Author List: Beaudry, Anne; Pinsonneault, Alain;
MIS Quarterly, 2005, Volume 29, Issue 3, Page 493-524.
This paper defines user adaptation as the cognitive and behavioral efforts performed by users to cope with significant information technology events that occur in their work environment. Drawing on coping theory, we posit that users choose different adaptation strategies based on a combination of primary appraisal (i.e., a user's assessment of the expected consequences of an IT event) and secondary appraisal (i.e., a user's assessment of his/her control over the situation). On that basis, we identify four adaptation strategies (benefits maximizing, benefits satisficing, disturbance handling, and self-preservation) which are hypothesized to result in three different individual-level outcomes: restoring emotional stability, minimizing the perceived threats of the technology, and improving user effectiveness and efficiency. A study of the adaptation behaviors of six account managers in two large North American banks provides preliminary support for our model. By explaining adaptation patterns based on users' initial appraisal and subsequent responses to an IT event, our model offers predictive power while retaining an agency view of user adaptation. Also, by focusing on user cognitive and behavioral adaptation responses related to the technology, the work system, and the self, our model accounts for a wide range of user behaviors such as technology appropriation, avoidance, and resistance.
Keywords: Coping theory; individual performance; IT appropriation; user adaptation
Algorithm:

List of Topics

#284 0.176 users user new resistance likely benefits potential perspective status actual behavior recognition propose user's social associated existing base using acceptance
#75 0.172 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses expected theories consequences impact theory
#230 0.107 adaptation patterns transition new adjustment different critical occur manner changes adapting concept novel temporary accomplish experience period managers transitions frequency
#10 0.094 strategies strategy based effort paper different findings approach suggest useful choice specific attributes explain effective affect employ particular online control
#35 0.083 technology organizational information organizations organization new work perspective innovation processes used technological understanding technologies transformation consequences perspectives use administrative economic
#73 0.065 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate
#27 0.057 secondary use primary data outcomes objective ways analysis range addresses development purpose budget past outcome wide direct generating occurs desired