A De-Construction of Wireless Device Usage

A De-Construction of Wireless Device Usage

Mary R. Lind (North Carolina A&T State University, USA)
DOI: 10.4018/978-1-60566-142-1.ch012
OnDemand PDF Download:


In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the information processing theories of user/technology interaction is presented. While commercial and useful applications of wireless devices are numerous, wireless interaction is emerging as a means of social interaction—an extension of the user’s personal image—and as an object of amusement and play. The technology/user interaction theories that have driven the discussions of computer assisted communication media are information richness, communicative action, and social influence modeling. This article will extend this theoretical view of wireless devices by using flow theory to address elements of fun, control, and focus. Then, these technology/user interaction theories are used with respect to wireless devices to propose areas for future research.
Chapter Preview

Theoretical Foundation For Wireless Media Usage

Two theoretical approaches will be examined. First, the view of wireless devices as communication media based in information richness theory is presented, followed by the theoretical view of wireless devices using the social networking theory perspective. Secondly, wireless media will be addressed as objects of play and of control. Finally, a model is developed showing the bidirectional impact of wireless devices as artifacts that influence culture and the resulting culture that in turn impacts perceptions of the wireless artifacts.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Chapter 1
Claus Hohmann
This chapter introduces emotional digitalization as a phenomenon of future information systems. It argues that emotional digitalization is a... Sample PDF
Emotional Digitalization as Technology of the Post-Modern: A Reflexive Examination from the View of The Industry
Chapter 2
Elias A. Hadzilias, Andrea Carugati
This chapter aims at defining a framework for the design of e-government services on cultural heritage. Starting from an analysis of three cases on... Sample PDF
Bridging User Requirements and Cultural Objects: A Process-Oriented Framework for Cultural E-Services
Chapter 3
Samantha Bax, Tanya McGill
The technology acceptance model (TAM) is a popular model for the prediction of information systems acceptance behaviors, defining a causal linkage... Sample PDF
From Beliefs to Success: Utilizing an Expanded TAM to Predict Web Page Development Success
Chapter 4
George E. Heilman, Jorge Brusa
This study assesses the psychometric properties of a Spanish translation of Doll and Torkzadeh’s End- User Computing Satisfaction (EUCS) survey... Sample PDF
Assessing a Spanish Translation of the End-User Computing Satisfaction Instrument
Chapter 5
Ishraga Khattab, Steve Love
Over the last several years, the ubiquitous use of mobile phones by people from different cultures has grown enormously. For example, mobile phones... Sample PDF
Understanding the Impact of Culture on Mobile Phone Usage on Public Places: A Comparison between the UK and Sudan
Chapter 6
Netta Iivari
Users should participate in information technology (IT) artifact development, but it has proven to be challenging. This applies also in the open... Sample PDF
Discourses on User Participation: Findings from Open Source Software Development Context
Chapter 7
Anita Greenhill, Gordon Fletcher
In this article we build upon existing research and commentary from a variety of disciplinary sources, including information systems, organisational... Sample PDF
Exploring "Events" as an Information Systems Research Methodology
Chapter 8
Hannakaisa Isomäki
This chapter describes a study clarifying information systems (IS) designers’ conceptions of human users of IS by drawing on in-depth interviews... Sample PDF
Different Levels of Information Systems Designers' Forms of Thought and Potential for Human-Centered Design
Chapter 9
Barbara Jones, Angelo Failla, Bob Miller
Constant renewal of the self-image and self-knowledge of the organisation becomes part of the day-to-day knowledge-in-use of front-line... Sample PDF
Tacit Knowledge in Rapidly Evolving Organisational Environments
Chapter 10
Anastasia Papazafeiropoulou, Reshma Gandecha
Interpretive flexibility is a term used to describe the diverse perspectives on what a technology is and can or can not do during the process of... Sample PDF
Interpretive Flexibility Along the Innovation Decision Process of the UK NHS Care Records Service (NCRS): Insights from a Local Implementation Case Study
Chapter 11
Sylvie Albert, Rolland LeBrasseur
This article reviews the literature on networks and, more specifically, on the development of community telecommunication networks. It strives to... Sample PDF
Collaboration Challenges in Community Telecommunication Networks
Chapter 12
Mary R. Lind
In this article, wireless technology use is addressed with a focus on the factors that underlie wireless interaction. A de-construction of the... Sample PDF
A De-Construction of Wireless Device Usage
Chapter 13
François-Xavier de Vaujany
The following chapter suggests a critical realistic framework, which aims at modeling sociotechnical change linked to end-users’ IT appropriation... Sample PDF
Modeling Sociotechnical Change in IS with a Quantitative Longitudinal Approach: The PPR Method
Chapter 14
Janet C. Dunlop
Today’s media are vast in both form and influence; however, few cultural studies scholars address the video gaming industry’s role in domestic... Sample PDF
The U.S. Video Game Industry: Analyzing Representation of Gender and Race
Chapter 15
Luciano Floridi
The article argues that Information Ethics (IE) can provide a successful approach for coping with the challenges posed by our increasingly... Sample PDF
Global Information Ethics: The Importance of Being Environmentally Earnest
Chapter 16
Philip Brey
In this chapter, I examine whether information ethics is culture relative. If it is, different approaches to information ethics are required in... Sample PDF
Is Information Ethics Culture-Relative?
Chapter 17
John Weckert
This chapter examines the concept of offence, both its giving and taking, and argues that such an examination can shed some light on global ethical... Sample PDF
Giving and Taking Offence in a Global Context
Chapter 18
Reima Suomi, Ari Serkkola, Markku Mikkonen
In this chapter we focus on the application of a mobile time reservation system for dental care. The specific application allocates cancelled... Sample PDF
GSM-Based SMS Time Reservation System for Dental Care
Chapter 19
Debra Howcroft, Robert McDonald
Both academics and practitioners have invested considerably in the information systems evaluation arena, yet rewards remain elusive. The aim of this... Sample PDF
An Ethnographic Study of IS Investment Appraisal
Chapter 20
Kevin Gallagher, Robert M. Mason
This chapter frames the requirements definition phase of systems design as a problem of knowledge transfer and learning between two communities of... Sample PDF
Reframing Information System Design as Learning Across Communities of Practice
Chapter 21
Tanya Bondarouk, Maarten van Riemsdijk
In this chapter, we conceptualize the implementation process associated with SAP_HR as an experiential learning one (Kolb, 1984), and analyze... Sample PDF
Successes and Failures of SAP Implementation: A Learning Perspective
Chapter 22
Pietro Murano, Patrik O’Brian Holt
Experimental work on anthropomorphic feedback in user interfaces has shown inconsistent results and researchers offer differing opinions as to the... Sample PDF
Anthropomorphic Feedback in User Interfaces: The Effect of Personality Traits, Context and Grice's Maxims on Effectiveness and Preferences
Chapter 23
Richard Diamond
This study explores decision premises that were used to manage and stabilise a complex technochange programme in a financial institution. Decision... Sample PDF
Several Simple Shared Stable Decision Premises for Technochange
Chapter 24
Alison Adam, Paul Spedding
This chapter considers the question of how we may trust automatically generated program code. The code walkthroughs and inspections of software... Sample PDF
Trusting Computers Through Trusting Humans: Software Verification in a Safety-Critical Information System
About the Editor
About the Contributors