Towards an activity theory perspective on mobile information systems

Michael Er*, Robert Kay

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

Mobile technology allows the potential to extend an organization's information system and therefore information access and collaboration outside the normal boundaries set by the traditional office, affording access to information from remote locations. It is therefore puzzling that with the large capital expenditure for research and development into mobile devices that their adoption and use does not necessarily reflect returns in the same order of magnitude. This confusion is compounded further considering the large quantum of research that has been already undertaken in the area of technology diffusion. This paper reflects on the existing work practices, which are often ignored in the implementation of mobile devices contributing to issues with new system adoption. We attempt to highlight the factors that affect adoptability of mobile technology devices through the use of Activity Theory.

Original languageEnglish
Title of host publicationProceedings of the 16th Australasian Conference on Information Systems (ACIS 2005)
Subtitle of host publicationNovember 30 - December 2, 2005, Sydney, Australia
EditorsBruce Campbell, Jim Underwood, Deborah Bunker
Place of PublicationSydney
PublisherAustralasian Chapter of the Association for Information Systems
Pages1-7
Number of pages7
ISBN (Print)097584170X
Publication statusPublished - 2005
Externally publishedYes
Event16th Australasian Conference on Information Systems, ACIS - 2005 - Sydney, Australia
Duration: 29 Nov 20052 Dec 2005

Other

Other16th Australasian Conference on Information Systems, ACIS - 2005
CountryAustralia
CitySydney
Period29/11/052/12/05

Keywords

  • Activity theory
  • Adoption
  • Diffusion
  • Mobile technology

Fingerprint

Dive into the research topics of 'Towards an activity theory perspective on mobile information systems'. Together they form a unique fingerprint.

Cite this