Individual Relationships with Technology

In this paper, we explore the nature of the relationships that people develop with technology. In particular, we examine social exchange theory, the norm of reciprocity, and attachment theory to begin to explain how individuals develop, or do not develop, relationships with computers and technology. The theories are summarized, hypotheses are presented, proposed methods for empirical work are presented, and brief discussion is offered suggesting that the reference theories identified provide a novel way to examine the relationship between people and the technologies they interact with.

[1]  A. Gouldner THE NORM OF RECIPROCITY: A PRELIMINARY STATEMENT * , 1960 .

[2]  M. Callon Some Elements of a Sociology of Translation: Domestication of the Scallops and the Fishermen of St Brieuc Bay , 1984 .

[3]  Joseph S. Valacich,et al.  Diagnosing and Managing Online Business-to-Consumer (B2C) Relationships: Toward an eCommerce B2C Relationship Stage Theory , 2009 .

[4]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[5]  Glenn I. Roisman,et al.  Patterns of stability in adult attachment: an empirical test of two models of continuity and change. , 2011, Journal of personality and social psychology.

[6]  Geoff Walsham,et al.  GIS for District-Level Administration in India: Problems and Opportunities , 1999, MIS Q..

[7]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[8]  G. Graen,et al.  Relationship-based approach to leadership: Development of leader-member exchange (LMX) theory of leadership over 25 years: Applying a multi-level multi-domain perspective , 1995 .

[9]  Kelly A. Brennan,et al.  Attachment-Style Differences in Attitudes toward and Reactions to Feedback from Romantic Partners: An Exploration of the Relational Bases of Self-Esteem , 1998 .

[10]  H. Kelley,et al.  The social psychology of groups , 1960 .

[11]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[12]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[13]  M. Ainsworth,et al.  Origins of the Sense of Security. (Book Reviews: Patterns of Attachment. A Psychological Study of the Strange Situation) , 1978 .

[14]  Robert F. Easley,et al.  Research Note - How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use , 2008, Inf. Syst. Res..

[15]  P. Blau Exchange and Power in Social Life , 1964 .

[16]  Kelly A. Brennan,et al.  Self-report measurement of adult attachment: An integrative overview. , 1998 .

[17]  J. Bowlby Attachment and loss: retrospect and prospect. , 1969, The American journal of orthopsychiatry.

[18]  Wiebe E. Bijker,et al.  Science in action : how to follow scientists and engineers through society , 1989 .

[19]  S. Srivastava,et al.  The Big Five Trait taxonomy: History, measurement, and theoretical perspectives. , 1999 .

[20]  C. Hazan,et al.  Love and work: An attachment-theoretical perspective. , 1990 .

[21]  Ritu Agarwal,et al.  A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology , 1998, Inf. Syst. Res..

[22]  Amy M. Bippus,et al.  Evaluations of Supportive Messages Provided by Friends and Romantic Partners: An Attachment Theory Approach , 2005 .

[23]  B. Latour Science in action : how to follow scientists and engineers through society , 1989 .

[24]  Jason Bennett Thatcher,et al.  An Empirical Examination of Individual Traits as Antecedents to Computer Anxiety and Computer Self-Efficacy , 2002, MIS Q..