References

Complete list of used/analyzed references. (MORE INFO)

ReferenceSourceISRI
(Agarwal & Prasad, 1998)Agarwal, R., & Prasad, J. (1998). A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology. Information Systems Research, 9(2) , 204-215.Used
(Ajzen, 1985)Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In Action control (pp. 11-39): Springer.Used
(Ajzen, 1991)Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749-5978(91)90020-TUsed
(Ajzen & Fishbein, 1980) Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, N.J.: Prentice-Hall.Used
(Almeida, 2002)Almeida, F. (2002). Organizações, pessoas e novas tecnologias. Coimbra: Quarteto Editora.Used
(Bandura, 1986)Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory: Prentice-Hall, Inc.Used
(Bandura, 2012)Bandura, A. (2012). Handbook of Theories of Social Psychology: Volume 1. In. London: SAGE Publications Ltd C1 - Social Cognitive Theory C2 - pages 349-374.Used
(Barki, Paré, & Sicotte, 2008)Barki, H., Paré, G., & Sicotte, C. (2008). Linking IT implementation and acceptance via the construct of psychological ownership of information technology. Journal of Information Technology, 23(4) , 269-280. doi:10.1057/jit.2008.12Used
(Barki, Titah, & Boffo, 2007)Barki, H., Titah, R., & Boffo, C. (2007). Information system use–related activity: an expanded behavioral conceptualization of individual-level information system use. Information Systems Research, 18 (2), 173-192.Used
(Barnett, Pearson, Pearson, & Kellermanns, 2015)Barnett, T., Pearson, A. W., Pearson, R., & Kellermanns, F. W. (2015). Five-factor model personality traits as predictors of perceived and actual usage of technology. European Journal of Information Systems, 24(4) , 374-390.Used
(Bhattacherjee & Lin, 2015)Bhattacherjee, A., & Lin, C. P. (2015). A unified model of IT continuance: three complementary perspectives and crossover effects. European Journal of Information Systems, 24(4), 364-373. doi:10.1057/ejis.2013.36Used
(Bock, Kankanhalli, & Sharma, 2006)Bock, G.-W., Kankanhalli, A., & Sharma, S. (2006). Are norms enough? The role of collaborative norms in promoting organizational knowledge seeking. European Journal of Information Systems, 15(4), 357-367. doi:10.1057/palgrave.ejis.3000630Used
(Bouwman & Van De Wijngaert, 2009)Bouwman, H., & Van De Wijngaert, L. (2009). Coppers context, and conjoints: A reassessment of TAM. Journal of Information Technology, 24(2), 186-201. doi:10.1057/jit.2008.36Used
(Bradley, Pridmore, & Byrd, 2006)Bradley, R. V., Pridmore, J. L., & Byrd, T. A. (2006). Information systems success in the context of different corporate cultural types: An empirical investigation. Journal of Management Information Systems, 23(2), 267-294. doi:10.2753/MIS0742-1222230211Used
(Brown, Dennis, & Venkatesh, 2010)Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of Management Information Systems, 27(2), 9-54.Used
(Brown, Massey, Montoya-Weiss, & Burkman, 2002)Brown, S. A., Massey, A. P., Montoya-Weiss, M. M., & Burkman, J. R. (2002). Do I really have to? User acceptance of mandated technology. European Journal of Information Systems, 11(4), 283-295. doi:10.1057/palgrave.ejis.3000438Used
(Carter & Belanger, 2005)Carter, L., & Belanger, F. (2005). The utilization of e-government services: citizen trust, innovation and acceptance factors. Information Systems Journal, 15(1), 5-25. doi:10.1111/j.1365-2575.2005.00183.xUsed
(Chan et al., 2011)Chan, F. K., Thong, J. Y., Venkatesh, V., Brown, S. A., Hu, P. J., & Tam, K. Y. (2011). Modeling citizen satisfaction with mandatory adoption of an e-government technology. Journal of the Association for Information Systems, 11(10), 519-549.Used
(Chandra, Srivastava, & Theng, 2012)Chandra, S., Srivastava, S. C., & Theng, Y. L. (2012). Cognitive Absorption and Trust for Workplace Collaboration in Virtual Worlds: An Information Processing Decision Making Perspective. Journal of the Association for Information Systems, 13(10), 797-835.Used
(Chau, 1996)Chau, P. Y. K. (1996). An Empirical Assessment of a Modified Technology Acceptance Model. Journal of Management Information Systems, 13 (2), 185-204.Used
(Chau & Hu, 2002)Chau, P. Y. K., & Hu, P. J. (2002). Examining a model of information technology acceptance by individual professionals: An exploratory study. Journal of Management Information Systems, 18 (4), 191-229. doi:10.1080/07421222.2002.11045699Used
(Cheng, 2011)Cheng, Y. M. (2011). Antecedents and consequences of e-learning acceptance. Information Systems Journal, 21 (3), 269-299. doi:10.1111/j.1365-2575.2010.00356.xUsed
(Chin, Johnson, & Schwarz, 2008)Chin, W. W., Johnson, N., & Schwarz, A. (2008). A fast form approach to measuring technology acceptance and other constructs. MIS Quarterly: Management Information Systems, 32(4), 687-703.Used
(Compeau & Higgins, 1995a)Compeau, D., & Higgins, C. (1995a). Application of social cognitive theory to training for computer skills. Information Systems Research, 6 (2), 118-143.Used
(Compeau & Higgins, 1995b)Compeau, D., & Higgins, C. (1995b). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly: Management Information Systems, 19(2), 189-210.Used
(Compeau, Higgins, & Huff, 1999)Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158. doi:10.2307/249749Used
(D'Ambra, Wilson, & Akter, 2013)D'Ambra, J., Wilson, C. S., & Akter, S. (2013). Application of the task-technology fit model to structure and evaluate the adoption of E-books by academics. Journal of the American Society for Information Science and Technology, 64 (1), 48-64. doi:10.1002/asi.22757Used
(Davis, 1986)Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. (PhD Thesis), Massachusetts Institute of Technology.Used
(Davis, Bagozzi, & Warshaw, 1989)Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35 (8), 982-1003.Used
(Davis, Bagozzi, & Warshaw, 1992)Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and Intrinsic Motivation to Use Computers in the Workplace. Journal of Applied Social Psychology, 22 (14), 1111-1132. doi:10.1111/j.1559-1816.1992.tb00945.xUsed
(DeLone & McLean, 1992)DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3 (1), 60-95.Used
(DeLone & McLean, 2003)DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19 (4) , 9-30.Used
(DeLone & McLean, 2016)DeLone, W. H., & McLean, E. R. (2016). Information Systems Success Measurement. Foundations and Trends in Information Systems, 2 (1), 1-116.Used
(Dickinger, Arami, & Meyer, 2008)Dickinger, A., Arami, M., & Meyer, D. (2008). The role of perceived enjoyment and social norm in the adoption of technology with network externalities. European Journal of Information Systems, 17 (1) , 4-11. doi:10.1057/palgrave.ejis.3000726Used
(Dinev, Goo, Hu, & Nam, 2009)Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: the role of national cultural differences. Information Systems Journal, 19 (4) , 391-412. doi:10.1111/j.1365-2575.2007.00289.xUsed
(Dinev & Hu, 2007)Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8 (7) , 386-408.Used
(Dishaw & Strong, 1999)Dishaw, M. T., & Strong, D. M. (1999). Extending the technology acceptance model with task-technology fit constructs. Information and Management, 36 (1), 9-21.Used
(Eckhardt, Laumer, & Weitzel, 2009)Eckhardt, A., Laumer, S., & Weitzel, T. (2009). Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption. Journal of Information Technology, 24 (1), 11-24.Used
(Fishbein & Ajzen, 1975)Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research: Addison-Wesley Pub. Co.Used
(Goodhue & Thompson, 1995)Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS Quarterly: Management Information Systems, 19(2), 213-233.Used
(Gupta, Dasgupta, & Gupta, 2008)Gupta, B., Dasgupta, S., & Gupta, A. (2008). Adoption of ICT in a government organization in a developing country: An empirical study. Journal of Strategic Information Systems, 17 (2), 140-154. doi:10.1016/j.jsis.2007.12.004Used
(Hong, Chan, Thong, Chasalow, & Dhillon, 2014)Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research. Information Systems Research, 25 (1), 111-136. doi:10.1287/isre.2013.0501Used
(Hong, Thong, Chasalow, & Dhillon, 2011)Hong, W., Thong, J. Y., Chasalow, L. C., & Dhillon, G. (2011). User acceptance of agile information systems: a model and empirical test. Journal of Management Information Systems, 28 (1), 235-272.Used
(Hong, Thong, Wong, & Tam, 2001)Hong, W., Thong, J. Y. L., Wong, W. M., & Tam, K. Y. (2001). Determinants of user acceptance of digital libraries: An empirical examination of individual differences and system characteristics. Journal of Management Information Systems, 18 (3), 97-124. doi:10.1080/07421222.2002.11045692Used
(Hsieh, Rai, & Keil, 2008)Hsieh, J. J. P.-A., Rai, A., & Keil, M. (2008). Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvantaged. MIS Quarterly, 32(1), 97-126.Used
(Hu, Chau, Liu Sheng, & Tam, 1999)Hu, P. J., Chau, P. Y. K., Liu Sheng, O. R., & Tam, K. Y. (1999). Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology. Journal of Management Information Systems, 16 (2), 91-112.Used
(Hwang, 2005)Hwang, Y. (2005). Investigating enterprise systems adoption: Uncertainty avoidance, intrinsic motivation, and the technology acceptance model. European Journal of Information Systems, 14 (2), 150-161. doi:10.1057/palgrave.ejis.3000532Used
(Igbaria, Parasuraman, & Baroudi, 1996)Igbaria, M., Parasuraman, S., & Baroudi, J. J. (1996). A Motivational Model of Microcomputer Usage. Journal of Management Information Systems, 13 (1), 127-143.Used
(Igbaria, Zinatelli, Cragg, & Cavaye, 1997)Igbaria, M., Zinatelli, N., Cragg, P., & Cavaye, A. L. M. (1997). Personal computing acceptance factors in small firms: A structural equation model. MIS Quarterly: Management Information Systems, 21(3), 279-301.Used
(Karahanna, Agarwal, & Angst, 2006)Karahanna, E., Agarwal, R., & Angst, C. M. (2006). Reconceptualizing compatibility beliefs in technology acceptance research. MIS Quarterly: Management Information Systems, 30(4), 781-804.Used
(Karahanna, Straub, & Chervany, 1999)Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs. MIS Quarterly, 23(2), 183-213. doi:10.2307/249751Used
(Karimi, Somers, & Gupta, 2004)Karimi, J., Somers, T. M., & Gupta, Y. P. (2004). Impact of environmental uncertainty and task characteristics on user satisfaction with data. Information Systems Research, 15 (2), 175-193.Used
(Kim, 2009)Kim, S. S. (2009). The integrative framework of technology use: an extension and test. MIS Quarterly, 33(3), 513-537.Used
(Komiak & Benbasat, 2006)Komiak, S. Y. X., & Benbasat, I. (2006). The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents. MIS Quarterly, 30(4), 941-960.Used
(Kositanurit, Ngwenyama, & Osei-Bryson, 2006)Kositanurit, B., Ngwenyama, O., & Osei-Bryson, K.-M. (2006). An exploration of factors that impact individual performance in an ERP environment: an analysis using multiple analytical techniques. European Journal of Information Systems, 15 (6), 556-568.Used
(Lai, Lai, & Lowry, 2016)Lai, V. S., Lai, F. J., & Lowry, P. B. (2016). Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China? Journal of Management Information Systems, 33 (4), 1209-1251. doi:10.1080/07421222.2016.1267534Used
(Lou, Luo, & Strong, 2000)Lou, H., Luo, W., & Strong, D. (2000). Perceived critical mass effect on groupware acceptance. European Journal of Information Systems, 9 (2), 91-103. doi:10.1057/palgrave.ejis.3000358Used
(J. Lu, Yao, & Yu, 2005)Lu, J., Yao, J. E., & Yu, C. S. (2005). Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology. Journal of Strategic Information Systems, 14 (3), 245-268. doi:10.1016/j.jsis.2005.07.003Used
(Y. B. Lu, Deng, & Wang, 2010)Lu, Y. B., Deng, Z. H., & Wang, B. (2010). Exploring factors affecting Chinese consumers' usage of short message service for personal communication. Information Systems Journal, 20 (2), 183-208. doi:10.1111/j.1365-2575.2008.00312.xUsed
(Maier, Laumer, Eckhardt, & Weitzel, 2013)Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2013). Analyzing the impact of HRIS implementations on HR personnel's job satisfaction and turnover intention. Journal of Strategic Information Systems, 22 (3), 193-207. doi:10.1016/j.jsis.2012.09.001Used
(Maruping, Bala, Venkatesh, & Brown, 2017)Maruping, L. M., Bala, H., Venkatesh, V., & Brown, S. A. (2017). Going beyond intention: Integrating behavioral expectation into the unified theory of acceptance and use of technology. Journal of the Association for Information Science and Technology, 68 (3), 623-637. doi:10.1002/asi.23699Used
(Mishra, Akman, & Mishra, 2014)Mishra, D., Akman, I., & Mishra, A. (2014). Theory of reasoned action application for green information technology acceptance. Computers in Human Behavior, 36, 29-40.Used
(Moore & Benbasat, 1991)Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.Used
(Neufeld, Dong, & Higgins, 2007)Neufeld, D. J., Dong, L., & Higgins, C. (2007). Charismatic leadership and user acceptance of information technology. European Journal of Information Systems, 16 (4), 494-510.Used
(Niehaves & Plattfaut, 2014)Niehaves, B., & Plattfaut, R. (2014). Internet adoption by the elderly: Employing IS technology acceptance theories for understanding the age-related digital divide. European Journal of Information Systems, 23 (6), 708-726. doi:10.1057/ejis.2013.19Used
(Oh, Ahn, & Kim, 2003)Oh, S., Ahn, J., & Kim, B. (2003). Adoption of broadband Internet in Korea: The role of experience in building attitudes. Journal of Information Technology, 18 (4), 267-280. doi:10.1080/0268396032000150807Used
(Oliveira & Martins, 2010)Oliveira, T., & Martins, M. F. (2010). Information technology adoption models at firm level: review of literature. Paper presented at the European Conference on Information Management and Evaluation.Used
(Parthasarathy & Bhattacherjee, 1998)Parthasarathy, M., & Bhattacherjee, A. (1998). Understanding post-adoption behavior in the context of online services. Information Systems Research, 9 (4), 362-379. doi:10.1287/isre.9.4.362Used
(Pavlou & Fygenson, 2006)Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly: Management Information Systems, 30(1), 115-143.Used
(Picoto, Bélanger, & Palma-Dos-Reis, 2014)Picoto, W. N., Bélanger, F., & Palma-Dos-Reis, A. (2014). An organizational perspective on m-business: Usage factors and value determination †. European Journal of Information Systems, 23 (5), 571-592. doi:10.1057/ejis.2014.15Used
(Plouffe, Hulland, & Vandenbosch, 2001)Plouffe, C. R., Hulland, J. S., & Vandenbosch, M. (2001). Research report: Richness versus parsimony in modeling technology adoption decisions-understanding merchant adoption of a smart card-based payment system. Information Systems Research, 12 (2), 208-222. doi:10.1287/isre.12.2.208.9697Used
(Rai, Lang, & Welker, 2002)Rai, A., Lang, S. S., & Welker, R. B. (2002). Assessing the validity of IS success models: An empirical test and theoretical analysis. Information Systems Research, 13(1), 50-69. doi:10.1287/isre.13.1.50.96Used
(Ramdani & Kawalek, 2007) Ramdani, B., & Kawalek, P. (2007). SME Adoption of Enterprise Systems in the Northwest of England. In Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda (pp. 409-429). Boston, MA: Springer US.Used
(Rogers, 1962)Rogers, E. M. (1962). Diffusion of innovations. New York: Free Press of Glencoe.Used
(Rogers, 1983)Rogers, E. M. (1983). Diffusion of innovations (Third Edition). New York: Free Press.Used
(Rogers, 1995)Rogers, E. M. (1995). Diffusion of Innovations (Fourth Edition). New York: Free Press.Used
(Rogers, 2003)Rogers, E. M. (2003). Diffusion of Innovations (Fifth Edition). New York: Free Press.Used
(Sarker & Valacich, 2010)Sarker, S., & Valacich, J. S. (2010). An alternative to methodological individualism: a non-reductionist approach to studying technology adoption by groups. MIS Quarterly, 34(4), 779-808.Used
(Scott, DeLone, & Golden, 2016)Scott, M., DeLone, W., & Golden, W. (2016). Measuring eGovernment success: a public value approach. European Journal of Information Systems, 25(3), 187-208. doi:10.1057/ejis.2015.11Used
(Son, Kim, & Riggins, 2006)Son, J. Y., Kim, S. S., & Riggins, F. J. (2006). Consumer adoption of net-enabled infomediaries: Theoretical explanations and an empirical test. Journal of the Association for Information Systems, 7 (7), 473-508.Used
(Srite & Karahanna, 2006)Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. MIS Quarterly: Management Information Systems, 30(3), 679-704.Used
(Sun & Fang, 2016)Sun, H., & Fang, Y. (2016). Choosing a Fit Technology: Understanding Mindfulness in Technology Adoption and Continuance. Journal of the Association for Information Systems, 17 (6), 377.Used
(Swanson, 1994)Swanson, E. B. (1994). Information systems innovation among organizations. Management Science, 40(9), 1069-1092.
(Sykes, Venkatesh, & Gosain, 2009)Sykes, T. A., Venkatesh, V., & Gosain, S. (2009). Model of Acceptance with Peer Support: A Social Network Perspective to Understand Employees' System Use. MIS Quarterly, 33(2), 371-393.Used
(Taylor & Todd, 1995a)Taylor, S., & Todd, P. (1995a). Assessing IT usage: The role of prior experience. MIS Quarterly: Management Information Systems, 19(4), 561-568.Used
(Taylor & Todd, 1995b)Taylor, S., & Todd, P. (1995b). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137-155. doi:10.1016/0167-8116(94)00019-KUsed
(Taylor & Todd, 1995c)Taylor, S., & Todd, P. (1995c). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.Used
(Teo & Men, 2008)Teo, T. S., & Men, B. (2008). Knowledge portals in Chinese consulting firms: a task–technology fit perspective. European Journal of Information Systems, 17 (6), 557-574.Used
(Teo, Srivastava, & Jiang, 2008)Teo, T. S. H., Srivastava, S. C., & Jiang, L. (2008). Trust and Electronic Government Success: An Empirical Study. Journal of Management Information Systems, 25(3), 99-131. doi:10.2753/MIS0742-1222250303Used
(Titah & Barki, 2009)Titah, R., & Barki, H. (2009). Nonlinearities between attitude and subjective norms in information technology acceptance: a negative sinergy? MIS Quarterly, 33(4), 827-844.Used
(Thompson, Higgins, & Howell, 1991)Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly: Management Information Systems, 15(1), 125-142.Used
(Tornatzky & Fleischer, 1990)Tornatzky, L. G., & Fleischer, M. (1990). The processes of technological innovation. Lexington, Mass.: Lexington Books.Used
(Tung & Rieck, 2005)Tung, L. L., & Rieck, O. (2005). Adoption of electronic government services among business organizations in Singapore. Journal of Strategic Information Systems, 14 (4), 417-440. doi:10.1016/j.jsis.2005.06.001Used
(Urbach, Smolnik, & Riempp, 2010)Urbach, N., Smolnik, S., & Riempp, G. (2010). An empirical investigation of employee portal success. Journal of Strategic Information Systems, 19(3), 184-206. doi:10.1016/j.jsis.2010.06.002Used
(Vallerand, 1997)Vallerand, R. J. (1997). Toward A Hierarchical Model of Intrinsic and Extrinsic Motivation. In Advances in Experimental Social Psychology (Vol. 29, pp. 271-360).Used
(Van Slyke, Ilie, Lou, & Stafford, 2007)Van Slyke, C., Ilie, V., Lou, H., & Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology. European Journal of Information Systems, 16 (3), 270-283. doi:10.1057/palgrave.ejis.3000680Used
(Venkatesh, 2000)Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model. Information Systems Research, 11 (4), 342-365.Used
(Venkatesh, Aloysius, Hoehle, & Burton, 2017)Venkatesh, V., Aloysius, J. A., Hoehle, H., & Burton, S. (2017). Design and evaluation of auto-ID enabled shopping assistance artifacts in customers' mobile phones: two retail store laboratory experiments. MIS Quarterly, 41(1), 83-113.Used
(Venkatesh & Bala, 2008)Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39 (2), 273-315. doi:10.1111/j.1540-5915.2008.00192.xUsed
(Venkatesh & Davis, 2000)Venkatesh, V., & Davis, F. D. (2000). Theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 46 (2), 186-204.Used
(Venkatesh & Goyal, 2010)Venkatesh, V., & Goyal, S. (2010). Expectation disconfirmation and technology adoption: Polynomial modeling and response surface analysis. MIS Quarterly: Management Information Systems, 34(special issue 2), 281-303.Used
(Venkatesh & Morris, 2000)Venkatesh, V., & Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly: Management Information Systems, 24(1), 115-136.Used
(Venkatesh & Speier, 1999) Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigation of the effect of mood. Organizational behavior and human decision processes, 79(1), 1-28.Used
(Venkatesh, Morris, Davis, & Davis, 2003)Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.Used
(Venkatesh, Thong, & Xu, 2012)Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly: Management Information Systems, 36(1), 157-178.Used
(Wakefield & Whitten, 2006)Wakefield, R. L., & Whitten, D. (2006). Mobile computing: a user study on hedonic/utilitarian mobile device usage. European Journal of Information Systems, 15 (3), 292-300. doi:10.1057/palgrave.ejis.3000619Used
(Wang, 2008)Wang, Y. S. (2008). Assessing e-commerce systems success: A respecification and validation of the DeLone and McLean model of IS success. Information Systems Journal, 18(5), 529-557. doi:10.1111/j.1365-2575.2007.00268.xUsed
(Wang, Lin, & Luarn, 2006)Wang, Y. S., Lin, H. H., & Luarn, P. (2006). Predicting consumer intention to use mobile service. Information Systems Journal, 16 (2), 157-179. doi:10.1111/j.1365-2575.2006.00213.xUsed
(Wixom & Todd, 2005)Wixom, B. H., & Todd, P. A. (2005). A theoretical integration of user satisfaction and technology acceptance. Information systems research, 16 (1), 85-102.Used
(Yang, Kang, Oh, & Kim, 2013)Yang, H.-D., Kang, S., Oh, W., & Kim, M. S. (2013). Are all fits created equal? A nonlinear perspective on task-technology fit. Journal of the Association for Information Systems, 14 (12), 694.Used
(Yao & Murphy, 2007)Yao, Y. R., & Murphy, L. (2007). Remote electronic voting systems: an exploration of voters' perceptions and intention to use. European Journal of Information Systems, 16 (2), 106-120. doi:10.1057/palgrave.ejis.3000672Used
(Zhu, Dong, Xu, & Kraemer, 2006)Zhu, K., Dong, S., Xu, S. X., & Kraemer, K. L. (2006). Innovation diffusion in global contexts: Determinants of post-adoption digital transformation of European companies. European Journal of Information Systems, 15 (6), 601-616. doi:10.1057/palgrave.ejis.3000650Used
(Zhu, Kraemer, & Xu, 2003)Zhu, K., Kraemer, K., & Xu, S. (2003). Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. European Journal of Information Systems, 12 (4), 251-268.Used
(Zhu, Kraemer, & Dedrick, 2004)Zhu, K., Kraemer, K. L., & Dedrick, J. (2004). Information technology payoff in e-business environments: An international perspective on value creation of e-business in the financial services industry. Journal of management information systems, 21 (1), 17-54.Used
(A. H. Chen, Lu, Gupta, & Qi, 2014)Chen, A. H., Lu, Y. B., Gupta, S., & Qi, X. L. (2014). Can customer satisfaction and dissatisfaction coexist? An issue of telecommunication service in China. Journal of Information Technology, 29(3), 237-252. doi:10.1057/jit.2013.26Analyzed
(A. S. Lee & Hubona, 2009)Lee, A. S., & Hubona, G. S. (2009). A scientific basis for rigor in information systems research. MIS Quarterly, 33(2), 237-262.Analyzed
(Abbasi, Sarker, & Chiang, 2016)Abbasi, A., Sarker, S., & Chiang, R. H. L. (2016). Big Data Research in Information Systems: Toward an Inclusive Research Agenda. Journal of the Association for Information Systems, 17(2), I-XXXII.Analyzed
(Abraham, Boudreau, Junglas, & Watson, 2013)Abraham, C., Boudreau, M. C., Junglas, I., & Watson, R. (2013). Enriching our theoretical repertoire: The role of evolutionary psychology in technology acceptance. European Journal of Information Systems, 22(1), 56-75. doi:10.1057/ejis.2011.25Analyzed
(Abraham, Junglas, Watson, & Boudreau, 2016)Abraham, C., Junglas, I., Watson, R. T., & Boudreau, M. C. (2016). Explaining the unexpected and continued use of an information system with the help of evolved evolutionary mechanisms. Journal of the Association for Information Science and Technology, 67(1), 212-231.Analyzed
(Adams, Nelson, & Todd, 1992)Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly: Management Information Systems, 16(2), 227-247. Analyzed
(Agarwal & Karahanna, 2000)Agarwal, R., & Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly: Management Information Systems, 24(4), 665-694. Analyzed
(Agarwal & Venkatesh, 2002)Agarwal, R., & Venkatesh, V. (2002). Assessing a firm's Web presence: A heuristic evaluation procedure for the measurement of usability. Information Systems Research, 13(2), 168-186. doi:10.1287/isre.13.2.168.84Analyzed
(Agarwal, Sambamurthy, & Stair, 2000)Agarwal, R., Sambamurthy, V., & Stair, R. M. (2000). Research report: The evolving relationship between general and specific computer self-efficacy - An empirical assessment. Information Systems Research, 11(4), 418-430. doi:10.1287/isre.11.4.418.11876Analyzed
(Ahuja & Thatcher, 2005)Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly: Management Information Systems, 29(3), 427-459.Analyzed
(Aladwani, 2002)Aladwani, A. M. (2002). The development of two tools for measuring the easiness and usefulness of transactional Web sites. European Journal of Information Systems, 11(3), 223-234. doi:10.1057/palgrave.ejis.3000432Analyzed
(Allen, Brown, Karanasios, & Norman, 2013)Allen, D. K., Brown, A., Karanasios, S., & Norman, A. (2013). How should technology-mediated organizational change be explained? A comparison on the contributions of critical realism and activity theory. MIS Quarterly, 37(3), 835-854.Analyzed
(Al-Natour & Benbasat, 2009)Al-Natour, S., & Benbasat, I. (2009). The Adoption and Use of IT Artifacts: A New Interaction-Centric Model for the Study of User-Artifact Relationships. Journal of the Association for Information Systems, 10 (9), 661-685.Analyzed
(Al-Natour, Benbasat, & Cenfetelli, 2011)Al-Natour, S., Benbasat, I., & Cenfetelli, R. (2011). The adoption of online shopping assistants: Perceived similarity as an antecedent to evaluative beliefs. Journal of the Association of Information Systems, 12 (5), 347-374.Analyzed
(Alnuaimi, Robert, & Maruping, 2010)Alnuaimi, O. A., Robert, L. P., & Maruping, L. M. (2010). Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective on the Theory of Moral Disengagement. Journal of Management Information Systems, 27 (1), 203-230. doi:10.2753/mis0742-1222270109Analyzed
(Ambrose & Chiravuri, 2010)Ambrose, P. J., & Chiravuri, A. (2010). A socio-cognitive interpretation of the potential effects of downsizing on software quality performance. Information Systems Journal, 20 (3), 239-265. doi:10.1111/j.1365-2575.2009.00332.xAnalyzed
(Anandarajan, 2002)Anandarajan, M. (2002). Profiling Web usage in the workplace: A behavior-based artificial intelligence approach. Journal of Management Information Systems, 19 (1), 243-266.Analyzed
(Anderson & Agarwal, 2010)Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643.Analyzed
(Angst & Agarwal, 2009)Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370.Analyzed
(Arazy & Gellatly, 2012)Arazy, O., & Gellatly, I. R. (2012). Corporate Wikis: The Effects of Owners' Motivation and Behavior on Group Members' Engagement. Journal of Management Information Systems, 29 (3), 87-116. doi:10.2753/mis0742-1222290303Analyzed
(Arbore, Soscia, & Bagozzi, 2014)Arbore, A., Soscia, I., & Bagozzi, R. P. (2014). The Role of Signaling Identity in the Adoption of Personal Technologies. Journal of the Association for Information Systems, 15 (2), 86-110.Analyzed
(Aubert, Barki, Patry, & Roy, 2008)Aubert, B. A., Barki, H., Patry, M., & Roy, V. (2008). A multi-level, multi-theory perspective of information technology implementation. Information Systems Journal, 18 (1), 45-72. doi:10.1111/j.1365-2575.2007.00279.xAnalyzed
(Awad & Ragowsky, 2008)Awad, N. F., & Ragowsky, A. (2008). Establishing trust in electronic commerce through online word of mouth: An examination across genders. Journal of Management Information Systems, 24 (4), 101-121. doi:10.2753/mis0742-1222240404Analyzed
(Ayyagari, Grover, & Purvis, 2011)Ayyagari, R., Grover, V., & Purvis, R. (2011). Technostress: technological antecedents and implications. MIS Quarterly, 35(4), 831-858.Analyzed
(B. Kim & Han, 2009)Kim, B., & Han, I. (2009). What drives the adoption of mobile data services? An approach from a value perspective. Journal of Information Technology, 24(1), 35-45. doi:10.1057/jit.2008.28Analyzed
(B. Zhu & Watts, 2010)Zhu, B., & Watts, S. A. (2010). Visualization of Network Concepts: The Impact of Working Memory Capacity Differences. Information Systems Research, 21(2), 327-344. doi:10.1287/isre.1080.0215Analyzed
(Ba, Stallaert, & Whinston, 2001)Ba, S. L., Stallaert, J., & Whinston, A. B. (2001). Research commentary: Introducing a third dimension in information systems design the case for incentive alignment. Information Systems Research, 12 (3), 225-239. doi:10.1287/isre.12.3.225.9712Analyzed
(Bagayogo, Lapointe, & Bassellier, 2014)Bagayogo, F. F., Lapointe, L., & Bassellier, G. (2014). Enhanced Use of IT: A New Perspective on Post-Adoption. Journal of the Association for Information Systems, 15 (7), 361-387.Analyzed
(Bagchi, Kanungo, & Dasgupta, 2003)Bagchi, S., Kanungo, S., & Dasgupta, S. (2003). Modeling use of enterprise resource planning systems: A path analytic study. European Journal of Information Systems, 12 (2), 142-158. doi:10.1057/palgrave.ejis.3000453Analyzed
(Bagozzi, 2007)Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association of Information Systems, 8 (4), 244-254.Analyzed
(Baird & Raghu, 2015)Baird, A., & Raghu, T. S. (2015). Associating consumer perceived value with business models for digital services. European Journal of Information Systems, 24(1), 4-22. doi:10.1057/ejis.2013.12Analyzed
(Baird, Furukawa, & Raghu, 2012)Baird, A., Furukawa, M. F., & Raghu, T. S. (2012). Understanding Contingencies Associated with the Early Adoption of Customer-Facing Web Portals. Journal of Management Information Systems, 29(2), 293-324. doi:10.2753/mis0742-1222290210Analyzed
(Bajwa et al., 2008)Bajwa, D. S., Lewis, L. F., Pervan, G., Lai, V. S., Munkvold, B. E., & Schwabe, G. (2008). Factors in the global assimilation of collaborative information technologies: An exploratory investigation in five regions. Journal of Management Information Systems, 25(1), 131-165. doi:10.2753/MIS0742-1222250106Analyzed
(Bajwa, Lewis, Pervan, & Lai, 2005)Bajwa, D. S., Lewis, L. F., Pervan, G., & Lai, V. S. (2005). The adoption and use of collaboration information technologies: International comparisons. Journal of Information Technology, 20(2), 130-140. doi:10.1057/palgrave.jit.2000037Analyzed
(Bala & Venkatesh, 2013)Bala, H., & Venkatesh, V. (2013). Changes in employees' job characteristics during an enterprise system implementation: a latent growth modelling perspective. MIS Quarterly, 37(4), 1113-1140.Analyzed
(Bansal, Zahedi, & Gefen, 2015)Bansal, G., Zahedi, F., & Gefen, D. (2015). The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. European Journal of Information Systems, 24 (6), 624-644. doi:10.1057/ejis.2014.41Analyzed
(Bapna, Goes, Wei, & Zhang, 2011)Bapna, R., Goes, P., Wei, K. K., & Zhang, Z. J. (2011). A Finite Mixture Logit Model to Segment and Predict Electronic Payments System Adoption. Information Systems Research, 22 (1), 118-133. doi:10.1287/isre.1090.0277Analyzed
(Barlow & Dennis, 2016)Barlow, J. B., & Dennis, A. R. (2016). Not as smart as we think: A study of collective intelligence in virtual groups. Journal of Management Information Systems, 33 (3), 684-712.Analyzed
(Barrett, Heracleous, & Walsham, 2013)Barrett, M., Heracleous, L., & Walsham, G. (2013). A rhetorical approach to it diffusion: Reconceptualizing the ideology-framing relationship in computerization movements. MIS Quarterly: Management Information Systems, 37(1), 201-220.Analyzed
(Bartelt & Dennis, 2014)Bartelt, V. L., & Dennis, A. R. (2014). Nature and nurture: The impact of automaticity and the structuration of communication on virtual team behavior and performance. MIS Quarterly: Management Information Systems, 38(2), 521-538.Analyzed
(Baskerville & Myers, 2009)Baskerville, R. L., & Myers, M. D. (2009). Fashion waves in information systems research and practice. MIS Quarterly: Management Information Systems, 33(4), 647-662.Analyzed
(Baskerville & Pries-Heje, 2001)Baskerville, R. L., & Pries-Heje, J. (2001). A multiple-theory analysis of a diffusion of information technology case. Information Systems Journal, 11 (3), 181-212. doi:10.1046/j.1365-2575.2001.00106.xAnalyzed
(Bayerl, Lauche, & Axtell, 2016)Bayerl, P. S., Lauche, K., & Axtell, C. (2016). Revisiting group-based technology adoption as a dynamic process: the role of changing attitude-rationale configurations. MIS Quarterly, 40(3).Analyzed
(Beath, Berente, Gallivan, & Lyytinen, 2013)Beath, C., Berente, N., Gallivan, M. J., & Lyytinen, K. (2013). Expanding the Frontiers of Information Systems Research: Introduction to the Special Issue. Journal of the Association for Information Systems, 14 (4), I-XVI.Analyzed
(Beaudry & Pinsonneault, 2005)Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493-524.Analyzed
(Beaudry & Pinsonneault, 2010)Beaudry, A., & Pinsonneault, A. (2010). The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use. MIS Quarterly: Management Information Systems, 34(4), 689-710.Analyzed
(Becker, Rai, Ringle, & Volckner, 2013)Becker, J. M., Rai, A., Ringle, C. M., & Volckner, F. (2013). Discovering unobserved heterogeneity in structural equation models to advert validity threats. MIS Quarterly, 37(3), 665-+.Analyzed
(Belanger & Carter, 2008)Belanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. Journal of Strategic Information Systems, 17 (2), 165-176. doi:10.1016/j.jsis.2007.12.002Analyzed
(Benbasat & Barki, 2007)Benbasat, I., & Barki, H. (2007). Quo vadis, TAM? Journal of the Association of Information Systems, 8 (4), 211-218.Analyzed
(Benlian, Koufaris, & Hess, 2011)Benlian, A., Koufaris, M., & Hess, T. (2011). Service Quality in Software-as-a-Service: Developing the SaaS-Qual Measure and Examining Its Role in Usage Continuance. Journal of Management Information Systems, 28 (3), 85-126. doi:10.2753/mis0742-1222280303Analyzed
(Benlian, Titah, & Hess, 2012)Benlian, A., Titah, R., & Hess, T. (2012). Differential effects of provider recommendations and consumer reviews in e-commerce transactions: An experimental study. Journal of Management Information Systems, 29 (1), 237-272. doi:10.2753/MIS0742-1222290107Analyzed
(Berthon, Pitt, Ewing, & Carr, 2002)Berthon, P., Pitt, L., Ewing, M., & Carr, C. L. (2002). Potential research space in MIS: A framework for envisioning and evaluating research replication, extension, and generation. Information Systems Research, 13 (4), 416-427. doi:10.1287/isre.13.4.416.71Analyzed
(Bhattacherjee & Hikmet, 2007)Bhattacherjee, A., & Hikmet, N. (2007). Physicians' resistance toward healthcare information technology: A theoretical model and empirical test. European Journal of Information Systems, 16(6), 725-737. doi:10.1057/palgrave.ejis.3000717Analyzed
(Bhattacherjee & Park, 2014)Bhattacherjee, A., & Park, S. C. (2014). Why end-users move to the cloud: a migration-theoretic analysis. European Journal of Information Systems, 23(3), 357-372. doi:10.1057/ejis.2013.1Analyzed
(Bhattacherjee & Premkumar, 2004)Bhattacherjee, A., & Premkumar, G. (2004). Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test. MIS Quarterly: Management Information Systems, 28(2), 229-254.Analyzed
(Bhattacherjee & Sanford, 2006)Bhattacherjee, A., & Sanford, C. (2006). Influence processes for information technology acceptance: An elaboration likelihood model. MIS Quarterly: Management Information Systems, 30(4), 805-825.Analyzed
(Bhattacherjee, 2001)Bhattacherjee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. MIS Quarterly: Management Information Systems, 25(3), 351-370.Analyzed
(Bock, Zmud, Kim, & Lee, 2005)Bock, G.-W., Zmud, R. W., Kim, Y.-G., & Lee, J.-N. (2005). Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate. MIS Quarterly, 29(1), 87-111.Analyzed
(Boonstra, Boddy, & Bell, 2008)Boonstra, A., Boddy, D., & Bell, S. (2008). Stakeholder management in IOS projects: analysis of an attempt to implement an electronic patient file. European Journal of Information Systems, 17 (2), 100-111. doi:10.1057/ejis.2008.2Analyzed
(Bose & Luo, 2011)Bose, R., & Luo, X. (2011). Integrative framework for assessing firms' potential to undertake Green IT initiatives via virtualization - A theoretical perspective. Journal of Strategic Information Systems, 20 (1), 38-54. doi:10.1016/j.jsis.2011.01.003Analyzed
(Boss, Galletta, Lowry, Moody, & Polak, 2015)Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-U461.Analyzed
(Boss, Kirsch, Angermeier, Shingler, & Boss, 2009)Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, R. W. (2009). If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security. European Journal of Information Systems, 18 (2), 151-164. doi:10.1057/ejis.2009.8Analyzed
(Braganza, Hackney, & Tanudjojo, 2009)Braganza, A., Hackney, R., & Tanudjojo, S. (2009). Organizational knowledge transfer through creation, mobilization and diffusion: a case analysis of InTouch within Schlumberger. Information Systems Journal, 19 (5), 499-522. doi:10.1111/j.1365-2575.2007.00246.xAnalyzed
(Brancheau & Wetherbe, 1990)Brancheau, J. C., & Wetherbe, J. C. (1990). The adoption of spreadsheet software: Testing innovation diffusion theory in the context of end-user computing. Information Systems Research, 1 (2), 115-143.Analyzed
(Briggs et al., 1998)Briggs, R. O., Adkins, M., Mittleman, D., Kruse, J., Miller, S., & Nunamaker Jr, J. F. (1998). A Technology Transition Model derived from field investigation of GSS use aboard the U.S.S. CORONADO. Journal of Management Information Systems, 15 (3), 151-195.Analyzed
(Briggs, De Vreede, & Nunamaker, 2003)Briggs, R. O., De Vreede, G. J., & Nunamaker, J. F. (2003). Collaboration engineering with ThinkLets to pursue sustained success with group support systems. Journal of Management Information Systems, 19 (4), 31-64.Analyzed
(Bulgurcu, Cavusoglu, & Benbasat, 2010)Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly: Management Information Systems, 34(special issue 3), 523-548.Analyzed
(Burton-Jones & Gallivan, 2007)Burton-Jones, A., & Gallivan, M. J. (2007). Toward a deeper understanding of system usage in organizations: A multilevel perspective. MIS Quarterly, 31(4), 657-679.Analyzed
(Burton-Jones & Straub, 2006)Burton-Jones, A., & Straub, D. W. (2006). Reconceptualizing system usage: An approach and empirical test. Information Systems Research, 17 (3), 228-246. doi:10.1287/isre.1060.0096Analyzed
(C. Kim, Jahng, & Lee, 2007)Kim, C., Jahng, J., & Lee, J. (2007). An empirical investigation into the utilization-based information technology success model: Integrating task-performance and social influence perspective. Journal of Information Technology, 22(2), 152-160. doi:10.1057/palgrave.jit.2000072Analyzed
(C. P. Lee & Shim, 2007)Lee, C. P., & Shim, J. P. (2007). An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. European Journal of Information Systems, 16(6), 712-724. doi:10.1057/palgrave.ejis.3000716Analyzed
(C. W. Tan, Benbasat, & Cenfetelli, 2013)Tan, C. W., Benbasat, I., & Cenfetelli, R. T. (2013). IT-mediated customer service content and delivery in electronic governments: an empirical investigation of the antecedents of service quality. MIS Quarterly, 37(1). Analyzed
(C.-H. Tan, Teo, & Benbasat, 2010)Tan, C.-H., Teo, H.-H., & Benbasat, I. (2010). Assessing screening and evaluation decision support systems: A resource-matching approach. Information Systems Research, 21(2), 305-326.Analyzed
(Carter & Grover, 2015)Carter, M., & Grover, V. (2015). Me, my self, and I(I): conceptualizing infromation technology identity and its implications. MIS Quarterly, 39(4), 931-957. Analyzed
(Cenfetelli & Schwarz, 2011)Cenfetelli, R. T., & Schwarz, A. (2011). Identifying and Testing the Inhibitors of Technology Usage Intentions. Information Systems Research, 22(4), 808-823. doi:10.1287/isre.1100.0295Analyzed
(Cenfetelli, Benbasat, & Al-Natour, 2008)Cenfetelli, R. T., Benbasat, I., & Al-Natour, S. (2008). Addressing the what and how of online services: Positioning supporting-services functionality and service quality for business-to-consumer success. Information Systems Research, 19(2), 161-181. doi:10.1287/isre.1070.0163Analyzed
(Chidambaram & Jones, 1993)Chidambaram, L., & Jones, B. (1993). Impact of Communication Medium and Computer Support on Group Perceptions and Performance: A Comparison of Face-to-Face and Dispersed Meetings. MIS Quarterly, 17(4), 465-491.Analyzed
(Chin & Todd, 1995)Chin, W. W., & Todd, P. A. (1995). On the use, usefulness, and ease of use of structural equation modeling in mis research: A note of caution. MIS Quarterly: Management Information Systems, 19(2), 237-246.Analyzed
(Chiravuri, Nazareth, & Ramamurthy, 2011)Chiravuri, A., Nazareth, D., & Ramamurthy, K. (2011). Cognitive conflict and consensus generation in virtual teams during knowledge capture: Comparative effectiveness of techniques. Journal of Management Information Systems, 28 (1), 311-350.Analyzed
(Chou & He, 2011)Chou, S. W., & He, M. Y. (2011). The factors that affect the performance of open source software development - the perspective of social capital and expertise integration. Information Systems Journal, 21 (2), 195-219. doi:10.1111/j.1365-2575.2009.00347.xAnalyzed
(Choudhury & Karahanna, 2008)Choudhury, V., & Karahanna, E. (2008). The relative advantage of electronic channels: A multidimensional view. MIS Quarterly, 32(1), 179-200.Analyzed
(Choudrie, Papazafeiropoulou, & Lee, 2003)Choudrie, J., Papazafeiropoulou, A., & Lee, H. (2003). A web of stakeholders and strategies: A case of broadband diffusion in South Korea. Journal of Information Technology, 18 (4), 281-290. doi:10.1080/0268396032000150816Analyzed
(Chu & Robey, 2008)Chu, T.-H., & Robey, D. (2008). Explaining changes in learning and work practice following the adoption of online learning: a human agency perspective. European Journal of Information Systems, 17 (1), 79-98.Analyzed
(Chua, Lim, Soh, & Sia, 2012)Chua, C. E. H., Lim, W. K., Soh, C., & Sia, S. K. (2012). Enacting clan control in complex IT projects: a social capital perspective. MIS Quarterly, 36(2), 577-600.Analyzed
(Clarke, 2013)Clarke, R. (2013). Morning dew on the Web in Australia: 1992-1995. Journal of Information Technology, 28 (2), 93-110. doi:10.1057/jit.2013.11Analyzed
(Compeau, Meister, & Higgins, 2007)Compeau, D., Meister, D. B., & Higgins, C. A. (2007). From prediction to explanation: Reconceptualizing and extending the Perceived Characteristics of Innovating. Journal of the Association for Information Systems, 8 (8), 409-439.Analyzed
(Constantiou, Papazafeiropoulou, & Dwivedi, 2009)Constantiou, I. D., Papazafeiropoulou, A., & Dwivedi, Y. K. (2009). The diffusion of IP telephony and vendors' commercialisation strategies. Journal of Information Technology, 24 (1), 25-34. doi:10.1057/jit.2008.29Analyzed
(Cordoba, Pilkington, & Bernroider, 2012)Cordoba, J. R., Pilkington, A., & Bernroider, E. W. N. (2012). Information systems as a discipline in the making: comparing EJIS and MISQ between 1995 and 2008. European Journal of Information Systems, 21 (5), 479-495. doi:10.1057/ejis.2011.58Analyzed
(Cram & Newell, 2016)Cram, W. A., & Newell, S. (2016). Mindful revolution or mindless trend? Examining agile development as a management fashion. European Journal of Information Systems, 25 (2), 154-169. doi:10.1057/ejis.2015.13Analyzed
(Cyr, 2008)Cyr, D. (2008). Modeling web site design across cultures: Relationships to trust, satisfaction, and e-loyalty. Journal of Management Information Systems, 24 (4), 47-72. doi:10.2753/mis0742-1222240402Analyzed
(Cyr, 2014)Cyr, D. (2014). Return visits: a review of how Web site design can engender visitor loyalty. Journal of Information Technology, 29 (1), 1-26. doi:10.1057/jit.2013.25Analyzed
(Cyr, Head, Larios, & Pan, 2009)Cyr, D., Head, M., Larios, H., & Pan, B. (2009). Exploring human images in website design: a multi-method approach. MIS Quarterly, 33(3), 539-566.Analyzed
(D. H. Brown & Thompson, 2011)Brown, D. H., & Thompson, S. (2011). Priorities, policies and practice of e-government in a developing country context: ICT infrastructure and diffusion in Jamaica. European Journal of Information Systems, 20(3), 329-342. doi:10.1057/ejis.2011.3Analyzed
(D. J. Kim, Ferrin, & Rao, 2009)Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information systems research, 20(2), 237-257. Analyzed
(Dabbish & Kraut, 2008)Dabbish, L., & Kraut, R. (2008). Awareness displays and social motivation for coordinating communication. Information Systems Research, 19 (2), 221-238. doi:10.1287/isre.1080.0175Analyzed
(Damsgaard & Lyytinen, 1998)Damsgaard, J., & Lyytinen, K. (1998). Contours of diffusion of electronic data interchange in Finland Overcoming technological barriers and collaborating to make it happen. Journal of Strategic Information Systems, 7 (4), 275-297.Analyzed
(Dang et al., 2012)Dang, Y., Zhang, Y. L., Chen, H. C., Brown, S. A., Hu, P. J. H., & Nunamaker, J. F. (2012). Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology. Journal of Management Information Systems, 28 (4), 99-127. doi:10.2753/mis0742-1222280405Analyzed
(D'Arcy, Herath, & Shoss, 2014)D'Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems, 31(2), 285-318. doi:10.2753/mis0742-1222310210Analyzed
(Datta, 2011)Datta, P. (2011). A preliminary study of ecommerce adoption in developing countries. Information Systems Journal, 21 (1), 3-32. doi:10.1111/j.1365-2575.2009.00344.xAnalyzed
(Davis & Bostrom, 1993)Davis, S. A., & Bostrom, R. P. (1993). Training end users - an experimental investigation of the roles of the computer-interface and training methods. MIS Quarterly, 17(1), 61-85. doi:10.2307/249510Analyzed
(De Guinea & Markus, 2009)De Guinea, A. O., & Markus, L. (2009). Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use. MIS Quarterly: Management Information Systems, 33(3), 433-444.Analyzed
(de Guinea, Titah, & Leger, 2014)de Guinea, A. O., Titah, R., & Leger, P. M. (2014). Explicit and Implicit Antecedents of Users' Behavioral Beliefs in Information Systems: A Neuropsychological Investigation. Journal of Management Information Systems, 30 (4), 179-209. doi:10.2753/mis0742-1222300407Analyzed
(de Vaujany, Walsh, & Mitev, 2011)de Vaujany, F. X., Walsh, I., & Mitev, N. (2011). An historically grounded critical analysis of research articles in IS. European Journal of Information Systems, 20 (4), 395-417. doi:10.1057/ejis.2011.13Analyzed
(De Vreede, Jones, & Mgaya, 1998)De Vreede, G. J., Jones, N., & Mgaya, R. J. (1998). Exploring the application and acceptance of group support systems in Africa. Journal of Management Information Systems, 15 (3), 197-234.Analyzed
(Dennis & Reinicke, 2004)Dennis, A. R., & Reinicke, B. A. (2004). Beta versus VHS and the acceptance of electronic brainstorming technology. MIS Quarterly: Management Information Systems, 28(1), 1-20.Analyzed
(Dennis, Wixom, & Vandenberg, 2001)Dennis, A. R., Wixom, B. H., & Vandenberg, R. J. (2001). Understanding fit and appropriation effects in group support systems via meta-analysis. MIS Quarterly, 25(2), 167-193.Analyzed
(Devaraj, Easley, & Crant, 2008)Devaraj, S., Easley, R. E., & Crant, J. M. (2008). How does personality matter? Relating the five-factor model to technology acceptance and use. Information Systems Research, 19 (1), 93-105. doi:10.1287/isre.1070.0153Analyzed
(Devaraj, Fan, & Kohli, 2002)Devaraj, S., Fan, M., & Kohli, R. (2002). Antecedents of B2C channel satisfaction and preference: Validating e-commerce metrics. Information Systems Research, 13 (3), 316-333. doi:10.1287/isre.13.3.316.77Analyzed
(Dimoka, 2010)Dimoka, A. (2010). What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly, 34 (2), 373-396.Analyzed
(Dimoka, Pavlou, & Davis, 2011)Dimoka, A., Pavlou, P. A., & Davis, F. D. (2011). NeuroIS: The Potential of Cognitive Neuroscience for Information Systems Research. Information Systems Research, 22 (4), 687-702. doi:10.1287/isre.1100.0284Analyzed
(Dinev & Hart, 2006)Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17 (1), 61-80. doi:10.1287/isre.1060.0080Analyzed
(Dinev, Hart, & Mullen, 2008)Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance - An empirical investigation. Journal of Strategic Information Systems, 17 (3), 214-233. doi:10.1016/j.jsis.2007.09.002Analyzed
(D'MacRedie & Mijinyawa, 2011)D'MacRedie, R. D., & Mijinyawa, K. (2011). A theory-grounded framework of Open Source Software adoption in SMEs. European Journal of Information Systems, 20(2), 237-250. doi:10.1057/ejis.2010.60Analyzed
(E. T. K. Lim, Pan, & Tan, 2005)Lim, E. T. K., Pan, S. L., & Tan, C. W. (2005). Managing user acceptance towards enterprise resource planning (ERP) systems - understanding the dissonance between user expectations and managerial policies. European Journal of Information Systems, 14(2), 135-149. doi:10.1057/palgrave.ejis.3000531Analyzed
(Elbanna, 2008)Elbanna, A. R. (2008). Strategic systems implementation: Diffusion through drift. Journal of Information Technology, 23 (2), 89-96. doi:10.1057/palgrave.jit.2000130Analyzed
(Elie-Dit-Cosaque, Pallud, & Kalika, 2011)Elie-Dit-Cosaque, C., Pallud, J., & Kalika, M. (2011). The Influence of Individual, Contextual, and Social Factors on Perceived Behavioral Control of Information Technology: A Field Theory Approach. Journal of Management Information Systems, 28 (3), 201-234. doi:10.2753/mis0742-1222280306Analyzed
(Elkins, Dunbar, Adame, & Nunamaker, 2013)Elkins, A. C., Dunbar, N. E., Adame, B., & Nunamaker, J. F. (2013). Are Users Threatened by Credibility Assessment Systems? Journal of Management Information Systems, 29 (4), 249-261. doi:10.2753/mis0742-1222290409Analyzed
(Featherman, Valacich, & Wells, 2006)Featherman, M. S., Valacich, J. S., & Wells, J. D. (2006). Is that authentic or artificial? Understanding consumer perceptions of risk in e-service encounters. Information Systems Journal, 16 (2), 107-134. doi:10.1111/j.1365-2575.2006.00211.xAnalyzed
(Ferratt & Vlahos, 1998)Ferratt, T., & Vlahos, G. (1998). An investigation of task-technology fit for managers in Greece and the US. European Journal of Information Systems, 7 (2), 123-136.Analyzed
(Fichman, 2004)Fichman, R. G. (2004). Real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15 (2), 132-154. doi:10.1287/isre.1040.0021Analyzed
(Flynn & Du, 2012)Flynn, D., & Du, Y. Q. (2012). A case study of the legitimation process undertaken to gain support for an information system in a Chinese university. European Journal of Information Systems, 21 (3), 212-228. doi:10.1057/ejis.2011.27Analyzed
(Foth, 2016)Foth, M. (2016). Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence. European Journal of Information Systems, 25 (2), 91-109. doi:10.1057/ejis.2015.9Analyzed
(Furneaux & Wade, 2011)Furneaux, B., & Wade, M. (2011). An exploration of organizational level information systems discontinuance intentions. MIS Quarterly, 35(3), 573-598. Analyzed
(G. Kim, Shin, & Lee, 2009)Kim, G., Shin, B., & Lee, H. G. (2009). Understanding dynamics between initial trust and usage intentions of mobile banking. Information Systems Journal, 19(3), 283-311. doi:10.1111/j.1365-2575.2007.00269.xAnalyzed
(G. Shmueli & Koppius, 2011)Shmueli, G., & Koppius, O. R. (2011). Predictive analytics in information systems research. MIS Quarterly, 35(3), 553-572.Analyzed
(Gallivan & Keil, 2003)Gallivan, M. J., & Keil, M. (2003). The user-developer communication process: A critical case study. Information Systems Journal, 13 (1), 37-68. doi:10.1046/j.1365-2575.2003.00138.xAnalyzed
(Gallivan, Spitler, & Koufaris, 2005)Gallivan, M. J., Spitler, V. K., & Koufaris, M. (2005). Does information technology training really matter? A social information processing analysis of coworkers' influence on IT usage in the Workplace. Journal of Management Information Systems, 22 (1), 153-192.Analyzed
(Gaskin, Lowry, & Hull, 2016)Gaskin, J. E., Lowry, P. B., & Hull, D. M. (2016). Leveraging multimedia to advance science by disseminating a greater variety of scholarly contributions in more accessible formats. Journal of the Association of Information Systems, 17 (6), 413-434.Analyzed
(Gebauer, Shaw, & Gribbins, 2010)Gebauer, J., Shaw, M. J., & Gribbins, M. L. (2010). Task-technology fit for mobile information systems. Journal of Information Technology, 25 (3), 259-272.Analyzed
(Gefen & Straub, 1997)Gefen, D., & Straub, D. W. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS Quarterly: Management Information Systems, 21(4), 389-400.Analyzed
(Gefen, 2004)Gefen, D. (2004). What makes an ERP implementation relationship worthwhile: Linking trust mechanisms and ERP usefulness. Journal of Management Information Systems, 21(1), 263-288.Analyzed
(Gefen, Benbasat, & Pavlou, 2008)Gefen, D., Benbasat, I., & Pavlou, P. A. (2008). A research agenda for trust in online environments. Journal of Management Information Systems, 24 (4), 275-286. doi:10.2753/mis0742-1222240411Analyzed
(Gefen, Karahanna, & Straub, 2003)Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90.Analyzed
(Gengatharen & Standing, 2005)Gengatharen, D. E., & Standing, C. (2005). A framework to assess the factors affecting success or failure of the implementation of government-supported regional e-marketplaces for SMEs. European Journal of Information Systems, 14 (4), 417-433. doi:10.1057/palgrave.ejis.3000551Analyzed
(Germonprez, Hovorka, & Gal, 2011)Germonprez, M., Hovorka, D., & Gal, U. (2011). Secondary Design: A Case of Behavioral Design Science Research. Journal of the Association for Information Systems, 12 (10), 662-683.Analyzed
(Gerow, Ayyagari, Thatcher, & Roth, 2013)Gerow, J. E., Ayyagari, R., Thatcher, J. B., & Roth, P. L. (2013). Can we have fun @ work? the role of intrinsic motivation for utilitarian systems. European Journal of Information Systems, 22 (3), 360-380. doi:10.1057/ejis.2012.25Analyzed
(Gil-Garcia, Chengalur-Smith, & Duchessi, 2007)Gil-Garcia, J. R., Chengalur-Smith, I., & Duchessi, P. (2007). Collaborative e-Government: impediments and benefits of information-sharing projects in the public sector. European Journal of Information Systems, 16 (2), 121-133. doi:10.1057/palgrave.ejis.3000673Analyzed
(Gill, 1996)Gill, T. G. (1996). Expert systems usage: Task change and intrinsic motivation. MIS Quarterly: Management Information Systems, 20(3), 301-323.Analyzed
(Gnyawali, Fan, & Penner, 2010)Gnyawali, D. R., Fan, W. G., & Penner, J. (2010). Competitive Actions and Dynamics in the Digital Age: An Empirical Investigation of Social Networking Firms. Information Systems Research, 21 (3), 594-613. doi:10.1287/isre.1100.0294Analyzed
(Goel, Johnson, Junglas, & Ives, 2011)Goel, L., Johnson, N. A., Junglas, I., & Ives, B. (2011). From space to place: predicting users' intentions to return to virtual worlds. MIS Quarterly, 35(3), 749-771.Analyzed
(Goel, Johnson, Junglas, & Ives, 2013)Goel, L., Johnson, N., Junglas, I., & Ives, B. (2013). Predicting users' return to virtual worlds: a social perspective. Information Systems Journal, 23(1), 35-63. doi:10.1111/j.1365-2575.2011.00396.xAnalyzed
(Gregor, 2006)Gregor, S. (2006). The nature of theory in information systems. MIS Quarterly, 30(3), 611-642.Analyzed
(Grgecic, Holten, & Rosenkranz, 2015)Grgecic, D., Holten, R., & Rosenkranz, C. (2015). The Impact of Functional Affordances and Symbolic Expressions on the Formation of Beliefs. Journal of the Association for Information Systems, 16 (7), 580-607.Analyzed
(Grover & Lyytinen, 2015)Grover, V., & Lyytinen, K. (2015). New state of play in information systems research: the push to the edges. MIS Quarterly, 39(2), 271-U310.Analyzed
(Grover, 1997)Grover, V. (1997). An extension of the tri-core model of information systems innovation: strategic and technological moderators. European Journal of Information Systems, 6(4), 232-242. doi:10.1038/sj.ejis.3000274Analyzed
(Grover, Fiedler, & Teng, 1997)Grover, V., Fiedler, K., & Teng, J. (1997). Empirical evidence on Swanson's tri-core model of information systems innovation. Information Systems Research, 8(3), 273-287. doi:10.1287/isre.8.3.273Analyzed
(Guo, Yuan, Archer, & Connelly, 2011)Guo, K. H., Yuan, Y. F., Archer, N. P., & Connelly, C. E. (2011). Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model. Journal of Management Information Systems, 28 (2), 203-236. doi:10.2753/mis0742-1222280208Analyzed
(Gurbaxani & Mendelson, 1994)Gurbaxani, V., & Mendelson, H. (1994). Modeling vs. forecasting: The case of information systems spending. Information Systems Research, 5 (2), 180-190.Analyzed
(H. G. Brown, Poole, & Rodgers, 2004)Brown, H. G., Poole, M. S., & Rodgers, T. L. (2004). Interpersonal traits, complementarity, and trust in virtual collaboration. Journal of Management Information Systems, 20(4), 115-137.Analyzed
(H. S. Sun & Zhang, 2006)Sun, H. S., & Zhang, P. (2006). Causal relationships between perceived enjoyment and perceived ease of use: An alternative approach. Journal of the Association for Information Systems, 7(9), 618-645.Analyzed
(H. S. Sun, 2010)Sun, H. S. (2010). Sellers' Trust and Continued Use of Online Marketplaces. Journal of the Association for Information Systems, 11 (4), 182-211.Analyzed
(H. S. Sun, 2012)Sun, H. S. (2012). Understanding user revisions when using information systems features: adaptive system use and triggers. MIS Quarterly, 36(2), 453-478.Analyzed
(H. S. Sun, 2013)Sun, H. S. (2013). A longitudinal study of herd behavior in the adoption and continued use of technology. MIS Quarterly, 37(4).Analyzed
(H. W. Kim & Kankanhalli, 2009)Kim, H. W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS Quarterly: Management Information Systems, 33(3), 567-582.Analyzed
(H. W. Kim, Chan, & Kankanhalli, 2012)Kim, H. W., Chan, H. C., & Kankanhalli, A. (2012). What Motivates People to Purchase Digital Items on Virtual Community Websites? The Desire for Online Self-Presentation. Information Systems Research, 23(4), 1232-1245. doi:10.1287/isre.1110.0411Analyzed
(Hann, Hui, Lee, & Png, 2007)Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24 (2), 13-42.Analyzed
(Hanseth & Lyytinen, 2010)Hanseth, O., & Lyytinen, K. (2010). Design theory for dynamic complexity in information infrastructures: the case of building internet. Journal of Information Technology, 25 (1), 1-19. doi:10.1057/jit.2009.19Analyzed
(Hardgrave, Davis, & Riemenschneider, 2003)Hardgrave, B. C., Davis, F. D., & Riemenschneider, C. K. (2003). Investigating determinants of software developers' intentions to follow methodologies. Journal of Management Information Systems, 20 (1), 123-151.Analyzed
(Hardin, Looney, & Fuller, 2014)Hardin, A. M., Looney, C. A., & Fuller, M. A. (2014). Self-efficacy, learning method appropriation and software skills acquisition in learner-controlled CSSTS environments. Information Systems Journal, 24 (1), 3-27. doi:10.1111/isj.12016Analyzed
(He & King, 2008)He, J., & King, W. R. (2008). The Role of User Participation in Information Systems Development: Implications from a Meta-Analysis. Journal of Management Information Systems, 25 (1), 301-331. doi:10.2753/mis0742-1222250111Analyzed
(Heinze & Hu, 2009)Heinze, N., & Hu, Q. (2009). Why college undergraduates choose IT: a multi-theoretical perspective. European Journal of Information Systems, 18 (5), 462-475. doi:10.1057/ejis.2009.30Analyzed
(Herath & Rao, 2009)Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125. doi:10.1057/ejis.2009.6Analyzed
(Herath et al., 2014)Herath, T., Chen, R., Wang, J. G., Banjara, K., Wilbur, J., & Rao, H. R. (2014). Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61-84. doi:10.1111/j.1365-2575.2012.00420.xAnalyzed
(Hess, Fuller, & Mathew, 2005)Hess, T. J., Fuller, M. A., & Mathew, J. (2005). Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness. Journal of Management Information Systems, 22 (3), 15-54.Analyzed
(Hess, McNab, & Basoglu, 2014)Hess, T. J., McNab, A. L., & Basoglu, K. A. (2014). Reliability generalization of perceived ease of use, perceived usefulness, and behavioral intentions. MIS Quarterly: Management Information Systems, 38(1), 1-28.Analyzed
(Ho & Bodoff, 2014)Ho, S. Y., & Bodoff, D. (2014). The effects of web personalization on user attitude and behavior: an integration of the elaboration likeliwood model and consumer search theory. MIS Quarterly, 38(2).Analyzed
(Hoefnagel, Oerlemans, & Goedee, 2014)Hoefnagel, R., Oerlemans, L., & Goedee, J. (2014). How anchoring and adjusting influence citizens' acceptance of video-mediated crime reporting: A narrative approach. Journal of Strategic Information Systems, 23 (4), 305-322. doi:10.1016/j.jsis.2014.09.002Analyzed
(Hoehle & Venkatesh, 2015)Hoehle, H., & Venkatesh, V. (2015). Mobile application usability: conceptualization and instrument development. MIS Quarterly, 39(2), 435-472.Analyzed
(Hoehle, Zhang, & Venkatesh, 2015)Hoehle, H., Zhang, X. J., & Venkatesh, V. (2015). An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability. European Journal of Information Systems, 24 (3), 337-359. doi:10.1057/ejis.2014.43Analyzed
(Hoffmann, Lutz, & Meckel, 2014)Hoffmann, C. P., Lutz, C., & Meckel, M. (2014). Digital Natives or Digital Immigrants? The Impact of User Characteristics on Online Trust. Journal of Management Information Systems, 31 (3), 138-171. doi:10.1080/07421222.2014.995538Analyzed
(Hong & Tam, 2006)Hong, S. J., & Tam, K. Y. (2006). Understanding the adoption of multipurpose information appliances: The case of mobile data services. Information Systems Research, 17 (2), 162-179. doi:10.1287/isre.1060.0088Analyzed
(Horton, Buck, Waterson, & Clegg, 2001)Horton, R. P., Buck, T., Waterson, P. E., & Clegg, C. W. (2001). Explaining intranet use with the technology acceptance model. Journal of Information Technology, 16 (4), 237-248. doi:10.1080/02683960110102407Analyzed
(Hsieh & Wang, 2007)Hsieh, J. J. P. A., & Wang, W. (2007). Explaining employees' extended use of complex information systems. European Journal of Information Systems, 16(3), 216-227. doi:10.1057/palgrave.ejis.3000663Analyzed
(Hsieh, Rai, & Keil, 2011)Hsieh, J. J. P. A., Rai, A., & Keil, M. (2011). Addressing Digital Inequality for the Socioeconomically Disadvantaged Through Government Initiatives: Forms of Capital That Affect ICT Utilization. Information Systems Research, 22(2), 233-253. doi:10.1287/isre.1090.0256Analyzed
(Hsu, Lin, & Wang, 2015)Hsu, C., Lin, Y. T., & Wang, T. (2015). A legitimacy challenge of a cross-cultural interorganizational information system. European Journal of Information Systems, 24(3), 278-294. doi:10.1057/ejis.2014.33Analyzed
(Iivari & Huisman, 2007)Iivari, J., & Huisman, M. (2007). The relationship between organizational culture and the deployment of systems development methodologies. MIS Quarterly, 31(1), 35-58.Analyzed
(Irani, Elliman, & Jackson, 2007)Irani, Z., Elliman, T., & Jackson, P. (2007). Electronic transformation of government in the U.K.: a research agenda. European Journal of Information Systems, 16 (4), 327-335. doi:10.1057/palgrave.ejis.3000698Analyzed
(J. D. Xu, Benbasat, & Cenfetelli, 2011)Xu, J. D., Benbasat, I., & Cenfetelli, R. (2011). The Effects of Service and Consumer Product Knowledge on Online Customer Loyalty. Journal of the Association for Information Systems, 12 (11), 741-766.Analyzed
(J. D. Xu, Benbasat, & Cenfetelli, 2013)Xu, J. D., Benbasat, I., & Cenfetelli, R. T. (2013). Integrating service quality with system and information quality: An empirical test in the E-service context. MIS Quarterly: Management Information Systems, 37(3), 777-794.Analyzed
(J. J. Xu, Abdinnour, & Chaparro, 2017)Xu, J. J., Abdinnour, S., & Chaparro, B. (2017). An Integrated Temporal Model of Belief and Attitude Change: An Empirical Test With the iPad. Journal of the Association for Information Systems, 18 (2), 113-140.Analyzed
(J. J. Xu, Benbasat, & Cenfetelli, 2014)Xu, J. J., Benbasat, I., & Cenfetelli, R. T. (2014). The nature and consequences of trade-off transparency in the context of recommendation agents. MIS Quarterly, 38(2), 379-406.Analyzed
(J. Lee & Rao, 2012)Lee, J., & Rao, H. R. (2012). Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain. Information Systems Journal, 22(4), 313-341. doi:10.1111/j.1365-2575.2011.00388.xAnalyzed
(J. Wu & Du, 2012)Wu, J., & Du, H. W. (2012). Toward a better understanding of behavioral intention and system usage constructs. European Journal of Information Systems, 21 (6), 680-698. doi:10.1057/ejis.2012.15Analyzed
(J. Wu & Lederer, 2009)Wu, J., & Lederer, A. (2009). A meta-analysis of the role of environment-based voluntariness in information technology acceptance. MIS Quarterly: Management Information Systems, 33(2), 419-432.Analyzed
(J. Wu & Lu, 2013)Wu, J., & Lu, X. J. (2013). Effects of Extrinsic and Intrinsic Motivators on Using Utilitarian, Hedonic, and Dual-Purposed Information Systems: A Meta-Analysis. Journal of the Association for Information Systems, 14 (3), 153-191.Analyzed
(Jasperson, Carter, & Zmud, 2005)Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS Quarterly, 29(3), 525-557.Analyzed
(Jensen, Kjaergaard, & Svejvig, 2009)Jensen, T. B., Kjaergaard, A., & Svejvig, P. (2009). Using institutional theory with sensemaking theory: a case study of information system implementation in healthcare. Journal of Information Technology, 24 (4), 343-353. doi:10.1057/jit.2009.11Analyzed
(Jeyaraj, Balser, Chowa, & Griggs, 2009)Jeyaraj, A., Balser, D. B., Chowa, C., & Griggs, G. M. (2009). Organizational and institutional determinants of B2C adoption under shifting environments. Journal of Information Technology, 24 (3), 219-230. doi:10.1057/jit.2008.22Analyzed
(Jeyaraj, Rottman, & Lacity, 2006)Jeyaraj, A., Rottman, J. W., & Lacity, M. C. (2006). A review of the predictors, linkages, and biases in IT innovation adoption research. Journal of Information Technology, 21 (1), 1-23. doi:10.1057/palgrave.jit.2000056Analyzed
(Jiang & Benbasat, 2004)Jiang, Z. H., & Benbasat, I. (2004). Virtual product experience: Effects of visual and functional control of products on perceived diagnosticity and flow in electronic shopping. Journal of Management Information Systems, 21 (3), 111-147.Analyzed
(Johnston & Warkentin, 2010)Johnston, A. C., & Warkentin, M. (2010). FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. MIS Quarterly, 34(3), 549-566.Analyzed
(Joshi, 1991)Joshi, K. (1991). A model of users' perspective on change: The case of information systems technology implementation. MIS Quarterly: Management Information Systems, 15(2), 229-242.Analyzed
(Jung, 2014)Jung, Y. (2014). What a smartphone is to me: understanding user values in using smartphones. Information Systems Journal, 24 (4), 299-321. doi:10.1111/isj.12031Analyzed
(Junglas, Goel, Abraham, & Ives, 2013)Junglas, I., Goel, L., Abraham, C., & Ives, B. (2013). The Social Component of Information Systems-How Sociability Contributes to Technology Acceptance. Journal of the Association for Information Systems, 14 (10), 585-616.Analyzed
(K. H. Lim & Benbasat, 2000)Lim, K. H., & Benbasat, I. (2000). The effect of multimedia on perceived equivocality and perceived usefulness of information systems. MIS Quarterly, 24(3), 449-471. doi:10.2307/3250969Analyzed
(K. H. Lim, Sia, Lee, & Benbasat, 2006)Lim, K. H., Sia, C. L., Lee, M. K. O., & Benbasat, I. (2006). Do I trust you online, and if so, will I buy? An empirical study of two trust-building strategies. Journal of Management Information Systems, 23 (2), 233-266. doi:10.2753/mis0742-1222230210Analyzed
(K. Zhu & Kraemer, 2005)Zhu, K., & Kraemer, K. L. (2005). Post-adoption variations in usage and value of e-business by organizations: Cross-country evidence from the retail industry. Information Systems Research, 16 (1), 61-84. doi:10.1287/isre.1050.0045Analyzed
(K. Zhu, Kraemer, Gurbaxani, & Xu, 2006)Zhu, K., Kraemer, K. L., Gurbaxani, V., & Xu, S. X. (2006). Migration to open-standard interorganizational systems: Network effects, switching costs, and path dependency. MIS Quarterly, 30, 515-539.Analyzed
(Kaba & Touré, 2014)Kaba, B., & Touré, B. (2014). Understanding information and communication technology behavioral intention to use: Applying the UTAUT model to social networking site adoption by young people in a least developed country. Journal of the Association for Information Science and Technology, 65 (8), 1662-1674.Analyzed
(Kaganer, Pawlowski, & Wiley-Patton, 2010)Kaganer, E., Pawlowski, S. D., & Wiley-Patton, S. (2010). Building Legitimacy for IT Innovations: The Case of Computerized Physician Order Entry Systems. Journal of the Association for Information Systems, 11 (1), 1-33.Analyzed
(Kamis, Koufaris, & Stern, 2008)Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32(1), 159-177.Analyzed
(Kane & Borgatti, 2011)Kane, G. C., & Borgatti, S. P. (2011). CENTRALITY-IS PROFICIENCY ALIGNMENT AND WORKGROUP PERFORMANCE. MIS Quarterly, 35(4), 1063-1078.Analyzed
(Kang, Lim, Kim, & Yang, 2012)Kang, S., Lim, K. H., Kim, M. S., & Yang, H. D. (2012). A Multilevel Analysis of the Effect of Group Appropriation on Collaborative Technologies Use and Performance. Information Systems Research, 23 (1), 214-230. doi:10.1287/isre.1100.0342Analyzed
(Kankanhalli, Tan, & Wei, 2005)Kankanhalli, A., Tan, B. C. Y., & Wei, K. K. (2005). Contributing knowledge to electronic knowledge repositories: An empirical investigation. MIS Quarterly, 29(1), 113-143.Analyzed
(Karimi, Somers, & Bhattacherjee, 2007)Karimi, J., Somers, T. M., & Bhattacherjee, A. (2007). The impact of ERP implementation on business process outcomes: A factor-based study. Journal of Management Information Systems, 24 (1), 101-134. doi:10.2753/MIS0742-1222240103Analyzed
(Kayande, De Bruyn, Lilien, Rangaswamy, & van Bruggen, 2009)Kayande, U., De Bruyn, A., Lilien, G. L., Rangaswamy, A., & van Bruggen, G. H. (2009). How Incorporating Feedback Mechanisms in a DSS Affects DSS Evaluations. Information Systems Research, 20 (4), 527-546. doi:10.1287/isre.1080.0198Analyzed
(Ke, Tan, Sia, & Wei, 2012)Ke, W. L., Tan, C. H., Sia, C. L., & Wei, K. K. (2012). Inducing Intrinsic Motivation to Explore the Enterprise System: The Supremacy of Organizational Levers. Journal of Management Information Systems, 29 (3), 257-289. doi:10.2753/mis0742-1222290308Analyzed
(Keith, Babb, Lowry, Furner, & Abdullat, 2015)Keith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., & Abdullat, A. (2015). The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal, 25 (6), 637-667. doi:10.1111/isj.12082Analyzed
(Kelley, Chiasson, Downey, & Pacaud, 2011)Kelley, H., Chiasson, M., Downey, A., & Pacaud, D. (2011). The clinical impact of ehealth on the self-management of diabetes: A double adoption perspective. Journal of the Association of Information Systems, 12 (3), 208-234.Analyzed
(Keutel, Michalik, & Richter, 2014)Keutel, M., Michalik, B., & Richter, J. (2014). Towards mindful case study research in IS: a critical analysis of the past ten years. European Journal of Information Systems, 23 (3), 256-272. doi:10.1057/ejis.2013.26Analyzed
(Khalifa & Liu, 2007)Khalifa, M., & Liu, V. (2007). Online consumer retention: contingent effects of online shopping habit and online shopping experience. European Journal of Information Systems, 16 (6), 780-792. doi:10.1057/palgrave.ejis.3000711Analyzed
(Khoumbati, Themistocleous, & Irani, 2006)Khoumbati, K., Themistocleous, M., & Irani, Z. (2006). Evaluating the adoption of enterprise application integration in health-care organizations. Journal of Management Information Systems, 22 (4), 69-108. doi:10.2753/mis0742-1222220404Analyzed
(Klaus, Wingreen, & Blanton, 2010)Klaus, T., Wingreen, S. C., & Blanton, J. E. (2010). Resistant groups in enterprise system implementations: a Q-methodology examination. Journal of Information Technology, 25 (1), 91-106. doi:10.1057/jit.2009.7Analyzed
(Klein, 2007)Klein, R. (2007). An empirical examination of patient-physician portal acceptance. European Journal of Information Systems, 16 (6), 751-760. doi:10.1057/palgrave.ejis.3000719Analyzed
(Ko & Dennis, 2011)Ko, D. G., & Dennis, A. R. (2011). Profiting from Knowledge Management: The Impact of Time and Experience. Information Systems Research, 22(1), 134-152. doi:10.1287/isre.1090.0247Analyzed
(Ko, Kirsch, & King, 2005)Ko, D. G., Kirsch, L. J., & King, W. R. (2005). Antecedents of Knowledge Transfer from Consultants to Clients in Enterprise System Implementations. MIS Quarterly, 29(1), 59-85.Analyzed
(Koch, Gonzalez, & Leidner, 2012)Koch, H., Gonzalez, E., & Leidner, D. (2012). Bridging the work/social divide: the emotional response to organizational social networking sites. European Journal of Information Systems, 21 (6), 699-717. doi:10.1057/ejis.2012.18Analyzed
(Komiak & Benbasat, 2006)Komiak, S. Y. X., & Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941-960.Analyzed
(Koufaris, 2002)Koufaris, M. (2002). Applying the Technology Acceptance Model and flow theory to online Consumer Behavior. Information Systems Research, 13 (2), 205-223.Analyzed
(Kung, Cegielski, & Kung, 2015)Kung, L., Cegielski, C. G., & Kung, H. J. (2015). An integrated environmental perspective on software as a service adoption in manufacturing and retail firms. Journal of Information Technology, 30 (4), 352-363. doi:10.1057/jit.2015.14Analyzed
(Kurnia & Johnston, 2000)Kurnia, S., & Johnston, R. B. (2000). The need for a processual view of inter-organizational systems adoption. Journal of Strategic Information Systems, 9 (4), 295-319. doi:10.1016/s0963-8687(00)00050-0Analyzed
(L. Chen, Hsieh, Van de Vliert, & Huang, 2015)Chen, L., Hsieh, J., Van de Vliert, E., & Huang, X. (2015). Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization. European Journal of Information Systems, 24(3), 314-336. doi:10.1057/ejis.2014.26Analyzed
(L. Q. Deng, Turner, Gehling, & Prince, 2010)Deng, L. Q., Turner, D. E., Gehling, R., & Prince, B. (2010). User experience, satisfaction, and continual usage intention of IT. European Journal of Information Systems, 19(1), 60-75. doi:10.1057/ejis.2009.50Analyzed
(Lam & Lee, 2006)Lam, J. C. Y., & Lee, M. K. O. (2006). Digital inclusiveness - Longitudinal study of Internet adoption by older adults. Journal of Management Information Systems, 22 (4), 177-206. doi:10.2753/mis0742-1222220407Analyzed
(Lamb & Kling, 2003)Lamb, R., & Kling, R. (2003). Reconceptualizing users as social actors in information systems research. MIS Quarterly, 27(2), 197-235.Analyzed
(Larsen, 2003)Larsen, K. R. T. (2003). A taxonomy of antecedents of information systems success: Variable analysis studies. Journal of Management Information Systems, 20(2), 169-246.Analyzed
(Laumer, Maier, Eckhardt, & Weitzel, 2016)Laumer, S., Maier, C., Eckhardt, A., & Weitzel, T. (2016). User personality and resistance to mandatory information systems in organizations: A theoretical model and empirical test of dispositional resistance to change. Journal of Information Technology, 31 (1), 67-82. doi:10.1057/jit.2015.17Analyzed
(Lederman & Johnston, 2011)Lederman, R., & Johnston, R. B. (2011). Decision support or support for situated choice: lessons for system design from effective manual systems. European Journal of Information Systems, 20 (5), 510-528. doi:10.1057/ejis.2011.11Analyzed
(Liang & Xue, 2009)Liang, H. G., & Xue, Y. J. (2009). AVOIDANCE OF INFORMATION TECHNOLOGY THREATS: A THEORETICAL PERSPECTIVE. MIS Quarterly, 33(1), 71-90.Analyzed
(Liang & Xue, 2010)Liang, H. G., & Xue, Y. J. (2010). Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Journal of the Association for Information Systems, 11 (7), 394-413.Analyzed
(Liang, Peng, Xue, Guo, & Wang, 2015)Liang, H. G., Peng, Z. Y., Xue, Y. J., Guo, X. T., & Wang, N. M. (2015). Employees' Exploration of Complex Systems: An Integrative View. Journal of Management Information Systems, 32 (1), 322-357. doi:10.1080/07421222.2015.1029402Analyzed
(Liang, Saraf, Hu, & Xue, 2007)Liang, H. G., Saraf, N., Hu, Q., & Xue, Y. J. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59-87.Analyzed
(Liang, Xue, & Wu, 2013)Liang, H. G., Xue, Y. J., & Wu, L. S. (2013). Ensuring Employees' IT Compliance: Carrot or Stick? Information Systems Research, 24 (2), 279-294. doi:10.1287/isre.1120.0427Analyzed
(Liang, Xue, Ke, & Wei, 2010)Liang, H. G., Xue, Y. J., Ke, W. L., & Wei, K. K. (2010). Understanding the Influence of Team Climate on IT Use. Journal of the Association for Information Systems, 11(8), 414-432.Analyzed
(Limayem, Hirt, & Cheung, 2007)Limayem, M., Hirt, S. G., & Cheung, C. M. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737.Analyzed
(Lin & Bhattacherjee, 2010)Lin, C. P., & Bhattacherjee, A. (2010). Extending technology usage models to interactive hedonic technologies: A theoretical model and empirical test. Information Systems Journal, 20 (2), 163-181. doi:10.1111/j.1365-2575.2007.00265.xAnalyzed
(Lioliou & Zimmermann, 2015)Lioliou, E., & Zimmermann, A. (2015). Vendor opportunism in IT outsourcing: a TCE and social capital perspective. Journal of Information Technology, 30 (4), 307-324. doi:10.1057/jit.2015.3Analyzed
(Liu, Mezei, Kostakos, & Li, 2017)Liu, Y., Mezei, J., Kostakos, V., & Li, H. X. (2017). Applying configurational analysis to IS behavioural research: a methodological alternative for modelling combinatorial complexities. Information Systems Journal, 27 (1), 59-89. doi:10.1111/isj.12094Analyzed
(Lowry, Cao, & Everard, 2011)Lowry, P. B., Cao, J. W., & Everard, A. (2011). Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures. Journal of Management Information Systems, 27 (4), 163-200. doi:10.2753/mis0742-1222270406Analyzed
(Lowry, Gaskin, & Moody, 2015)Lowry, P. B., Gaskin, J. E., & Moody, G. D. (2015). Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions. Journal of the Association for Information Systems, 16 (7), 515-579.Analyzed
(Lowry, Gaskin, Twyman, Hammer, & Roberts, 2013)Lowry, P. B., Gaskin, J. E., Twyman, N. W., Hammer, B., & Roberts, T. L. (2013). Taking "fun and games" seriously: Proposing the hedonic-motivation system adoption model (HMSAM). Journal of the Association of Information Systems, 14 (11), 617-671.Analyzed
(Lu, Guo, Luo, & Chen, 2015)Lu, B. J., Guo, X. H., Luo, N. L., & Chen, G. Q. (2015). Corporate Blogging and Job Performance: Effects of Work-related and Nonwork-related Participation. Journal of Management Information Systems, 32 (4), 285-314. doi:10.1080/07421222.2015.1138573Analyzed
(Lyytinen & Damsgaard, 2011)Lyytinen, K., & Damsgaard, J. (2011). Inter-organizational information systems adoption - a configuration analysis approach. European Journal of Information Systems, 20 (5), 496-509. doi:10.1057/ejis.2010.71Analyzed
(Lyytinen & Rose, 2003a)Lyytinen, K., & Rose, G. M. (2003a). Disruptive information system innovation: the case of internet computing. Information Systems Journal, 13 (4), 301-330. doi:10.1046/j.1365-2575.2003.00155.xAnalyzed
(Lyytinen & Rose, 2003b)Lyytinen, K., & Rose, G. M. (2003b). The disruptive nature of information technology innovations: The case of Internet computing in systems development organizations. MIS Quarterly, 27(4), 557-595.Analyzed
(M. A. Fuller, Hardin, & Davison, 2006)Fuller, M. A., Hardin, A. M., & Davison, R. M. (2006). Efficacy in technology-mediated distributed teams. Journal of Management Information Systems, 23(3), 209-235. doi:10.2753/mis0742-1222230308Analyzed
(M. I. Hwang & Schmidt, 2011)Hwang, M. I., & Schmidt, F. L. (2011). Assessing moderating effect in meta-analysis: a re-analysis of top management support studies and suggestions for researchers. European Journal of Information Systems, 20(6), 693-702. doi:10.1057/ejis.2011.12Analyzed
(M. O. Lewis, Mathiassen, & Rai, 2011)Lewis, M. O., Mathiassen, L., & Rai, A. (2011). Scalable growth in IT-enabled service provisioning: a sensemaking perspective. European Journal of Information Systems, 20(3), 285-302. doi:10.1057/ejis.2011.5Analyzed
(Ma, Kim, & Kim, 2014)Ma, X., Kim, S. H., & Kim, S. S. (2014). Online Gambling Behavior: The Impacts of Cumulative Outcomes, Recent Outcomes, and Prior Use. Information Systems Research, 25 (3), 511-527. doi:10.1287/isre.2014.0517Analyzed
(Macredie & Mijinyawa, 2011)Macredie, R. D., & Mijinyawa, K. (2011). A theory-grounded framework of Open Source Software adoption in SMEs. European Journal of Information Systems, 20 (2), 237-250. doi:10.1057/ejis.2010.60Analyzed
(Maier, Laumer, Weinert, & Weitzel, 2015)Maier, C., Laumer, S., Weinert, C., & Weitzel, T. (2015). The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use. Information Systems Journal, 25 (3), 275-308. doi:10.1111/isj.12068Analyzed
(Malhotra & Galletta, 2005)Malhotra, Y., & Galletta, D. (2005). A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information Systems, 22 (1), 117-151.Analyzed
(Malhotra, Galletta, & Kirsch, 2008)Malhotra, Y., Galletta, D. F., & Kirsch, L. J. (2008). How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations. Journal of Management Information Systems, 25 (1), 267-299. doi:10.2753/mis0742-1222250110Analyzed
(Mangalaraj, Mahapatra, & Nerur, 2009)Mangalaraj, G., Mahapatra, R., & Nerur, S. (2009). Acceptance of software process innovations - the case of extreme programming. European Journal of Information Systems, 18 (4), 344-354. doi:10.1057/ejis.2009.23Analyzed
(Mao & Benbasat, 1998)Mao, J. Y., & Benbasat, I. (1998). Contextualized access to knowledge: theoretical perspectives and a process‐tracing study. Information Systems Journal, 8 (3), 217-239.Analyzed
(Marakas, Johnson, & Clay, 2007)Marakas, G. M., Johnson, R. D., & Clay, P. F. (2007). The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8 (1), 15-46.Analyzed
(Marakas, Yi, & Johnson, 1998)Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research, 9 (2), 126-163. doi:10.1287/isre.9.2.126Analyzed
(Marcolin, Compeau, Munro, & Huff, 2000)Marcolin, B. L., Compeau, D. R., Munro, M. C., & Huff, S. L. (2000). Assessing user competence: Conceptualization and measurement. Information Systems Research, 11 (1), 37-60. doi:10.1287/isre.11.1.37.11782Analyzed
(Marginson, King, & McAulay, 2000)Marginson, D., King, M., & McAulay, L. (2000). Executives' use of information technology: comparison of electronic mail and an accounting information system. Journal of Information Technology, 15 (2), 149-164.Analyzed
(Markus & Silver, 2008)Markus, M. L., & Silver, M. S. (2008). A Foundation for the Study of IT Effects: A New Look at DeSanctis and Poole's Concepts of Structural Features and Spirit. Journal of the Association for Information Systems, 9 (10), 609-632.Analyzed
(Markus, Steinfield, Wigand, & Minton, 2006)Markus, M. L., Steinfield, C. W., Wigand, R. T., & Minton, G. (2006). Industry-wide information systems standardization as collective action: The case of the US residential mortgage industry. MIS Quarterly, 30, 439-465.Analyzed
(Maruping & Magni, 2015)Maruping, L. M., & Magni, M. (2015). MOTIVATING EMPLOYEES TO EXPLORE COLLABORATION TECHNOLOGY IN TEAM CONTEXTS. MIS Quarterly, 39(1), 1-U369.Analyzed
(Mathieson, 1991)Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2 (3), 173-191.Analyzed
(McCoy, Galletta, & King, 2007)McCoy, S., Galletta, D. F., & King, W. R. (2007). Applying TAM across cultures: The need for caution. European Journal of Information Systems, 16 (1), 81-90. doi:10.1057/palgrave.ejis.3000659Analyzed
(McElroy, Hendrickson, Townsend, & DeMarie, 2007)McElroy, J. C., Hendrickson, A. R., Townsend, A. M., & DeMarie, S. M. (2007). Dispositional factors in internet use: Personality versus cognitive style. MIS Quarterly, 31(4), 809-820.Analyzed
(McKnight, Choudhury, & Kacmar, 2002a)McKnight, D. H., Choudhury, V., & Kacmar, C. (2002a). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13 (3), 334-359. doi:10.1287/isre.13.3.334.81Analyzed
(McKnight, Choudhury, & Kacmar, 2002b)McKnight, D. H., Choudhury, V., & Kacmar, C. (2002b). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems, 11 (3-4), 297-323.Analyzed
(Melas, Zampetakis, Dimopoulou, & Moustakis, 2014)Melas, C. D., Zampetakis, L. A., Dimopoulou, A., & Moustakis, V. S. (2014). An empirical investigation of Technology Readiness among medical staff based in Greek hospitals. European Journal of Information Systems, 23 (6), 672-690. doi:10.1057/ejis.2013.23Analyzed
(Meso, Musa, & Mbarika, 2005)Meso, P., Musa, P., & Mbarika, V. (2005). Towards a model of consumer use of mobile information and communication technology in LDCs: the case of sub-Saharan Africa. Information Systems Journal, 15 (2), 119-146. doi:10.1111/j.1365-2575.2005.00190.xAnalyzed
(Messerschmidt & Hinz, 2013)Messerschmidt, C. M., & Hinz, O. (2013). Explaining the adoption of grid computing: An integrated institutional theory and organizational capability approach. Journal of Strategic Information Systems, 22 (2), 137-156. doi:10.1016/j.jsis.2012.10.005Analyzed
(Mignerat & Rivard, 2009)Mignerat, M., & Rivard, S. (2009). Positioning the institutional perspective in information systems research. Journal of Information Technology, 24 (4), 369-391. doi:10.1057/jit.2009.13Analyzed
(Miranda, Kim, & Summers, 2015)Miranda, S. M., Kim, I., & Summers, J. D. (2015). Jamming with social media: How cognitive structuring of organizing vision facets affects it innovation diffusion. MIS Quarterly: Management Information Systems, 39(3), 591-614.Analyzed
(Mirchandani & Lederer, 2014)Mirchandani, D. A., & Lederer, A. L. (2014). Autonomy and procedural justice in strategic systems planning. Information Systems Journal, 24 (1), 29-59. doi:10.1111/j.1365-2575.2012.00419.xAnalyzed
(Money, 1995)Money, W. H. (1995). Applying group support systems to classroom settings: A social cognitive learning theory explanation. Journal of Management Information Systems, 12 (3), 65-80.Analyzed
(Montoya, Massey, & Khatri, 2010)Montoya, M. M., Massey, A. P., & Khatri, V. (2010). Connecting IT Services Operations to Services Marketing Practices. Journal of Management Information Systems, 26 (4), 65-85. doi:10.2753/mis0742-1222260403Analyzed
(Mueller, Viering, Legner, & Riempp, 2010)Mueller, B., Viering, G., Legner, C., & Riempp, G. (2010). Understanding the Economic Potential of Service-Oriented Architecture. Journal of Management Information Systems, 26 (4), 145-180. doi:10.2753/mis0742-1222260406Analyzed
(Murray & Haubl, 2011)Murray, K. B., & Haubl, G. (2011). FREEDOM OF CHOICE, EASE OF USE, AND THE FORMATION OF INTERFACE PREFERENCES. MIS Quarterly, 35(4), 955-976.Analyzed
(Mustonen-Ollila & Lyytinen, 2003)Mustonen-Ollila, E., & Lyytinen, K. (2003). Why organizations adopt information system process innovations: a longitudinal study using Diffusion of Innovation theory. Information Systems Journal, 13 (3), 275-297. doi:10.1046/j.1365-2575.2003.00141.xAnalyzed
(Myyry, Siponen, Pahnila, Vartiainen, & Vance, 2009)Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18 (2), 126-139.Analyzed
(N. Au, Ngai, & Cheng, 2008)Au, N., Ngai, E. W. T., & Cheng, T. C. E. (2008). Extending the Understanding of End User Information Systems Satisfaction Formation: An Equitable Needs Fulfillment Model Approach. MIS Quarterly, 32(1), 43-66.Analyzed
(N. K. Lankton & McKnight, 2012)Lankton, N. K., & McKnight, H. D. (2012). Examining Two Expectation Disconfirmation Theory Models: Assimilation and Asymmetry Effects. Journal of the Association for Information Systems, 13(2), 88-115. Analyzed
(N. Lankton, McKnight, & Thatcher, 2014)Lankton, N., McKnight, D. H., & Thatcher, J. B. (2014). Incorporating trust-in-technology into Expectation Disconfirmation Theory. Journal of Strategic Information Systems, 23(2), 128-145. doi:10.1016/j.jsis.2013.09.001Analyzed
(Nadkarni & Gupta, 2007)Nadkarni, S., & Gupta, R. (2007). A task-based model of perceived website complexity. MIS Quarterly, 31(3), 501-524.Analyzed
(Nah, Eschenbrenner, & DeWester, 2011)Nah, F. F.-H., Eschenbrenner, B., & DeWester, D. (2011). Enhancing brand equity through flow and telepresence: A comparison of 2D and 3D virtual worlds. MIS Quarterly, 35(3), 731-747.Analyzed
(Nambisan, 2003)Nambisan, S. (2003). Information systems as a reference discipline for new product development. MIS Quarterly, 27(1), 1-18.Analyzed
(Nambisan, Agarwal, & Tanniru, 1999)Nambisan, S., Agarwal, R., & Tanniru, M. (1999). Organizational mechanisms for enhancing user innovation in information technology. MIS Quarterly, 23(3), 365-395. doi:10.2307/249468Analyzed
(Nan & Johnston, 2009)Nan, N., & Johnston, E. W. (2009). Using Multi-Agent Simulation to Explore the Contribution of Facilitation to GSS Transition. Journal of the Association for Information Systems, 10 (3), 252-277.Analyzed
(Nan & Lu, 2014)Nan, N., & Lu, Y. (2014). HARNESSING THE POWER OF SELF-ORGANIZATION IN AN ONLINE COMMUNITY DURING ORGANIZATIONAL CRISIS. MIS Quarterly, 38(4), 1135-1157.Analyzed
(Nan, 2011)Nan, N. (2011). CAPTURING BOTTOM-UP INFORMATION TECHNOLOGY USE PROCESSES: A COMPLEX ADAPTIVE SYSTEMS MODEL. MIS Quarterly, 35(2), 505-532.Analyzed
(Nardon & Aten, 2012)Nardon, L., & Aten, K. (2012). Valuing Virtual Worlds: The Role of Categorization in Technology Assessment. Journal of the Association for Information Systems, 13 (10), 772-796.Analyzed
(Nelson & Cheney, 1987)Nelson, R. R., & Cheney, P. H. (1987). Training end users: An exploratory study. MIS Quarterly: Management Information Systems, 11(4), 547-559.Analyzed
(Nelson, Todd, & Wixom, 2005)Nelson, R. R., Todd, P. A., & Wixom, B. H. (2005). Antecedents of information and system quality: An empirical examination within the context of data warehousing. Journal of Management Information Systems, 21 (4), 199-235.Analyzed
(Nevo, Nevo, & Kim, 2012)Nevo, S., Nevo, D., & Kim, H. (2012). From recreational applications to workplace technologies: an empirical study of cross-context IS continuance in the case of virtual worlds. Journal of Information Technology, 27 (1), 74-86. doi:10.1057/jit.2011.18Analyzed
(Nevo, Nevo, & Pinsonneault, 2016)Nevo, S., Nevo, D., & Pinsonneault, A. (2016). A temporally situated self-agency theory of information technology reinvention. MIS Quarterly: Management Information Systems, 40(1), 157-186.Analyzed
(Nicolaou & McKnight, 2006)Nicolaou, A. I., & McKnight, D. H. (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information systems research, 17 (4), 332-351.Analyzed
(Nicolaou & McKnight, 2011)Nicolaou, A. I., & McKnight, D. H. (2011). System Design Features and Repeated Use of Electronic Data Exchanges. Journal of Management Information Systems, 28 (2), 269-304. doi:10.2753/mis0742-1222280210Analyzed
(O. Shmueli, Pliskin, & Fink, 2016)Shmueli, O., Pliskin, N., & Fink, L. (2016). Can the outside-view approach improve planning decisions in software development projects? Information Systems Journal, 26(4), 395-418. doi:10.1111/isj.12091Analyzed
(Olivera, Goodman, & Tan, 2008)Olivera, F., Goodman, P. S., & Tan, S. S.-L. (2008). Contribution Behaviors in Distributed Environments. MIS Quarterly, 32(1), 23-42.Analyzed
(Ondrus, Gannamaneni, & Lyytinen, 2015)Ondrus, J., Gannamaneni, A., & Lyytinen, K. (2015). The impact of openness on the market potential of multi-sided platforms: a case study of mobile payment platforms. Journal of Information Technology, 30 (3), 260-275. doi:10.1057/jit.2015.7Analyzed
(Osei-Bryson & Ngwenyama, 2011)Osei-Bryson, K. M., & Ngwenyama, O. (2011). Using decision tree modelling to support Peircian abduction in IS research: a systematic approach for generating and evaluating hypotheses for systematic theory development. Information Systems Journal, 21(5), 407-440. doi:10.1111/j.1365-2575.2010.00368.xAnalyzed
(Osei-Bryson, Dong, & Ngwenyama, 2008)Osei-Bryson, K. M., Dong, L. Y., & Ngwenyama, O. (2008). Exploring managerial factors affecting ERP implementation: an investigation of the Klein-Sorra model using regression splines. Information Systems Journal, 18(5), 499-527. doi:10.1111/j.1365-2575.2008.00309.xAnalyzed
(P. F. Wu, 2012)Wu, P. F. (2012). A Mixed Methods Approach to Technology Acceptance Research. Journal of the Association for Information Systems, 13(3), 172-187.Analyzed
(P. Wang & Ramiller, 2009)Wang, P., & Ramiller, N. C. (2009). COMMUNITY LEARNING IN INFORMATION TECHNOLOGY INNOVATION. MIS Quarterly, 33(4), 709-734.Analyzed
(P. Wang, 2010)Wang, P. (2010). Chasing the hottest it: Effects of information technology fashion on organizations. MIS Quarterly: Management Information Systems, 34(1), 63-85.Analyzed
(P. Zhang, 2013)Zhang, P. (2013). THE AFFECTIVE RESPONSE MODEL: A THEORETICAL FRAMEWORK OF AFFECTIVE CONCEPTS AND THEIR RELATIONSHIPS IN THE ICT CONTEXT. MIS Quarterly, 37(1), 247-+.Analyzed
(Palka, Pousttchi, & Wiedemann, 2009)Palka, W., Pousttchi, K., & Wiedemann, D. G. (2009). Mobile word-of-mouth - A grounded theory of mobile viral marketing. Journal of Information Technology, 24 (2), 122-185. doi:10.1057/jit.2008.37Analyzed
(Parboteeah, Valacich, & Wells, 2009)Parboteeah, D. V., Valacich, J. S., & Wells, J. D. (2009). The Influence of Website Characteristics on a Consumer's Urge to Buy Impulsively. Information Systems Research, 20 (1), 60-78. doi:10.1287/isre.1070.0157Analyzed
(Park, Sharman, & Rao, 2015)Park, I., Sharman, R., & Rao, H. R. (2015). DISASTER EXPERIENCE AND HOSPITAL INFORMATION SYSTEMS: AN EXAMINATION OF PERCEIVED INFORMATION ASSURANCE, RISK, RESILIENCE, AND HIS USEFULNESS. MIS Quarterly, 39(2), 317-U372.Analyzed
(Pavlou, 2011)Pavlou, P. A. (2011). STATE OF THE INFORMATION PRIVACY LITERATURE: WHERE ARE WE NOW AND WHERE SHOULD WE GO? MIS Quarterly, 35(4), 977-988.Analyzed
(Peace, Galletta, & Thong, 2003)Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20 (1), 153-177.Analyzed
(Peng, Dey, & Lahiri, 2014)Peng, G., Dey, D., & Lahiri, A. (2014). Healthcare IT Adoption: An Analysis of Knowledge Transfer in Socioeconomic Networks. Journal of Management Information Systems, 31 (3), 7-34. doi:10.1080/07421222.2014.994672Analyzed
(Petter, DeLone, & McLean, 2008)Petter, S., DeLone, W., & McLean, E. (2008). Measuring information systems success: models, dimensions, measures, and interrelationships. European Journal of Information Systems, 17 (3), 236-263. doi:10.1057/ejis.2008.15Analyzed
(Petter, DeLone, & McLean, 2013)Petter, S., DeLone, W., & McLean, E. R. (2013). Information Systems Success: The Quest for the Independent Variables. Journal of Management Information Systems, 29 (4), 7-61. doi:10.2753/MIS0742-1222290401Analyzed
(Phang, Kankanhalli, & Huang, 2014)Phang, C. W., Kankanhalli, A., & Huang, L. (2014). Drivers of quantity and quality of participation in online policy deliberation forums. Journal of Management Information Systems, 31 (3), 172-212.Analyzed
(Phelps & Mok, 1999)Phelps, R., & Mok, M. (1999). Managing the risks of intranet implementation: an empirical study of user satisfaction. Journal of Information Technology, 14 (1), 39-52.Analyzed
(Polites, Roberts, & Thatcher, 2012)Polites, G. L., Roberts, N., & Thatcher, J. (2012). Conceptualizing models using multidimensional constructs: a review and guidelines for their use. European Journal of Information Systems, 21 (1), 22-48. doi:10.1057/ejis.2011.10Analyzed
(Popovic, Hackney, Coelho, & Jaklic, 2014)Popovic, A., Hackney, R., Coelho, P. S., & Jaklic, J. (2014). How information-sharing values influence the use of information systems: An investigation in the business intelligence systems context. Journal of Strategic Information Systems, 23 (4), 270-283. doi:10.1016/j.jsis.2014.08.003Analyzed
(Porra, Hirschheim, & Parks, 2005)Porra, J., Hirschheim, R., & Parks, M. S. (2005). The history of texaco's corporate information technology function: a general systems theoretical interpretation. MIS Quarterly, 29(4), 721-746.Analyzed
(Pozzebon, Mackrell, & Nielsen, 2014)Pozzebon, M., Mackrell, D., & Nielsen, S. (2014). Structuration bridging diffusion of innovations and gender relations theories: A case of paradigmatic pluralism in IS research. Information Systems Journal, 24 (3), 229-248. doi:10.1111/isj.12007Analyzed
(Pramatari & Theotokis, 2009)Pramatari, K., & Theotokis, A. (2009). Consumer acceptance of RFID-enabled services: A model of multiple attitudes, perceived system characteristics and individual traits. European Journal of Information Systems, 18 (6), 541-552. doi:10.1057/ejis.2009.40Analyzed
(Premkumar, Ramamurthy, & Nilakanta, 1994)Premkumar, G., Ramamurthy, K., & Nilakanta, S. (1994). Implementation of electronic data interchange: An innovation diffusion perspective. Journal of Management Information Systems, 11 (2), 157-186.Analyzed
(Q. Hu, West, & Smarandescu, 2015)Hu, Q., West, R., & Smarandescu, L. (2015). The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. Journal of Management Information Systems, 31(4), 6-48. doi:10.1080/07421222.2014.1001255Analyzed
(Q. Huang, Chen, Ou, Davison, & Hua, 2017)Huang, Q., Chen, X. Y., Ou, C. X., Davison, R. M., & Hua, Z. S. (2017). Understanding buyers' loyalty to a C2C platform: the roles of social capital, satisfaction and perceived effectiveness of e-commerce institutional mechanisms. Information Systems Journal, 27(1), 91-119. doi:10.1111/isj.12079Analyzed
(Qiu & Benbasat, 2009)Qiu, L. Y., & Benbasat, I. (2009). Evaluating Anthropomorphic Product Recommendation Agents: A Social Relationship Perspective to Designing Information Systems. Journal of Management Information Systems, 25 (4), 145-181. doi:10.2753/mis0742-1222250405Analyzed
(Quaddus & Hofmeyer, 2007)Quaddus, M., & Hofmeyer, G. (2007). An investigation into the factors influencing the adoption of B2B trading exchanges in small businesses. European Journal of Information Systems, 16 (3), 202-215. doi:10.1057/palgrave.ejis.3000671Analyzed
(R. Chen & Sharma, 2015)Chen, R., & Sharma, S. K. (2015). Learning and self-disclosure behavior on social networking sites: the case of Facebook users. European Journal of Information Systems, 24(1), 93-106. doi:10.1057/ejis.2013.31Analyzed
(R. D. Johnson & Marakas, 2000)Johnson, R. D., & Marakas, G. M. (2000). Research report: The role of behavioral modeling in computer skills acquisition - Toward refinement of the model. Information Systems Research, 11(4), 402-417. doi:10.1287/isre.11.4.402.11869Analyzed
(R. M. Fuller & Dennis, 2009)Fuller, R. M., & Dennis, A. R. (2009). Does fit matter? The impact of task-technology fit and appropriation on team performance in repeated tasks. Information Systems Research, 20(1), 2-17.Analyzed
(Ragowsky, Stern, & Adams, 2000)Ragowsky, A., Stern, M., & Adams, D. A. (2000). Relating benefits from using IS to an organization's operating characteristics: Interpreting results from two countries. Journal of Management Information Systems, 16 (4), 175-194.Analyzed
(Ragu-Nathan, Tarafdar, Ragu-Nathan, & Tu, 2008)Ragu-Nathan, T. S., Tarafdar, M., Ragu-Nathan, B. S., & Tu, Q. (2008). The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation. Information Systems Research, 19 (4), 417-433. doi:10.1287/isre.1070.0165Analyzed
(Ramiller & Pentland, 2009)Ramiller, N. C., & Pentland, B. T. (2009). Management Implications in Information Systems Research: The Untold Story. Journal of the Association for Information Systems, 10 (6), 474-494.Analyzed
(Ramiller & Swanson, 2003)Ramiller, N. C., & Swanson, E. B. (2003). Organizing visions for information technology and the information systems executive response. Journal of Management Information Systems, 20 (1), 13-50.Analyzed
(Ranganathan, Seo, & Babad, 2006)Ranganathan, C., Seo, D., & Babad, Y. (2006). Switching behavior of mobile users: do users' relational investments and demographics matter? European Journal of Information Systems, 15 (3), 269-276. doi:10.1057/palgrave.ejis.3000616Analyzed
(Recker, 2010)Recker, J. (2010). Continued use of process modeling grammars: the impact of individual difference factors. European Journal of Information Systems, 19 (1), 76-92. doi:10.1057/ejis.2010.5Analyzed
(Rensel, Abbas, & Rao, 2006)Rensel, A. D., Abbas, J. M., & Rao, H. R. (2006). Private transactions in public places: an exploration of the impact of the computer environment on public transactional web site use. Journal of the Association for Information Systems, 7 (1), 19-51.Analyzed
(Riaz, Rambli, Salleh, & Mushtaq, 2011)Riaz, S., Rambli, D. R. A., Salleh, R., & Mushtaq, A. (2011). Exploratory Factor Analysis (EFA) to Examine Learner’s Aesthetic Perceptions and Motivation Through their Aesthetic-Emotions in Informal Visual Environments. 10 (7), 1268- 1284.Analyzed
(Riedl, Mohr, Kening, Davis, & Hekeren, 2014)Riedl, R., Mohr, P. N. C., Kening, P. H., Davis, F. D., & Hekeren, H. R. (2014). Trusting Humans and Avatars: A Brain Imaging Study Based on Evolution Theory. Journal of Management Information Systems, 30 (4), 83-113. doi:10.2753/mis0742-1222300404Analyzed
(Riemer & Johnston, 2014)Riemer, K., & Johnston, R. B. (2014). Rethinking the place of the artefact in IS using Heidegger's analysis of equipment. European Journal of Information Systems, 23 (3), 273-288. doi:10.1057/ejis.2013.5Analyzed
(Robert & Sykes, 2017)Robert, L. P., & Sykes, T. A. (2017). Extending the Concept of Control Beliefs: Integrating the Role of Advice Networks. Information Systems Research, 28 (1), 84-96. doi:10.1287/isre.2016.0666Analyzed
(Robey, Im, & Wareham, 2008)Robey, D., Im, G., & Wareham, J. D. (2008). Theoretical Foundations of Empirical Research on Interorganizational Systems: Assessing Past Contributions and Guiding Future Directions. Journal of the Association for Information Systems, 9 (9), 497-518.Analyzed
(Romano, Pick, & Roztocki, 2010)Romano, N. C., Pick, J. B., & Roztocki, N. (2010). A motivational model for technology-supported cross-organizational and cross-border collaboration. European Journal of Information Systems, 19 (2), 117-133.Analyzed
(Rowe, 2005)Rowe, F. (2005). Are decision support systems getting people to conform? the impact of work organisation and segmentation on user behaviour in a French bank. Journal of Information Technology, 20 (2), 103-116. doi:10.1057/palgrave.jit.2000042Analyzed
(Ruth, 2012)Ruth, R. D. (2012). Conversation as a source of satisfaction and continuance in a question-and-answer site. European Journal of Information Systems, 21 (4), 427-437. doi:10.1057/ejis.2011.42Analyzed
(S. A. Brown & Venkatesh, 2005)Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS Quarterly, 29(3), 399-426.Analyzed
(S. L. Johnson, Faraj, & Kudaravalli, 2014)Johnson, S. L., Faraj, S., & Kudaravalli, S. (2014). Emergence of Power Laws in Online Communities: The Role of Social Mechanisms and Preferential Attachment. MIS Quarterly, 38(3), 795-808. Analyzed
(S. Lee, Shin, & Lee, 2009)Lee, S., Shin, B., & Lee, H. G. (2009). Understanding Post-adoption Usage of Mobile Data Services: The Role of Supplier-side Variables. Journal of the Association for Information Systems, 10(12), 860-888.Analyzed
(S. S. Kim & Son, 2009)Kim, H. W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS Quarterly: Management Information Systems, 33(3), 567-582.Analyzed
(S. S. Kim, Malhotra, & Narasimhan, 2005)Kim, S. S., Malhotra, N. K., & Narasimhan, S. (2005). Two competing perspectives on automatic use: A theoretical and empirical comparison. Information Systems Research, 16(4), 418-432. doi:10.1287/isre.1050.0070Analyzed
(Saccol & Reinhard, 2006)Saccol, A. Z., & Reinhard, N. (2006). The Hospitality Metaphor as a theoretical lens for understanding the ICT adoption process. Journal of Information Technology, 21 (3), 154-164. doi:10.1057/palgrave.jit.2000067Analyzed
(Saeed & Abdinnour, 2013)Saeed, K. A., & Abdinnour, S. (2013). Understanding post-adoption IS usage stages: an empirical assessment of self-service information systems. Information Systems Journal, 23 (3), 219-244. doi:10.1111/j.1365-2575.2011.00389.xAnalyzed
(Santhanarn, Sasidharan, & Webster, 2008)Santhanarn, R., Sasidharan, S., & Webster, J. (2008). Using self-regulatory learning to enhance e-learning-based information technology training. Information Systems Research, 19 (1), 26-47. doi:10.1287/isre.1070.0141Analyzed
(Scheepers, 2006)Scheepers, R. (2006). A conceptual framework for the implementation of enterprise information portals in large organizations. European Journal of Information Systems, 15 (6), 635-647. doi:10.1057/palgrave.ejis.3000646Analyzed
(Schmitz, Teng, & Webb, 2016)Schmitz, K., Teng, J. T., & Webb, K. (2016). Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals. MIS Quarterly, 40(3), 663-686.Analyzed
(Schwarz & Chin, 2007)Schwarz, A., & Chin, W. (2007). Looking forward: Toward an understanding of the nature and definition of IT acceptance. Journal of the Association of Information Systems, 8 (4), 230-243.Analyzed
(Schwarz, Chin, Hirschheim, & Schwarz, 2014)Schwarz, A., Chin, W. W., Hirschheim, R., & Schwarz, C. (2014). Toward a process-based view of information technology acceptance. Journal of Information Technology, 29 (1), 73-96. doi:10.1057/jit.2013.31Analyzed
(Seddon, 1997)Seddon, P. B. (1997). A respecification and extension of the DeLone and McLean model of IS success. Information Systems Research, 8 (3), 240-253. doi:10.1287/isre.8.3.240Analyzed
(Seidel, Recker, & vom Brocke, 2013)Seidel, S., Recker, J., & vom Brocke, J. (2013). SENSEMAKING AND SUSTAINABLE PRACTICING: FUNCTIONAL AFFORDANCES OF INFORMATION SYSTEMS IN GREEN TRANSFORMATIONS. MIS Quarterly, 37(4), 1275-+.Analyzed
(Sen, 2007)Sen, R. (2007). A strategic analysis of competition between open source and proprietary software. Journal of Management Information Systems, 24 (1), 233-257. doi:10.2753/mis0742-1222240107Analyzed
(Serrano & Karahanna, 2016)Serrano, C., & Karahanna, E. (2016). The Compensatory Interaction between User Capabilities and Technology Capabilities in Influencing Task Performance: An Empirical Assessment in Telemedicine Consultations. Management Information Systems Quarterly, 40 (3), 597-621.Analyzed
(Sharma & Yetton, 2003)Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS Quarterly, 27(4), 533-555.Analyzed
(Sharma, Yetton, & Crawford, 2009)Sharma, R., Yetton, P., & Crawford, J. (2009). Estimating the effect of common method variance: The method-method pair technique with an illustration from tam research. MIS Quarterly: Management Information Systems, 33(3), 473-490.Analyzed
(Shayo, Olfman, & Teitelroit, 1999)Shayo, C., Olfman, L., & Teitelroit, R. (1999). An exploratory study of the value of pretraining end-user participation. Information Systems Journal, 9 (1), 55-79. doi:10.1046/j.1365-2575.1999.00049.xAnalyzed
(Shen, Lee, Cheung, & Chen, 2010)Shen, A. X. L., Lee, M. K. O., Cheung, C. M. K., & Chen, H. P. (2010). Gender differences in intentional social action: we-intention to engage in social network-facilitated team collaboration. Journal of Information Technology, 25 (2), 152-169. doi:10.1057/jit.2010.12Analyzed
(Shepherd, Clegg, & Stride, 2009)Shepherd, C., Clegg, C., & Stride, C. (2009). Opening the black box: A multi-method analysis of an enterprise resource planning implementation. Journal of Information Technology, 24 (1), 81-102. doi:10.1057/jit.2008.32Analyzed
(Shuraida & Barki, 2013)Shuraida, S., & Barki, H. (2013). The influence of analyst communication in IS projects. Journal of the Association of Information Systems, 14 (9), 482-520.Analyzed
(Sia et al., 2009)Sia, C. L., Lim, K. H., Leung, K., Lee, M. K. O., Huang, W. W., & Benbasat, I. (2009). WEB STRATEGIES TO PROMOTE INTERNET SHOPPING: IS CULTURAL-CUSTOMIZATION NEEDED? MIS Quarterly, 33(3), 491-512.Analyzed
(Silva, 2007)Silva, L. (2007). Post-positivist review of Technology Acceptance Model. Journal of the Association of Information Systems, 8 (4), 255-266.Analyzed
(Singh, Dalal, & Spears, 2005)Singh, S. N., Dalal, N., & Spears, N. (2005). Understanding Web home page perception. European Journal of Information Systems, 14 (3), 288-302. doi:10.1057/palgrave.ejis.3000525Analyzed
(Sipior, Ward, & Connolly, 2011)Sipior, J. C., Ward, B. T., & Connolly, R. (2011). The digital divide and t-government in the United States: Using the technology acceptance model to understand usage. European Journal of Information Systems, 20 (3), 308-328. doi:10.1057/ejis.2010.64Analyzed
(Siponen & Iivari, 2006)Siponen, M., & Iivari, J. (2006). Six design theories for IS security policies and guidelines. Journal of the Association for Information Systems, 7 (7), 445-472.Analyzed
(Skerlavaj, Dimovski, & Desouza, 2010)Skerlavaj, M., Dimovski, V., & Desouza, K. C. (2010). Patterns and structures of intra-organizational learning networks within a knowledge-intensive organization. Journal of Information Technology, 25 (2), 189-204. doi:10.1057/jit.2010.3Analyzed
(Smith, Johnston, & Howard, 2011)Smith, S. P., Johnston, R. B., & Howard, S. (2011). Putting Yourself in the Picture: An Evaluation of Virtual Model Technology as an Online Shopping Tool. Information Systems Research, 22 (3), 640-659. doi:10.1287/isre.1090.0279Analyzed
(Sojer, Alexy, Kleinknecht, & Henkel, 2014)Sojer, M., Alexy, O., Kleinknecht, S., & Henkel, J. (2014). Understanding the Drivers of Unethical Programming Behavior: The Inappropriate Reuse of Internet-Accessible Code. Journal of Management Information Systems, 31 (3), 287-325. doi:10.1080/07421222.2014.995563Analyzed
(Söllner, Hoffmann, & Leimeister, 2016)Söllner, M., Hoffmann, A., & Leimeister, J. M. (2016). Why different trust relationships matter for information systems users. European Journal of Information Systems, 25(3), 274-287. doi:10.1057/ejis.2015.17Analyzed
(Son & Benbasat, 2007)Son, J. Y., & Benbasat, I. (2007). Organizational Buyers' adoption and use of B2B electronic marketplaces: Efficiency- and legitimacy-oriented perspectives. Journal of Management Information Systems, 24 (1), 55-99. doi:10.2753/mis0742-1222240102Analyzed
(Sorensen & Lundh-Snis, 2001)Sorensen, C., & Lundh-Snis, U. (2001). Innovation through knowledge codification. Journal of Information Technology, 16 (2), 83-97. doi:10.1080/026839600110054771Analyzed
(Soror, Hammer, Steelman, Davis, & Limayem, 2015)Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective. Information Systems Journal, 25 (4), 403-427. doi:10.1111/isj.12065Analyzed
(Stafford & Turan, 2011)Stafford, T. F., & Turan, A. H. (2011). Online tax payment systems as an emergent aspect of governmental transformation. European Journal of Information Systems, 20 (3), 343-357. doi:10.1057/ejis.2010.63Analyzed
(Stanko, 2016)Stanko, M. A. (2016). Toward a theory of remixing in online innovation communities. Information Systems Research, 27 (4), 773-791. doi:10.1287/isre.2016.0650Analyzed
(Steelman, Hammer, & Limayem, 2014)Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly: Management Information Systems, 38(2), 355-378.Analyzed
(Stein, Newell, Wagner, & Galliers, 2015)Stein, M. K., Newell, S., Wagner, E. L., & Galliers, R. D. (2015). COPING WITH INFORMATION TECHNOLOGY: MIXED EMOTIONS, VACILLATION, AND NONCONFORMING USE PATTERNS. MIS Quarterly, 39(2), 367-U434.Analyzed
(Stewart, Ammeter, & Maruping, 2006)Stewart, K. J., Ammeter, A. P., & Maruping, L. M. (2006). Impacts of license choice and organizational sponsorship on user interest and development activity in open source software projects. Information Systems Research, 17 (2), 126-144. doi:10.1287/isre.1060.0082Analyzed
(Strader, Ramaswami, & Houle, 2007)Strader, T. J., Ramaswami, S. N., & Houle, P. A. (2007). Perceived network externalities and communication technology acceptance. European Journal of Information Systems, 16 (1), 54-65. doi:10.1057/palgrave.ejis.3000657Analyzed
(Straub & Burton-Jones, 2007)Straub, D. W., & Burton-Jones, A. (2007). Veni, vidi, vici: Breaking the TAM logjam. Journal of the Association for Information Systems, 8(4), 223-229.Analyzed
(Straub, 1994)Straub, D. W. (1994). The effect of culture on IT diffusion: E-mail and FAX in Japan and the U.S. Information Systems Research, 5(1), 23-47.Analyzed
(Sussman & Siegal, 2003)Sussman, S. W., & Siegal, W. S. (2003). Informational influence in organizations: An integrated approach to knowledge adoption. Information Systems Research, 14 (1), 47-65. doi:10.1287/isre.14.1.47.14767Analyzed
(T. Hu, Kettinger, & Poston, 2015)Hu, T., Kettinger, W. J., & Poston, R. S. (2015). The effect of online social value on satisfaction and continued use of social media. European Journal of Information Systems, 24(4), 391-410. doi:10.1057/ejis.2014.22Analyzed
(Tam & Ho, 2006)Tam, K. Y., & Ho, S. Y. (2006). Understanding the impact of web personalization on user information processing and decision outcomes. MIS Quarterly, 30(4), 865-890.Analyzed
(Tarafdar, Pullins, & Ragu-Nathan, 2015)Tarafdar, M., Pullins, E. B., & Ragu-Nathan, T. S. (2015). Technostress: negative effect on performance and possible mitigations. Information Systems Journal, 25 (2), 103-132. doi:10.1111/isj.12042Analyzed
(Tarafdar, Tu, & Ragu-Nathan, 2010)Tarafdar, M., Tu, Q. A., & Ragu-Nathan, T. S. (2010). Impact of Technostress on End-User Satisfaction and Performance. Journal of Management Information Systems, 27 (3), 303-334. doi:10.2753/mis0742-1222270311Analyzed
(Taylor, 2004)Taylor, W. A. (2004). Computer-mediated knowledge sharing and individual user differences: an exploratory study. European Journal of Information Systems, 13 (1), 52-64. doi:10.1057/palgrave.ejis.3000484Analyzed
(Teo, Wei, & Benbasat, 2003)Teo, H. H., Wei, K. K., & Benbasat, I. (2003). Predicting intention to adopt interorganizational linkages: An institutional perspective. MIS Quarterly, 27(1), 19-49.Analyzed
(Thatcher & Perrewe, 2002)Thatcher, J. B., & Perrewe, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26(4), 381-396. doi:10.2307/4132314Analyzed
(Theotokis, Vlachos, & Pramatari, 2008)Theotokis, A., Vlachos, P. A., & Pramatari, K. (2008). The moderating role of customer-technology contact on attitude towards technology-based services. European Journal of Information Systems, 17 (4), 343-351. doi:10.1057/ejis.2008.32Analyzed
(Thiesse, 2007)Thiesse, F. (2007). RFID, privacy and the perception of risk: A strategic framework. Journal of Strategic Information Systems, 16 (2), 214-232. doi:10.1016/j.jsis.2007.05.006Analyzed
(Thomas & Bostrom, 2010)Thomas, D. M., & Bostrom, R. P. (2010). Team leader strategies for enabling collaboration technology adaptation: team technology knowledge to improve globally distributed systems development work. European Journal of Information Systems, 19 (2), 223-237. doi:10.1057/ejis.2010.14Analyzed
(Townsend, Demarie, & Hendrickson, 2001)Townsend, A. M., Demarie, S. M., & Hendrickson, A. R. (2001). Desktop video conferencing in virtual workgroups: Anticipation, system evaluation and performance. Information Systems Journal, 11 (3), 213-227. doi:10.1046/j.1365-2575.2001.00103.xAnalyzed
(Trier & Molka-Danielsen, 2013)Trier, M., & Molka-Danielsen, J. (2013). Sympathy or strategy: social capital drivers for collaborative contributions to the IS community. European Journal of Information Systems, 22 (3), 317-335. doi:10.1057/ejis.2012.27Analyzed
(Turel & Qahri-Saremi, 2016)Turel, O., & Qahri-Saremi, H. (2016). Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective. Journal of Management Information Systems, 33(4), 1087-1116. doi:10.1080/07421222.2016.1267529Analyzed
(Turel, 2015)Turel, O. (2015). Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users. European Journal of Information Systems, 24 (4), 431-446. doi:10.1057/ejis.2014.19Analyzed
(Turel, 2016)Turel, O. (2016). Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System. European Journal of Information Systems, 25 (5), 432-447. doi:10.1057/s41303-016-0002-5Analyzed
(Turel, Serenko, & Giles, 2011)Turel, O., Serenko, A., & Giles, P. (2011). INTEGRATING TECHNOLOGY ADDICTION AND USE: AN EMPIRICAL INVESTIGATION OF ONLINE AUCTION USERS. MIS Quarterly, 35(4), 1043-1061.Analyzed
(Van Akkeren & Rowlands, 2007)Van Akkeren, J., & Rowlands, B. (2007). An epidemic of pain in an Australian radiology practice. European Journal of Information Systems, 16 (6), 695-711. doi:10.1057/palgrave.ejis.3000715Analyzed
(Van Der Heijden, 2004)Van Der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly: Management Information Systems, 28(4), 695-704.Analyzed
(Van Der Heijden, Verhagen, & Creemers, 2003)Van Der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding online purchase intentions: contributions from technology and trust perspectives. European Journal of Information Systems, 12 (1), 41-48. doi:10.1057/palgrave.ejis.3000445Analyzed
(van Offenbeek, Boonstra, & Seo, 2013)van Offenbeek, M., Boonstra, A., & Seo, D. (2013). Towards integrating acceptance and resistance research: evidence from a telecare case study. European Journal of Information Systems, 22 (4), 434-454. doi:10.1057/ejis.2012.29Analyzed
(Vega, Chiasson, & Brown, 2008)Vega, A., Chiasson, M., & Brown, D. (2008). Extending the research agenda on diffusion: The case of public program interventions for the adoption of e-business systems in SMEs. Journal of Information Technology, 23 (2), 109-117. doi:10.1057/palgrave.jit.2000135Analyzed
(Veiga, Floyd, & Dechant, 2001)Veiga, J. F., Floyd, S., & Dechant, K. (2001). Towards modelling the effects of national culture on IT implementation and acceptance. Journal of Information Technology, 16 (3), 145-158. doi:10.1080/02683960110063654Analyzed
(Venkatesh, 1999)Venkatesh, V. (1999). Creation of favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quarterly: Management Information Systems, 23(2), 239-260.
(Venkatesh & Brown, 2001)Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges. MIS Quarterly, 25(1), 71-102. doi:10.2307/3250959Analyzed
(Venkatesh & Ramesh, 2006)Venkatesh, V., & Ramesh, V. (2006). Web and wireless site usability: Understanding differences and modeling use. MIS Quarterly: Management Information Systems, 30(1), 181-206.Analyzed
(Venkatesh & Sykes, 2013)Venkatesh, V., & Sykes, T. A. (2013). Digital Divide Initiative Success in Developing Countries: A Longitudinal Field Study in a Village in India. Information Systems Research, 24(2), 239-260. doi:10.1287/isre.1110.0409Analyzed
(Venkatesh & Windeler, 2012)Venkatesh, V., & Windeler, J. B. (2012). Hype or Help? A Longitudinal Field Study of Virtual World Use for Team Collaboration. Journal of the Association for Information Systems, 13(10), 735-771.Analyzed
(Venkatesh, Brown, Maruping, & Bala, 2008)Venkatesh, V., Brown, S. A., Maruping, L. M., & Bala, H. (2008). Predicting different conceptualizations of system USE: The competing roles of behavioral intention, facilitating conditions, and behavioral expectation. MIS Quarterly: Management Information Systems, 32(3), 483-502.Analyzed
(Venkatesh, Davis, & Morris, 2007)Venkatesh, V., Davis, F. D., & Morris, M. G. (2007). Dead or alive? The development, trajectory and future of technology adoption research. Journal of the Association for Information Systems, 8(4), 267-286.Analyzed
(Venkatesh, Sykes, & Venkatraman, 2014)Venkatesh, V., Sykes, T. A., & Venkatraman, S. (2014). Understanding e-Government portal use in rural India: role of demographic and personality characteristics. Information Systems Journal, 24(3), 249-269. doi:10.1111/isj.12008Analyzed
(Venkatesh, Thong, & Xu, 2016)Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead. Journal of the Association for Information Systems, 17(5), 328-376.Analyzed
(Venkatesh, Thong, Chan, & Hu, 2016)Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., & Hu, P. J. H. (2016). Managing Citizens' Uncertainty in E-Government Services: The Mediating and Moderating Roles of Transparency and Trust. Information Systems Research, 27(1), 87-111. doi:10.1287/isre.2015.0612Analyzed
(Venkatesh, Thong, Chan, Hu, & Brown, 2011)Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., Hu, P. J. H., & Brown, S. A. (2011). Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Information Systems Journal, 21(6), 527-555. doi:10.1111/j.1365-2575.2011.00373.xAnalyzed
(Venkatesh, Zhang, & Sykes, 2011)Venkatesh, V., Zhang, X. J., & Sykes, T. A. (2011). "Doctors Do Too Little Technology": A Longitudinal Field Study of an Electronic Healthcare System Implementation. Information Systems Research, 22(3), 523-546. doi:10.1287/isre.1110.0383Analyzed
(Vidgen, Henneberg, & Naude, 2007)Vidgen, R., Henneberg, S., & Naude, P. (2007). What sort of community is the European Conference on Information Systems? A social network analysis 1993-2005. European Journal of Information Systems, 16 (1), 5-19. doi:10.1057/palgrave.ejis.3000661Analyzed
(Vitharana, Zahedi, & Jain, 2016)Vitharana, P., Zahedi, M. F., & Jain, H. K. (2016). Enhancing analysts’ mental models for improving requirements elicitation: A two-stage theoretical framework and empirical results. Journal of the Association of Information Systems, 17 (12), 804-840.Analyzed
(von Krogh & Spaeth, 2007)von Krogh, G., & Spaeth, S. (2007). The open source software phenomenon: Characteristics that promote research. Journal of Strategic Information Systems, 16 (3), 236-253. doi:10.1016/j.jsis.2007.06.001Analyzed
(W. Lewis, Agarwal, & Sambamurthy, 2003)Lewis, W., Agarwal, R., & Sambamurthy, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly, 27(4), 657-678.Analyzed
(W. Q. Wang & Benbasat, 2007)Wang, W. Q., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217-246. doi:10.2753/mis0742-122230410Analyzed
(Wakefield & Wakefield, 2016)Wakefield, R. L., & Wakefield, K. (2016). Social media network behavior: A study of user passion and affect. Journal of Strategic Information Systems, 25 (2), 140-156. doi:10.1016/j.jsis.2016.04.001Analyzed
(Wakefield, Wakefield, Baker, & Wang, 2011)Wakefield, R. L., Wakefield, K. L., Baker, J., & Wang, L. C. (2011). How website socialness leads to website use. European Journal of Information Systems, 20 (1), 118-132. doi:10.1057/ejis.2010.47Analyzed
(Walden & Browne, 2009)Walden, E. A., & Browne, G. J. (2009). Sequential Adoption Theory: A Theory for Understanding Herding Behavior in Early Adoption of Novel Technologies. Journal of the Association for Information Systems, 10 (1), 31-62.Analyzed
(Walsh, Gettler-Summa, & Kalika, 2016)Walsh, I., Gettler-Summa, M., & Kalika, M. (2016). Expectable use: An important facet of IT, usage. Journal of Strategic Information Systems, 25 (3), 177-210. doi:10.1016/j.jsis.2016.01.003Analyzed
(Walsh, Kefi, & Baskerville, 2010)Walsh, I., Kefi, H., & Baskerville, R. (2010). Managing culture creep: Toward a strategic model of user IT culture. Journal of Strategic Information Systems, 19 (4), 257-280. doi:10.1016/j.jsis.2010.09.002Analyzed
(Wan, Compeau, & Haggerty, 2012)Wan, Z. Y., Compeau, D., & Haggerty, N. (2012). The Effects of Self-Regulated Learning Processes on E-Learning Outcomes in Organizational Settings. Journal of Management Information Systems, 29 (1), 307-339. doi:10.2753/mis0742-1222290109Analyzed
(Waring & Wainwright, 2000)Waring, T., & Wainwright, D. (2000). Interpreting integration with respect to information systems in organizations-image, theory and reality. Journal of Information Technology, 15 (2), 131-147. doi:10.1080/026839600344320Analyzed
(Wattal, Racherla, & Mandviwalla, 2010)Wattal, S., Racherla, P., & Mandviwalla, M. (2010). Network Externalities and Technology Use: A Quantitative Analysis of Intraorganizational Blogs. Journal of Management Information Systems, 27 (1), 145-173. doi:10.2753/mis0742-1222270107Analyzed
(Weerakkody, Dwivedi, & Irani, 2009)Weerakkody, V., Dwivedi, Y. K., & Irani, Z. (2009). The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey. Journal of Information Technology, 24 (4), 354-368. doi:10.1057/jit.2009.16Analyzed
(Wei, Teo, Chan, & Tan, 2011)Wei, K. K., Teo, H. H., Chan, H. C., & Tan, B. C. Y. (2011). Conceptualizing and Testing a Social Cognitive Model of the Digital Divide. Information Systems Research, 22 (1), 170-187. doi:10.1287/isre.1090.0273Analyzed
(Wells, Parboteeah, & Valacich, 2011)Wells, J. D., Parboteeah, V., & Valacich, J. S. (2011). Online Impulse Buying: Understanding the Interplay between Consumer Impulsiveness and Website Quality. Journal of the Association for Information Systems, 12 (1), 32-56.Analyzed
(Williams, Dwivedi, Lal, & Schwarz, 2009)Williams, M. D., Dwivedi, Y. K., Lal, B., & Schwarz, A. (2009). Contemporary trends and issues in IT adoption and diffusion research. Journal of Information Technology, 24 (1), 1-10. doi:10.1057/jit.2008.30Analyzed
(Windeler & Riemenschneider, 2016)Windeler, J. B., & Riemenschneider, C. K. (2016). The influence of ethnicity on organizational commitment and merit pay of IT workers: the role of leader support. Information Systems Journal, 26 (2), 157-190. doi:10.1111/isj.12058Analyzed
(Wingreen & Blanton, 2017)Wingreen, S. C., & Blanton, J. E. (2017). IT professionals' person-organization fit with IT training and development priorities. Information Systems Journal . doi:10.1111/isj.12135Analyzed
(Winter & Gill, 2001)Winter, S. J., & Gill, T. G. (2001). OFFICETECH®: A new paradigm in office services? Journal of Information Technology, 16 (1), 23-32. doi:10.1080/02683960122282Analyzed
(Wixom & Watson, 2001)Wixom, B. H., & Watson, H. J. (2001). An empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), 17-41. doi:10.2307/3250957Analyzed
(X. F. Deng & Chi, 2012)Deng, X. F., & Chi, L. (2012). Understanding Postadoptive Behaviors in Information Systems Use: A Longitudinal Analysis of System Use Problems in the Business Intelligence Context. Journal of Management Information Systems, 29(3), 291-325. doi:10.2753/mis0742-1222290309Analyzed
(X. Fang, Benamati, & Lederer, 2011)Fang, X., Benamati, J., & Lederer, A. L. (2011). Coping with rapid information technology change in different national cultures. European Journal of Information Systems, 20 (5), 560-573. doi:10.1057/ejis.2011.20Analyzed
(X. Fang, Hu, Li, & Tsai, 2013)Fang, X., Hu, P. J. H., Li, Z. P., & Tsai, W. Y. (2013). Predicting Adoption Probabilities in Social Networks. Information Systems Research, 24 (1), 128-145. doi:10.1287/isre.1120.0461Analyzed
(X. Li, Hess, & Valacich, 2008)Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. Journal of Strategic Information Systems, 17(1), 39-71. doi:10.1016/j.jsis.2008.01.001Analyzed
(X. Q. Zhang & Zhang, 2015)Zhang, X. Q., & Zhang, L. H. (2015). HOW DOES THE INTERNET AFFECT THE FINANCIAL MARKET? AN EQUILIBRIUM MODEL OF INTERNET-FACILITATED FEEDBACK TRADING. MIS Quarterly, 39(1), 17-+. Analyzed
(X. W. Fang, Chan, Brzezinski, & Xu, 2005)Fang, X. W., Chan, S., Brzezinski, J., & Xu, S. (2005). Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems, 22(3), 123-157.Analyzed
(X. X. Li, Hsieh, & Rai, 2013)Li, X. X., Hsieh, J., & Rai, A. (2013). Motivational Differences Across Post-Acceptance Information System Usage Behaviors: An Investigation in the Business Intelligence Systems Context. Information Systems Research, 24(3), 659-682. doi:10.1287/isre.1120.0456Analyzed
(X. Xu, Thong, & Venkatesh, 2014)Xu, X., Thong, J. Y. L., & Venkatesh, V. (2014). Effects of ICT Service Innovation and Complementary Strategies on Brand Equity and Customer Loyalty in a Consumer Technology Market. Information Systems Research, 25(4), 710-729. doi:10.1287/isre.2014.0540Analyzed
(X. Zhang & Venkatesh, 2013)Zhang, X., & Venkatesh, V. (2013). Explaining employee job performance: The role of online and offline workplace communication networks. MIS Quarterly: Management Information Systems, 37(3), 695-722.Analyzed
(X. Zhang, Venkatesh, & Brown, 2011)Zhang, X., Venkatesh, V., & Brown, S. A. (2011). Designing collaborative systems to enhance team performance. Journal of the Association for Information Systems, 12 (8), 556.Analyzed
(Xiao & Benbasat, 2007)Xiao, B., & Benbasat, I. (2007). E-commerce product recommendation agents: Use, characteristics, and impact. MIS Quarterly, 31(1), 137-209.Analyzed
(Xue, Liang, & Wu, 2011)Xue, Y. J., Liang, H. G., & Wu, L. S. (2011). Punishment, Justice, and Compliance in Mandatory IT Settings. Information Systems Research, 22(2), 400-414. doi:10.1287/isre.1090.0266Analyzed
(Y. A. Au & Kauffman, 2003)Au, Y. A., & Kauffman, R. J. (2003). What do you know? Rational expectations in information technology adoption and investment. Journal of Management Information Systems, 20(2), 49-76.Analyzed
(Y. Chen & Zahedi, 2016)Chen, Y., & Zahedi, F. M. (2016). INDIVIDUALS' INTERNET SECURITY PERCEPTIONS AND BEHAVIORS: POLYCONTEXTUAL CONTRASTS BETWEEN THE UNITED STATES AND CHINA. MIS Quarterly, 40(1), 205-+.Analyzed
(Y. E. Lee & Benbasat, 2011)Lee, Y. E., & Benbasat, I. (2011). The Influence of Trade-off Difficulty Caused by Preference Elicitation Methods on User Acceptance of Recommendation Agents Across Loss and Gain Conditions. Information Systems Research, 22(4), 867-884. doi:10.1287/isre.1100.0334Analyzed
(Y. J. Hwang, Kettinger, & Yi, 2015)Hwang, Y. J., Kettinger, W. J., & Yi, M. Y. (2015). Personal information management effectiveness of knowledge workers: conceptual development and empirical validation. European Journal of Information Systems, 24(6), 588-606. doi:10.1057/ejis.2014.24Analyzed
(Y. J. Xu, Yang, Cheng, & Lim, 2014)Xu, Y. J., Yang, Y. P., Cheng, Z. Y., & Lim, J. (2014). Retaining and attracting users in social networking services: An empirical investigation of cyber migration. Journal of Strategic Information Systems, 23(3), 239-253. doi:10.1016/j.jsis.2014.03.002Analyzed
(Y. L. Wang, Meister, & Gray, 2013)Wang, Y. L., Meister, D. B., & Gray, P. H. (2013). SOCIAL INFLUENCE AND KNOWLEDGE MANAGEMENT SYSTEMS USE: EVIDENCE FROM PANEL DATA. MIS Quarterly, 37(1), 299-313.Analyzed
(Y. Lee & Chen, 2011)Lee, Y., & Chen, A. N. K. (2011). Usability Design and Psychological Ownership of a Virtual World. Journal of Management Information Systems, 28(3), 269-307. doi:10.2753/mis0742-1222280308Analyzed
(Y. Lee & Larsen, 2009)Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 18(2), 177-187. doi:10.1057/ejis.2009.11Analyzed
(Y. Lee, Chen, & Ilie, 2012)Lee, Y., Chen, A. N. K., & Ilie, V. (2012). CAN ONLINE WAIT BE MANAGED? THE EFFECTS OF FILLER INTERFACES AND PRESENTATION MODES ON PERCEIVED WAITING TIME ONLINE. MIS Quarterly, 36(2), 365-394. Analyzed
(Y. Q. Sun, Fang, Lim, & Straub, 2012)Sun, Y. Q., Fang, Y. L., Lim, K. H., & Straub, D. (2012). User Satisfaction with Information Technology Service Delivery: A Social Capital Perspective. Information Systems Research, 23(4), 1195-1211. doi:10.1287/isre.1120.0421Analyzed
(Y.-F. Huang, Hsu, Chen, & Dong, 2011)Huang, Y.-F., Hsu, K.-H., Chen, P.-S., & Dong, S.-H. (2011). Discussing performance index of human resource valuation with AHP-occupational safety section in T company in Taiwan as the case study. Information Technology Journal, 10(3), 549-556.Analyzed
(Yen, Hu, Hsu, & Li, 2015)Yen, H. R., Hu, P. J. H., Hsu, S. H. Y., & Li, E. Y. (2015). A Multilevel Approach to Examine Employees' Loyal Use of ERP Systems in Organizations. Journal of Management Information Systems, 32 (4), 144-178. doi:10.1080/07421222.2015.1138373Analyzed
(Yetton, Sharma, & Southon, 1999)Yetton, P., Sharma, R., & Southon, G. (1999). Successful IS innovation: the contingent contributions of innovation characteristics and implementation process. Journal of Information Technology, 14 (1), 53-68.Analyzed
(Yi & Davis, 2003)Yi, M. Y., & Davis, F. D. (2003). Developing and validating an observational learning model of computer software training and skill acquisition. Information Systems Research, 14 (2), 146-169. doi:10.1287/isre.14.2.146.16016Analyzed
(Yoo, Lyytinen, & Yang, 2005)Yoo, Y., Lyytinen, K., & Yang, H. D. (2005). The role of standards in innovation and diffusion of broadband mobile services: The case of South Korea. Journal of Strategic Information Systems, 14 (3), 323-353. doi:10.1016/j.jsis.2005.07.007Analyzed
(Young, Mathiassen, & Davidson, 2016)Young, B. W., Mathiassen, L., & Davidson, E. (2016). Inconsistent and Incongruent Frames During IT-enabled Change: An Action Research Study into Sales Process Innovation. Journal of the Association for Information Systems, 17 (7), 495-520.Analyzed
(Yu, Hu, & Cheng, 2015)Yu, J., Hu, P. J. H., & Cheng, T. H. (2015). Role of Affect in Self-Disclosure on Social Network Websites: A Test of Two Competing Models. Journal of Management Information Systems, 32 (2), 239-277. doi:10.1080/07421222.2015.1063305Analyzed
(Z. C. Xu, Turel, & Yuan, 2012)Xu, Z. C., Turel, O., & Yuan, Y. F. (2012). Online game addiction among adolescents: motivation and prevention factors. European Journal of Information Systems, 21(3), 321-340. doi:10.1057/ejis.2011.56Analyzed
(Z. H. Jiang & I. Benbasat, 2007)Jiang, Z. H., & Benbasat, I. (2007). Investigating the influence of the functional mechanisms of online product presentations. Information Systems Research, 18(4), 454-470. doi:10.1287/isre.1070.0124Analyzed
(Z. J. Jiang & I. Benbasat, 2007)Jiang, Z. J., & Benbasat, I. (2007). The effects of presentation formats and task complexity on online consumers' product understanding. MIS Quarterly, 31(3), 475-500.Analyzed
(Zahedi & Song, 2008)Zahedi, F., & Song, J. (2008). Dynamics of trust revision: Using health infomediaries. Journal of Management Information Systems, 24(4), 225-248. doi:10.2753/mis0742-1222240409Analyzed
(Zhao, Detlor, & Connelly, 2016)Zhao, L., Detlor, B., & Connelly, C. E. (2016). Sharing Knowledge in Social Q&A Sites: The Unintended Consequences of Extrinsic Motivation. Journal of Management Information Systems, 33(1), 70-100. doi:10.1080/07421222.2016.1172459Analyzed
(Zigurs & Buckland, 1998)Zigurs, I., & Buckland, B. K. (1998). A Theory of Task/Technology Fit and Group Support Systems Effectiveness. MIS Quarterly, 22(3), 313-334.Analyzed
(Zimmermann & Ravishankar, 2014)Zimmermann, A., Raab, K., & Zanotelli, L. (2012). Vicious and virtuous circles of offshoring attitudes and relational behaviours. A configurational study of German IT developers. Information Systems Journal . doi:10.1111/j.1365-2575.2012.00399.xAnalyzed
(Zimmermann, Raab, & Zanotelli, 2012)Zimmermann, A., & Ravishankar, M. (2014). Knowledge transfer in IT offshoring relationships: the roles of social capital, efficacy and outcome expectations. Information Systems Journal, 24 (2), 167-202.Analyzed