The main framework is however the Diffusion of Innovation (DoI) theory that was proposed by Rogers (1995). Other factors are however incorporated so as to make use understand the user adoption of the ENUM technology. The users possessing high adoption application of ENUM are to be assumed to be the 'early adopters' and are to be associated with the factors employed in Roger's (1995) theory in characterizing the early adopters. The user adoption of ENUM is effectively hypothesized to be affected/influenced by; (1) the characteristics of the innovation such as the perceived relative advantage, trialability, compatibility, complexity and observability. (2) the communication channels (influence of peers and industry ) (3) the social system (existence of restrictive policy) (4) individual characteristics (how techno savvy the users are ) as well as the general attitude of the users (individuals and telecommunication industry) towards the convenience, cost effectiveness and other advantages of ENUM.
Innovation is an improved way of doing something. The work of Mohr (1982) stated that every organization must possess as well as be willing to appropriately commit the various resources that are needed to effectively implement a given new technology for these organizations to be successful. Lewin (1951) on the other hand, came up with a three-step sequential model that effectively described how various processes are changed. He pointed out that the present behavior that is 'unfrozen' gets 'changed' in order to reinforce the improved (new) behavior. He suggested that there are various forces that exist in the changing as well as maintaining the nature of the status quo (Stoner, James and Edward, 1989).These are; new technology, improved raw materials, competition from other entities, pressures from supervisors. On the hand, the forces that hinder change are; norms of a certain group's performance fear of change as well as the external threats. The work of Berth (1991) indicated that various organizational members are supposed to identify with a given champion who is mandated with spearheading the change to necessitate the 'unfreezing' process. The work of Cooper and Zmud (1990) defined the implementation of IT ideas as an organizational effort that is directed towards the diffusion of the necessary information technology within a given user community. They came up with a six-staged model for implementing IT-based projects on the basis of the work of Lewin (1951).The is;
1. Initiation: Which involves the active or active scanning of the problems as well as opportunities
2. Adoption: Which involves the negotiation for the backing of the implementation of the IT applications
3. Adaptation: The process of revising the IT applications as well as the organizational procedures
4. Acceptance: The stage where the organizational members are induced to appropriately commit to the given It application.
5. Routinization: Denotes the encouragement for the utilization of the IT application as a normal thing/activity.
6. Infusion: The increasing of the effectiveness that is gained by using the given technology.
There are also five main contextual factors that have an impact on the stages of the adoption process. These are; the user community, the organization, adopted technology and the organizational environment.
This study makes use of documents that describes the ENUM trials in the UK, Australia and the U.S. with the need of identifying the key issues that would affect the adoption as well as the diffusion of the technology. The study is longitudinal so as to reveal any contextual factors.
The development of the model
A customized model is employed in order to identify as well as measure the various factors that have an influence on the ENUM innovation. The model used is the one developed by Liu Sheng (1999) as a modification of an earlier model by Cooper and Zmud (1990).
Key Issues that in the adoption of the ENUM system
A review of ENUM trials in USA, UK and Australia indicates a pattern of issues to be addressed. Security issues have been prevalent in ENUM related discussions. Contact information used by ENUM is stored in a public database with unrestricted access. This means ENUM security has been given much priority. Other features of the ENUM database may as well be specific procedures for contacting an individual, such as the gadgets to be utilized by a particular caller as per the time of day.
ENUM may also...
This was stated by the Electronic Privacy and Information Center (EPIC). ENUM database, having unrestricted access by the public may be used by sales executives, spammers, and cyber criminals to acquire private contact information.
The absence of legal restrictions controlling the usage of ENUM contact material encourages its use by marketing personnel and spammers to send unwanted commercial e- mail and other types of business-related solicitations.
The system may enhance an unspecified volume of spam since developers could come up with software meant to forward solicitations to all of the applicant's contact devices.
Mealling and Daniel, (2005) point out that The Naming Authority Pointer Records (NAPTR) is involved with an applicant's phone number which is connected to a Domain Number System (DNS) query that can be launched by any user based on a contact.
An applicant is bound to provide sufficient details to facilitate the search work as ascertaining the precise details to be stored in the NAPTR records.
Questions on what magnitude of the security issue can be solved by scientific methods, and to what extent can be lessened legally have been asked. Proposals made by the government and organizations on how to enforce ENUM is one risk factor associated with its destruction. The other factor is the kind of technical strategies to be employed. These solutions will greatly influence the risk height of abuse of personal information.
New Privacy and Security issues emanating from ENUM
There exist two distinctive notions of how ENUM may be applied: the first concept gives the caller the ability to determine the mode of connection, while the second concept lets the person being called to control the call connection.
These two approaches differ significantly in the aspect of privacy. In the first concept, the caller is supplied with all possible contact information leading to the corresponding individual being called and may always select the suitable one to use. As a result, the caller may retain all the details received for future use.In contrast, the second concept allows only one contact detail to be inserted to the DNS record. (Rosenberg et al., 2002).Other concerns emanating from particular applications of ENUM are affected by mismanaged supervision of controls. This can mean that an entity copies another one's identity
Malicious users take advantage of this to expose confidential personal details or use it for certain unlawful purposes. This kind of security should also be put in place for downloads and study of web contentSince it can encompass execution of implanted or linked malware .As a result, the automatically download feature must be turned off on the user application. A number of ENUM services may also be addressed for software that demand some form of security protocol, but do not accord the required mechanisms themselves. For example, in the storage of personal details for support, user passwords can be applied by defining a necessary underpinning ENUM system.
Here, an outer privacy service is needed. Another concern that emanates from the new chances is that malicious service provider personnel put themselves in the call paths of a particular E.164 number, having no permission from the receiver. These security issues may hinder the accelerated adoption of the ENUM technology.
The Roger's adoption model for ENUM
The Roger's model of adopting an innovation comprises of five adopter categories (Roger,1995). These are the characteristics that can influence the way an individual uses an innovation.ENUM can be regarded as an efficient and cost effective communication technology that is to replace the traditional and the rather conventional telecommunication via multiple devices such as telephone, fax and email. According to the model advanced by Rogers (1995) the adopter category comprises of;
Relative advantage; This is the degree to which the given innovation would be perceived to be better than the one that it supersedes. The relative advantage is made up of various factors. The first relative advantage of ENUM is that it is much more convenient that the currently existing telephone numbers. For example, an individual can have all of their voice mail, emails and fax in a single inbox that bears a single and common number. The second adopter category or advantage is efficiency; ENUM can save one a lot of time and money by using a single number and inbox provided by a single telecommunication provider at a discounted fee. The other advantage is the fact that ENUM has improved quality of data information received. This is There are however certain obstacles such as security and privacy concerns in ENUM implementations. The second…
Moreover, CoPs develop their practice through improving the diffusion of innovation within their active networks; the benefits of such interactions are countless especially in the field of healthcare. One can assume that specialty doctors' communities would present the perfect example for CoPs because they share the same practice, interest and professionalism. It would be interesting to study if those CoP networks exist in United Arab Emirates, whether they are active
, 2005). The framework centers strengthening the compatibility with existing values and practices to also ensure a high level of simplicity and observable results, two other factors crucial to creating an effective framework (Rogers, 2003). All of these elements must also be unified with a simplistic model to make sure the nurses can see the value of the system and their ability to manage it as a resource, not be
Diffusion of Innovation theory consists of explaining not only the spread of new objects but also new ideas. According to Bell (1968), innovation of diffusion is considered as the key locomotive of change in society. In this sense diffusion of innovation is analyzed both with the notion of technology as tools and the notion of technology as organized knowledge. Diffusion theory has been studied from number of diverse perspectives as
diffusion process? Briefly describe the individuals who make up each grou The first stage of a diffusion process is the awareness stage. In this stage the consumer becomes aware or informed about the existence of a new innovation. However this group of individuals is only know about the existence of the idea such as a brand name but do not know any further details about the product or the idea.
With such an influential opinion leader as the character of Samantha obsessing about the bag, and outright lying about it being for Lucy Liu to be able to possess one for herself (Givhan, 2004), a mass audience of aspiring fashionistas was convinced, or persuaded, that a Birkin bag was a "must have" for them. However, once these late majority women learned of the high price tag of the bag, and
Systems and Diffusion of Innovation Theory Attached File Systems theory vs. diffusion of innovation theory Systems theory is based upon the idea that the whole is greater than the sum of its parts. Its founder Ludwig von Bertalanffy proposed that, based upon his experience with the biology of organisms, all systems are constantly changing because they are able to interact with their environments. Systems are open and thus can acquire "qualitatively new properties