IT application features that, over

    time, the individual has adopted, used, dropped, and extended.

    The logic of the reflective feedback loop depicted in Figure 2 draws liberally from prior research on IT adoption and use, in particular from the unified theory of acceptance and use of technology

    (UTAUT) (Venkatesh et al. 2003).9 The underlying premise of UTAUT?here, applied to post-adoptive behavior?suggests that, given a particular time and context, an individual's intentions to engage in

    post-adoptive behavior are the best predictors of that individual's actual post-adoptive behaviors

    (Davis et al. 1989; Taylor and Todd 1995b; Venkatesh et al. 2000; Venkatesh et al. 2003). Individual cognitions, which comprise the core of

    UTAUT, can be conceptualized as encompassing two domains: cognitive process and cognitive content (Blumenthal 1977). Cognitive processing involves both the mental processes used in

    9The collective results of IT adoption and use research, which has applied eight different theories to explain both intention to use and actual use behavior, was reviewed and incorporated into the development of UTAUT. We refer the reader Venkatesh et al. (2003) for a more

    comprehensive discussion of these other theories.

    perceiving, learning, remembering, thinking, and

    understanding, and the mental activity of applying those processes (Ashcraft 1998). Cognitive con tent consists of the collection of mental structures formed as a result of cognitive processing; typically, researchers refer to instances of cogni tive content as cognitions.

    But what exactly is the nature of these cognitions with regard to post-adoptive behavior? While a

    large number of cognitions may play a role in

    influencing individuals' adoption and use behaviors

    (see Table 4), Venkatesh et al. (2003) have

    synthesized and integrated these into a single set of cognitions: performance expectancy, effort

    expectancy, social influence, and facilitating conditions.10 Drawing from UTAUT, we suggest these four cognitions as being most likely to influence post-adoptive intentions.

    UTAUT also proposes that individual demographic characteristics moderate the relationship between

    cognition and intention (Venkatesh et al. 2003). Previous research identifies not only demographic characteristics but also cognitive styles and

    personality characteristics as individual differences

    likely to impact post-adoptive behavior (Zmud 1979). Table 5 contains an overview of various individual differences considered by illustrative IT

    adoption and use research that has examined use after adoption. Again, following the logic of UTAUT, the individual cognition model of post adoptive behavior includes such individual differences as moderators of the relationship between an individual's IT application feature

    cognitions and the individual's post-adoptive intentions.11

    I Venkatesh et al. (2003) define facilitating conditions as

    cognitions regarding the technical and organizational infrastructure that supports system use.

    II UTAUT proposes a direct relationship (moderated by age and experience) between the facilitating conditions

    cognition and use. Because we have grouped all four

    cognitions proposed by Venkatesh et al. (2003) into a

    single construct, we have not modeled this relationship in Figure 2.

    538 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Table 4. Cognitions Studied in Illustrative IT Adoption and Use Research

    Cognition Example Study

    Compatability Agarwal and Prasad 1997; livari 1996; Karahanna et al. 1999; Taylor and Todd 1995b; Xia and Lee 2000

    Complexity Igbaria et al. 1996; livari 1996; Thompson et al. 1991, 1994

    Computer anxiety* Compeau and Higgins 1995b; Compeau et al. 1999; Howard and Mendelow 1991; Igbaria 1990, 1993; Igbaria and livari 1995; Venkatesh 2000

    Ease of use Adams et al. 1992; Agarwal and Prasad 1997; Davis et al. 1989; Gefen and Straub 1997; Igbaria et al. 1995; Igbaria and livari 1995; Igbaria et al. 1997; Karahanna et al. 1999; Kettinger and Grover 1997; Lucas and

    Spitler 1999; Rai et al. 2002; Straub et al. 1995; Szajna 1996; Taylor and Todd 1995a, 1995b; Teo et al. 1999; Venkatesh 2000; Venkatesh and Davis 2000; Venkatesh and Morris 2000; Venkatesh et al. 2002; Xia and Lee 2000

    Effort expectancy Venkatesh et al. 2003

    Facilitating conditions Taylor and Todd 1995b; Thompson et al. 1991, 1994; Venkatesh et al. 2003

    Image Agarwal and Prasad 1997; Karahanna et al. 1999; Schewe 1976; Venkatesh and Davis 2000

    Job-fit Thompson et al. 1991, 1994

    Job relevance Venkatesh and Davis 2000

    Outcome expectations Compeau and Higgins 1995b; Compeau et al. 1999; Lucas 1975; Thompson et al. 1991, 1994

    Output quality Venkatesh and Davis 2000

    Perceived behavioral Taylor and Todd 1995a, 1995b; Venkatesh et al. 2000 control

    Performance expectancy Venkatesh et al. 2003

    Relative advantage Agarwal and Prasad 1997; livari 1996; Xia and Lee 2000

    Result demonstrability Agarwal and Prasad 1997; Karahanna et al. 1999; Venkatesh and Davis 2000; Xia and Lee 2000

    Richness Fulk 1993; Kettinger and Grover 1997

    Self-efficacy* Burkhardt 1994; Compeau and Higgins 1995b; Compeau et al. 1999; Igbaria and livari 1995; Taylor and Todd 1995b; Venkatesh 2000;

    Webster 1998

    MIS Quarterly Vol. 29 No. 3/September 2005 539

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Table 4. Cognitions Studied in Illustrative IT Adoption and Use Research (Continued)

    Social influence (peer Compeau and Higgins 1995b; Fulk 1993; Guimaraes and Igbaria 1997; influence, management Howard and Mendelow 1991; Igbaria 1990, 1993; Igbaria et al. 1995; support, social pressure, Igbaria et al. 1996; Igbaria et al. 1997; Karahanna et al. 1999; Kraut et al.

    etc.) 1999; Leonard-Barton and Deschamps 1988; Lucas 1975; Schewe 1976; Taylor and Todd 1995b; Thompson et al. 1991, 1994; Venkatesh et al. 2003; Webster 1998

    Subjective norm Davis et al. 1989; Hartwick and Barki 1994; Lucas and Spitler 1999; Taylor and Todd 1995a, 1995b; Venkatesh and Davis 2000; Venkatesh and Morris 2000; Venkatesh et al. 2000

    Trialability Agarwal and Prasad 1997; Karahanna et al. 1999; Xia and Lee 2000

    Usefulness Adams et al. 1992; Bhattacherjee 2001; Davis et al. 1989; Fulk 1993; Gefen and Straub 1997; Hiltz and Turoff 1981; Howard and Mendelow 1991; Igbaria 1993; Igbaria et al. 1995; Igbaria and livari 1995; Igbaria et al. 1996; Igbaria et al. 1997; Karahanna et al. 1999; Kettinger and Grover 1997; Lucas 1975; Lucas and Spitler 1999; Rai et al. 2002; Robey 1979; Schewe 1976; Straub et al. 1995; Szajna 1996; Taylor and Todd 1995a, 1995b; Teo et al. 1999; Venkatesh 2000; Venkatesh and Davis 2000;

    Venkatesh and Morris 2000; Venkatesh et al. 2002

    Visibility_Agarwal and Prasad 1997; Karahanna et al. 1999; Xia and Lee 2000

    Although some suggest these constructs represent individual differences, we include them as cognitions because most researchers measure them as individual perceptions.

    In addition to the focus on an IT application's fea tures, our conceptualization involves three exten

    sions to UTAUT: the influences of technology sensemaking, of use history, and of an individual's attention to introduced interventions. We discuss each of these in the remainder of this section.

    Technology Sensemaking

    Technology sensemaking occurs as an evaluative

    cognitive process that transpires when an individual contrasts the outcomes of a post adoptive behavior episode with those expected from pre-episode cognitions (Weick 1979a, 1990, 1995). We postulate that during a substantive

    period of technology use, an individual engaged in

    reflective, rather than habitual, use of an IT

    application feature implicitly triggers technology sensemaking which confirms (disconfirms) the

    cognitions that existed prior to the active use

    experience (Bhattacherjee 2001; Bhattacherjee and Premkumar 2004; Oliver 1980; Weick 1990, 1995). Weak confirmation (disconfirmation) out comes will likely lead directly to modifications in

    prior-held cognitions. Strong confirmation (discon firmation) outcomes, on the other hand, will likely lead to user-initiated learning interventions and/or user-initiated work system interventions.

    User-initiated technology learning interventions affect post-adoptive behaviors not only through their influence on technology cognitions but also

    through their influence on an individual's interpre tations of other work system elements (Orlikowski et al. 1995). Post-adoptive intentions derive from an individual's understanding both of how to use an IT application's features and how these fea tures complement other work system elements

    (Swanson 1974). Thus, self-orchestrated learning

    540 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Table 5. Individual Difference Categories Studied in Illustrative IT Adoption and Use

    Individual Difference Example Study

    Age Burkhardt 1994; Fuerst and Cheney 1982; Fulk 1993; Howard and Mendelow 1991; Igbaria 1990, 1993; Kettinger and Grover 1997; Kraut et al. 1999; Kraut et al. 1998; Lucas 1975; Schewe 1976; Teo et al. 1999; Venkatesh et al. 2003

    Cognitive Style Fuerst and Cheney 1982; Lucas 1975

    Education Burkhardt 1994; Fuerst and Cheney 1982; Fulk 1993; Howard and Mendelow 1991; Igbaria 1993; Kettinger and Grover 1997; Lucas 1975; Schewe 1976; Teo et al. 1999; Venkatesh et al. 2003

    Gender Burkhardt 1994; Fuerst and Cheney 1982; Fulk 1993; Gefen and Straub 1997; Howard and Mendelow 1991; Igbaria 1990, 1993; Kraut et al. 1999; Kraut et al. 1998; Teo et al. 1999; Venkatesh and Morris 2000; Venkatesh et al. 2000; Venkatesh et al. 2003

    Organizational level Howard and Mendelow 1991; Igbaria 1990

    Personality Jobber and Watts 1986

    Technology experience Fulk 1993; Howard and Mendelow 1991; Igbaria 1990, 1993; Igbaria et al. 1995; Igbaria and livari 1995; Igbaria et al. 1996; Kettinger and Grover 1997; Kraut et al. 1999; Schewe 1976; Taylor and Todd 1995a;

    Venkatesh and Davis 2000; Venkatesh and Morris 2000

    Training Howard and Mendelow 1991; Igbaria 1990, 1993; Igbaria et al. 1995; Igbaria et al. 1996; Igbaria et al. 1997; Leonard-Barton and Deschamps and Deschamps 1988; Venkatesh et al. 2002; Webster 1998; Xia and Lee 2000

    Voluntariness of use* Agarwal and Prasad 1997; livari 1996; Karahanna et al. 1999; Venkatesh et al. 2003

    Work experience Burkhardt 1994; Fuerst and Cheney 1982; Howard and Mendelow 1991; Schewe 1976

    Although many researchers study voluntariness of use as a cognition, UTAUT proposes voluntariness of use as an individual difference which modifies the relationship between cognitions and intentions (Venkatesh et al. 2003). We include voluntariness of use as an individual difference to be consistent with UTAUT.

    MIS Quarterly Vol. 29 No. 3/September 2005 541

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    about the IT application's features, the potential use of those features, and the work system within which the IT application is situated constitute

    crucially important means by which individuals

    modify their use cognitions. Examples of such

    learning interventions undertaken by an individual user include taking advantage of formal or informal

    training opportunities (Fuerst and Cheney 1982), accessing external documentation (Brancheau and Wetherbe 1990), observing others (Bandura 1986; Gioia and Manz 1985), and experimenting with IT

    application features (DeSanctis and Poole 1994) and/or new approaches for handling work assign ments (McKersie and Walton 1991).

    Use History

    Existing evidence suggests that as individuals gain experience with what was initially a novel behavior, they tend to engage less frequently in reflective consideration of this behavior and rely instead on

    previous patterns of behavior to direct future behaviors (Bargh 1989; Conner and Armitage 1998; Langer 1989; Lassila and Brancheau 1999; Louis and Sutton 1991; Majchrzak et al. 2000; Ouellette and Wood 1998; Triandis 1980; Tyre and Orlikowski 1994; Venkatesh et al. 2000; Venkatesh et al. 2003; Venkatesh et al. 2002). It thus seems reasonable that, as an individual routinely applies an IT application feature within her/his work con

    text, the ever-accumulating prior-use experiences

    imprint these use behaviors within the cognitive (and organizational) scripts that direct the indi vidual (or the individual's work unit) in task

    accomplishment (Bargh 1989; Logan 1989; Louis and Sutton 1991; March and Simon 1958; Triandis

    1971; Triandis 1980; Tyre and Orlikowski 1994). Accordingly, much post-adoptive behavior, over

    time, is likely to reflect a habitualization of action where the decision to use the IT application feature occurs more or less automatically via a subconscious response to a work situation (Bargh 1989, 1994; Eagly and Chaiken 1993; Limayem and Hirt 2003; Limayem et al. 2001; Logan 1989; Ouellette and Wood 1998; Thompson et al. 1994; Venkatesh et al. 2000). In some mandatory use

    environments, such routinized behaviors likely develop through the mindless following of policy, procedures, methodologies, or other codified

    organizational scripts (Langer et al. 1978). In

    voluntary and other mandatory use environments, however, such routinized behaviors are more likely to reflect the scripting of once-active personal decision processes (Bargh 1989; Bargh 1994;

    Langer etal. 1978; Langer and Piper 1987; Logan 1989; Louis and Sutton 1991; Ouellette and Wood

    1998).

    A key facet of post-adoptive behavior is the strong influence of an individual's use history on post adoptive intentions and post-adoptive behaviors

    (encompassing both reflective thought and the

    deep mental scripting that results in and from habitual use). An individual's past use behavior

    generally produces a tendency (e.g., post-adoptive intention) for the individual to act in a particular

    manner (i.e., applying a common set of IT appli cation features) given a particular context (i.e., a

    specific work task) (Eagly and Chaiken 1993; Ouellette and Wood 1998; Triandis 1971, 1980). During the initial use of an IT feature, individuals most likely engage in active cognitive processing in determining post-adoptive intention or behavior; however, with repetition, the reflective cognitive processing dissipates, leading to automatic and routinized behavior (i.e., habit) (Bargh 1989,1994;

    Logan 1989; Ouellette and Wood 1998). We define use history to include both an individual's

    past use behavior (i.e., a collective, systematic

    account of an individual's prior use of an IT appli cation and its features) and an individual's use habits (i.e., learned situational-behavior sequences

    with respect to an IT application and its features that have become automatic [Triandis 1980]). Thus, during substantive technology use periods, use history as past behavior plays a role in pre

    dicting an individual's post-adoptive intentions to

    engage in post-adoptive behavior (i.e., solid-line

    relationships in Figure 2). However, during periods of non-reflective, post-adoptive behavior, use history as habit becomes the dominant pre dictor of an individual's post-adoptive behavior

    (i.e., dashed-line relationships in Figure 2).

    542 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Attention to Introduced Interventions

    Ouellette and Wood (1998, p. 66) indicate that

    when behavior is a function of conscious decision making and deliberation, inten tions directly predict behavior perfor mance, and the effects of past behavior are likely to be mediated through conscious intents.

    Louis and Sutton (1991) suggest that conscious

    processing occurs as a result of three types of stimuli: when a situation is novel (i.e., the initial use of a technology feature), when an individual senses a discrepancy between reality and expec tation, and when individuals are induced to deliberate regarding their behavior (i.e., an inter vention is attended to). Bandura (1986) proposes attention as the first stage in his observational

    learning model.

    As shown in Figure 2, the extent to which an individual attends to an intervention will moderate the relationship between the intervention and individual cognitions. For an intervention to induce the individual to engage in conscious cognitive processing, the intervention must be sensed, interpreted, and considered (Bandura 1986; Yi and Davis 2003). One researcher explains why people often disregard signals directed toward them:

    People find noninteresting those propo sitions that affirm their assumption ground (that's obvious), that do not speak to their assumption ground (that's irrele

    vant), or deny their assumption ground (that's absurd) (Weick 1979b, p. 51).

    But, what is it about an intervention that would increase the likelihood a targeted individual would attend to the intervention? Weick (1995) suggests individuals are more likely to attend to signals that are prominent and promise to disrupt the work

    system context. Two intervention attributes are

    suggested as particularly relevant: the salience of the work system elements likely affected by an intervention (Beach 1997; March 1994) and the

    power of the intervention source (Jasperson et al.

    2002). Here, power refers to the intervention source's ability to influence others to think or to act

    (Emerson 1962; Frost 1987; Hall 1999; Jasperson et al. 2002).

    Implications for Research: Theory -_-_-H----H-B----_H-B--H-l

    We urge researchers to develop and apply richer and more complex research models in examining the variation within and across individuals' post adoptive behavior. Such research models should tap into the dynamic interplay between the organi zational action and individual cognition levels and, therefore, must collect data at multiple points-in time and account (control) for changes in the IT

    application via its features, individual cognitions regarding the IT application via its features, and the work system(s) being enabled. In particular, we advocate future programs of research that

    systematically (1) explore the outcomes of indi vidual post-adoptive behaviors and the resulting feedback that impacts organizational action and individual cognitions and (2) focus on work system interventions and the manner in which those interventions prompt individuals to engage in substantive technology use. We caution against future research efforts that merely replicate existing IT adoption and use research at a feature level of analysis or in a post-adoptive context; and

    we implore researchers examining post-adoptive behaviors to discontinue the practice of studying post-adoption intentions as the final outcome variable?such research would have limited value in furthering our collective understanding of the dynamics of post-adoptive behavior. Below we

    suggest specific programs of research designed to

    investigate the dynamic nature of our two-level model.

    Post-Adoptive Behaviors and Work

    System Outcomes

    We know little about the patterns of feature adop tion, use, and extension that occur throughout the

    MIS Quarterly Vol. 29 No. 3/September 2005 543

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    post-adoptive stage of diffusion or the cumulative

    impacts of those patterns on work system performance over time. We urge scholars to further investigate this domain, as theory develop ment in this area is likely to illuminate the

    relationships between diffusion microprocesses that occur at the individual level and macro behavioral outcomes at the organizational level.

    Example research questions include

    Are there consistent patterns of feature

    adoption, use, and extension, and how do

    such patterns evolve over time?

    Are specific patterns within particular contexts

    predictive of positive (negative) work system outcomes?

    What aspects of feature adoption, use, and extension differentially explain impacts on various elements of a work system?

    Technology Sensemaking

    Given the limited amount of research examining post-adoptive behaviors at a feature level of

    analysis, we have insufficient understanding of the

    technology sensemaking processes that transpire

    during the post-adoptive context. A deeper under

    standing of these dynamic processes will allow us to better predict and explain what influences current users of installed IT applications to learn about, use more fully, and extend the feature sets

    made available through these applications. Relevant research questions include

    What types of post-adoptive behaviors trigger technology sensemaking?

    What aspects of technology sensemaking most distinguish between and influence weak and strong confirmation (disconfirmation)?

    What is the nature of the tipping point leading to strong confirmation (disconfirmation)?

    What situational factors induce individuals, as a result of strong confirmation (discon

    firmation), to engage in self-learning inter vention as opposed to an intervention directed at other work system elements?

    Use History

    Previous IT adoption and use researchers have found past use behavior to be a significant predictor of future use behavior (Igbaria 1990, 1993; Igbaria et al. 1995; Igbaria et al. 1996; Kettinger and Grover 1997; Limayem and Hirt 2003; Thompson et al. 1994; Venkatesh et al. 2000; Venkatesh et al. 2002). However, for the most part, these researchers have examined prior use quite simplistically in terms of the frequency, or level, of use of the whole technology rather than

    capturing users' patterns of use regarding the

    technology's features (or feature sets). We en

    courage programs of research that move beyond such simplistic views of use history in order to

    (1) expose the sufficiently rich depictions of use

    history required to surface, study, model, and

    understand the path-dependent episodes of use

    leading to routinized or habitual use of an IT appli cation and, then, to (2) systematically examine the roles of both aspects of use history (past behavior and habit) in influencing post-adoptive behavior.

    Suggested research questions include

    What are typical patterns of feature adoption, use, and extension, and which of these

    patterns lead to routinized or to habitual use?

    How, when, and why do individuals engage in reflective versus non-reflective use of IT

    application features?

    What are the necessary conditions required to

    trigger periods of substantive technology use that disrupt states of routinized or habitual feature use?

    Attention to Interventions

    Users must actively attend to an intervention if it is to be effectual (Beach 1997; March 1994; Weick

    544 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    1979b, 1995; Yi and Davis 2003). Thus, we advocate that scholars studying post-adoption behaviors undertake efforts to increase our

    understanding of the situational, intervention, and individual attributes associated with an intervention

    being attended to by targeted users. Previously, we identified two such attributes: the salience of the work system element(s) targeted by an intervention and the power of the intervention source. Related research questions include

    What are the key factors that influence individuals to attend to work system inter ventions, and do these factors vary in different situational contexts or with different user

    groups?

    What theoretical models adequately portray how these factors come together in triggering an individual's attention to an intervention?

    Organizational Interventions and Substantive Technology Use

    While prior literature has discussed work system interventions (Orlikowski et al. 1995; Yates et al.

    1999), this important domain of IT implementation research merits more systematic study. Most

    importantly, it is paramount for researchers studying post-adoptive behaviors to apply research

    designs that enable them to discover, identify, and account for salient interventions directed at all of the work system elements associated with the focal IT application. Research studies that fail to account for such interventions will likely observe considerable unexplained variance. In particular, we see the following issues associated with

    organizational interventions and substantive

    technology use as crucial to understanding post adoptive behavior.

    Training Interventions

    The critical role served by training in successful IS implementation is well understood (Duplaga and

    Astani 2003; Robey et al. 2002). While the findings by scholars studying IT adoption and use

    consistently support the importance of training (e.g., Compeau and Higgins 1995a; Nelson and

    Cheney 1987; Venkatesh and Speier 1999), such research generally has focused on training associated with initial adoption and use behaviors

    (e.g., Venkatesh 1999; Venkatesh and Davis

    1996). Prior IS studies indicate that the influence of ease of use on intentions (and indirectly adoption and use) diminishes over time (Davis et al. 1989; Venkatesh 2000; Venkatesh and Davis 1996, Davis 2000).

    Consequently, little understanding exists of when and how an organization should orchestrate

    training interventions within the post-adoptive context?regardless of whether such interventions are formal or informal, scheduled or just-in-time, or human- or technology-enabled. It seems obvious

    that, as individuals' understandings of an IT

    application (with its associated features) and a work context evolve over time, training strategies (i.e., learning objectives and modes of delivery) need to evolve as well. Therefore, we strongly

    encourage scholars studying the post-adoptive context to develop rich conceptualizations of post adoptive training strategies, within which training tactics account for the dynamic behaviors reflected in our reconceptualization of post-adoptive behavior. Example research questions include

    What are or should be the key components of

    post-adoptive training strategy-making and

    budgeting, and who is or should be involved in the development of those key components?

    What types of processes are involved in best

    practice implementations of post-adoptive training interventions, and when and how

    during the post-adoptive stage of the tech

    nology life cycle should each of these process types be applied?

    What types of learning experiences and post adoptive behavior outcomes should be assessed and incorporated into training activities at later time periods?

    MIS Quarterly Vol. 29 No. 3/September 2005 545

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

    LeeHighlight

    LeeHighlight

    LeeHighlight

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Portfolios of Interventions

    While it is both possible and desirable to design laboratory or field experiments which impose a

    single intervention on a subject group or a com

    munity of users, it is highly unlikely that such a controlled action would occur in practice as users are invariably subjected to multiple such inter ventions at any point in time. For example, a

    single intervention source (e.g., a manager) might initiate multiple interventions targeted at a specific user group regarding a particular IT application feature; meanwhile, individuals within this user

    group are also likely to be subject to multiple interventions from this same (and/or other) source(s) regarding this same (and/or other) IT

    application(s) and corresponding IT application feature(s). Researchers who investigate the role of interventions in post-adoptive behavior contexts must account for the effects of interacting inter ventions. Pertinent research questions might include

    Do certain interventions complement or inhibit others?

    Do path-dependencies exist across portfolios of interventions over time?

    For users involved with multiple work sys tems, what are the consequences?both

    positive and negative?of these users' expo sure to concurrent interventions directed at more than one work system?

    Substantive Technology Use Periods

    For too long, scholars working in the domain of IT

    implementation and use have ignored intensive studies of post-adoption life cycles. What are and what should be the ebb and flow of resources invested in an IT implementation effort after the

    application is installed? Clearly much of the benefit derived from installed IT applications comes during periods of equilibrium rather than

    during periods of dramatic change. However, much remains to be learned about managing a

    technology's post-adoption life cycle. In particular,

    we believe that future researchers should direct their interest toward examinations of appropriate patterns of substantive technology use. Some example research questions include

    When should periods of substantive tech

    nology use proliferate (inducing active

    learning by users) and when should they diminish (enabling these users to leverage this learning)?

    Is it advisable to constrain (to specific users, to specific technology features, etc.) periods of substantive technology use?

    What are the dysfunctionalities of substantive

    periods of technology use? Here, we have

    ignored such dysfunctionalities, such as the

    potential for interventions to lead to pro ductivity lost, to cognitive overload, or to

    feelings of mistrust.

    How likely is it that, and under what conditions

    might, an intervention trigger a substantive

    period of technology use that never stabilizes, ultimately ending in work system failures?

    Once individuals are engaged in substantive

    technology use episodes, what contextual conditions should be in place to increase the likelihood that gains in individual learning transfer to others?

    Implications for Research: Methodology 1

    As discussed throughout this paper, previous researchers have overlooked a significant source of variation in individual post-adoptive behaviors

    by ignoring the distinct features of an IT appli cation. However, researchers who design studies that collect data at the feature level of analysis face a number of challenges. Here, we focus on

    four of these challenges: core versus ancillary features, designers' versus users' views, discreet

    versus bundles of features, and existing versus new instrumentation.

    546 MIS Quarterly Vol. 29 No. 3/September 2005

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    Core Versus Ancillary Features

    A crucial first step in working at the feature level of an IT application is appropriately scoping the research project by identifying the specific features to include in the research design. IT applications associated with IT-enabled work systems are

    comprised of very large feature sets consisting of both core and ancillary features. Accordingly, the researcher must decide the set of features that is to be the focus of a research design for at least two reasons. First, ancillary features, which are

    optional, may be unused or unknown to a majority of an IT application's users. As a result, it may prove ineffectual or dysfunctional to incorporate such features into a research design, depending upon the goals of the study. Second, empirical studies at a feature level have the potential to utilize data collection methods and data sets that are too large and too rich for subjects/respondents (from or about whom data is collected) and the researcher (in terms of the volume of data to be

    collected, analyzed, and interpreted), respectively.

    A number of viable options exists in selecting those features to be the focus of a research

    design, including focus on (1) the core features of a technology since those features serve to charac terize the technology as a whole (Griffith 1999), (2) those features that most clearly differentiate the

    specific technology from other technologies (e.g., communication and social structure features in the

    case of GSS), (3) those features most likely to be

    applied in a consistent fashion over the entire post adoptive life cycle, and (4) those features most

    likely to stabilize or destabilize use patterns (Griffith 1999). What is most important is that the researcher carefully considers these various

    options and provides clear justification for the

    approach taken.

    Designers' Versus Users' Views

    Also important when working at the feature level of

    analysis is determining the point of view appro priate for the goals of the research. Two alter

    natives are possible: the designer's view (i.e., a set of predefined features believed relevant for all users of a specific IT application) or the users' view (i.e., a social construction of the technology in-use as defined collectively by a specific user

    community). Reasons might exist for selecting either view. For example, if the intent is to study a

    single IT application across multiple work contexts, it would be desirable to employ the designers' view so that a consistent view is maintained across these work contexts. On the other hand, if the intent is to study over time the evolution of user

    cognitions within a single user community, it would be desirable to employ these users' views (or, more likely, the views of subsets of users within the community) of the IT application's features to increase the likelihood that the nuances reflected in changes in cognitions might better be surfaced and interpreted. Regardless of the selected view, the key is that the researcher has thoughtfully examined and justified his/her selection.

    Discrete Features Versus Bundles of Features

    A related decision is whether to focus on an IT

    application's elemental features or on meaningful bundles of these elemental features. For example, several distinct features might collectively come

    together in forming a feature bundle (e.g., discreet features such as "Generate Balance Sheet,"

    "Generate Income Statement," and "Generate

    Statement of Cash Flows" may also exist as a feature bundle called "Generate Financial

    Statements") whose functionality is generally understood by designers, by users, or both.

    Again, as above, either approach is viable given a

    study's research goals as well as the nature of the IT-enabled work system(s) under investigation.

    Existing Versus New Instrumentation

    A particularly thorny challenge when moving to the feature level of analysis is deciding whether or not

    existing instrumentation from the IT adoption and

    MIS Quarterly Vol. 29 No. 3/September 2005 547

    This content downloaded from 61.70.146.20 on Wed, 1 Jan 2014 07:15:49 AMAll use subject to JSTOR Terms and Conditions

  • Jasperson et al./Post-Adoptive Behaviors & IT-Enabled Work Systems

    use literature is applicable. Can researchers use

    slight modifications in wording to existing scales to

    adequately capture the nuances of feature adop tion, use, and extension? Or do these existing scales need more extensive refinement, possibly to the point where the resultant reconcep tualization requires that they be developed anew?

    We know of no current research which has examined this issue and, thus, advocate that scholars undertake research (1) to examine whether or not existing instrumentation can be

    effectually ported to the feature level of analysis and, if needed, (2) to develop instrumentation

    enabling researchers to measure the cognitions and use behaviors associated with the dynamic interactions reflected in our reconceptualization of

    post-adoptive behavior.

    Implications for Practice

    Installed IT applications, particularly those that establish new IT-enabled work platforms, all too often do not meet senior managements' expec tations due to a lack of functionality customized for

    unique business needs and processes; em

    ployees' lack of understanding of the IT application features, the new work processes, or both; and a

    lack of continual system upgrades and enhance ments. To induce managers, technical and busi

    ness experts, and the users associated with the

    implementation of an IT application to engage in a rich set of post-adoptive behaviors, we have

    argued that periods of substantive technology use must occur among the community of users.

    In our conceptualization, the primary means for

    accomplishing this task is through the (direct or

    indirect) orchestration of work system interventions

    applied throughout the post-adoptive life cycle? interventions that induce an organization's mem bers to engage in active learning activities asso ciated with the IT-enabled work system. Ac

    cordingly, we strongly believe that the technology and business managers responsible for the success of an IT-enabled work system initiative should reconsider these responsibilities in two

    substantive ways: the active management of the

    post-adoptive life cycle and the active collection of data on post-adoptive behaviors.

    Management of the Post-Adoptive Life Cycle

    All too often, the active management of the imple mentation of an IT-enabled work system essen

    tially halts soon after its installation as the key principals involved with the implementation (i.e., business and project managers, IT and business

    experts, etc.) are either reassigned to other

    projects or move on to what they consider more

    pressing activities (Ross et al. 2003). As a result, the majority of the post-adoptive life cycle is without management attention and direction. We thus advocate that organizations strongly con sider reconvening the principals associated with such implementation efforts, after installa tion, to plan for and to provide the resources for the post-adoptive life cycle. Here, active reflection (Edmondson et al. 2001) should be

    engendered regarding what has so far transpired, the extent to which prior expectations regarding the new work system have been met, and current

    organizational realities. Paramount in establishing this plan for the post-adoptive life cycle are decisions about when and how to induce periods of substantive technology use within the user

    community. In addition, organizations must allow

    sufficient time for periods of relative stability during which users might leverage the learning so gained.

    Collection of Data on Post-Adoptive Behaviors

    Because of the learning (as well as the unlearning) that occurs during the post-adoptive life cycle, the

    principals responsible for the post-adoptive life

    cycle of a newly installed IT-enabled work system will undoubtedly have to periodically adjust or otherwise refine the post-adoptive implementation plan. However, it would be very difficult to assess either the current state of the implementation effort

    548 MIS Quarterly Vol. 29 No. 3/September 2005

    This content