Вы находитесь на странице: 1из 21

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/286949182

How Generation Y Perceives Social Networking Applications in Corporate


Environments

Book · January 2014


DOI: 10.4018/978-1-4666-6182-0.ch009

CITATIONS READS
0 3,849

1 author:

Imed Boughzala
Institut Mines-Télécom Business School
113 PUBLICATIONS   514 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Knowledge Management View project

Social Media View project

All content following this page was uploaded by Imed Boughzala on 17 April 2016.

The user has requested enhancement of the downloaded file.


Integrating Social
Media into Business
Practice, Applications,
Management, and Models

In Lee
Western Illinois University, USA

A volume in the Advances in E-Business Research


(AEBR) Book Series
163

Chapter 9
How Generation Y Perceives
Social Networking Applications
in Corporate Environments
Imed Boughzala
Telecom Ecole de Management, France

ABSTRACT
Organizations increasingly rely on corporate social networks and online communities to enhance so-
cialization and knowledge sharing, collaboration, and value creation among coworkers. This chapter
presents and analyzes results from a qualitative exploratory study conducted recently with a group of
24 graduate management students from a French business school. It contributes to a better understand-
ing of how generation Y perceives the use of Social Networking (SN) applications inside businesses by
drawing up a list of dos and don’ts. This study provides an ordered list of important adoption issues to
consider when implementing and using CSN applications in businesses. It provides expectations and
precautions for stakeholders to take into account for best use, compared to users (coworkers), managers,
and the enterprise as a whole. A first list of guidelines, to favor the best adoption of these applications
and to make their usage effective, is formulated.

INTRODUCTION Indeed, this magazine used to devote coverage to


the person of the year since the late 1920s.
In 2005, the social aspect of the Web was empha- The idea was to highlight that internet users
sized by Tim O’Reilly (2005) to highlight the value from that year (2006) will have the control over
of socialization related to people connections, the information thanks to the Social Web (2.0),
content sharing and co-creation through social by expressing freely themselves on the web and
networks. Internet user is no longer considered as interacting directly with others. This marks in
an information consumer but more as a content somewhat a break with the traditional web.
producer. To the point that in 2006 Time magazine Today, integrating Web 2.0 applications (i.e.
titled its coverage “You.” (Yes, you. You control social media) in businesses provides many op-
the Information Age. Welcome to your world). portunities to improve interaction, knowledge

DOI: 10.4018/978-1-4666-6182-0.ch009

Copyright © 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

How Generation Y Perceives Social Networking Applications in Corporate Environments

sharing and collaboration among employees, also environment under what we call Enterprise 2.0
with customers and partners. These applications (Crumpacker & Crumpacker, 2007; Deal et al.,
are becoming a popular medium for people in- 2010). However, to the best of our knowledge,
teraction, content sharing (Constant et al., 1994; there is no empirical work which has been reported
Davenport and Prusak, 1998; Cramton, 2001) and on this issue confirming this assumption on the
open collaboration (Coleman & Levine, 2008). ground. Nobody can affirm today that generation
Currently, to take profit from their potential, Y would be the driver of this technology adop-
companies increasingly rely on corporate social tion in corporate environment considering their
networking (CSN) applications (in the continuum technology readiness (Parasuraman, 2000).
of Intranet efforts) to enhance the communica- This chapter tries to address this gap by answer-
tion and increase the density of connections and ing the following research questions: how the use
sharing among coworkers to drive business value of CSN applications is perceived by the generation
and innovation (Chesbrough & Appleyard, 2007; Y? To what extent people from this generation are
Sena & Sena, 2008). willing to adopt and use them within a corporate
According to many authors (Dudezert et al., environment? And, what should be the best and
2009; Hershatter & Epstein, 2010; Boughzala, worst use according to them?
2007-2012a; Deal et al., 2010; Gorman et al., The method adopted for this study is based
2004), the new generation of hypermodern em- on a qualitative exploratory study through an
ployees (i.e. Generation Y) has developed new enriched Delphi method (Briggs et al., 2003).
habits and behaviors at work. They use, on a daily Twenty four graduate management students from a
basis, Web 2.0 applications (blogs, wikis, Really French business school were invited to participate
Simple Syndication (RSS) feeds, SN applica- voluntarily to a directed brainstorming session,
tions/services, folksonomy, podcasting, tagging, using a Group Support System (GSS), in order to
mashups, etc) in the private arena and, therefore, gather their statements and opinions. This study
consider that such applications for self-organizing, provided an ordered list of important adoption
sharing and collaboration are the best tools to issues to consider when implementing and using
work. Social networks and online communities CSN applications in businesses.
are for them the best resources to solve problems The purpose of this chapter is to contribute to
collectively, to get connections and partnerships a better understanding of the perception of genera-
and thus to take advantage of the collective in- tion Y with regard to CSN applications by drawing
telligence (Smith & Duin, 1994; Malone et al., up a list of dos and don’ts. It provides important
2009). This generation wants to choose by it-self expectations and precautions to take into account
the tools and devices it deems fit to use (notion by stakeholders for a best use, compared to users
of self-care, Bitner et al., 2002). This is part of (coworkers), managers and the enterprise at whole.
larger organizational issues, called BYOD (Bring The rest of this chapter is structured as follows:
Your Own Device), BYOA (Bring Your Own Ap- Section 2 briefly describes research background in
plication, Ballagas et al., 2004) or more BYOB terms of concepts (Web 2.0, generation Y and SN
(Bring Your Own Behavior, Gunnarsson, 2012). applications) and some related works and theories.
Researchers and practitioners to date have Section 3 describes the research method that has
mostly assumed that people from this generation been used in this exploratory study. Results are
Y (Dudezert et al., 2009; Hershatter & Epstein, presented in section 4. Based on our findings,
2010), because of their massive use of social media we discuss in section 5 their accordance with the
in the private arena, would be willing to accept technology acceptance and adoption models and
and use them more easily and quickly in corporate theories; and present some guidelines associated

164

How Generation Y Perceives Social Networking Applications in Corporate Environments

with best CSN applications deployment and usage. for self-expression, social networking and inter-
The conclusion discusses contributions, limita- action, and skills and talents identification. They
tions and future research directions. are a good opportunity for companies to improve
best practices’ sharing, and to encourage open
collaboration, crowdsourcing and co-creation
BACKGROUND (AIIM, 2009; Gorman et al., 2004).
Indeed, knowledge sharing among cowork-
Web 2.0 and Knowledge Sharing ers through web 2.0 applications remains the
primary objective to reach for companies before
Web 2.0 (O’Reilly, 2005) is one major change that hoping their collaboration and value co creation.
is being transforming work practices and more Knowledge sharing is a volitional action by which
widely the organization at whole. In fact, new knowledge is made known to other people (Dav-
usages for information and knowledge sharing enport and Prusak, 1998; Cramton, 2001). This
have emerged with the advent of Web 2.0 appli- can be seen from two angles – a) the knowledge
cations, giving rise to the Enterprise 2.0 concept one considers sharing; and b) the person or people
(Anderson, 2007). Enterprise 2.0 - a new culture with whom one contemplates sharing it. Thus, an
of technology usage here - refers to “the use of individual may deem a given body of knowledge
Web 2.0, emergent social software platforms to be highly sharable with someone, but not shar-
within companies, or between companies and able with another (Bock et al., 2005; Boughzala
their partners or customers” as defined initially and Briggs, 2012b). Social networks and online
by McAfee (2006). communities are very important for knowledge
Web 2.0 is a combination of applications sharing and creation (Rheingold, 1993). Cum-
(Blog, Wiki, Podcast, RSS feeds, Tagging, Social mings (2003) posits that knowledge sharing is the
networks…); new values related to the use of means by which an organization obtains access
these applications (user as producer, collective to its own and other organizations’ knowledge.
intelligence, perpetual beta, extreme ease if use) Bresman et al. (1999) argued that individuals will
and standardized technology behind these appli- only participate willingly in knowledge sharing
cations (Ajax, XML, Open API, Microformats, once they share a sense of identity (or belonging)
Flash/Flex) (O’Reilly, 2005; Anderson, 2007). with others.
Web 2.0 applications, also called social me-
dia, are intuitive, user-friendly, social centered, Social Networking Applications
flexible and less formal than traditional informa-
tion systems (Kaplan & Haenlein, 2010). Latter One of the most interesting, rich and extremely
researchers have classified social media into six popular web 2.0 applications is SN applications
categories including collaborative projects (e.g. (mobile apps, sites, services or platforms) for
Wikipedia), blogs and microblogs (e.g. Twitter), developing and supporting online social network
content communities (e.g. Youtube), social net- communities, and share user-created contents
working sites/systems (SNSs) (e.g. Facebook), (Kim et al., 2010). Boyd and Ellison (2007) define
virtual game worlds (e.g. World of Warecraft) them “as web-based services that allow individu-
and virtual social worlds (e.g. Second Life). Used als to (1) construct a public or semi-public profile
initially in the private arena, they are increasingly within a bounded system, (2) articulate a list of
disseminated within professional spheres, regard- other users with whom they share a connection,
less of organization type or field of activities and (3) view and traverse their list of connections
(Boughzala, 2010a-2011). They are very useful and those made by others within the system.” For

165

How Generation Y Perceives Social Networking Applications in Corporate Environments

Figure 1. The honeycomb framework of social media (Kietzmann et al., 2011)

Richter and Koch (2008 p. 87), social networking Presence, Sharing, Relationships, Conversations,
services/sites (SNSs) “are application systems Reputation, Groups (Figure 1).
that offer users functionalities for identity man-
agement and enable furthermore to keep in touch Generation Y
with other users.”
Kaplan and Haenlein (2010) categorize SNS Another change related to the transformation of the
by four different terms: (1) self-presentation, (2) organization is social that came with the arrival on
self-disclosure, (3) social presence, and (4) media the job market of the new generation of employees
richness in terms of the amount of information to – the Generation Y (Anonymous editorial, 1993)
be transmitted at time intervals. Later, Kietzmann (“Why” – i.e., eager of sense-making), Gen Y,
et al. (2011) describe a categorization, called the Yers, Net Generation, Digital Natives or Milen-
honeycomb framework of social media, which nials (Gorman et al., 2004; Forrester Consulting,
is able to categorize SNS using seven functional 2006; Dudezert et al., 2009). A new generation
building blocks (i.e. functionalities): Identity, of younger, college- and university-educated

166

How Generation Y Perceives Social Networking Applications in Corporate Environments

workers born between 1978 and 1995 and grown obsolescence.” A study led by SelectMinds (2008)
up with the Internet. This generation succeeds to revealed that private and secure CSNs provide
the generation X (anonymous) which came after substantial savings for the company. “This study
and is less known than, the baby boomers. Ac- examined the financial contributions of CSN so-
cording to Forrester Consulting (2006) and others lutions in 60 leading, global organizations. The
(Broadbridge et al., 2009, Hershatter & Epstein, report revealed that a better connected workforce
2010), these employees are looking continuously through CSN technology can yield significant
for new technology and are eager to simply and financial contributions to organizations” (Sena
quickly find good information/knowledge, any- & Sena, 2008). Key findings of the study include:
time and anywhere and from any device; and are
very autonomous and intuitive, not intimidated • 10.3% increase in productivity
by knowledge complexity and organizational contributions;
hierarchy (Boughzala, 2010b – 2012a). This new • 8.8% increase in retention contributions;
generation already upsets the traditional organi- and
zation and sometimes confuses the professional • 11.7% increase in new business.
sphere with the private one (Kowske et al., 2010).
It is also a good opportunity for her to integrate Therefore, for many companies the adoption
enthusiastic and creative employees. The genera- of CSN applications by workers and their incor-
tion Y is characterized by a new culture – Culture poration into their daily workspace are becoming
2.0 – of awareness, technology usage, knowledge big challenges (Grady, 2008). They count on the
sharing, mass collaboration and open innovation contribution of generation Y, with relation to its
(Chesbrough & Appleyard, 2007). alleged readiness, to lead this change and be the
driver of this technology adoption.
CSN Applications and Generation Y
The Technology Adoption Research
As young people from the generation Y are ac-
customed nowadays to meet and converse on Technology is evolving and with this a big chal-
Facebook, MySpace, Flickr and other similar SN lenge for designers and managers to understand
applications, companies have realized the impor- how and why people adopt or do not adopt new
tance of social networking and started deploying technology. The technology acceptance/adoption
and using their own SN platforms (Sena & Sena, is one of the most important issues in the manage-
2008). Social networking within a corporate ment information systems (MIS) area. The Theory
environment is an efficient way to link remotely of Reasoned Action (Fishbein and Ajzen, 1975)
located people with specific competency domains and the Theory of Planned Behavior (Ajzen, 1991)
in large organizations (e.g. IBM, Disney, Accen- have been used successfully to assess technology
ture, Redbull), to create a sustainable relationship adoption. TRA states that there are four constructs
and maintain them. This social aspect makes the that a user has in actual behavior since the behav-
CSN applications an attractive opportunity for ioral intention is positively influenced by beliefs,
knowledge-intensive organizations (Richter & attitude, normative beliefs and subjective norm.
Riemer, 2009). TPB states that the attitude toward the behavior,
Sena and Sena (2008) argue that CSN ap- subjective norm, and perceived behavioral control
plications “are primarily used to build trust and determine behavior intention and in consequence
share knowledge on a peer to peer basis rather behavior.
than through documents subject to information

167

How Generation Y Perceives Social Networking Applications in Corporate Environments

Many studies have been carried out and many RESEARCH METHOD
theories and models were provided to explain
this social phenomenon, such as Technology In order to address the aforementioned research
Acceptance Model (TAM, Davis, 1989), Technol- gap, we carried out a qualitative exploratory study
ogy Readiness and Acceptance Model (TRAM, based on a Delphi approach, enriched by the use
Parasuraman 2000), TAM 2 (Venkatesh & Davis, of the think Lets-based modeling (Briggs et al.,
2000), TAM 3 (Venkatesh & Bala, 2008), Unified 2003). Twenty four graduate management students
Theory of Acceptance and Use of Technology (from the generation Y) from a French business
(UTAUT, Venkatesh et al., 2003) and UTAUT 2 school participated an electronic brainstorming
(Venkatesh et al., 2012). These cognitive-based around one main question: what do you think
models try to explain the behavioral intention to about Enterprise 2.0 through the use of SN ap-
use a technology according to main two variables: plications within a corporate environment?, and
the perceived ease of use and perceived usefulness; five sub-questions:
and other external variables such as social influ-
ence, performance expectancy, effort expectancy, • To what extent could CSN applications be
voluntariness of use, experience, age, subjective used?
norm, image, job relevance, output quality, com- • What are benefits in the use of CSN appli-
puter self-efficacy, computer playfulness, hedonic cations compared to businesses and com-
motivation, habit, etc. pared to you?
TAM is an adaptation of TRA and proposes that • What are the dos and don’ts to make their
the acceptance of a technology in the workplace is deployment successful?
influenced by the perceived usefulness and ease of • How you should use them (dos and don’ts)?
use for the technology use (Davis 1989). TRAM • How managers should use them (dos and
includes individual beliefs to understand how don’ts)?
people embrace and use new technologies for home
and work measured by optimism, innovativeness, Delphi studies are regularly used in Informa-
discomfort and insecurity (Parasuraman 2000). tion Systems studies when a consensus needs to
UTAUT provides a model to assess the likelihood be achieved among domain experts on a topic
of adoption for a new technology; it emerged from where idea generation is required (Keil et al.,
eight different technology acceptance models 2002). While Delphi studies are normally survey-
(Venkatesh et al. 2003). (Figures 2 & 3) based (Schmidt et al., 2001), we used a GSS and
Furthermore according to DeLone and McLean a well-structured facilitation process based on the
(1992-2003), the success of an information system use of thinkLets (Briggs et al., 2003). GSS is a
(IS) deployment is conditioned by the intention to suite of software tools designed to support collec-
use, the use and satisfaction of its users, which are tive problem solving, including the generation of
conditioned by the quality of information, system ideas, reducing, organizing, and evaluating idea
and service. (Figure 4) sets (Fjermestad and Hiltz, 1999). ThinkLets
This chapter does not detail these models are pre-packaged thinking activities (facilitation
that are sources of inspiration to interpret the techniques) that create predictable, repeatable
results of this exploratory study for explaining patterns of collaboration among people working
the acceptance and adoption of SN applications toward a goal. They facilitate information emer-
within a corporate environment by generation Y. gence and sharing among participants and assist
This study comes as a prior step before a future the facilitators in controlling the reflection process
quantitative confirmatory research. to converge on relevant proposals. They are used

168

How Generation Y Perceives Social Networking Applications in Corporate Environments

Figure 2. Technology acceptance models (TAM, TAM 2 vs. TAM 3)

to streamline collaboration during brainstorm- nize ideas, or to write draft texts. Using GSS, all
ing sessions, rapid decision-making, creativity participants can contribute simultaneously, and
… (Vreede et al., 2009). Each participant in a may generate and evaluate ideas anonymously,
GSS session uses a computer to submit ideas and while participating in well-structured deliberation
votes to the group, to make selections, to orga- processes (Briggs et al., 2003). The use of a GSS

169

How Generation Y Perceives Social Networking Applications in Corporate Environments

Figure 3. Unified theory of acceptance and use of technology (UTAUT 2 vs. UTAUT)

allowed us to collect extensive and well-organized The participants


group collaboration results. It also served for the
development of a synthesis report summarizing In June 2012, students of a GSS course (the objec-
the results of the process. tive of the course is to learn how to use a GSS (a
technology for supporting group work) in order
to run electronic brainstorming and solve problem
collectively) were invited to participate in a study
at the author’s business school. In order to motivate

Figure 4. Model of Information Systems Success (DeLone and McLean, 2003)

170

How Generation Y Perceives Social Networking Applications in Corporate Environments

Table 1. Delphi study participant demographic data

Study data
     • Total of participants: 24
     • Nationality: 19 French, 3 Tunisian, 1 Senegalese, 1 Chinese
     • Educational background: all participants are Management Graduate students
     • Youngest participant in Age: 20
     • Oldest participant in Age: 23
     • Age average: 21
     • Males: 13
     • Females: 11
     • Business experience: at least a 6 months internship

them, students who volunteered to participate question, statements have to be classified


in the study received an extra credit. They were around two themes: benefits compared to
asked to answer the above questions through an businesses and benefits compared to the
electronic brainstorming. Demographics of the generation Y. For the three other sub ques-
study participants are provided in Table 1. tions, statements have to be classified in
terms of dos and don’ts.
The Brainstorming process • Participants then rejoined as a single group.
Each subgroup presented and explained to
The brainstorming process consisted of several the group which statements were selected
activities in which the participants were asked to for their respective question (40 minutes).
engage during a 180 minute period followed by • Participants were then asked to individu-
90 minute open discussion. A summarized agenda ally and anonymously rate the relevance
and research process follows: of each statement on a 5-point Likert-type
scale, with ‘5’ representing a very relevant
• After an introductory presentation by the statement and ‘1’ a least relevant state-
facilitator on Enterprise 2.0 and CSN ap- ment relating to each of the questions (20
plications in particular, and the scope of minutes).
the brainstorming, participants were asked • The voting scores were then presented to
to anonymously generate ideas around the all participants in a raw format to stimulate
main question and five sub questions (40 a discussion of the results (statement by
minutes). statement), and to allow the reformulation
• Participants were then assigned to six sub- of statements when necessary, to clarify
groups and asked to reduce, clarify and ratings’ standard deviations and so to build
organize collectively generated ideas into a collective consensus (40 minutes).
unique statements around one of the six
questions (40 minutes). The goal was to To end the brainstorming, we conducted af-
converge on similar ideas, remove non- ter a 15 minute break an open discussion for 90
related ones, and reword those insuffi- minutes with participants about the brainstorming
ciently clear. For the main general question results. We aimed to deepen understanding on
and first sub question, statements have to how to make the deployment of CSN applications
be ordered in one list. For the second sub successful according to them. A list of guidelines

171

How Generation Y Perceives Social Networking Applications in Corporate Environments

was generated to favor the best adoption of these • “I’m afraid of opinion-based discrimina-
applications and make their usage effective. tion.” There is here distrust toward the
Moreover, a research assistant audio recorded enterprise and managers expressed by this
all the session and made field notes about oral state- generation. They think that spontaneity
ments during the meeting. In addition, participants sometimes could be a disadvantage.
recorded their key contributions on Post-it notes, • “I want to be trained first and know the
and gave them to the research team at the end of usage charter.” Here, this generation does
the session. The facilitator made also field notes not feel well prepared/trained to use these
immediately following each step of the process. applications in a professional setting. She
therefore requires training and to know the
terms of the usage charter. She believes
RESULTS that this latter should exist to frame well
this professional use.
To the main question, “what do you think about • “I want to use my personal PC / mobile
Enterprise 2.0 through the use of SN applications device and own tools.” Here, the interest
within a corporate environment?”, participants in the BYOD and BYOA are confirmed.
made several statements. Here, in a decreasing We can interpret that by its practical side
order, quotes which had the higher votes (greater (keeping the same device and application
Mean and smaller Standard Deviation): for both business and private uses) and/or
the mistrust in enterprise side (tracking/
• “I don’t want to have my colleagues among control that the enterprise could do).
my friends’ contacts.” This confirms that • “I use them [CSN applications] if I see a
they are aware of the need to separate benefit or personal value.” This statement
between business and private spheres, shows the pragmatism (realism) of this
contrary to the preconceived schemes ad- generation in its continuous search for
vanced in the literature. sense-making and recognition.
• “I’m afraid to speak freely thorny issues
within a corporate environment, unless it To the sub question 1, “To what extent could
is anonymous.” This means that they are CSN applications be used?” participants made
afraid about what they could say on a net- several statements. 8 statements in an ordered
work or blog informally be used against list have been elicited and consolidated. Table 2
them later by the enterprise. To ensure the summarizes the statements deemed most relevant
freedom of expression, they suggest that by participants.
the communication would be anonymous The Cronbach’s alpha (α) for this question
on critical subjects. It would be here a form equals 0.88 (> 0.7), indicating a certain homo-
of self-censorship that is contrary to their geneity in the participants’ responses relative to
supposed culture 2.0. the understanding of these statements – this is the
• “My private social network is sufficient for same for all the other questions.
me.” This is similar to say that the CSN To the sub question 2, “What are the benefits
applications would not necessarily be of a in the use of CSN applications compared to busi-
great contribution to their professional ac- nesses and compared to you?”, participants made
tivities. An assertion contrary to an almost several statements. 8 statements for each theme
obviousness for managers. have been elicited and consolidated. Table 3 sum-
marizes the statements deemed most relevant by

172

How Generation Y Perceives Social Networking Applications in Corporate Environments

Table 2. Main usage of CSN applications (α=0.88)

     9. Connection
     10. Social awareness
     11. Information and knowledge sharing
     12. Forming or participating (to) groups
     13. Reputation and self-advertising
     14. Recruitment
     15. Daily spontaneous reporting
     16. Crowdsourcing: collaboration and problem solving

participants. These statements generally show that DISCUSSION AND IMPLICATIONS


this generation is very well aware of the benefit
of using CSN applications. Some statements are The findings of this exploratory study go up a gap
personal benefit oriented beyond their usefulness between what they declared during the brainstorm-
for performing the professional activity. ing and stereotypes commonly relayed on their
To the sub question 3, “What are the dos and technology usage in the academic and manage-
don’ts to make their deployment successful?”, rial literature (self-care, confusion of private and
participants made several statements. 7 statements professional spheres, easy technology adoption,
for each theme have been elicited and consolidated. strong technical skills and less need for training
Table 4 summarizes the statements considered as being instinctive). These findings cast doubt
the most relevant according to the participants. compared to their adoption and waited potential
These statements show to which extent this genera- in the diffusion of Enterprise 2.0 (particularly here
tion gives importance for a good management of CSN applications) within businesses.
these applications. For them, they should remain In summary, key findings of this study show
informal social spaces rather than controlled ones. that:
To the sub question 4, “How you should use
them (dos and don’ts)?”, participants made several • People from the generation Y are prudent
statements. 5 statements for each theme have been with regard to their CSN use in a corporate
elicited and consolidated. Table 5 summarizes the environment, and suspicious about the real
statements considered as the most relevant accord- managerial intentions.
ing to the participants. These statements show at • They consider that socialization between
somewhat a lack of spontaneity (for not saying coworkers must remain out of the hierar-
a simulation) and a lot of prudence in their use. chical control.
To the sub question 5, “How managers should • Private data protection is becoming a big
use them (dos and don’ts)?”, participants made priority for them.
several statements. 6 statements for each theme • Security is briefly mentioned without in-
have been elicited and consolidated. Table 6 sistence. It seems obvious for them to trust
summarizes the statements considered as the businesses with regard to their IS.
most relevant according to the participants. These • The quality of the used technologies should
statements show a strong need for recognition be enough good for motivating their usage.
and rewarding expressed by this generation. She • They are not specially prepared for the
is also very aware of the limitations of the usage CSN use, and their private use of social
of CSN applications. media is not a guarantee for an optimized

173

How Generation Y Perceives Social Networking Applications in Corporate Environments

Table 3. Benefits from the CSN applications’ usage (α=0.94)

Benefits compared to businesses


     9. Give a better outside image
     10. Surf on a new fashion: advertising and display
     11. Communicate better on its objectives, products and services
     12. Disseminate internally information content
     13. Distribute job offers and recruit
     14. Provoke Buzz around activities
     15. Stimulate open innovation among coworkers
     16. Promote cohesion between coworkers and integrate better new employees
Benefits compared to generation Y
     9. Give a better self-image and valorize his/her skills
     10. Find a job or new mission internally
     11. Increase his/her employability and mobility
     12. Get help to solve problems faster
     13. Be well informed about what happen inside the enterprise in Pull mode (through a wall of activity monitoring)
     14. Build a own professional network
     15. Know more about coworkers (skills, activities, etc)
     16. Co-create value

professional use. They hope that others • Their interest in CSN is individualistic and
stop thinking that all of them are geeks. mostly opportunistic: building their profes-
sional network, taking care of their repu-

Table 4. Business usage (α=0.89)

Dos
     8. Ensure data security and compliance with privacy
     9. Allow creating extra-professional groups and keep them informal
     10. Create an internal reputation index (e.g. R-index) and an endorsement system
     11. Make of CSNs instruments for a participative management (debates, referenda, contests, voting…)
     12. Create a mentoring system for new employees
     13. Provide multi devices applications with the same quality as those used in the private sphere (e.g. Facebook, MySpace)
     14. Associate a skills search engine
Don’ts
     8. Control abusively their usage with deep statistics
     9. Emerge a false spontaneity (self censorship, continuous picture control, fear to open up, fear to be judged)
     10. Information overload (too much shared information)
     11. Provide less interesting content
     12. No animation of communities (no community management)
     13. Keep tracking usage and analyze it without the knowledge of workers
     14. Do not provide a rewarding system

174

How Generation Y Perceives Social Networking Applications in Corporate Environments

Table 5. Generation Y usage (α=0.93)

Dos
     6. Do not associate the professional profile to the private one
     7. Fill well his/her professional profile (skills, experience, interests…)
     8. Get noticed by the hierarchy and other employees: having followers
     9. Choose the right interest groups and communities
     10. Remain always professional in his/her communication (talk)
Don’ts
     6. Talk about confidential things and customers
     7. Disparage the enterprise, his/her manager/business unit, colleagues, client or future internal employer
     8. Use the same SN application than in private arena
     9. Share compromising content (photos, videos…)
     10. Confuse the professional space with the private one

tation, being recognized, increasing their When we consider the technology acceptance
employability, finding new opportunities and adoption research models (cited above i.e.
of mobility, etc. TAM, UTAUT…) in this study, several variables
explaining the intention of the generation Y to use
Through all results of this study, we find CSN applications are addressed such as:
almost all the functional building blocks of the
honeycomb framework of social media cited above 1. The perceived ease of use is cited when this
(see Figure 1). generation claims for a prior training and a
clear usage charter;

Table 6. Manager usage (α=0.85)

Dos
     7. Shorten the hierarchical distance (direct access, more trust, more empowerment, more democracy)
     8. Encourage and reward collaborators
     9. Provide a transversal competence
     10. Animate without imposing the participation
     11. Know how to interest others
     12. Lead by the example
Don’ts
     7. Think only of profitability and amortization (the yield)
     8. Control abusively the participation of collaborators
     9. Use it to assess their skills
     10. Observe without participating
     11. Compel people to use it
     12. Do not predict time for collaborators for that use

175

How Generation Y Perceives Social Networking Applications in Corporate Environments

2. The perceived usefulness seems more related service (participants cited e.g. speed, bugs free, ac-
to the personal benefit rather than the execu- cessibility, interoperability with other applications
tion of the professional activity; and devices (mobile ones), technical support…).
3. The motivation and habit are mentioned when In addition, a list of five guidelines, to favor the
they insist on the quality of the technology best adoption of these applications and make their
since they are already very familiar with usage effective, was formulated from this open
good quality technology in terms of HCI discussion through the participants’ statements:
and features (e.g. authoring, tagging, shar-
ing, connecting, voting, rating, commenting, 1. Making users aware of benefits of these
etc); applications by using good internal
4. The voluntariness of use is suggested by not communication.
to compel people to use these applications; 2. Forecasting an action plan for change man-
5. The effort expectancy is mentioned through agement including training of users and using
the time prediction for collaborators to use companionship techniques.
these applications; 3. Establishing a charter regulating the use of
6. The experience seems essential since this these applications.
generation ask for creating a mentoring 4. Identifying champions to manage “formally”
system for new employees; and sustain the use of these applications.
7. The image is mentioned several times 5. Creating a system of rewarding and rec-
through statements both for business and ognition to motivate participation and
for users. For generation Y, that use could contribution.
help for a better self-image and valorizing
his/her skills;
8. The computer self-efficacy refers to a person CONCLUSION AND PERSPECTIVES
judgment about his/her ability to use technol-
ogy. Here generation Y assumes a need of a In this chapter, we report on an exploratory study
prior training since its private use of social to understand how generation Y perceives CSN
media is not a guarantee for an optimized applications usage. It was based on qualitative
professional use. approach and discussed important adoption issues
to consider when implementing and using CSN
However, if we consider the DeLone and applications within a corporate environment.
McLean’ model of IS success (DeLone & McLean, Despite being exploratory, the results of this
1992-2003) (here the CSN applications deploy- study brought important insights toward answering
ment and use) only the open discussion was the addressed research questions. They enabled us
useful to get more statements and correlates to to provide important expectations and precautions
explain the intention to use the CSN applications to take into account by stakeholders for a best use,
and the satisfaction of the generation Y related compared to users, managers and the enterprise
to the quality of information (participants cited at whole according to a set of young people from
e.g. availability, accuracy, reliability, relevance, the generation Y.
updatedness…), quality of system (i.e. the CSN Our contribution is both theoretical and practi-
applications should of a good quality in terms of cal as we propose an empirical evidence to explain
HCI and features, participants cited e.g. compli- the acceptance and adoption of CSN applications.
ance with standards, customization, user friendly, The results should be of interest to academic
awareness, VoIP availability…) and quality of researchers in the MIS area, and practitioners

176

How Generation Y Perceives Social Networking Applications in Corporate Environments

interested in CSN applications deployment and variables. The research model will be based on the
usage. The research contributes to collaboration previous technology acceptance/adoption models
processes and technology, social networks and and theories.
online communities’ literature, theory and prac- In conclusion, this study could inspire other
tice through the development of first guidelines researchers in assessing new initiatives in the
to favor the best adoption of these applications social web era such as through open sourcing or
and make their usage effective. From a practical crowdsourcing online (open) communities.
viewpoint, these findings suggested by this study
may be useful to predict and explain variations in
the attitudes and actions of people from the genera- REFERENCES
tion Y toward using CSN applications in terms of
motivation, engagement, quality and continuance AIIM. (2009). Collaboration and enterprise
use. From a research viewpoint, this could justify 2.0 - Work-meets-play or the future of business?
the application of one of the adoption models or Retrieved from http://www.aiim.org/research/
the building of a new research model related to collaboration-enterprise20-research.aspx
that specific issue to provide evidence of proof Ajzen, I. (1991). The theory of planned behaviour.
of value and proof of use in the field. Organizational Behavior and Human Decision
Practitioners and researchers, however, should Processes, 50(2), 179–211. doi:10.1016/0749-
interpret these findings with caution, and regard 5978(91)90020-T
this study as preliminary, rather than definitive.
In fact, there are some limitations related to this Anderson, P. (2007). What is web 2.0? Ideas,
work. First, the study is limited by the amount of technologies and implications for education. JISC
knowledge the author has access to in terms of Technology and Standards Watch, 60(1), 64.
managerial literature. There are possibly other
Ballagas, R., Rohs, M., Sheridan, J. G., & Borch-
initiatives and case studies that can be related
ers, J. (2004). BYOD: Bring Your Own Device.
to issues discussed in this chapter. The second
Paper presented at the UbiComp 2004 Workshop,
limitation concerns possible bias in the sampling
Sixth International Conference on Ubiquitous
method. Our analysis is based on a set of statements
Computing. Nottingham, UK.
considered as relevant by a small – although sig-
nificant – sample of students but not practitioners. Bitner, M., Ostrom, A., Meuter, M., & Clancy,
The composition of this sample, in terms of users’ A. (2002). Implementing successful self-service
knowledge and usage of SN applications, depends technologies. Academy of Management Journal,
directly on the group of participants. Furthermore, 16(4).
the elicited statements resulted from only one
Bock, G.-O., Zmud, R. W., Kim, Y.-G., & Lee,
group of students in a particular cultural context
J.-N. (2005). Behavioral intention formation in
(participants have the same educational back-
knowledge sharing: Examining the roles of extrin-
ground and are mostly French by birth [79.16%]).
sic motivators, social-psychological factors and
Further field studies and explorations are
organizational climate. Management Information
required in other settings and cultural contexts
Systems (MIS). Quarterly, 29(1), 87–111.
to validate and expand the findings. In the near
future, a quantitative research using structural Boughzala, I. (2007). Ingénierie de la collabora-
equation modeling (SEM) will be launched to tion: Théories, technologies et pratiques. Paris,
analyze this social phenomenon by the theory and France: Hermès - Lavoisier.
validate the correlation between some acceptance

177

How Generation Y Perceives Social Networking Applications in Corporate Environments

Boughzala, I. (2010). Mise en perspective de Broadbridge, A., Maxwell, G., & Ogden, S.
l’e-collaboration comme outil de transformation (2009). Selling Retailing to Generation Y Gradu-
de l’organisation. HDR Sciences de Gestion, ates: Recruitment Challenges and Opportuni-
Université de Nantes. ties. International Review of Retail, Distribu-
tion and Consumer Research, 19(4), 405–420.
Boughzala, I. (2011). Collaboration 2.0 through
doi:10.1080/09593960903331394
the new organization transformation. In Knowl-
edge Management 2.0: Organizational Models and Chesbrough, H. W., & Appleyard, M. M. (2007).
Enterprise Strategies. Hershey, PA: IGI Global. Open innovation and strategy. California Manage-
doi:10.4018/978-1-61350-195-5.ch001 ment Review, 50(1), 57–77. doi:10.2307/41166416
Boughzala, I. (2012). Collaboration engineering: Coleman, D., & Levine, S. (2008). Collaboration
A contribution to its foundations through the 2.0 2.0: Technology and best practices for successful
era. Saarbrücken, Germany: Lambert Academic collaboration in a web 2.0 world. Happy About.
Publishing.
Constant, D., Keisler, S., & Sproull, L. (1994).
Boughzala, I., & Briggs, R. O. (2012). A value What’s mine is ours, or is it? A study of attitudes
frequency model of knowledge sharing: An ex- about information sharing. Information Systems
ploratory study on knowledge sharability in cross- Research (Informs), 5(4), 400–421. doi:10.1287/
organizational collaboration. Electronic Markets, isre.5.4.400
22(1), 9–19. doi:10.1007/s12525-011-0080-0
Consulting, F. (2006). Is Europe Ready for the
Boughzala, I., & Limayem, M. (2010). The Millennials? Innovate to meet the needs of the
new generation of Knowledge Management for emerging generation. Retrieved from http://www.
the Web 2.0 Age: KM 2.0. In Encyclopedia of ffpress.net/Kunden/XER/Downloads/XER87000/
E-Business Development and Management in XER87000.pdf
the Digital Economy. Hershey, PA: IGI Global.
Cramton, C. D. (2001). The mutual knowledge
doi:10.4018/978-1-61520-611-7.ch122
problem and its consequences for dispersed col-
Boyd, D., & Ellison, N. (2007). Social network laboration. Organization Science, 12(3), 346–371.
sites: Definition, history, and scholarship. Journal doi:10.1287/orsc.12.3.346.10098
of Computer-Mediated Communication, 13(1),
Crumpacker, M., & Crumpacker, J. (2007). Suc-
210–230. doi:10.1111/j.1083-6101.2007.00393.x
cession planning and generational stereotypes:
Bresman, H., Birkenshaw, J., & Nobel, R. (1999). Should HR consider age-based values and attitudes
Knowledge transfer in international acquisitions. a relevant factor or a passing fad? Public Person-
Journal of International Business Studies, 30(3), nel Management, 36(4), 349–369.
439–462. doi:10.1057/palgrave.jibs.8490078
Cummings, J. (2003). Knowledge sharing: A
Briggs, R. O., de Vreede, G. J., & Nunamaker, review of the literature. Washington, DC: World
J. F. Jr. (2003). Collaboration Engineering with Bank Operations Evaluation Department. Re-
ThinkLets to Pursue Sustained Success with trieved from http://ieg.worldbankgroup.org/Data/
Group Support Systems. Journal of Management reports/knowledge_eval_literature_review.pdf
Information Systems, 19(4), 31–64.
Davenport, T. H., & Prusak, L. (1998). Working
knowledge: How organizations manage what they
know. Harvard Business School Press.

178

How Generation Y Perceives Social Networking Applications in Corporate Environments

Davis, F. (1989). Perceived usefulness, perceived Grady, B. (2008). Corporate America embraces
ease of use and user acceptance of information social networking. Information and Learning
technology. Management Information Systems Company.
Quarterly, 13(3), 318–340. doi:10.2307/249008
Gunnarsson, M. (2012). BYOB (Bring Your Own
de Vreede, G. J., Briggs, R., & Massey, A. (2009). Behavior) is a Driving Factor in the Adoption
Collaboration Engineering: Foundations and of Enterprise Mobility Applications. Retrieved
Opportunities. Journal of the Association for from http://blogs.ifsworld.com/2012/10/byob-
Information Systems, 10(3), 121–137. bring-your-own-behavior-is-a-driving-factor-in-
the-adoption-of-enterprise-mobility-applications/
Deal, J., Altman, J., David, G., & Rogelberg,
S. (2010). Millennials at work: What we know Hershatter, A., & Epstein, M. (2010). Millenni-
and what we need to do (if anything). Journal als and the world of work: An organization and
of Business and Psychology, 25(2), 191–199. management perspective. Journal of Business
doi:10.1007/s10869-010-9177-2 and Psychology, 25(2), 211–223. doi:10.1007/
s10869-010-9160-y
DeLone, W. H., & MacLean, E. R. (1992). Informa-
tion systems success: The quest for the dependent Howe, J. (2006). The rise of crowdsourcing: A
variable. Information Systems Research, 3(1), definition. Wired, 14.
60–95. doi:10.1287/isre.3.1.60
Kaplan, A. M., & Haenlein, M. (2010). Users of
DeLone, W. H., & McLean, E. R. (2003). The the world, unite! The challenges and opportunities
DeLone and McLean model of information of Social Media. Business Horizons, 53(1), 59–68.
systems success: A ten-year update. Journal of doi:10.1016/j.bushor.2009.09.003
Management Information Systems, 19(4), 9–30.
Keil, M., Tiwana, A., & Bush, A. (2002). Recon-
Dudezert, A., Boughzala, I., & Mounoud, E. ciling user and project manager perceptions of IT
(2009). Comment intégrer la génération Millen- project risk: A Delphi study. Information Systems
nials à l’entreprise? Management: Enjeux de Journal, 12(2), 103–119. doi:10.1046/j.1365-
demain (pp. 323–334). Paris: Vuibert. 2575.2002.00121.x
Editorial, A. (1993). Adverting Age. Midwest Kietzmann, J. H., Hermkens, K., McCarthy, I.
Region, 64(36), 16. P., & Silvestre, B. S. (2011). Social Media? Get
Serious! Understanding the functional building
Fishbein, M., & Ajzen, I. (1975). Belief, attitude,
blocks of Social Media. Business Horizons, 54(3),
intention and behavior: An introduction to theory
241–251. doi:10.1016/j.bushor.2011.01.005
and research. Reading, MA: Addison-Wesley.
Kim, W., Jeong, O.-R., & Lee, S.-W. (2010). On
Fjermestad, J., & Hiltz, S. R. (1999). An assess-
social websites. Information Systems Journal,
ment of group support systems experimental
35(2), 215–236. doi:10.1016/j.is.2009.08.003
research: Methodology and results. Journal of
Management Information Systems, 15(3), 7–150. Kowske, B., Rasch, R., & Wiley, J. (2010). Mil-
lennials’ (lack of) attitude problem: An empiri-
Gorman, P., Nelson, T., & Glassman, A. (2004).
cal examination of generational effects on work
The millenial generation: A strategic opportunity.
attitudes. Journal of Business and Psychology,
Organizational Analysis, 12(3), 255–270.
25(2), 265–279. doi:10.1007/s10869-010-9171-8

179

How Generation Y Perceives Social Networking Applications in Corporate Environments

Malone, T. W., Laubacher, R., & Dellarocas, C. Smith, J., & Duin, A. (1994). Collective intel-
(2009). Harnessing crowds: Mapping the genome ligence in computer-based collaboration. L.
of collective intelligence (Working Paper No. Erlbaum Asso. Publishers.
2009-001). MIT Center for Collective Intelligence.
Venkatesh, V., & Bala, H. (2008). Technology
McAfee, A. P. (2006). Enterprise 2.0: The Dawn Acceptance Model 3 and a Research Agenda on
of Emergent Collaboration. Sloan Management Interventions. Decision Sciences, 39(2), 273–315.
Review, 47(3), 21–28. doi:10.1111/j.1540-5915.2008.00192.x
O’Reilly, T. (2005). What Is Web 2.0 Design Pat- Venkatesh, V., & Davis, F. D. (2000). A Theo-
terns and Business Models for the Next Generation retical Extension of the Technology Acceptance
of Software. Retrieved from http://oreilly.com/ Model: Four Longitudinal Field Studies. Man-
web2/archive/what-is-web-20.html agement Science, 46(2), 186–204. doi:10.1287/
mnsc.46.2.186.11926
Parasuraman, A. (2000). Technology Readi-
ness Index (TRI), a multiple-item scale to mea- Venkatesh, V., Morris, M. G., Davis, G. B., & Da-
sure readiness to embrace new technologies. vis, F. D. (2003). User Acceptance of Information
Journal of Service Research, 2(4), 307–320. Technology: Toward a unified view. Management
doi:10.1177/109467050024001 Information Systems (MIS). Quarterly, 27(3),
425–478.
Rheingold, H. (1993). The virtual community:
Homesteading on the electronic frontier. Reading, Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012).
MA: Addison-Wesley. Consumer acceptance and use of information tech-
nology: Extending the unified theory of acceptance
Richter, A., & Koch, M. (2008). Functions on
and use of technology. Management Information
Social Networking Services. In Proceedings of
Systems (MIS). Quarterly, 36(1), 157–178.
8th International Conference on the Design of
Cooperative Systems. Academic Press.
Richter, A., & Riemer, K. (2009). Corporate Social
KEY TERMS AND DEFINITIONS
Networking Sites – Modes of Use and Appropria-
tion through Co-Evolution. Paper presented at Collective Intelligence: Refers to knowledge
the 20th Australasian Conference on Information created from human interactions and interpersonal
Systems. Melbourne, Australia. networking.
Schmidt, R., Lyytinen, K., Keil, M., & Cule, P. Corporate Social Networking: The use of so-
(2001). Identifying software project risks: An cial networking applications at the corporate level.
international delphi study. Journal of Management Enterprise 2.0 or Enterprise Social Soft-
Information Systems, 17(4), 5–36. ware: The use of Web 2.0, emergent social
software platforms within companies, or between
SelectMinds. (2008). Corporate Social Network- companies and their partners or customers.
ing: SelectMinds Benchmarking Study. Retrieved Generation Y: A new generation of younger,
from www.selectminds.com college- and university-educated workers born
Sena, J., & Sena, M. (2008). Corporate social between 1980 and 2000 and grown up with the
networking. Issues in Information Systems, 9(2), Internet, also known as Gen Y, Yers, Digital Na-
227–231. tives, Net Generation or Millennials.

180

How Generation Y Perceives Social Networking Applications in Corporate Environments

Online Community: A virtual community


that exists online and whose members enable its
existence through taking part in membership ritual.
Social Network: A social structure made up
of a set of social actors (such as individuals or
organizations) and a complex set of the dyadic
ties between these actors.
Technology Adoption: To which extent an
organization adopts a new technology and to
which extent users are willing to accept using a
new technology.
Web 2.0: The second generation of web de-
velopment and design based on social software
– also called Social Media.

181

View publication stats

Вам также может понравиться