Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sandra A. Vannoy is active.

Publication


Featured researches published by Sandra A. Vannoy.


Communications of The ACM | 2010

The social influence model of technology adoption

Sandra A. Vannoy; Prashant Palvia

Introduction Human innovation, in combination with the internet, networking, and communications technologies have produced a new platform for social and business networking, formation of community, and communication. This emerging phenomenon is generally known as social computing. While there is no widely accepted definition of social computing, we define it as: intra-group social and business actions practiced through group consensus, group cooperation, and group authority, where such actions are made possible through the mediation of information technologies, and where group interaction causes members to conform and influences others to join the group. In this article, we examine the adoption of information technologies in the context of social computing. Most current information systems research on individual technology adoption has focused upon the adoption of technology in organizations and has utilized such technology acceptance models as the TRA and TAM. It has been suggested, however, that a new perspective on adoption may be necessary to fully capture the nature of technology acceptance in social computing situations, where the technology is embraced rather than simply accepted by the user, and where the action made possible by technology is seen as a behavior embedded in society. Few studies have investigated technology adoption targeting the individual at the level of society, community, or lifestyle experience. There is little research that approaches adoption in the context of social computing, and to our knowledge, no models have been developed to investigate this phenomenon. This study addresses this gap by developing social constructs and providing a theoretically grounded model for technology adoption in the context of social computing. We develop a cross-disciplinary model of technology adoption to address the multi-faceted context of social computing. Our model suggests that social computing action, social computing consensus, social computing cooperation, and social computing authority are antecedents to social influence, and augment usefulness and ease of use. In social influence, group membership legitimizes actions and the individual is guided by the groups rules of practice. Social influence leads to technology adoption. Technology adoption incorporates two essential elements, the embracement of the technology by individuals and its embedment in society. Each of the models constructs will be explained in further detail. As Figure 1 demonstrates, while technology may influence society, society often exerts influence on technology. Consider SMS text messaging. A technology that was originally intended to deliver subscriber information was adopted by end users as a vehicle for social behavior. Peer-to-peer (P2P) file swapping offers another example. A technology that was intended to provide an efficient mechanism for remote file access was adopted by end users to create music sharing networks. The strength of social influence is evident, as text messaging has now outpaced voice mobile calling as well as email. Similarly, sales of traditional music media such as CDs are declining as the number of music downloads and uploads via P2P networks continue to increase. As the Internet, networking, and communications technologies become increasingly embraced by individuals and embedded in everyday lives and activities, technologically enabled social structures are emerging that are changing the way individuals interact and communicate, and are facilitating fundamental changes to business practices. People socialize and network via their Web browsers by joining social networking sites such as MySpace.com and LinkedIn.com. Text messaging has created a form of communication that has its own user-defined language and protocols. A recent study by Cision on the influence of Web blogs on mainstream media showed that the mention of blogs in top magazines and newspapers has increased from just over 2,000 in 2005 to over 13,000 in 2008. In a 2006 study, Forrester Research found that although social computing is in infancy, societal changes are being witnessed, as individuals increasingly take cues from one another, in addition to traditional sources of authority, such as corporations, media, political institutions or religions. Social computing mechanisms such as blogs, e-Bay-esque Web sites, Web-based forums such as MySpace.com, text messaging, and instant messaging are often utilized instead of traditional sources of news, purchasing, and social interaction. Unauthorized P2P file sharing provides an example of how technology is used in the formation and organization of groups with shared interests. Through cooperation with a particular action, communities based upon the shared interest of music exchange are created by the consensus of the group that it is acceptable to use the Internet and communication technologies to share music among group members. Though the action is illegal in the traditional sense, the decentralized nature of P2P makes regulation difficult and largely immunizes its activities against established forms of authority. Furthermore, unauthorized file sharing has become socially acceptable (embedded) due to the new authority imposed by the group. The embracement and embedment of P2P file sharing is evident as the number of P2P networks continues to grow. Individuals have historically exchanged music via low quality mechanisms such as magnetic tape; however, the development of file formats such as .mp3 that could carry music of high quality and the adoption of P2P transferred some portion of the power wielded by the entertainment industry to the consumer. P2P file exchange has provided a means for obtaining music outside of mechanisms sanctioned by the entertainment industry, such as purchasing CDs or obtaining .mp3 files from legitimate sources. As social computing becomes prevalent, creating new ways to examine human behavior in the context of information technology becomes important. Parameswaran and Whinston9 suggest that social computing has brought about a much more complex model of computing that may not fit within the confines of current knowledge. Current research on IT adoption focuses largely upon the concepts of usefulness and ease of use, which may not fully explain technology adoption in the context of social computing. Due to the social influence inherent in social computing and the embedment and embracement of technology in the lives of individuals and the interactions of society, it has become important to examine technology adoption from a cross-disciplinary and multifaceted context, and in terms of social and business interactions.


Journal of Global Information Technology Management | 2012

Intercultural Communication Competence via IP Services Applications: A Modified Task-technology Fit Perspective

Sandra A. Vannoy; Charlie C. Chen

Abstract Technology and effective communication have been acknowledged as essential components of the globalization process. However, there is little empirical research regarding the role of technology in assisting individuals in communicating across cultures. Over a four week period, one hundred American and sixty Taiwanese subjects communicated virtually via the Internet Protocol (IP) services application Skype on a one-to-one basis in order to learn from each about their respective cultures and acquire communication skills. A survey was administered to the American participants at the end of the four weeks. The results of a Partial Least Squares analysis show strong support for using a self-efficacy modified task-technology fit perspective to understand the relationship between IP services applications and intercultural communication competence. The utilization of IP services applications and the perception that the IP services applications fit intercultural communication tasks are useful predictors for perceived intercultural communication competence.


hawaii international conference on system sciences | 2012

Investigating Social Computing in Competitive Dynamics

Sandra A. Vannoy; B. Dawn Medlin

This paper contributes to a program of research linking the fields of information systems and competitive dynamics. Findings suggest that effective collaboration on complex competitive actions is facilitated by unplanned social network configurations that are supported by particular technologies. Furthermore, findings indicate that managers in superior network positions largely control not only the flow of information and knowledge among network participants but also the information technologies by which the social network infrastructure is supported.


International Journal of Virtual Communities and Social Networking | 2011

Enhancing the Trust of Members in Online Social Networks: An Integrative Technical and Marketing Perspective

Sandra A. Vannoy; B. Dawn Medlin; Charlie C. Chen

The trust of members is essential to the sustainability of e-business. Unlike other business models, the success of online social networks is highly dependent upon the growth rate of social network size. In order to accelerate and continue the growth rate, online social networks need to be able to continuously roll out diversified services and use them to interest existing and new members. However, the nature of this business model can expose online social networks to ubiquitous security threats such as spam, viral marketing and viruses. In order to convince users to adopt social network services, cultivation of brand equity and trust in the online social networks is essential. This study integrates technical and marketing perspectives to examine the potential influence of website quality and brand equity on user satisfaction, thereby influencing users’ formation of trust. A survey was conducted with 385 subjects to understand the causal relationships between the studied constructs. Regression analysis indicates that website quality, brand loyalty, brand association, and brand quality have a positive influence on user satisfaction, thereby increasing the trust of members in online social networks. Brand awareness shows no significant influence on user satisfaction. These findings lead us to derive theoretical and practical implications on the sustainable operation of online social networks.


Journal of Computer Information Systems | 2016

Students' Views of the Importance of Techncal and Non-Technical Skills for Successful it Professionals

B. Dawn Medlin; Dinesh S. Dave; Sandra A. Vannoy

The dynamic environment of technology and changing business needs require todays IT professional to possess a wide range of technical and non-technical abilities. Profit seeking and non-profit organizations expect their IT employees to combine business skills, analytical thinking and the ability to exhibit expertise in an array of technology areas. In this paper an empirical investigation is conducted to determine students views of the importance of various skills that would be required for a successful IT professional. The skill set was developed by reviewing certain skills identified by companies as necessary in the IT profession. The survey was conducted in upper level required information technology courses at the undergraduate level. The results indicate that according to students, non-technical skills including communication skills, analytical, and managerial skills are at least as important as technical ability.


Social Network Analysis and Mining | 2013

Investigating the impact of differences in kind upon resource consumption in web-based social networks

Sandra A. Vannoy; Charlie C. Chen; B. Dawn Medlin

Understanding factors that encourage membership is becoming critically important in the success of web-based social networks. Web-based social structures provide various resources designed to encourage membership, such as mechanisms for finding individuals, posting and receiving messages, joining groups, promoting oneself or events, sharing news or photos, and protecting personal information. However, resources in the web-based social structure deviate quite drastically from resources in the traditional world being equally available to all societal members, reproduced at near zero cost, where consumption does not reduce supply but increases societal value of the resource, and where resource consumption requires trust of the consumer and affects privacy of the social network population. This paper uses the sociological view that clusters of individuals who exhibit similar patterns of behavior will emerge in social structures. Given that trust and privacy have long been established as important concepts in understanding behaviors in the online environment, we endeavor in this study to determine whether trust and privacy emerge as critical factors in the environment of the web-based social network. We use social network analysis to cluster individuals who exhibit both high and low tendencies toward trust and privacy, and then examine patterns of consumption of resources across these networks.


Information Systems Research | 2010

Managerial Interpretations of the Role of Information Systems in Competitive Actions and Firm Performance: A Grounded Theory Investigation

Sandra A. Vannoy; A. F. Salam


The International Journal of Management | 2004

An Internet-Based Approach to the Teaching of Information Technology: A Study of Student Attitudes in the United States

B. Dawn Medlin; Sandra A. Vannoy; Dinesh S. Dave


americas conference on information systems | 2012

The Influence of General Sustainability Attitudes and Value Congruence on Consumer Behavior

John Kenneth Corley; Joseph A. Cazier; Sandra A. Vannoy


americas conference on information systems | 2008

The Role of Trust in the Intention to Use Feedback from Reputation Systems

Sandra A. Vannoy; Anupam Kumar Nath; Lakshmi S. Iyer

Collaboration


Dive into the Sandra A. Vannoy's collaboration.

Top Co-Authors

Avatar

B. Dawn Medlin

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

Charlie C. Chen

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

Dinesh S. Dave

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

John Kenneth Corley

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

Joseph A. Cazier

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

A. F. Salam

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Anupam Kumar Nath

University of North Carolina at Chapel Hill

View shared research outputs
Top Co-Authors

Avatar

Dawn Medlin

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

Lakshmi S. Iyer

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Prashant Palvia

University of North Carolina at Greensboro

View shared research outputs
Researchain Logo
Decentralizing Knowledge