Technology adoption and use theory review for studying scientists' continued use of cyber-infrastructure

Youngseek Kim, Kevin Crowston

Research output: Contribution to journalArticle

29 Scopus citations

Abstract

In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyberinfrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post-adoption (continued use) research. In addition, we review studies specifically regarding cyberinfrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber-infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber-infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.

Original languageEnglish (US)
JournalProceedings of the ASIST Annual Meeting
Volume48
DOIs
StatePublished - Dec 1 2011

Keywords

  • Acceptance
  • Adoption
  • Cyber-infrastructure
  • EScience
  • Use

ASJC Scopus subject areas

  • Information Systems
  • Library and Information Sciences

Fingerprint Dive into the research topics of 'Technology adoption and use theory review for studying scientists' continued use of cyber-infrastructure'. Together they form a unique fingerprint.

  • Cite this