{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:00:41Z","timestamp":1760061641067},"reference-count":64,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10,1]]},"abstract":"<p>This descriptive single case study examines the process and implications of the self-determined adoption of an internet-based meeting system in a global company. Self-determination theory and structuration theory are used as theoretical lenses to understand the adoption and use of an ICT system. The data were collected using qualitative semi-structured interviews with eleven system users and analyzed using a content analysis approach. The research shows that the self-determined adoption of ICT systems has benefits like user motivation and satisfaction. Problems in such adoption relate to users\u2019 experiencing uncertainty regarding the organizational legitimization of the system and support for its use. Employees and organizations are likely to benefit from self-determined adoption because it promotes employees\u2019 motivation and initiative-taking. However, a shared understanding of self-determination and organizational support for it are required.<\/p>","DOI":"10.4018\/joeuc.2010100103","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T20:16:12Z","timestamp":1297800972000},"page":"51-69","source":"Crossref","is-referenced-by-count":12,"title":["Self-Determined Adoption of an ICT System in a Work Organization"],"prefix":"10.4018","volume":"22","author":[{"given":"Eija","family":"Korpelainen","sequence":"first","affiliation":[{"name":"Helsinki University of Technology, Finland"}]},{"given":"Matti","family":"Vartiainen","sequence":"additional","affiliation":[{"name":"Helsinki University of Technology, Finland"}]},{"given":"Mari","family":"Kira","sequence":"additional","affiliation":[{"name":"Helsinki University of Technology, Finland"}]}],"member":"2432","reference":[{"issue":"4","key":"joeuc.2010100103-0","doi-asserted-by":"crossref","first-page":"55","DOI":"10.4018\/joeuc.2004100104","article-title":"Best practice. Applying strategies to overcome user resistance in a group of clinical managers to a business software application: A case study.","volume":"16","author":"B.Adams","year":"2004","journal-title":"Journal of Organizational and End User Computing"},{"key":"joeuc.2010100103-1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0067-6","author":"J. H. E.Andriessen","year":"2003","journal-title":"Working with groupware. Understanding and evaluating collaboration technology"},{"key":"joeuc.2010100103-2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01253016"},{"key":"joeuc.2010100103-3","doi-asserted-by":"publisher","DOI":"10.2307\/2392767"},{"key":"joeuc.2010100103-4","doi-asserted-by":"publisher","DOI":"10.1177\/017084069701800106"},{"key":"joeuc.2010100103-5","author":"P.Berger","year":"1967","journal-title":"The social construction of reality"},{"issue":"4","key":"joeuc.2010100103-6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/joeuc.2002100101","article-title":"Toward an understanding of the behavioral intention to use a groupware application.","volume":"14","author":"Y.Chen","year":"2002","journal-title":"Journal of End User Computing"},{"key":"joeuc.2010100103-7","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.36.2.123"},{"key":"joeuc.2010100103-8","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"joeuc.2010100103-9","doi-asserted-by":"publisher","DOI":"10.1207\/S15327965PLI1104_01"},{"key":"joeuc.2010100103-10","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.125.6.627"},{"key":"joeuc.2010100103-11","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.5.2.121"},{"key":"joeuc.2010100103-12","doi-asserted-by":"publisher","DOI":"10.1080\/10919399309540193"},{"key":"joeuc.2010100103-13","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(00)00195-8"},{"key":"joeuc.2010100103-14","doi-asserted-by":"publisher","DOI":"10.1145\/42196.42198"},{"issue":"2","key":"joeuc.2010100103-15","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/15228053.2006.10856088","article-title":"The importance of social structure in implementing ERP systems: A case study using adaptive structuration theory.","volume":"8","author":"K.Furumo","year":"2006","journal-title":"Journal of Information Technology Case and Application Research"},{"key":"joeuc.2010100103-16","doi-asserted-by":"publisher","DOI":"10.1002\/job.322"},{"key":"joeuc.2010100103-17","doi-asserted-by":"publisher","DOI":"10.1177\/074171369704800103"},{"key":"joeuc.2010100103-18","author":"A.Giddens","year":"1984","journal-title":"Constitution of society outline of the theory of structuration"},{"key":"joeuc.2010100103-19","doi-asserted-by":"publisher","DOI":"10.1007\/s11414-007-9079-x"},{"key":"joeuc.2010100103-20","author":"H.Gleitman","year":"1999","journal-title":"Psychology"},{"key":"joeuc.2010100103-21","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175230"},{"issue":"3","key":"joeuc.2010100103-22","first-page":"245","article-title":"Why groupware applications fail: problems in design and evaluation.","volume":"4","author":"J. T.Grudin","year":"1989","journal-title":"Office Technology and People"},{"key":"joeuc.2010100103-23","unstructured":"Heaton, H. (1998). Secondary analysis of qualitative data. Social Research Update, 22. Retrieved February 24, 2009, from http:\/\/sru.soc.surrey.ac.uk\/SRU22.html"},{"key":"joeuc.2010100103-24","doi-asserted-by":"publisher","DOI":"10.1177\/104973239700700306"},{"key":"joeuc.2010100103-25","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(99)00032-4"},{"key":"joeuc.2010100103-26","unstructured":"Jones, M., & Karsten, H. (2003). Review: Structuration theory and information systems research. Retrieved February 10, 2009, from http:\/\/www.jbs.cam.ac.uk\/research\/working_papers\/2003\/wp0311.pdf"},{"issue":"1","key":"joeuc.2010100103-27","doi-asserted-by":"crossref","first-page":"127","DOI":"10.2307\/25148831","article-title":"Giddens\u2019s structuration theory and information systems research.","volume":"32","author":"M. R.Jones","year":"2008","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2010100103-28","doi-asserted-by":"publisher","DOI":"10.2307\/2392498"},{"key":"joeuc.2010100103-29","doi-asserted-by":"publisher","DOI":"10.1108\/09534810810847048"},{"key":"joeuc.2010100103-30","doi-asserted-by":"crossref","unstructured":"Klaus, T., Wingreen, S., & Blanton, J. E. (2007). Examining user resistance and management strategies in enterprise system implementations. In Proceedings of the ACM SIGMIS CPR Conference on Computer Personnel Research, St. Louis, MO (pp. 55-62).","DOI":"10.1145\/1235000.1235013"},{"key":"joeuc.2010100103-31","author":"M. S.Knowles","year":"1975","journal-title":"Self-directed learning. A guide for learners and teachers"},{"key":"joeuc.2010100103-32","unstructured":"Kouroubali, A. (2002). Structuration theory and conception-reality gaps: Addressing cause and effect of implementation outcomes in health care information systems. In Proceedings of the 35th Hawaii International Conference on System Sciences. Washington, DC: IEEE."},{"key":"joeuc.2010100103-33","first-page":"31","article-title":"Sampling in qualitative inquiry","author":"A. J.Kuzel","year":"2000","journal-title":"Doing qualitative research"},{"key":"joeuc.2010100103-34","first-page":"73","article-title":"To validate is to question","author":"S.Kvale","year":"1989","journal-title":"Issues of validity in qualitative research"},{"key":"joeuc.2010100103-35","first-page":"227","article-title":"Unifying the fragmented models of information systems implementation","author":"T. H.Kwon","year":"1987","journal-title":"Critical issues in information systems research"},{"key":"joeuc.2010100103-36","first-page":"459","article-title":"Group decision and social change","author":"K.Lewin","year":"1952","journal-title":"Readings in social psychology"},{"key":"joeuc.2010100103-37","author":"M. B.Miles","year":"1994","journal-title":"Qualitative data analysis. An expanded sourcebook"},{"key":"joeuc.2010100103-38","first-page":"3","article-title":"Primary care research: A multimethod typology and qualitative road map","author":"W. L.Miller","year":"1992","journal-title":"Doing qualitative research"},{"key":"joeuc.2010100103-39","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0073-7","author":"B. E.Munkvold","year":"2003","journal-title":"Implementing collaboration technologies in industry. Case examples and lessons"},{"key":"joeuc.2010100103-40","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1997.0142"},{"key":"joeuc.2010100103-41","author":"D. W.Organ","year":"2006","journal-title":"Organizational citizenship behavior: Its nature, antecedents, and consequences"},{"key":"joeuc.2010100103-42","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.3.3.398"},{"key":"joeuc.2010100103-43","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1993.9960143"},{"key":"joeuc.2010100103-44","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.4.404.14600"},{"issue":"2","key":"joeuc.2010100103-45","first-page":"11","article-title":"An improvisational model of change management: the case of groupware technologies.","volume":"38","author":"W. J.Orlikowski","year":"1997","journal-title":"Sloan Management Review"},{"key":"joeuc.2010100103-46","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.2.143"},{"key":"joeuc.2010100103-47","author":"M. Q.Patton","year":"1990","journal-title":"Qualitative evaluation and research methods"},{"key":"joeuc.2010100103-48","doi-asserted-by":"crossref","first-page":"206","DOI":"10.4018\/978-1-59140-144-5.ch013","article-title":"Structuration theory in information systems research: Methods and controversies","author":"M. S.Poole","year":"2004","journal-title":"The handbook of information systems research"},{"key":"joeuc.2010100103-49","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1020"},{"key":"joeuc.2010100103-50","doi-asserted-by":"publisher","DOI":"10.1177\/1094428104272000"},{"key":"joeuc.2010100103-51","doi-asserted-by":"crossref","DOI":"10.4135\/9780857020093","author":"C.Seale","year":"1999","journal-title":"The quality of qualitative research"},{"issue":"1","key":"joeuc.2010100103-52","doi-asserted-by":"crossref","first-page":"20","DOI":"10.5465\/amj.2007.24160882","article-title":"Persuasion with case studies.","volume":"50","author":"N.Siggelkow","year":"2007","journal-title":"Academy of Management Journal"},{"key":"joeuc.2010100103-53","author":"D.Silverman","year":"2006","journal-title":"Interpreting qualitative data"},{"key":"joeuc.2010100103-54","first-page":"236","article-title":"Case studies","author":"R. E.Stake","year":"1994","journal-title":"Handbook of qualitative research"},{"key":"joeuc.2010100103-55","author":"L. H.Sundholm","year":"2000","journal-title":"Self-determination in organisational change"},{"key":"joeuc.2010100103-56","first-page":"263","article-title":"Secondary analysis in qualitative research: Issues and implications","author":"S.Thorne","year":"1994","journal-title":"Critical issues in qualitative research methods"},{"issue":"3","key":"joeuc.2010100103-57","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view.","volume":"27","author":"V.Venkatesh","year":"2003","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2010100103-58","doi-asserted-by":"publisher","DOI":"10.1016\/0959-8022(93)90016-Y"},{"key":"joeuc.2010100103-59","doi-asserted-by":"crossref","DOI":"10.4135\/9781412983488","author":"R. P.Weber","year":"1990","journal-title":"Basic content analysis"},{"key":"joeuc.2010100103-60","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-006-9018-1"},{"issue":"3-4","key":"joeuc.2010100103-61","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/344241.344242","article-title":"Groupware Comes to the Internet: Charting a New World.","volume":"30","author":"B. C.Wheeler","year":"1999","journal-title":"The Data Base for Advances in Information Systems"},{"key":"joeuc.2010100103-62","author":"R. K.Yin","year":"2003","journal-title":"Applications of case study research"},{"key":"joeuc.2010100103-63","author":"R. K.Yin","year":"2003","journal-title":"Case study research: design and methods"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=46969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:52:32Z","timestamp":1654098752000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/joeuc.2010100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,10,1]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2010100103","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"value":"1546-2234","type":"print"},{"value":"1546-5012","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,1]]}}}