Informational Cascades in IT Adoption

advertisement
PAYOFF EXTERNALITIES, INFORMATIONAL CASCADES
AND MANAGERIAL INCENTIVES:
A THEORETICAL FRAMEWORK FOR IT ADOPTION HERDING
Robert J. Kauffman
Professor and Chair, Information and Decision Sciences
Co-Director, MIS Research Center
Carlson School of Management
University of Minnesota
Minneapolis, MN 55455
Email: rkauffman@csom.umn.edu
Xiaotong Li
Assistant Professor of Management Information Systems
Department of Accounting and MIS
University of Alabama, Huntsville
Huntsville, AL 35899
Email: lixi@uah.edu
Last revised: May 11, 2003
______________________________________________________________________________
ABSTRACT
We have recently observed herd behavior in many instances of information technology (IT)
adoption. This study examines the basis for IT adoption herding generated by corporate
decisionmakers’ investment decisions. We propose rational herding theory as a new perspective
from which some of the dynamics of IT adoption can be systematically analyzed and understood.
We also investigate the roles of payoff externalities, asymmetric information, conversational
learning and managerial incentives in IT adoption herding. By constructing a synthesis of the
critical drivers influencing managers’ IT investment decisions, this study will help business
researchers and practitioners to critically address the issues of information asymmetries and
incentive incompatibility in firm- and market-level IT adoption.
Keywords: Agency problem, asymmetric information, herd behavior, incentives, informational
cascades, IT adoption, network externalities, reputations, signaling games.
______________________________________________________________________________
Acknowledgements: The authors wish to acknowledge Yoris Au for helpful discussions on
related work.
______________________________________________________________________________
INTRODUCTION 1
In the recent years, there have been many instances of information technology (IT) adoption
in which we have observed “herd behavior,” as many investment decisionmakers lost touch with
their own cautious value-maximizing approaches to investment decisionmaking, and decided to
follow the advice of the many “smart cookies” in the Digital Economy. “Herd behavior,” such as
we saw during the height of the DotCom days arises in the presence of differences in the
information endowments of decisionmakers in different organizations.
Bikchandani and Sharma (2001, pp. 280-281) define herd behavior in terms of three related
aspects: (1) the actions and assessments of investors who decide early will be critical to the way
the majority will decide; (2) investors may herd on the wrong decision; and, (3) if they do make
the wrong decision, then experience or new information may cause them to reverse their
decisions, and a herd will be created in the opposite direction. Examples that we have observed
1
The above cartoon was originally published by the New Yorker Magazine in 1972 and is reproduced from
Bikhchandani, S., Hirshleifer, D., and Welch, I. (1996), “Informational Cascades and Rational Herding: An
Annotated Bibliography,” Working Paper, Anderson Graduate School of Management, University of California, Los
Angeles; Fisher College of Management, Ohio State University; and School of Management, Yale University.
Available on the Internet at welch.som.yale.edu/cascades/.
1
include the adoption of price-discriminating electronic auctions, wireless telecommunications
technologies, business-to-business electronic market solutions, and enterprise systems software,
among others. In other instances, however, considerable inertia seems to have stalled market
adoption, as senior managers ask: “Should we wait?” (Au and Kauffman, 2001). Examples
include the slow growth of electronic bill payment and presentment technologies and only
modest adoption of powerful Internet-based corporate travel reservation systems.
Herd behavior has long been studied in other fields, including Finance, Biology, Sociology
and Psychology, and especially Economics, where the literature has reached an exceptional depth
of coverage of the issues (Bikhchandani, Hirshleifer and Welch, 1996). In some cases, such as
stock market bubbles or the Internet and DotCom mania, herding is driven—in the words of
Federal Reserve Bank Chairman, Alan Greenspan—by people’s “irrational exuberance.”
Unfortunately, this can be exploited by other rational people in the economy, as Liebowitz
(2002) and Schiller (2000) point out. However, recent theoretical and empirical studies suggest
that in many other cases herd behavior is rather counterintuitively caused by the decisions of
perfectly rational people. Unfortunately, such rational decisions at the individual level
sometimes result in significant problems with information transmission, due to people’s
unwillingness to pass on information that does not match other information which they have
decided to herd on, and the associated welfare losses that arise for others in the marketplace and
the economy.
In the context of IT adoption, rational herding has the potential to generate several problems.
First, valuable information about new technologies is most often lost (or at least poorly
aggregated) when IT managers blindly follow the adoption decisions of others. Second, payoff
externalities-driven herding makes early adopters’ decisions disproportionately important. It
2
gives other adopters little chance to compare and experience different technologies. Third,
managers sometimes intentionally imitate others’ adoption decisions because of their career
concerns, and those reputation-motivated decisions usually fail to maximize expected IT
investment payoffs.
The widespread mimicry in IT adoption and the resultant inefficiencies motivate us to
investigate the basis for technology adoption herding generated by corporate managers’
decisions. A common and well-studied justification for IT adoption herding is positive payoff
externalities like network externalities. Recent studies have indicated that many technology
markets are subject to positive network feedback that makes the leading technology grow more
dominant (Brynjolfsson and Kemerer, 1996; Gallaugher and Wang, 2002; Kauffman,
McAndrews and Wang, 2000). Because positive network feedback makes a company’s IT
adoption return rise as more companies adopt the same technology, it usually gives managers
strong incentives to adopt the technology with the larger installed base of users. In addition to
the studies of positive payoff externalities, recent research in the area of information economics
demonstrates how rational herd behavior may arise because of “informational cascades”
(Banerjee 1992; Bikhchandani, Hirshleifer and Welch, 1992 and 1998) or managers’ career
concerns (Scharfstein and Stein, 1990; Zwiebel, 1995).
Informational cascades occur when individuals ignore their own private information and
instead mimic the actions of previous decisionmakers. Those mimetic strategies are rational
when private information is swamped by publicly observable information accumulated over
time. This is why informational cascading is sometimes referred to as “statistical herding”
(Banerjee, 1992; Ottaviani and Sorensen, 2000). Like informational cascade models, career
concerns models have information economics and Bayesian games as their theoretical
3
foundations, but they distinguish themselves by examining rational investment herding through
the lens of agency theory (Holmström, 1999). The primary implication of those models is that
managers concerned about their reputations may imitate others’ investment decisions to
positively influence others’ inferences of their professional capabilities. Although reputational
herding decisions are rational for individual managers, they are usually not in the best interests of
those companies who hire their managers to maximize investment payoffs.
Empirical evidence of herd behavior and imitative strategies has been recently documented in
financial investment decisionmaking, stock analysts’ equity recommendations, emerging
technology adoption and television programming selection (Hong, Kubik and Solomon, 2000;
Hong, Kubik and Stein, 2003; Kennedy, 2002; Walden and Browne, 2002; Welch, 2000). There
is also extensive experimental evidence of rational herding and informational cascades in the
economics literature (Anderson and Holt, 1996 and 1997; Hung and Plott, 2001). Another recent
experimental study of behavioral conformity is by Tingling and Parent (2002), who employ
senior IT and business decisionmakers instead of college students are used as subjects.
Despite the fast-growing rational herding literature and the pervasiveness of imitative
behavior in IT adoption, systematic studies of IT adoption herding are still rare in the IS
literature. By synthesizing previous rational herding models, this paper proposes an integrated
research framework based on economic theory, and within which the dynamics of IT adoption
herding can be better analyzed and understood. The next three sections discuss the underlying
theories in greater detail. We investigate the relationship between payoff externalities and IT
adoption herding in Section 2. We next demonstrate in Section 3 how the vagaries of information
transmission and observational learning can lead to information cascades in technology
investment.
4
The problem of managerial incentives in IT investment and adoption decisionmaking is the
focus of Section 4. We discuss why agency problems predispose the market to reputational
herding in IT adoption. Managerial compensation schemes designed to address those incentive
issues are also discussed. Section 5 provides a synthesis of critical theoretical drivers of IT
adoption herding and brings the ideas together into a single integrative framework. We provide
preliminary thoughts about why stakeholders to IT adoption at different levels (e.g., business
process or firm-level investor/decisionmaker, senior executive or member of the board of
directors, industry sector promoters or regulators of the economy) may have distinctly different
perspectives about , and briefly discusses its potential application. Section 6 concludes the paper
with the contributions of this work to ongoing research in IS, and ideas for further research.
PAYOFF EXTERNALITIES: DOES ADOPTION HERDING PAY OR HURT?
One of a number of different types of payoff externalities that is commonly observed in the
IT market is “network externalities” (Economides, 1996; Katz and Shapiro, 1994; Shapiro and
Varian, 1999). Network externalities are sometimes referred to as demand-side economies of
scale. ( For additional constructs related this area of theory, see Table 1.)
5
Table 1. Key Constructs in the Payoff Externalities Theory Relative to IT Adoption
CONSTRUCT
Rational IT
adoption
herding
Network
externalities
Intrinsic and
extrinsic
network
externalities
Installed base
Path
dependencies
Tipping
equilibrium
DEFINITION
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
COMMENTS
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
They stem from the presence of significant technology switching costs and the benefits
associated with a large installed base of users of compatible technologies. These and other
relevant findings that characterize the Economics literature on network effects and technology
switching costs was recently surveyed by Farrell and Klemperer (2001). In the context of IT
adoption, network externalities tend to reward herding decisions by increasing the payoffs to IT
adopters who associate themselves with the majority. They also decrease the risks that an IT
adopter will be stranded in its adoption of an IT that has too small an installed base of users.
In technology markets subject to network externalities, IT diffusion processes are often
characterized by path dependencies. They represent the situational specifics of irreversible
6
managerial decisions and their impacts on the decisions of others. Many managers believe that
network externalities and technology switching costs work in tandem to justify imitative
technology adoption. In some cases, strong network effects create a “tippy” technology market
in which one technology very quickly emerges as the dominant product because of massive
adoption imitation. Under such a winner-take-all tipping equilibrium scenario, the question most
managers face is when to jump on the bandwagon, and whether to join the herd.
Although herd behavior driven by positive network feedback can be easily justified by
individual rationality, it usually leads to obvious information and welfare loss. Companies make
their IT adoption decisions mainly based on the installed user bases of competing technologies.
Consequently, managers do not concentrate on the intrinsic merits and suitableness of competing
technologies, and under many circumstances they do not even have enough time to compare all
available technology choices because the technology competition could end very quickly in favor
of a technology.
So does network externality-driven IT adoption herding pay off? Or does it hurt those firms
that adopt this way? At the individual level, each decisionmaker gains by joining the herd and
taking advantage of the positive network feedback. However, most decisionmakers lose a
chance to deliberate the associated opportunities. Very often, as some have claimed for the VHS
video format winning out over the Sony Beta format (Shapiro and Varian, 1999), the market may
end up adopting an inferior technology, which will hurt all adopters in the long run.
Payoff externalities, as a stand-alone justification for rational IT adoption herding, has its
limitations. Strong network externalities may not be so pervasive in the technology market as
many IT and business strategists expected (e.g., see Liebowitz, 2002). As a result, imitative
technology adoption strategies driven by those illusive network effects are not even individually
7
rational. Moreover, technology managers sometimes choose to adopt emerging technologies
with superior performance instead of imitating others by using the dominant technology.
Clearly, there is a tradeoff between the future potentials of superior new technologies and the
network benefits of current technologies. Adoption herding may not persist or even exist if some
firms find that the benefits of exploring new technologies outweigh those of exploiting the
dominant technology with network benefits (Lee, Lee and Lee, 2003).
It is also worth noting that payoff externalities can be either positive or negative.
Unsurprisingly, negative payoff externalities play an important role in mitigating a technology
market’s propensity to adoption herding. They are commonly seen in most competitive business
environments where downward-sloping demand curves make a company’s IT adoption payoffs
decrease as more companies adopt the same technology. Therefore, companies imitate others’
IT investment decisions may be punished by intense ex post competition in the downstream
market. Both the fiber cable network glut and the e-commerce gold rush exemplify how severely
IT adoption herding may have been penalized by negative payoff externalities. Interestingly,
adoption herding sometimes still happens in those situations where negative payoff externalities
are evidently present (Kennedy, 2002; Khanna, 1998). Because of these limitations for payoff
externalities as a justification for rational adoption herding, we need to investigate other
theoretical explanations of firm-level herd behavior in IT adoption.
INFORMATIONAL CASCADES: TOO MUCH OR TOO LITTLE INFORMATION?
The theory of payoff externalities-driven adoption herding does not sufficiently emphasize
two important features that are present in IT diffusion. The first feature is that information
asymmetries and information incompleteness are pervasive in emerging technology markets.
8
Different decisionmakers have their own judgments about the business value of a new
technology based upon their own private information, and generally no one possesses perfect
information in making an individual IT adoption decision. These information structure problems
lead to the second feature: to improve the quality of their decisions, decisionmakers keep trying
to learn valuable information by observing others’ IT adoption decisions. For those who make
their adoption decisions earlier, their actions may reveal their private information to others,
which generates information spillovers. These are often referred to as information externalities
(Zhang, 1997). (See Table 2 for constructs related to information cascades-driven herding.)
Table 2. Key Constructs in the Informational Cascades Theory Relative to IT Adoption
CONSTRUCT
Information
asymmetry
Information
completeness
Information
spillover
Informational
cascade
Observational
learning
Word-ofmouth learning
DEFINITION
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
COMMENTS
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
9
Although observational learning can facilitate information conveyance, it also can result in
an informational cascade in which most people adopt the same technology independent of their
own private information. Similar to the decisionmaking process that appears to be operative in
the judicial body depicted in the cartoon in the Introduction to this article, the reason why
informational cascades occur with IT adoption is because the information revealed through
others’ adoption actions may have accumulated enough to overwhelm a decisionmaker’s
imprecise private information (Banerjee, 1992; Bikhchandani, Hirshleifer and Welch, 1992).
The opinions of Supreme Court justices, just like the opinions that expressed in a marketplace in
which buyers make IT adoption decisions, carry substantial weight with others. In this kind of
situation (even with a single Supreme Court justice), the decisionmaker’s action may not depend
on his private information. As a result, such decisions actually become incrementally
uninformative to others. In fact, it may cause others to rationally disregard their own
information and imitate the prevailing adoption decision. The outcome is that the valuable
private information of individuals will be lost in such an informational cascade, which
simultaneously reduces efficiency because of poor information aggregation in the market. So if
informational cascades occur in the technology market, we are likely to observe inefficient
outcomes. Some of the things that we frequently observes include IT overbuilding and systems
over-investment, and the massive adoption of inferior and poorly understood new technologies.
A related intriguing question is whether informational cascades result from too little or too
much information. And, how much information is enough? Corporate decisionmakers
frequently struggle with too little information to make sound IT investment decisions. That is
why they want to gather valuable information from observing other’s adoption actions, and not
be too sure about when to apply a stopping rule and decide on their own. Paradoxically, once
10
they engage in observational learning, they may get too much accumulated information, to the
extent that it may be strong enough to swamp their private information. As a consequence, an
informational cascade will occur and most people will imitate early adopters’ decisions that are
rather unfortunately based upon limited information.
As two possible mechanisms that cause rational IT adoption herding, informational cascades
and network externalities are not mutually exclusive; in fact, they sometimes can be mutually
reinforcing (Li, 2003). Informational cascades are generally fragile because they can be stopped
or reversed by enough newly-arrived information. For example, many companies will be
observed to adopt Technology A over Technology B in a herd when their private information is
dominated in an informational cascade, even though everyone knows that the valuable
information contained in such a cascade is limited. If some credible information is revealed (by
governments or other authoritative agencies, for example) to support Technology B, the adoption
cascade can be quickly stopped or reversed. However, informational cascades are far more
resilient in the presence of network externalities. Once adoption cascades form, they will be
reinforced by later IT adopters who intentionally jump on board to reap the benefits of positive
network feedback. The interactive dynamics between the two herding mechanisms have recently
been studied by Choi (1997), Hung and Plott (2001) and Li (2003).
The strength of informational cascade theory as an explanation for rational IT adoption
herding is its emphasis on social learning under information asymmetries. However, social
learning can sometimes mitigate a market’s propensity to be influenced by informational
cascades. Most informational cascade models assume that decisionmakers can only infer
information from observing others’ actions. This assumption exacerbates the information
aggregation problem of rational herding. In a simple world where every decisionmaker
11
truthfully tells public his private information, no valuable private information will be lost and the
information aggregation problem disappears. In fact, prior innovation diffusion studies have
recognized the significant role played by word-of-mouth learning in affecting technology
diffusion, as noted by Rogers (1995).
Nevertheless, the effectiveness of conversational information sharing in preventing
informational cascades should not be overestimated. The major obstacle for effective word-ofmouth learning under many IT adoption scenarios is that each individual decisionmaker’s
incentive for truthful information revelation. Potential adopters can benefit from talking with
early adopters if what they are told is credible, but who can guarantee the truthfulness of the socalled “cheap talk” (Crawford and Sobel, 1982; Farrell and Rabin, 1996)? In competitive
business environments where most IT adoptions occur, individuals may have strong incentives to
misinform others through strategic lying or signal jamming, as pointed out by Crawford (2003)
and Fudenberg and Tirole (1986). That’s why most researchers who believe that “actions speak
louder than words” emphasize observational learning and downplay conversational learning in
their informational cascade models.
At the market level, informational cascades are more likely to occur when the incentive
problems associated with information revelation block credible conversations. At the firm level,
decisionmakers’ incentives sometimes cause agency problems that provide another explanation
for rational IT adoption herding.
MANAGERIAL INCENTIVES IN ADOPTION: PROFITS OR REPUTATION?
Since a herd involves a group of decisionmakers, it is natural for researchers to concentrate
on understanding the market-level interactive dynamics, such as payoff and information
12
externalities. However, significant developments in agency and incentive theory (Laffont and
Martimort, 2002) over the last three decades have nourished a stream of research on rational
herding that explores the role of managerial incentives in fostering investment herding. (See
Table 3 for definitions of reputational herding and incentive compatibility, two key constructs
that figure importantly in the managerial incentives theory literature.)
Table 3. Key Constructs in the Informational Cascades Theory Relative to IT Adoption
CONSTRUCT
Reputational
herding
Incentive
compatibility
DEFINITION
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
COMMENTS
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxx
Traditional capital budgeting theory suggests that profit-maximizing companies primarily
look at the expected investment payoffs when they make their IT adoption decisions. However,
corporate managers hired by a company’s owners or shareholders may have incentives to deviate
from the company’s goals and to pursue their own interests when they make their IT adoption
decisions. The conflicts of interest, coupled with information incompleteness, can lead to many
inefficient outcomes. Some of these are frequently referred to as market-for-lemons problems,
adverse selection or moral hazard.
In a seminal paper in Economics, Holmström (1999) showed that reputation-concerned
managers are very likely to make inefficient investment decisions in the absence of effective
mechanisms to align their own interests with those of their companies. In some cases where
managerial incentive problems are present, managers may herd solely for reputational purposes
in investment decisionmaking. In the influential reputational herding model presented by
13
Scharfstein and Stein (1990), the authors make the case that managers tend to intentionally
imitate others’ investment decisions. Intentional herding comes from the belief that managers
do not wish to run the risk to be associated with those who are not identified as being in the
highly-talented group. In a more specific context, reputation and career concerns are found to
be important in promoting security analysts’ herd behavior commonly seen in their stock
recommendations or earning forecasts (Graham, 1999; Hong, Kubik and Solomon, 2000).
We believe that reputational herding theory has its distinctive advantages in helping us to
understand IT adoption herding. Like other important corporate investment decisions, IT
adoption decisions are usually made by senior managers. Because their adoption decisions are
not immune to agency and incentive problems, they will imitate others’ decisions to enhance
their professional reputations if the situation warrants. But unlike most other investment
decisions, IT adoption decisions—especially strategic IT adoption decisions—are more
susceptible to reputational herding. This is not because a good decisionmaking reputation is
more valuable to IT managers like CIOs than to other mangers. Instead, it is because the
informational problems are usually more severe. Under many IT adoption scenarios, managers
have to make their IT adoption decisions quickly with very limited information. Because IT
adoptions are highly specialized tasks that involve a lot of technical details, there are also
significant information asymmetries between the decisionsmakers (IT managers) and their
supervisors (the firms’s owners or board). Furthermore, the economic payoffs of many IT
investments are notoriously difficult to observe or measure in the short run, which gives
managers more room reputational gain at the expense of their companies.
Most reputational herding studies use signaling (or signal jamming) games in which
managers try to positively influence their supervisors’ and the labor market’s posterior beliefs on
14
their capabilities and reputations through their investment decisions. Because firms’ owners or
the labor market usually lack concrete evidence to indicate whether an individual IT project will
be successful or unsuccessful in the short run, IT managers’ professional reputations will heavily
depend on the market consensus that is reached by peer managers or short-term reactions in the
stock market. As a result, IT managers that are concerned with their reputations are more likely
to exhibit herd behavior in their IT adoption decisions than those who are not.
Furthermore, when IT managers are concerned about their career prospects, then imitating
the IT adoption decisions of other will be fully rational, if doing so will result in a better
reputation. The potential inefficiency and welfare loss stem from the conflicting interests among
different parties. Therefore, the key to preventing inefficient reputational herding is to address
the issue of incentive compatibility. By offering managers appropriate compensation contracts,
firms can provide them with explicit incentives to maximize investment returns. Ideally, firms
should make their managers’ compensation contingent on the returns of their investment
projects, including those of IT managers who make decisions about IT project investments.
Two difficulties arise in the context of IT adoption, however. First, it is usually hard to
quantify IT investment payoffs, at least in the short run. Incentives from ambiguously designed
performance-based contracts are easily subjugated by the implicit incentives from managers’
career concerns. For example, compensation contracts based on short-term stock price could
actually exacerbate the efficiency loss caused by rational investment herding (Brandenburger and
Polak, 1996). Second, long-term performance-based compensation, like an option on stock, is
thought to be more effective in solving agency problems. However, many IT investments play
an instrumental role in strengthening companies’ long-term competitiveness. So the quality of
an IT manager’s decision, unlike a chief executive officer’s decision, generally will have less
15
impact on a firm’s overall performance. So long-term performance, when it is used as a basis for
compensation, must be significant enough to dominate a manager’s gains from reputation
building. However, this usually makes these compensation schemes very expensive to
implement. This problem deserves the attention of IS researchers, who should study how to
overcome these difficulties in designing optimal incentive contracts for managers who make IT
adoption decisions.
A SYNTHESIS OF CRITICAL DRIVERS IN ADOPTION HERDING
One of the primary determinants of the value of the body of theoretical knowledge that we
have proposed for explaining observed IT adoption phenomena is the extent to which we are able
to identify when its application becomes effective.
In this section of the paper, we provide the
basis for a framework that permits us to evaluate the applicability and the quality of the insights
that the theory offers for herding in different IT adoption settings. Our framework cuts the
alternative theoretical perspectives with levels of analysis that represent the possible stakeholders
in different IT adoption settings.
Framework Preliminaries
We need to address two issues in developing our theoretical framework for IT adoption
herding. First, almost all the rational herding models in the literature study investment herding
in generic investment settings. Although studying herd behavior in generic investments
increases the generality of results, it sometimes fails to capture the distinctive features of certain
types of investment like IT adoption. So our framework emphasizes the uniqueness of IT
investments to provide more in-depth and relevant analysis of adoption herding. Table 4 shows
how certain features of IT investments can increase the chances for rational investment herding
to occur. [Insert Table 4 here] Second, our integrated framework recognizes the difference and
16
relationships among the three explanations for rational investment herding. As one major goal of
our framework is to allow IT adoption herd behavior to be studied from appropriate theoretical
perspective, it is important for us to understand the strength and weakness of each explanation
under different IT adoption scenarios. We provide a comparison of the three theoretical
explanations for IT adoption herding in table 5. [Insert Table 5 here]
o 2nd paragraph: discussion of the stakeholder levels, motivation for that, what leverage
looking at IT adoption problems at these levels of analysis creates for insights, why
stakeholder level enable us to focus on different strategy perspectives relative to the
different herding related theories
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
17
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxx
An Evaluative Framework for Assessing Herding Theories of IT Adoption
□
3 paragraphs for this section
o 1st paragraph: introduce the framework with a brief couple sentences and then give
the table
o 2nd paragraph: explain the contrasts that the framework depicts, answer question
about why this framework provides a basis for figuring out which of the herding
behavior theories is the most appropriate to use in the interpretation of the observed
adoption phenomena in real world settings
o 3rd paragraph: explain the structure of a mini-case analysis in general terms using the
framework; provides an opportunity to tell reader how to think about our “results”—
how we will sell the quality of the framework dimensions in terms of the insights it
offers
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
18
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
19
Table 6. An Evaluative Framework for the Alternative IT Adoption Herding Theories
THEORETICAL
PERSPECTIVE
Payoff externalities
Informational
Cascades
Managerial
incentives
BUSINESS PROCESS
LEVEL/ IT
ADOPTER,
INVESTOR
Xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
Xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
Xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
FIRM LEVEL /
BOARD OF
DIRECTORS,
SENIOR MGMT
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
INDUSTRY SECTOR /
STANDARDS GROUP
ECONOMY LEVEL /
REGULATOR
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
20
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Four Applications of the Evaluative Framework for IT Adoption Herding Behavior
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
(1) Payoff Externalities-Focused IT Adoption: The Case of Wi-Fi Hotspot Adoption.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
21
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
(2) Informational Cascades-Influenced IT Adoption: ICQ and Microsoft Messenger.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
22
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
(3) Managerial Incentives-Influenced IT Adoption: Morgan/Reuters and Riskmetrics.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
23
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
(4) A Mixed Theoretical Interpretation: Micropayment Solutions on the Internet. xxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
24
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxx
Discussion
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxx
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
25
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
CONCLUSION
This study provides a new theoretical framework for rational IT adoption herding as basis for
understanding some observed forms of IT adoption and the related fundamentals of managerial
decisionmaking for IT investments. Herding, as a type of human imitative behavior, tends to
result rather naturally from an individual’s imperfect reasoning and cognitive capabilities with
respect to the costs, benefits and risks associated with an IT investment. Au and Kauffman
(2003) have argued that many inefficient IT adoption decisions can be attributed to the adopters’
bounded rationality. Thus, it will be helpful to explore some of the potential behavioral
justifications of observed investment decision herding under certain circumstances (Schiller,
1995). We also believe that the rational herding theory synthesized in our framework is likely to
be very useful in many settings where bounded rationality plays a significant role. In fact, many
problems associated with bounded rationality can be studied in fully rational models with
imperfect information and vice versa (Conlisk, 1996). By formally analyzing IT adoption
herding in a somewhat simplified rational world, we are able to pay attention to the relevant
information and incentive problems, without sacrificing the real world applicability of most of
the managerial insights that will be generated.
26
The reader should not interpret our exposition in this article as a basis for rationalizing the
herd behaviors that are commonly observed in IT investment decisionmaking. Nevertheless, our
rational herding framework suggests payoff externalities, informational cascades and managers’
career concerns as three interrelated explanations for the kinds of imitative decisionmaking
behaviors that are observed in IT adoption. We investigated network externalities, observational
learning and managerial incentives as critical drivers influencing managers’ IT investment
decisions. By doing so, we demonstrated the relevance and the importance of our proposed
framework to academic researchers, business strategists and IT investment managers. Instead of
introducing various rational herding models as standalone theories, instead we emphasized their
inherent relationships in an attempt to acquire more distinctive insights for IT adoption herding.
For example, we showed why an adoption herd is much more likely to form in a market for an
emerging technology market, where information asymmetries and network effects come into
play. We also demonstrated why reputational herding is more common in IT adoption processes
where agency problems are compounded by severe information problems.
This paper presents a research framework within which IT adoption herding can be
systematically studied. We believe that future studies within this framework will not only
enhance our understanding of herd behavior in IT investment, but also offer insights and
contributions to the rational herding literature in Economics. Most informational cascade models
downplay the importance of conversation and information sharing across firms because of the
credibility issue. However, word-of-mouth communications are usually very useful in IT
diffusion and social learning in general (Ellison and Fudenberg, 1995; Rogers 1995), and the
growing literature on “cheap talk” in Economics also sheds light on the effectiveness of
conversational learning in strategic interactions (Crawford and Sobel, 1982; Farrell and Rabin,
27
1996). So future studies that explore the role of conversation in IT adoption herding have the
potential to inform the herding literature by generalizing the prior informational cascade models.
Future studies of IT adoption herding can also provide additional insights related to the theory of
reputational herding. In most reputational herding models that we have seen to date, the
outcomes of managers’ investment decisions are observable ex post in a mechanistic manner. So
the labor market and firm owners can infer managers’ capabilities through Bayesian updating.
However, as we pointed out earlier, many IT projects are strategically instrumental to the firms
that invest in them, and yet their payoffs are hard to measure in the short run. This complicates
the inference process that leads to managerial decisions about IT investments, and thus requires
the extension of reputational herding models so that they will yield more useful insights in this
managerial context.
Finally, we believe that the framework proposed in our study can also make contributions to
the IS literature in some contexts other than IT adoption. For example, we frequently observe
herd behavior in IS curriculum design, research topic selection, consumer online shopping
patterns, IT firms’ advertising campaigns, R&D spending in developing certain kinds of
information systems, and so on. The applications are varied and interesting it turns out. Our
study suggests that IS researchers ought to pay close attention to a number of related issues when
they study a decisionmaker’s behavior in those contexts. The first issue is payoff
interdependence. It is important to try to figure out whether a decisionmaker’s decision will hurt
or benefit others who make the same decision. The second issue is information gathering
through learning. In this case, it is useful to understand whether a decisionmaker can learn
information from the similar decisions of others, and whether the information gathered is
credible. The third issue is the incentives of different stakeholders. Here, we want to know
28
whether there are conflicts of interest among the different stakeholders, and if so, whether a
specific decisionmaker will have sufficient incentive to pursue her own interests at the expenses
of other stakeholders. Our future research will take up some of these issues.
REFERENCES
[1] Anderson, L., and C. Holt (1996) “Classroom Games: Information Cascades,” Journal of
Economic Perspectives, 10, 4,187-193.
[2] Anderson, L., and C. Holt (1997) “Information Cascades in the Laboratory,” American
Economic Review, 87, 5, 847-862.
[3] Au, Y., and R. J. Kauffman, (2001) “Should We Wait? Network Externalities and
Electronic Billing Adoption,” Journal of Management Information Systems, 18, 2, 47-64.
[4] Au, Y., and R. J. Kauffman, (2003) “What Do You Know? Rational Expectations in IT
Adoption and Investment,” working paper, MIS Research Center, Carlson School of
Management, University of Minnesota, Minneapolis, MN.
[5] Banerjee, A, (1992), “A Simple Model of Herd Behavior,” Quarterly Journal of Economics
107, 3, 797-818.
[6] Bikhchandani, S., Hirshleifer, D. and Welch. I. (1992), “A Theory of Fads, Fashion,
Custom, and Cultural Change as Informational Cascades,” Journal of Political Economy,
100, 5, 992-1026.
[7] Bikhchandani, S., Hirshleifer, D., and Welch, I. (1996). “Informational Cascades and
Rational Herding: An Annotated Bibliography,” Working Paper, Anderson Graduate School
of Management, University of California, Los Angeles; Fisher College of Management,
Ohio State University; and School of Management, Yale University. Available on the
Internet at welch.som.yale.edu/cascades/.
[8] Bikhchandani, S., Hirshleifer, D. and Welch, I. (1998), “Learning from the Behavior of
Others: Conformity, Fads, and Informational Cascades,” Journal of Economic Perspectives
12, 3, 151-170.
[9] Brandenburger, A., and B. Polak (1996), “When Managers Cover Their Posteriors: Making
the Decisions the Market Wants to See,” Rand Journal of Economics, 27, 3, 523-541.
[10] Brynjolfsson, E., and C. Kemerer (1996), “Network Externalities in Microcomputer
Software: An Econometric Analysis of the Spreadsheet Market,” Management Science, 42,
12, 1627-47.
[11] Choi, J. P. (1997), “Herd Behavior, the “Penguin Effect,” and the Suppression of
Informational Diffusion: an Analysis of Informational Externalities and Payoff
Interdependency,” Rand Journal of Economics, 28, 3, 407-25.
[12] Conlisk, J. (1996), “Why Bounded Rationality?” Journal of Economic Literature, 34, 669700.
[13] Crawford, V., and J. Sobel (1982), “Strategic Information Transmission,” Econometrica, 50,
6, 1431-1451.
29
[14] Crawford, V. (2003), “Lying for Strategic Advantage: Rational and Boundedly Rational
Misrepresentation of Intentions,” American Economic Review, 93, 1, 133-149.
[15] Economides, N. (1996), “The Economics of Networks,” International Journal of Industrial
Organization, 16, 4, 673-699.
[16] Ellison, G., and D. Fudenberg (1995), “Word-of-Mouth Communication and Social
Learning,” Quarterly Journal of Economics, 110, 1, 93-125.
[17] Farrell, J., and M. Rabin (1996), “Cheap Talk,” Journal of Economic Perspectives, 10, 3,
103-118.
[18] Farrell, J., and P. Klemperer (2001), “Coordination and Lock-in: Competition with
Switching Costs and Network Effects,” Handbook of Industrial Organization, Volume 3,
North Holland: Amsterdam, Netherlands.
[19] Fudenberg, D., and J. Tirole (1986), “A Signal-jamming Theory of Predation”, Rand
Journal of Economics, 17, 3, 366-376.
[20] Gallaugher, J., and Y. Wang (2002), “Understanding Network Effects in Software Markets:
Evidence from Web Server Pricing”, MIS Quarterly, 26, 4, 303-327.
[21] Graham, J. (1999), “Herding Among Investment Newsletters: Theory and Evidence”,
Journal of Finance, 54, 1, 237-269.
[22] Holmström, B. (1999), “Managerial Incentive Problems: A Dynamic Perspective,” Review
of Economic Studies, 66, 1, 169–182.
[23] Hong, H., J. Kubik and A. Solomon (2000), “Security Analysts’ Career Concerns and
Herding of Earnings Forecasts,” Rand Journal of Economics, 31, 1, 121-44.
[24] Hong, H., J. Kubik and J. Stein (2003), “Social Interaction and Stock-Market Participation,”
Journal of Finance, forthcoming.
[25] Hung, A., and C. Plott (2001) “Information Cascades: Replication and an Extension to
Majority Rule and Conformity-Rewarding Institutions,” American Economic Review, 91, 5,
1508-20.
[26] Katz, M., and C. Shapiro (1994), “System Competition and Network Effects,” Journal of
Economic Perspectives, 8, 2, 93-115.
[27] Kauffman, R., McAndrews, J. and Y. Wang (2000), “Opening the “Black Box” of Network
Externalities in Network Adoption,” Information Systems Research, 11, 1, 61-82.
[28] Kennedy, R. (2002), “Strategy Fads and Competitive Convergence: An Empirical Test for
Herd Behavior in Primetime TV Programming,” The Journal of Industrial Economics, L, 1,
57-84.
[29] Khanna, N. (1998), “Optimal Contracting with Moral Hazard and Cascading,” Review of
Financial Studies, 11, 3, 559-596.
[30] Laffont, J., and D. Martimort (2002), The Theory of Incentives: The Principal-Agent Model,
Princeton University Press: Princeton, NJ.
[31] Lee, J., Lee, J., and H. Lee, (2003), “Exploration and Exploitation in the Presence of
Network Externalities,” Management Science, forthcoming.
[32] Li, X. (2003), “Informational Cascades in IT Adoption,” Communications of the ACM,
forthcoming.
30
[33] Liebowitz, S. (2002), Rethinking the Network Economy: The True Forces That Drive the
Digital Economy, Amacom Publishing: Saranac Lake, NY.
[34] Ottaviani, M., and P. Sorensen (2000), “Herd Behavior and Investment: Comment,”
American Economic Review, 90, 3, 695-704.
[35] Rogers, E. (1995), Diffusion of Innovations—4th Edition, Free Press: New York, NY.
[36] Scharfstein, D., and J. Stein (1990), “Herd Behavior and Investment,” American Economic
Review, 80, 3, 465-479.
[37] Schiller, R. (1995), “Rhetoric and Economic Behavior: Conversation, Information and Herd
Behavior,” American Economic Review, 85, 2, 181-185.
[38] Schiller, R. (2000), Irrational Exuberance, Princeton University Press: Princeton, NJ.
[39] Shapiro, C., and H. R. Varian (1999), Information Rules: A Strategic Guide to the Network
Economy, Harvard Business School Press: Cambridge, MA.
[40] Tingling, P., and M. Parent (2002), “Mimetic Isomorphism and Technology Evaluation:
Does Imitation Transcend Judgment?” Journal of the Association for Information Systems,
3, 113-143
[41] Walden, E. and G. Browne (2002), “Information Cascades in the Adoption of New
Technology,” in F. Miralles, J. Valor, and J. I. DeGross (Eds.), Proceedings of the TwentyThird International Conference on Information Systems, Barcelona, Spain, December 2002,
435-443.
[42] Welch, I. (2000), “Herding Among Security Analysts,” Journal of Financial Economics, 58,
369-96.
[43] Zhang, J. (1997), “Strategic Delay and the Onset of Investment Cascades,” Rand Journal of
Economics, 28, 1, 188-205.
[44] Zwiebel, J. (1995), “Corporate Conservatism and Relative Compensation,” Journal of
Political Economy, 103, 1, 1-25.
31
Table 4. Rational Herding in Generic Investments and IT Investments
Payoff Externalities
Driven Herding
Informational Cascades
(Statistical Herding)
Reputational Herding
Generic Investments
IT Investments
Investment herding may arise when
there are strategic
complementarities among investors
who make similar decisions.
However, negative externalities
may curb investment herding in
many competitive environments.
Decision-makers imitate others’
investment decisions when their
private information is overwhelmed
by the information acquired through
observational learning.
Many IT markets are subject to
network externalities, a type of positive
payoff externalities. Network effects
and significant IT switching costs are
the driving forces behind many
instances of IT adoption herding.
Instead of helping their companies
to maximize investment returns,
Managers imitate others’ decisions
to build their reputations and to
maximize their own human capital
returns.
Information incompleteness and
information asymmetries in the IT
market make observational learning
important for decision-makers, and
thus increase the possibility of an
informational cascade.
The financial returns of most IT
investments are hard to measure in the
short run, which creates more implicit
incentives for managers to engage in
investment herding when situations
warrant.
Table 5. A Comparison of Three Explanations for IT Adoption Herding
Network-effect-driven
Herding Models
Informational Cascade
Models
Reputational Herding
Models
Theoretical
Foundation
Payoff interdependency and
strategic complementarities
Information economics and
Bayesian learning
Aspects of
IT Adoption
emphasized
Model
Strength
IT switching costs, network
externalities and technology
compatibilities.
Many IT markets are
subject to network
feedback. These herding
models are generally more
intuitive and robust.
Model
Weakness
Hard to explain herding in
situations where network
externalities are weak or
negative payoff externalities
are strong.
Information externality and
social learning in IT
adoption
These models rigorously
demonstrate how herding
arise because of
Information asymmetries
and the associated learning
problems.
Simplified assumptions of
market information structure
and learning processes
make these models
unrealistic in some settings.
Information economics,
contracting and agency
theory
Managers’ implicit
incentives and career
concerns in IT adoption
These models show that
herding may be caused by
incentive problems, which
builds a bridge between the
agency theory and the
rational herding theory.
The conditions that lead to
herding are more complex
and less obvious. Most
models only deal with very
simple investment settings.
Download