Complete list of used/analyzed references. (MORE INFO)
Reference | Source | ISRI |
---|---|---|
(Agarwal & Prasad, 1998) | Agarwal, R., & Prasad, J. (1998). A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology. Information Systems Research, 9(2) , 204-215. | Used |
(Ajzen, 1985) | Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In Action control (pp. 11-39): Springer. | Used |
(Ajzen, 1991) | Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. doi:10.1016/0749-5978(91)90020-T | Used |
(Ajzen & Fishbein, 1980) | Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, N.J.: Prentice-Hall. | Used |
(Almeida, 2002) | Almeida, F. (2002). Organizações, pessoas e novas tecnologias. Coimbra: Quarteto Editora. | Used |
(Bandura, 1986) | Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory: Prentice-Hall, Inc. | Used |
(Bandura, 2012) | Bandura, A. (2012). Handbook of Theories of Social Psychology: Volume 1. In. London: SAGE Publications Ltd C1 - Social Cognitive Theory C2 - pages 349-374. | Used |
(Barki, Paré, & Sicotte, 2008) | Barki, H., Paré, G., & Sicotte, C. (2008). Linking IT implementation and acceptance via the construct of psychological ownership of information technology. Journal of Information Technology, 23(4) , 269-280. doi:10.1057/jit.2008.12 | Used |
(Barki, Titah, & Boffo, 2007) | Barki, H., Titah, R., & Boffo, C. (2007). Information system use–related activity: an expanded behavioral conceptualization of individual-level information system use. Information Systems Research, 18 (2), 173-192. | Used |
(Barnett, Pearson, Pearson, & Kellermanns, 2015) | Barnett, T., Pearson, A. W., Pearson, R., & Kellermanns, F. W. (2015). Five-factor model personality traits as predictors of perceived and actual usage of technology. European Journal of Information Systems, 24(4) , 374-390. | Used |
(Bhattacherjee & Lin, 2015) | Bhattacherjee, A., & Lin, C. P. (2015). A unified model of IT continuance: three complementary perspectives and crossover effects. European Journal of Information Systems, 24(4), 364-373. doi:10.1057/ejis.2013.36 | Used |
(Bock, Kankanhalli, & Sharma, 2006) | Bock, G.-W., Kankanhalli, A., & Sharma, S. (2006). Are norms enough? The role of collaborative norms in promoting organizational knowledge seeking. European Journal of Information Systems, 15(4), 357-367. doi:10.1057/palgrave.ejis.3000630 | Used |
(Bouwman & Van De Wijngaert, 2009) | Bouwman, H., & Van De Wijngaert, L. (2009). Coppers context, and conjoints: A reassessment of TAM. Journal of Information Technology, 24(2), 186-201. doi:10.1057/jit.2008.36 | Used |
(Bradley, Pridmore, & Byrd, 2006) | Bradley, R. V., Pridmore, J. L., & Byrd, T. A. (2006). Information systems success in the context of different corporate cultural types: An empirical investigation. Journal of Management Information Systems, 23(2), 267-294. doi:10.2753/MIS0742-1222230211 | Used |
(Brown, Dennis, & Venkatesh, 2010) | Brown, S. A., Dennis, A. R., & Venkatesh, V. (2010). Predicting collaboration technology use: Integrating technology adoption and collaboration research. Journal of Management Information Systems, 27(2), 9-54. | Used |
(Brown, Massey, Montoya-Weiss, & Burkman, 2002) | Brown, S. A., Massey, A. P., Montoya-Weiss, M. M., & Burkman, J. R. (2002). Do I really have to? User acceptance of mandated technology. European Journal of Information Systems, 11(4), 283-295. doi:10.1057/palgrave.ejis.3000438 | Used |
(Carter & Belanger, 2005) | Carter, L., & Belanger, F. (2005). The utilization of e-government services: citizen trust, innovation and acceptance factors. Information Systems Journal, 15(1), 5-25. doi:10.1111/j.1365-2575.2005.00183.x | Used |
(Chan et al., 2011) | Chan, F. K., Thong, J. Y., Venkatesh, V., Brown, S. A., Hu, P. J., & Tam, K. Y. (2011). Modeling citizen satisfaction with mandatory adoption of an e-government technology. Journal of the Association for Information Systems, 11(10), 519-549. | Used |
(Chandra, Srivastava, & Theng, 2012) | Chandra, S., Srivastava, S. C., & Theng, Y. L. (2012). Cognitive Absorption and Trust for Workplace Collaboration in Virtual Worlds: An Information Processing Decision Making Perspective. Journal of the Association for Information Systems, 13(10), 797-835. | Used |
(Chau, 1996) | Chau, P. Y. K. (1996). An Empirical Assessment of a Modified Technology Acceptance Model. Journal of Management Information Systems, 13 (2), 185-204. | Used |
(Chau & Hu, 2002) | Chau, P. Y. K., & Hu, P. J. (2002). Examining a model of information technology acceptance by individual professionals: An exploratory study. Journal of Management Information Systems, 18 (4), 191-229. doi:10.1080/07421222.2002.11045699 | Used |
(Cheng, 2011) | Cheng, Y. M. (2011). Antecedents and consequences of e-learning acceptance. Information Systems Journal, 21 (3), 269-299. doi:10.1111/j.1365-2575.2010.00356.x | Used |
(Chin, Johnson, & Schwarz, 2008) | Chin, W. W., Johnson, N., & Schwarz, A. (2008). A fast form approach to measuring technology acceptance and other constructs. MIS Quarterly: Management Information Systems, 32(4), 687-703. | Used |
(Compeau & Higgins, 1995a) | Compeau, D., & Higgins, C. (1995a). Application of social cognitive theory to training for computer skills. Information Systems Research, 6 (2), 118-143. | Used |
(Compeau & Higgins, 1995b) | Compeau, D., & Higgins, C. (1995b). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly: Management Information Systems, 19(2), 189-210. | Used |
(Compeau, Higgins, & Huff, 1999) | Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145-158. doi:10.2307/249749 | Used |
(D'Ambra, Wilson, & Akter, 2013) | D'Ambra, J., Wilson, C. S., & Akter, S. (2013). Application of the task-technology fit model to structure and evaluate the adoption of E-books by academics. Journal of the American Society for Information Science and Technology, 64 (1), 48-64. doi:10.1002/asi.22757 | Used |
(Davis, 1986) | Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. (PhD Thesis), Massachusetts Institute of Technology. | Used |
(Davis, Bagozzi, & Warshaw, 1989) | Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management science, 35 (8), 982-1003. | Used |
(Davis, Bagozzi, & Warshaw, 1992) | Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1992). Extrinsic and Intrinsic Motivation to Use Computers in the Workplace. Journal of Applied Social Psychology, 22 (14), 1111-1132. doi:10.1111/j.1559-1816.1992.tb00945.x | Used |
(DeLone & McLean, 1992) | DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3 (1), 60-95. | Used |
(DeLone & McLean, 2003) | DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: a ten-year update. Journal of Management Information Systems, 19 (4) , 9-30. | Used |
(DeLone & McLean, 2016) | DeLone, W. H., & McLean, E. R. (2016). Information Systems Success Measurement. Foundations and Trends in Information Systems, 2 (1), 1-116. | Used |
(Dickinger, Arami, & Meyer, 2008) | Dickinger, A., Arami, M., & Meyer, D. (2008). The role of perceived enjoyment and social norm in the adoption of technology with network externalities. European Journal of Information Systems, 17 (1) , 4-11. doi:10.1057/palgrave.ejis.3000726 | Used |
(Dinev, Goo, Hu, & Nam, 2009) | Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: the role of national cultural differences. Information Systems Journal, 19 (4) , 391-412. doi:10.1111/j.1365-2575.2007.00289.x | Used |
(Dinev & Hu, 2007) | Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8 (7) , 386-408. | Used |
(Dishaw & Strong, 1999) | Dishaw, M. T., & Strong, D. M. (1999). Extending the technology acceptance model with task-technology fit constructs. Information and Management, 36 (1), 9-21. | Used |
(Eckhardt, Laumer, & Weitzel, 2009) | Eckhardt, A., Laumer, S., & Weitzel, T. (2009). Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption. Journal of Information Technology, 24 (1), 11-24. | Used |
(Fishbein & Ajzen, 1975) | Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research: Addison-Wesley Pub. Co. | Used |
(Goodhue & Thompson, 1995) | Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. MIS Quarterly: Management Information Systems, 19(2), 213-233. | Used |
(Gupta, Dasgupta, & Gupta, 2008) | Gupta, B., Dasgupta, S., & Gupta, A. (2008). Adoption of ICT in a government organization in a developing country: An empirical study. Journal of Strategic Information Systems, 17 (2), 140-154. doi:10.1016/j.jsis.2007.12.004 | Used |
(Hong, Chan, Thong, Chasalow, & Dhillon, 2014) | Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research. Information Systems Research, 25 (1), 111-136. doi:10.1287/isre.2013.0501 | Used |
(Hong, Thong, Chasalow, & Dhillon, 2011) | Hong, W., Thong, J. Y., Chasalow, L. C., & Dhillon, G. (2011). User acceptance of agile information systems: a model and empirical test. Journal of Management Information Systems, 28 (1), 235-272. | Used |
(Hong, Thong, Wong, & Tam, 2001) | Hong, W., Thong, J. Y. L., Wong, W. M., & Tam, K. Y. (2001). Determinants of user acceptance of digital libraries: An empirical examination of individual differences and system characteristics. Journal of Management Information Systems, 18 (3), 97-124. doi:10.1080/07421222.2002.11045692 | Used |
(Hsieh, Rai, & Keil, 2008) | Hsieh, J. J. P.-A., Rai, A., & Keil, M. (2008). Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvantaged. MIS Quarterly, 32(1), 97-126. | Used |
(Hu, Chau, Liu Sheng, & Tam, 1999) | Hu, P. J., Chau, P. Y. K., Liu Sheng, O. R., & Tam, K. Y. (1999). Examining the Technology Acceptance Model Using Physician Acceptance of Telemedicine Technology. Journal of Management Information Systems, 16 (2), 91-112. | Used |
(Hwang, 2005) | Hwang, Y. (2005). Investigating enterprise systems adoption: Uncertainty avoidance, intrinsic motivation, and the technology acceptance model. European Journal of Information Systems, 14 (2), 150-161. doi:10.1057/palgrave.ejis.3000532 | Used |
(Igbaria, Parasuraman, & Baroudi, 1996) | Igbaria, M., Parasuraman, S., & Baroudi, J. J. (1996). A Motivational Model of Microcomputer Usage. Journal of Management Information Systems, 13 (1), 127-143. | Used |
(Igbaria, Zinatelli, Cragg, & Cavaye, 1997) | Igbaria, M., Zinatelli, N., Cragg, P., & Cavaye, A. L. M. (1997). Personal computing acceptance factors in small firms: A structural equation model. MIS Quarterly: Management Information Systems, 21(3), 279-301. | Used |
(Karahanna, Agarwal, & Angst, 2006) | Karahanna, E., Agarwal, R., & Angst, C. M. (2006). Reconceptualizing compatibility beliefs in technology acceptance research. MIS Quarterly: Management Information Systems, 30(4), 781-804. | Used |
(Karahanna, Straub, & Chervany, 1999) | Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs. MIS Quarterly, 23(2), 183-213. doi:10.2307/249751 | Used |
(Karimi, Somers, & Gupta, 2004) | Karimi, J., Somers, T. M., & Gupta, Y. P. (2004). Impact of environmental uncertainty and task characteristics on user satisfaction with data. Information Systems Research, 15 (2), 175-193. | Used |
(Kim, 2009) | Kim, S. S. (2009). The integrative framework of technology use: an extension and test. MIS Quarterly, 33(3), 513-537. | Used |
(Komiak & Benbasat, 2006) | Komiak, S. Y. X., & Benbasat, I. (2006). The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents. MIS Quarterly, 30(4), 941-960. | Used |
(Kositanurit, Ngwenyama, & Osei-Bryson, 2006) | Kositanurit, B., Ngwenyama, O., & Osei-Bryson, K.-M. (2006). An exploration of factors that impact individual performance in an ERP environment: an analysis using multiple analytical techniques. European Journal of Information Systems, 15 (6), 556-568. | Used |
(Lai, Lai, & Lowry, 2016) | Lai, V. S., Lai, F. J., & Lowry, P. B. (2016). Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China? Journal of Management Information Systems, 33 (4), 1209-1251. doi:10.1080/07421222.2016.1267534 | Used |
(Lou, Luo, & Strong, 2000) | Lou, H., Luo, W., & Strong, D. (2000). Perceived critical mass effect on groupware acceptance. European Journal of Information Systems, 9 (2), 91-103. doi:10.1057/palgrave.ejis.3000358 | Used |
(J. Lu, Yao, & Yu, 2005) | Lu, J., Yao, J. E., & Yu, C. S. (2005). Personal innovativeness, social influences and adoption of wireless Internet services via mobile technology. Journal of Strategic Information Systems, 14 (3), 245-268. doi:10.1016/j.jsis.2005.07.003 | Used |
(Y. B. Lu, Deng, & Wang, 2010) | Lu, Y. B., Deng, Z. H., & Wang, B. (2010). Exploring factors affecting Chinese consumers' usage of short message service for personal communication. Information Systems Journal, 20 (2), 183-208. doi:10.1111/j.1365-2575.2008.00312.x | Used |
(Maier, Laumer, Eckhardt, & Weitzel, 2013) | Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2013). Analyzing the impact of HRIS implementations on HR personnel's job satisfaction and turnover intention. Journal of Strategic Information Systems, 22 (3), 193-207. doi:10.1016/j.jsis.2012.09.001 | Used |
(Maruping, Bala, Venkatesh, & Brown, 2017) | Maruping, L. M., Bala, H., Venkatesh, V., & Brown, S. A. (2017). Going beyond intention: Integrating behavioral expectation into the unified theory of acceptance and use of technology. Journal of the Association for Information Science and Technology, 68 (3), 623-637. doi:10.1002/asi.23699 | Used |
(Mishra, Akman, & Mishra, 2014) | Mishra, D., Akman, I., & Mishra, A. (2014). Theory of reasoned action application for green information technology acceptance. Computers in Human Behavior, 36, 29-40. | Used |
(Moore & Benbasat, 1991) | Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222. | Used |
(Neufeld, Dong, & Higgins, 2007) | Neufeld, D. J., Dong, L., & Higgins, C. (2007). Charismatic leadership and user acceptance of information technology. European Journal of Information Systems, 16 (4), 494-510. | Used |
(Niehaves & Plattfaut, 2014) | Niehaves, B., & Plattfaut, R. (2014). Internet adoption by the elderly: Employing IS technology acceptance theories for understanding the age-related digital divide. European Journal of Information Systems, 23 (6), 708-726. doi:10.1057/ejis.2013.19 | Used |
(Oh, Ahn, & Kim, 2003) | Oh, S., Ahn, J., & Kim, B. (2003). Adoption of broadband Internet in Korea: The role of experience in building attitudes. Journal of Information Technology, 18 (4), 267-280. doi:10.1080/0268396032000150807 | Used |
(Oliveira & Martins, 2010) | Oliveira, T., & Martins, M. F. (2010). Information technology adoption models at firm level: review of literature. Paper presented at the European Conference on Information Management and Evaluation. | Used |
(Parthasarathy & Bhattacherjee, 1998) | Parthasarathy, M., & Bhattacherjee, A. (1998). Understanding post-adoption behavior in the context of online services. Information Systems Research, 9 (4), 362-379. doi:10.1287/isre.9.4.362 | Used |
(Pavlou & Fygenson, 2006) | Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly: Management Information Systems, 30(1), 115-143. | Used |
(Picoto, Bélanger, & Palma-Dos-Reis, 2014) | Picoto, W. N., Bélanger, F., & Palma-Dos-Reis, A. (2014). An organizational perspective on m-business: Usage factors and value determination †. European Journal of Information Systems, 23 (5), 571-592. doi:10.1057/ejis.2014.15 | Used |
(Plouffe, Hulland, & Vandenbosch, 2001) | Plouffe, C. R., Hulland, J. S., & Vandenbosch, M. (2001). Research report: Richness versus parsimony in modeling technology adoption decisions-understanding merchant adoption of a smart card-based payment system. Information Systems Research, 12 (2), 208-222. doi:10.1287/isre.12.2.208.9697 | Used |
(Rai, Lang, & Welker, 2002) | Rai, A., Lang, S. S., & Welker, R. B. (2002). Assessing the validity of IS success models: An empirical test and theoretical analysis. Information Systems Research, 13(1), 50-69. doi:10.1287/isre.13.1.50.96 | Used |
(Ramdani & Kawalek, 2007) | Ramdani, B., & Kawalek, P. (2007). SME Adoption of Enterprise Systems in the Northwest of England. In Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda (pp. 409-429). Boston, MA: Springer US. | Used |
(Rogers, 1962) | Rogers, E. M. (1962). Diffusion of innovations. New York: Free Press of Glencoe. | Used |
(Rogers, 1983) | Rogers, E. M. (1983). Diffusion of innovations (Third Edition). New York: Free Press. | Used |
(Rogers, 1995) | Rogers, E. M. (1995). Diffusion of Innovations (Fourth Edition). New York: Free Press. | Used |
(Rogers, 2003) | Rogers, E. M. (2003). Diffusion of Innovations (Fifth Edition). New York: Free Press. | Used |
(Sarker & Valacich, 2010) | Sarker, S., & Valacich, J. S. (2010). An alternative to methodological individualism: a non-reductionist approach to studying technology adoption by groups. MIS Quarterly, 34(4), 779-808. | Used |
(Scott, DeLone, & Golden, 2016) | Scott, M., DeLone, W., & Golden, W. (2016). Measuring eGovernment success: a public value approach. European Journal of Information Systems, 25(3), 187-208. doi:10.1057/ejis.2015.11 | Used |
(Son, Kim, & Riggins, 2006) | Son, J. Y., Kim, S. S., & Riggins, F. J. (2006). Consumer adoption of net-enabled infomediaries: Theoretical explanations and an empirical test. Journal of the Association for Information Systems, 7 (7), 473-508. | Used |
(Srite & Karahanna, 2006) | Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. MIS Quarterly: Management Information Systems, 30(3), 679-704. | Used |
(Sun & Fang, 2016) | Sun, H., & Fang, Y. (2016). Choosing a Fit Technology: Understanding Mindfulness in Technology Adoption and Continuance. Journal of the Association for Information Systems, 17 (6), 377. | Used |
(Swanson, 1994) | Swanson, E. B. (1994). Information systems innovation among organizations. Management Science, 40(9), 1069-1092. | |
(Sykes, Venkatesh, & Gosain, 2009) | Sykes, T. A., Venkatesh, V., & Gosain, S. (2009). Model of Acceptance with Peer Support: A Social Network Perspective to Understand Employees' System Use. MIS Quarterly, 33(2), 371-393. | Used |
(Taylor & Todd, 1995a) | Taylor, S., & Todd, P. (1995a). Assessing IT usage: The role of prior experience. MIS Quarterly: Management Information Systems, 19(4), 561-568. | Used |
(Taylor & Todd, 1995b) | Taylor, S., & Todd, P. (1995b). Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions. International Journal of Research in Marketing, 12(2), 137-155. doi:10.1016/0167-8116(94)00019-K | Used |
(Taylor & Todd, 1995c) | Taylor, S., & Todd, P. (1995c). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176. | Used |
(Teo & Men, 2008) | Teo, T. S., & Men, B. (2008). Knowledge portals in Chinese consulting firms: a task–technology fit perspective. European Journal of Information Systems, 17 (6), 557-574. | Used |
(Teo, Srivastava, & Jiang, 2008) | Teo, T. S. H., Srivastava, S. C., & Jiang, L. (2008). Trust and Electronic Government Success: An Empirical Study. Journal of Management Information Systems, 25(3), 99-131. doi:10.2753/MIS0742-1222250303 | Used |
(Titah & Barki, 2009) | Titah, R., & Barki, H. (2009). Nonlinearities between attitude and subjective norms in information technology acceptance: a negative sinergy? MIS Quarterly, 33(4), 827-844. | Used |
(Thompson, Higgins, & Howell, 1991) | Thompson, R. L., Higgins, C. A., & Howell, J. M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly: Management Information Systems, 15(1), 125-142. | Used |
(Tornatzky & Fleischer, 1990) | Tornatzky, L. G., & Fleischer, M. (1990). The processes of technological innovation. Lexington, Mass.: Lexington Books. | Used |
(Tung & Rieck, 2005) | Tung, L. L., & Rieck, O. (2005). Adoption of electronic government services among business organizations in Singapore. Journal of Strategic Information Systems, 14 (4), 417-440. doi:10.1016/j.jsis.2005.06.001 | Used |
(Urbach, Smolnik, & Riempp, 2010) | Urbach, N., Smolnik, S., & Riempp, G. (2010). An empirical investigation of employee portal success. Journal of Strategic Information Systems, 19(3), 184-206. doi:10.1016/j.jsis.2010.06.002 | Used |
(Vallerand, 1997) | Vallerand, R. J. (1997). Toward A Hierarchical Model of Intrinsic and Extrinsic Motivation. In Advances in Experimental Social Psychology (Vol. 29, pp. 271-360). | Used |
(Van Slyke, Ilie, Lou, & Stafford, 2007) | Van Slyke, C., Ilie, V., Lou, H., & Stafford, T. (2007). Perceived critical mass and the adoption of a communication technology. European Journal of Information Systems, 16 (3), 270-283. doi:10.1057/palgrave.ejis.3000680 | Used |
(Venkatesh, 2000) | Venkatesh, V. (2000). Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model. Information Systems Research, 11 (4), 342-365. | Used |
(Venkatesh, Aloysius, Hoehle, & Burton, 2017) | Venkatesh, V., Aloysius, J. A., Hoehle, H., & Burton, S. (2017). Design and evaluation of auto-ID enabled shopping assistance artifacts in customers' mobile phones: two retail store laboratory experiments. MIS Quarterly, 41(1), 83-113. | Used |
(Venkatesh & Bala, 2008) | Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39 (2), 273-315. doi:10.1111/j.1540-5915.2008.00192.x | Used |
(Venkatesh & Davis, 2000) | Venkatesh, V., & Davis, F. D. (2000). Theoretical extension of the Technology Acceptance Model: Four longitudinal field studies. Management Science, 46 (2), 186-204. | Used |
(Venkatesh & Goyal, 2010) | Venkatesh, V., & Goyal, S. (2010). Expectation disconfirmation and technology adoption: Polynomial modeling and response surface analysis. MIS Quarterly: Management Information Systems, 34(special issue 2), 281-303. | Used |
(Venkatesh & Morris, 2000) | Venkatesh, V., & Morris, M. G. (2000). Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly: Management Information Systems, 24(1), 115-136. | Used |
(Venkatesh & Speier, 1999) | Venkatesh, V., & Speier, C. (1999). Computer technology training in the workplace: A longitudinal investigation of the effect of mood. Organizational behavior and human decision processes, 79(1), 1-28. | Used |
(Venkatesh, Morris, Davis, & Davis, 2003) | Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478. | Used |
(Venkatesh, Thong, & Xu, 2012) | Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly: Management Information Systems, 36(1), 157-178. | Used |
(Wakefield & Whitten, 2006) | Wakefield, R. L., & Whitten, D. (2006). Mobile computing: a user study on hedonic/utilitarian mobile device usage. European Journal of Information Systems, 15 (3), 292-300. doi:10.1057/palgrave.ejis.3000619 | Used |
(Wang, 2008) | Wang, Y. S. (2008). Assessing e-commerce systems success: A respecification and validation of the DeLone and McLean model of IS success. Information Systems Journal, 18(5), 529-557. doi:10.1111/j.1365-2575.2007.00268.x | Used |
(Wang, Lin, & Luarn, 2006) | Wang, Y. S., Lin, H. H., & Luarn, P. (2006). Predicting consumer intention to use mobile service. Information Systems Journal, 16 (2), 157-179. doi:10.1111/j.1365-2575.2006.00213.x | Used |
(Wixom & Todd, 2005) | Wixom, B. H., & Todd, P. A. (2005). A theoretical integration of user satisfaction and technology acceptance. Information systems research, 16 (1), 85-102. | Used |
(Yang, Kang, Oh, & Kim, 2013) | Yang, H.-D., Kang, S., Oh, W., & Kim, M. S. (2013). Are all fits created equal? A nonlinear perspective on task-technology fit. Journal of the Association for Information Systems, 14 (12), 694. | Used |
(Yao & Murphy, 2007) | Yao, Y. R., & Murphy, L. (2007). Remote electronic voting systems: an exploration of voters' perceptions and intention to use. European Journal of Information Systems, 16 (2), 106-120. doi:10.1057/palgrave.ejis.3000672 | Used |
(Zhu, Dong, Xu, & Kraemer, 2006) | Zhu, K., Dong, S., Xu, S. X., & Kraemer, K. L. (2006). Innovation diffusion in global contexts: Determinants of post-adoption digital transformation of European companies. European Journal of Information Systems, 15 (6), 601-616. doi:10.1057/palgrave.ejis.3000650 | Used |
(Zhu, Kraemer, & Xu, 2003) | Zhu, K., Kraemer, K., & Xu, S. (2003). Electronic business adoption by European firms: a cross-country assessment of the facilitators and inhibitors. European Journal of Information Systems, 12 (4), 251-268. | Used |
(Zhu, Kraemer, & Dedrick, 2004) | Zhu, K., Kraemer, K. L., & Dedrick, J. (2004). Information technology payoff in e-business environments: An international perspective on value creation of e-business in the financial services industry. Journal of management information systems, 21 (1), 17-54. | Used |
(A. H. Chen, Lu, Gupta, & Qi, 2014) | Chen, A. H., Lu, Y. B., Gupta, S., & Qi, X. L. (2014). Can customer satisfaction and dissatisfaction coexist? An issue of telecommunication service in China. Journal of Information Technology, 29(3), 237-252. doi:10.1057/jit.2013.26 | Analyzed |
(A. S. Lee & Hubona, 2009) | Lee, A. S., & Hubona, G. S. (2009). A scientific basis for rigor in information systems research. MIS Quarterly, 33(2), 237-262. | Analyzed |
(Abbasi, Sarker, & Chiang, 2016) | Abbasi, A., Sarker, S., & Chiang, R. H. L. (2016). Big Data Research in Information Systems: Toward an Inclusive Research Agenda. Journal of the Association for Information Systems, 17(2), I-XXXII. | Analyzed |
(Abraham, Boudreau, Junglas, & Watson, 2013) | Abraham, C., Boudreau, M. C., Junglas, I., & Watson, R. (2013). Enriching our theoretical repertoire: The role of evolutionary psychology in technology acceptance. European Journal of Information Systems, 22(1), 56-75. doi:10.1057/ejis.2011.25 | Analyzed |
(Abraham, Junglas, Watson, & Boudreau, 2016) | Abraham, C., Junglas, I., Watson, R. T., & Boudreau, M. C. (2016). Explaining the unexpected and continued use of an information system with the help of evolved evolutionary mechanisms. Journal of the Association for Information Science and Technology, 67(1), 212-231. | Analyzed |
(Adams, Nelson, & Todd, 1992) | Adams, D. A., Nelson, R. R., & Todd, P. A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly: Management Information Systems, 16(2), 227-247. | Analyzed |
(Agarwal & Karahanna, 2000) | Agarwal, R., & Karahanna, E. (2000). Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly: Management Information Systems, 24(4), 665-694. | Analyzed |
(Agarwal & Venkatesh, 2002) | Agarwal, R., & Venkatesh, V. (2002). Assessing a firm's Web presence: A heuristic evaluation procedure for the measurement of usability. Information Systems Research, 13(2), 168-186. doi:10.1287/isre.13.2.168.84 | Analyzed |
(Agarwal, Sambamurthy, & Stair, 2000) | Agarwal, R., Sambamurthy, V., & Stair, R. M. (2000). Research report: The evolving relationship between general and specific computer self-efficacy - An empirical assessment. Information Systems Research, 11(4), 418-430. doi:10.1287/isre.11.4.418.11876 | Analyzed |
(Ahuja & Thatcher, 2005) | Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly: Management Information Systems, 29(3), 427-459. | Analyzed |
(Aladwani, 2002) | Aladwani, A. M. (2002). The development of two tools for measuring the easiness and usefulness of transactional Web sites. European Journal of Information Systems, 11(3), 223-234. doi:10.1057/palgrave.ejis.3000432 | Analyzed |
(Allen, Brown, Karanasios, & Norman, 2013) | Allen, D. K., Brown, A., Karanasios, S., & Norman, A. (2013). How should technology-mediated organizational change be explained? A comparison on the contributions of critical realism and activity theory. MIS Quarterly, 37(3), 835-854. | Analyzed |
(Al-Natour & Benbasat, 2009) | Al-Natour, S., & Benbasat, I. (2009). The Adoption and Use of IT Artifacts: A New Interaction-Centric Model for the Study of User-Artifact Relationships. Journal of the Association for Information Systems, 10 (9), 661-685. | Analyzed |
(Al-Natour, Benbasat, & Cenfetelli, 2011) | Al-Natour, S., Benbasat, I., & Cenfetelli, R. (2011). The adoption of online shopping assistants: Perceived similarity as an antecedent to evaluative beliefs. Journal of the Association of Information Systems, 12 (5), 347-374. | Analyzed |
(Alnuaimi, Robert, & Maruping, 2010) | Alnuaimi, O. A., Robert, L. P., & Maruping, L. M. (2010). Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective on the Theory of Moral Disengagement. Journal of Management Information Systems, 27 (1), 203-230. doi:10.2753/mis0742-1222270109 | Analyzed |
(Ambrose & Chiravuri, 2010) | Ambrose, P. J., & Chiravuri, A. (2010). A socio-cognitive interpretation of the potential effects of downsizing on software quality performance. Information Systems Journal, 20 (3), 239-265. doi:10.1111/j.1365-2575.2009.00332.x | Analyzed |
(Anandarajan, 2002) | Anandarajan, M. (2002). Profiling Web usage in the workplace: A behavior-based artificial intelligence approach. Journal of Management Information Systems, 19 (1), 243-266. | Analyzed |
(Anderson & Agarwal, 2010) | Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643. | Analyzed |
(Angst & Agarwal, 2009) | Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: the elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370. | Analyzed |
(Arazy & Gellatly, 2012) | Arazy, O., & Gellatly, I. R. (2012). Corporate Wikis: The Effects of Owners' Motivation and Behavior on Group Members' Engagement. Journal of Management Information Systems, 29 (3), 87-116. doi:10.2753/mis0742-1222290303 | Analyzed |
(Arbore, Soscia, & Bagozzi, 2014) | Arbore, A., Soscia, I., & Bagozzi, R. P. (2014). The Role of Signaling Identity in the Adoption of Personal Technologies. Journal of the Association for Information Systems, 15 (2), 86-110. | Analyzed |
(Aubert, Barki, Patry, & Roy, 2008) | Aubert, B. A., Barki, H., Patry, M., & Roy, V. (2008). A multi-level, multi-theory perspective of information technology implementation. Information Systems Journal, 18 (1), 45-72. doi:10.1111/j.1365-2575.2007.00279.x | Analyzed |
(Awad & Ragowsky, 2008) | Awad, N. F., & Ragowsky, A. (2008). Establishing trust in electronic commerce through online word of mouth: An examination across genders. Journal of Management Information Systems, 24 (4), 101-121. doi:10.2753/mis0742-1222240404 | Analyzed |
(Ayyagari, Grover, & Purvis, 2011) | Ayyagari, R., Grover, V., & Purvis, R. (2011). Technostress: technological antecedents and implications. MIS Quarterly, 35(4), 831-858. | Analyzed |
(B. Kim & Han, 2009) | Kim, B., & Han, I. (2009). What drives the adoption of mobile data services? An approach from a value perspective. Journal of Information Technology, 24(1), 35-45. doi:10.1057/jit.2008.28 | Analyzed |
(B. Zhu & Watts, 2010) | Zhu, B., & Watts, S. A. (2010). Visualization of Network Concepts: The Impact of Working Memory Capacity Differences. Information Systems Research, 21(2), 327-344. doi:10.1287/isre.1080.0215 | Analyzed |
(Ba, Stallaert, & Whinston, 2001) | Ba, S. L., Stallaert, J., & Whinston, A. B. (2001). Research commentary: Introducing a third dimension in information systems design the case for incentive alignment. Information Systems Research, 12 (3), 225-239. doi:10.1287/isre.12.3.225.9712 | Analyzed |
(Bagayogo, Lapointe, & Bassellier, 2014) | Bagayogo, F. F., Lapointe, L., & Bassellier, G. (2014). Enhanced Use of IT: A New Perspective on Post-Adoption. Journal of the Association for Information Systems, 15 (7), 361-387. | Analyzed |
(Bagchi, Kanungo, & Dasgupta, 2003) | Bagchi, S., Kanungo, S., & Dasgupta, S. (2003). Modeling use of enterprise resource planning systems: A path analytic study. European Journal of Information Systems, 12 (2), 142-158. doi:10.1057/palgrave.ejis.3000453 | Analyzed |
(Bagozzi, 2007) | Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association of Information Systems, 8 (4), 244-254. | Analyzed |
(Baird & Raghu, 2015) | Baird, A., & Raghu, T. S. (2015). Associating consumer perceived value with business models for digital services. European Journal of Information Systems, 24(1), 4-22. doi:10.1057/ejis.2013.12 | Analyzed |
(Baird, Furukawa, & Raghu, 2012) | Baird, A., Furukawa, M. F., & Raghu, T. S. (2012). Understanding Contingencies Associated with the Early Adoption of Customer-Facing Web Portals. Journal of Management Information Systems, 29(2), 293-324. doi:10.2753/mis0742-1222290210 | Analyzed |
(Bajwa et al., 2008) | Bajwa, D. S., Lewis, L. F., Pervan, G., Lai, V. S., Munkvold, B. E., & Schwabe, G. (2008). Factors in the global assimilation of collaborative information technologies: An exploratory investigation in five regions. Journal of Management Information Systems, 25(1), 131-165. doi:10.2753/MIS0742-1222250106 | Analyzed |
(Bajwa, Lewis, Pervan, & Lai, 2005) | Bajwa, D. S., Lewis, L. F., Pervan, G., & Lai, V. S. (2005). The adoption and use of collaboration information technologies: International comparisons. Journal of Information Technology, 20(2), 130-140. doi:10.1057/palgrave.jit.2000037 | Analyzed |
(Bala & Venkatesh, 2013) | Bala, H., & Venkatesh, V. (2013). Changes in employees' job characteristics during an enterprise system implementation: a latent growth modelling perspective. MIS Quarterly, 37(4), 1113-1140. | Analyzed |
(Bansal, Zahedi, & Gefen, 2015) | Bansal, G., Zahedi, F., & Gefen, D. (2015). The role of privacy assurance mechanisms in building trust and the moderating role of privacy concern. European Journal of Information Systems, 24 (6), 624-644. doi:10.1057/ejis.2014.41 | Analyzed |
(Bapna, Goes, Wei, & Zhang, 2011) | Bapna, R., Goes, P., Wei, K. K., & Zhang, Z. J. (2011). A Finite Mixture Logit Model to Segment and Predict Electronic Payments System Adoption. Information Systems Research, 22 (1), 118-133. doi:10.1287/isre.1090.0277 | Analyzed |
(Barlow & Dennis, 2016) | Barlow, J. B., & Dennis, A. R. (2016). Not as smart as we think: A study of collective intelligence in virtual groups. Journal of Management Information Systems, 33 (3), 684-712. | Analyzed |
(Barrett, Heracleous, & Walsham, 2013) | Barrett, M., Heracleous, L., & Walsham, G. (2013). A rhetorical approach to it diffusion: Reconceptualizing the ideology-framing relationship in computerization movements. MIS Quarterly: Management Information Systems, 37(1), 201-220. | Analyzed |
(Bartelt & Dennis, 2014) | Bartelt, V. L., & Dennis, A. R. (2014). Nature and nurture: The impact of automaticity and the structuration of communication on virtual team behavior and performance. MIS Quarterly: Management Information Systems, 38(2), 521-538. | Analyzed |
(Baskerville & Myers, 2009) | Baskerville, R. L., & Myers, M. D. (2009). Fashion waves in information systems research and practice. MIS Quarterly: Management Information Systems, 33(4), 647-662. | Analyzed |
(Baskerville & Pries-Heje, 2001) | Baskerville, R. L., & Pries-Heje, J. (2001). A multiple-theory analysis of a diffusion of information technology case. Information Systems Journal, 11 (3), 181-212. doi:10.1046/j.1365-2575.2001.00106.x | Analyzed |
(Bayerl, Lauche, & Axtell, 2016) | Bayerl, P. S., Lauche, K., & Axtell, C. (2016). Revisiting group-based technology adoption as a dynamic process: the role of changing attitude-rationale configurations. MIS Quarterly, 40(3). | Analyzed |
(Beath, Berente, Gallivan, & Lyytinen, 2013) | Beath, C., Berente, N., Gallivan, M. J., & Lyytinen, K. (2013). Expanding the Frontiers of Information Systems Research: Introduction to the Special Issue. Journal of the Association for Information Systems, 14 (4), I-XVI. | Analyzed |
(Beaudry & Pinsonneault, 2005) | Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493-524. | Analyzed |
(Beaudry & Pinsonneault, 2010) | Beaudry, A., & Pinsonneault, A. (2010). The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use. MIS Quarterly: Management Information Systems, 34(4), 689-710. | Analyzed |
(Becker, Rai, Ringle, & Volckner, 2013) | Becker, J. M., Rai, A., Ringle, C. M., & Volckner, F. (2013). Discovering unobserved heterogeneity in structural equation models to advert validity threats. MIS Quarterly, 37(3), 665-+. | Analyzed |
(Belanger & Carter, 2008) | Belanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. Journal of Strategic Information Systems, 17 (2), 165-176. doi:10.1016/j.jsis.2007.12.002 | Analyzed |
(Benbasat & Barki, 2007) | Benbasat, I., & Barki, H. (2007). Quo vadis, TAM? Journal of the Association of Information Systems, 8 (4), 211-218. | Analyzed |
(Benlian, Koufaris, & Hess, 2011) | Benlian, A., Koufaris, M., & Hess, T. (2011). Service Quality in Software-as-a-Service: Developing the SaaS-Qual Measure and Examining Its Role in Usage Continuance. Journal of Management Information Systems, 28 (3), 85-126. doi:10.2753/mis0742-1222280303 | Analyzed |
(Benlian, Titah, & Hess, 2012) | Benlian, A., Titah, R., & Hess, T. (2012). Differential effects of provider recommendations and consumer reviews in e-commerce transactions: An experimental study. Journal of Management Information Systems, 29 (1), 237-272. doi:10.2753/MIS0742-1222290107 | Analyzed |
(Berthon, Pitt, Ewing, & Carr, 2002) | Berthon, P., Pitt, L., Ewing, M., & Carr, C. L. (2002). Potential research space in MIS: A framework for envisioning and evaluating research replication, extension, and generation. Information Systems Research, 13 (4), 416-427. doi:10.1287/isre.13.4.416.71 | Analyzed |
(Bhattacherjee & Hikmet, 2007) | Bhattacherjee, A., & Hikmet, N. (2007). Physicians' resistance toward healthcare information technology: A theoretical model and empirical test. European Journal of Information Systems, 16(6), 725-737. doi:10.1057/palgrave.ejis.3000717 | Analyzed |
(Bhattacherjee & Park, 2014) | Bhattacherjee, A., & Park, S. C. (2014). Why end-users move to the cloud: a migration-theoretic analysis. European Journal of Information Systems, 23(3), 357-372. doi:10.1057/ejis.2013.1 | Analyzed |
(Bhattacherjee & Premkumar, 2004) | Bhattacherjee, A., & Premkumar, G. (2004). Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test. MIS Quarterly: Management Information Systems, 28(2), 229-254. | Analyzed |
(Bhattacherjee & Sanford, 2006) | Bhattacherjee, A., & Sanford, C. (2006). Influence processes for information technology acceptance: An elaboration likelihood model. MIS Quarterly: Management Information Systems, 30(4), 805-825. | Analyzed |
(Bhattacherjee, 2001) | Bhattacherjee, A. (2001). Understanding information systems continuance: An expectation-confirmation model. MIS Quarterly: Management Information Systems, 25(3), 351-370. | Analyzed |
(Bock, Zmud, Kim, & Lee, 2005) | Bock, G.-W., Zmud, R. W., Kim, Y.-G., & Lee, J.-N. (2005). Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate. MIS Quarterly, 29(1), 87-111. | Analyzed |
(Boonstra, Boddy, & Bell, 2008) | Boonstra, A., Boddy, D., & Bell, S. (2008). Stakeholder management in IOS projects: analysis of an attempt to implement an electronic patient file. European Journal of Information Systems, 17 (2), 100-111. doi:10.1057/ejis.2008.2 | Analyzed |
(Bose & Luo, 2011) | Bose, R., & Luo, X. (2011). Integrative framework for assessing firms' potential to undertake Green IT initiatives via virtualization - A theoretical perspective. Journal of Strategic Information Systems, 20 (1), 38-54. doi:10.1016/j.jsis.2011.01.003 | Analyzed |
(Boss, Galletta, Lowry, Moody, & Polak, 2015) | Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-U461. | Analyzed |
(Boss, Kirsch, Angermeier, Shingler, & Boss, 2009) | Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, R. W. (2009). If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security. European Journal of Information Systems, 18 (2), 151-164. doi:10.1057/ejis.2009.8 | Analyzed |
(Braganza, Hackney, & Tanudjojo, 2009) | Braganza, A., Hackney, R., & Tanudjojo, S. (2009). Organizational knowledge transfer through creation, mobilization and diffusion: a case analysis of InTouch within Schlumberger. Information Systems Journal, 19 (5), 499-522. doi:10.1111/j.1365-2575.2007.00246.x | Analyzed |
(Brancheau & Wetherbe, 1990) | Brancheau, J. C., & Wetherbe, J. C. (1990). The adoption of spreadsheet software: Testing innovation diffusion theory in the context of end-user computing. Information Systems Research, 1 (2), 115-143. | Analyzed |
(Briggs et al., 1998) | Briggs, R. O., Adkins, M., Mittleman, D., Kruse, J., Miller, S., & Nunamaker Jr, J. F. (1998). A Technology Transition Model derived from field investigation of GSS use aboard the U.S.S. CORONADO. Journal of Management Information Systems, 15 (3), 151-195. | Analyzed |
(Briggs, De Vreede, & Nunamaker, 2003) | Briggs, R. O., De Vreede, G. J., & Nunamaker, J. F. (2003). Collaboration engineering with ThinkLets to pursue sustained success with group support systems. Journal of Management Information Systems, 19 (4), 31-64. | Analyzed |
(Bulgurcu, Cavusoglu, & Benbasat, 2010) | Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly: Management Information Systems, 34(special issue 3), 523-548. | Analyzed |
(Burton-Jones & Gallivan, 2007) | Burton-Jones, A., & Gallivan, M. J. (2007). Toward a deeper understanding of system usage in organizations: A multilevel perspective. MIS Quarterly, 31(4), 657-679. | Analyzed |
(Burton-Jones & Straub, 2006) | Burton-Jones, A., & Straub, D. W. (2006). Reconceptualizing system usage: An approach and empirical test. Information Systems Research, 17 (3), 228-246. doi:10.1287/isre.1060.0096 | Analyzed |
(C. Kim, Jahng, & Lee, 2007) | Kim, C., Jahng, J., & Lee, J. (2007). An empirical investigation into the utilization-based information technology success model: Integrating task-performance and social influence perspective. Journal of Information Technology, 22(2), 152-160. doi:10.1057/palgrave.jit.2000072 | Analyzed |
(C. P. Lee & Shim, 2007) | Lee, C. P., & Shim, J. P. (2007). An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. European Journal of Information Systems, 16(6), 712-724. doi:10.1057/palgrave.ejis.3000716 | Analyzed |
(C. W. Tan, Benbasat, & Cenfetelli, 2013) | Tan, C. W., Benbasat, I., & Cenfetelli, R. T. (2013). IT-mediated customer service content and delivery in electronic governments: an empirical investigation of the antecedents of service quality. MIS Quarterly, 37(1). | Analyzed |
(C.-H. Tan, Teo, & Benbasat, 2010) | Tan, C.-H., Teo, H.-H., & Benbasat, I. (2010). Assessing screening and evaluation decision support systems: A resource-matching approach. Information Systems Research, 21(2), 305-326. | Analyzed |
(Carter & Grover, 2015) | Carter, M., & Grover, V. (2015). Me, my self, and I(I): conceptualizing infromation technology identity and its implications. MIS Quarterly, 39(4), 931-957. | Analyzed |
(Cenfetelli & Schwarz, 2011) | Cenfetelli, R. T., & Schwarz, A. (2011). Identifying and Testing the Inhibitors of Technology Usage Intentions. Information Systems Research, 22(4), 808-823. doi:10.1287/isre.1100.0295 | Analyzed |
(Cenfetelli, Benbasat, & Al-Natour, 2008) | Cenfetelli, R. T., Benbasat, I., & Al-Natour, S. (2008). Addressing the what and how of online services: Positioning supporting-services functionality and service quality for business-to-consumer success. Information Systems Research, 19(2), 161-181. doi:10.1287/isre.1070.0163 | Analyzed |
(Chidambaram & Jones, 1993) | Chidambaram, L., & Jones, B. (1993). Impact of Communication Medium and Computer Support on Group Perceptions and Performance: A Comparison of Face-to-Face and Dispersed Meetings. MIS Quarterly, 17(4), 465-491. | Analyzed |
(Chin & Todd, 1995) | Chin, W. W., & Todd, P. A. (1995). On the use, usefulness, and ease of use of structural equation modeling in mis research: A note of caution. MIS Quarterly: Management Information Systems, 19(2), 237-246. | Analyzed |
(Chiravuri, Nazareth, & Ramamurthy, 2011) | Chiravuri, A., Nazareth, D., & Ramamurthy, K. (2011). Cognitive conflict and consensus generation in virtual teams during knowledge capture: Comparative effectiveness of techniques. Journal of Management Information Systems, 28 (1), 311-350. | Analyzed |
(Chou & He, 2011) | Chou, S. W., & He, M. Y. (2011). The factors that affect the performance of open source software development - the perspective of social capital and expertise integration. Information Systems Journal, 21 (2), 195-219. doi:10.1111/j.1365-2575.2009.00347.x | Analyzed |
(Choudhury & Karahanna, 2008) | Choudhury, V., & Karahanna, E. (2008). The relative advantage of electronic channels: A multidimensional view. MIS Quarterly, 32(1), 179-200. | Analyzed |
(Choudrie, Papazafeiropoulou, & Lee, 2003) | Choudrie, J., Papazafeiropoulou, A., & Lee, H. (2003). A web of stakeholders and strategies: A case of broadband diffusion in South Korea. Journal of Information Technology, 18 (4), 281-290. doi:10.1080/0268396032000150816 | Analyzed |
(Chu & Robey, 2008) | Chu, T.-H., & Robey, D. (2008). Explaining changes in learning and work practice following the adoption of online learning: a human agency perspective. European Journal of Information Systems, 17 (1), 79-98. | Analyzed |
(Chua, Lim, Soh, & Sia, 2012) | Chua, C. E. H., Lim, W. K., Soh, C., & Sia, S. K. (2012). Enacting clan control in complex IT projects: a social capital perspective. MIS Quarterly, 36(2), 577-600. | Analyzed |
(Clarke, 2013) | Clarke, R. (2013). Morning dew on the Web in Australia: 1992-1995. Journal of Information Technology, 28 (2), 93-110. doi:10.1057/jit.2013.11 | Analyzed |
(Compeau, Meister, & Higgins, 2007) | Compeau, D., Meister, D. B., & Higgins, C. A. (2007). From prediction to explanation: Reconceptualizing and extending the Perceived Characteristics of Innovating. Journal of the Association for Information Systems, 8 (8), 409-439. | Analyzed |
(Constantiou, Papazafeiropoulou, & Dwivedi, 2009) | Constantiou, I. D., Papazafeiropoulou, A., & Dwivedi, Y. K. (2009). The diffusion of IP telephony and vendors' commercialisation strategies. Journal of Information Technology, 24 (1), 25-34. doi:10.1057/jit.2008.29 | Analyzed |
(Cordoba, Pilkington, & Bernroider, 2012) | Cordoba, J. R., Pilkington, A., & Bernroider, E. W. N. (2012). Information systems as a discipline in the making: comparing EJIS and MISQ between 1995 and 2008. European Journal of Information Systems, 21 (5), 479-495. doi:10.1057/ejis.2011.58 | Analyzed |
(Cram & Newell, 2016) | Cram, W. A., & Newell, S. (2016). Mindful revolution or mindless trend? Examining agile development as a management fashion. European Journal of Information Systems, 25 (2), 154-169. doi:10.1057/ejis.2015.13 | Analyzed |
(Cyr, 2008) | Cyr, D. (2008). Modeling web site design across cultures: Relationships to trust, satisfaction, and e-loyalty. Journal of Management Information Systems, 24 (4), 47-72. doi:10.2753/mis0742-1222240402 | Analyzed |
(Cyr, 2014) | Cyr, D. (2014). Return visits: a review of how Web site design can engender visitor loyalty. Journal of Information Technology, 29 (1), 1-26. doi:10.1057/jit.2013.25 | Analyzed |
(Cyr, Head, Larios, & Pan, 2009) | Cyr, D., Head, M., Larios, H., & Pan, B. (2009). Exploring human images in website design: a multi-method approach. MIS Quarterly, 33(3), 539-566. | Analyzed |
(D. H. Brown & Thompson, 2011) | Brown, D. H., & Thompson, S. (2011). Priorities, policies and practice of e-government in a developing country context: ICT infrastructure and diffusion in Jamaica. European Journal of Information Systems, 20(3), 329-342. doi:10.1057/ejis.2011.3 | Analyzed |
(D. J. Kim, Ferrin, & Rao, 2009) | Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information systems research, 20(2), 237-257. | Analyzed |
(Dabbish & Kraut, 2008) | Dabbish, L., & Kraut, R. (2008). Awareness displays and social motivation for coordinating communication. Information Systems Research, 19 (2), 221-238. doi:10.1287/isre.1080.0175 | Analyzed |
(Damsgaard & Lyytinen, 1998) | Damsgaard, J., & Lyytinen, K. (1998). Contours of diffusion of electronic data interchange in Finland Overcoming technological barriers and collaborating to make it happen. Journal of Strategic Information Systems, 7 (4), 275-297. | Analyzed |
(Dang et al., 2012) | Dang, Y., Zhang, Y. L., Chen, H. C., Brown, S. A., Hu, P. J. H., & Nunamaker, J. F. (2012). Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology. Journal of Management Information Systems, 28 (4), 99-127. doi:10.2753/mis0742-1222280405 | Analyzed |
(D'Arcy, Herath, & Shoss, 2014) | D'Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems, 31(2), 285-318. doi:10.2753/mis0742-1222310210 | Analyzed |
(Datta, 2011) | Datta, P. (2011). A preliminary study of ecommerce adoption in developing countries. Information Systems Journal, 21 (1), 3-32. doi:10.1111/j.1365-2575.2009.00344.x | Analyzed |
(Davis & Bostrom, 1993) | Davis, S. A., & Bostrom, R. P. (1993). Training end users - an experimental investigation of the roles of the computer-interface and training methods. MIS Quarterly, 17(1), 61-85. doi:10.2307/249510 | Analyzed |
(De Guinea & Markus, 2009) | De Guinea, A. O., & Markus, L. (2009). Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use. MIS Quarterly: Management Information Systems, 33(3), 433-444. | Analyzed |
(de Guinea, Titah, & Leger, 2014) | de Guinea, A. O., Titah, R., & Leger, P. M. (2014). Explicit and Implicit Antecedents of Users' Behavioral Beliefs in Information Systems: A Neuropsychological Investigation. Journal of Management Information Systems, 30 (4), 179-209. doi:10.2753/mis0742-1222300407 | Analyzed |
(de Vaujany, Walsh, & Mitev, 2011) | de Vaujany, F. X., Walsh, I., & Mitev, N. (2011). An historically grounded critical analysis of research articles in IS. European Journal of Information Systems, 20 (4), 395-417. doi:10.1057/ejis.2011.13 | Analyzed |
(De Vreede, Jones, & Mgaya, 1998) | De Vreede, G. J., Jones, N., & Mgaya, R. J. (1998). Exploring the application and acceptance of group support systems in Africa. Journal of Management Information Systems, 15 (3), 197-234. | Analyzed |
(Dennis & Reinicke, 2004) | Dennis, A. R., & Reinicke, B. A. (2004). Beta versus VHS and the acceptance of electronic brainstorming technology. MIS Quarterly: Management Information Systems, 28(1), 1-20. | Analyzed |
(Dennis, Wixom, & Vandenberg, 2001) | Dennis, A. R., Wixom, B. H., & Vandenberg, R. J. (2001). Understanding fit and appropriation effects in group support systems via meta-analysis. MIS Quarterly, 25(2), 167-193. | Analyzed |
(Devaraj, Easley, & Crant, 2008) | Devaraj, S., Easley, R. E., & Crant, J. M. (2008). How does personality matter? Relating the five-factor model to technology acceptance and use. Information Systems Research, 19 (1), 93-105. doi:10.1287/isre.1070.0153 | Analyzed |
(Devaraj, Fan, & Kohli, 2002) | Devaraj, S., Fan, M., & Kohli, R. (2002). Antecedents of B2C channel satisfaction and preference: Validating e-commerce metrics. Information Systems Research, 13 (3), 316-333. doi:10.1287/isre.13.3.316.77 | Analyzed |
(Dimoka, 2010) | Dimoka, A. (2010). What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly, 34 (2), 373-396. | Analyzed |
(Dimoka, Pavlou, & Davis, 2011) | Dimoka, A., Pavlou, P. A., & Davis, F. D. (2011). NeuroIS: The Potential of Cognitive Neuroscience for Information Systems Research. Information Systems Research, 22 (4), 687-702. doi:10.1287/isre.1100.0284 | Analyzed |
(Dinev & Hart, 2006) | Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research, 17 (1), 61-80. doi:10.1287/isre.1060.0080 | Analyzed |
(Dinev, Hart, & Mullen, 2008) | Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance - An empirical investigation. Journal of Strategic Information Systems, 17 (3), 214-233. doi:10.1016/j.jsis.2007.09.002 | Analyzed |
(D'MacRedie & Mijinyawa, 2011) | D'MacRedie, R. D., & Mijinyawa, K. (2011). A theory-grounded framework of Open Source Software adoption in SMEs. European Journal of Information Systems, 20(2), 237-250. doi:10.1057/ejis.2010.60 | Analyzed |
(E. T. K. Lim, Pan, & Tan, 2005) | Lim, E. T. K., Pan, S. L., & Tan, C. W. (2005). Managing user acceptance towards enterprise resource planning (ERP) systems - understanding the dissonance between user expectations and managerial policies. European Journal of Information Systems, 14(2), 135-149. doi:10.1057/palgrave.ejis.3000531 | Analyzed |
(Elbanna, 2008) | Elbanna, A. R. (2008). Strategic systems implementation: Diffusion through drift. Journal of Information Technology, 23 (2), 89-96. doi:10.1057/palgrave.jit.2000130 | Analyzed |
(Elie-Dit-Cosaque, Pallud, & Kalika, 2011) | Elie-Dit-Cosaque, C., Pallud, J., & Kalika, M. (2011). The Influence of Individual, Contextual, and Social Factors on Perceived Behavioral Control of Information Technology: A Field Theory Approach. Journal of Management Information Systems, 28 (3), 201-234. doi:10.2753/mis0742-1222280306 | Analyzed |
(Elkins, Dunbar, Adame, & Nunamaker, 2013) | Elkins, A. C., Dunbar, N. E., Adame, B., & Nunamaker, J. F. (2013). Are Users Threatened by Credibility Assessment Systems? Journal of Management Information Systems, 29 (4), 249-261. doi:10.2753/mis0742-1222290409 | Analyzed |
(Featherman, Valacich, & Wells, 2006) | Featherman, M. S., Valacich, J. S., & Wells, J. D. (2006). Is that authentic or artificial? Understanding consumer perceptions of risk in e-service encounters. Information Systems Journal, 16 (2), 107-134. doi:10.1111/j.1365-2575.2006.00211.x | Analyzed |
(Ferratt & Vlahos, 1998) | Ferratt, T., & Vlahos, G. (1998). An investigation of task-technology fit for managers in Greece and the US. European Journal of Information Systems, 7 (2), 123-136. | Analyzed |
(Fichman, 2004) | Fichman, R. G. (2004). Real options and IT platform adoption: Implications for theory and practice. Information Systems Research, 15 (2), 132-154. doi:10.1287/isre.1040.0021 | Analyzed |
(Flynn & Du, 2012) | Flynn, D., & Du, Y. Q. (2012). A case study of the legitimation process undertaken to gain support for an information system in a Chinese university. European Journal of Information Systems, 21 (3), 212-228. doi:10.1057/ejis.2011.27 | Analyzed |
(Foth, 2016) | Foth, M. (2016). Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence. European Journal of Information Systems, 25 (2), 91-109. doi:10.1057/ejis.2015.9 | Analyzed |
(Furneaux & Wade, 2011) | Furneaux, B., & Wade, M. (2011). An exploration of organizational level information systems discontinuance intentions. MIS Quarterly, 35(3), 573-598. | Analyzed |
(G. Kim, Shin, & Lee, 2009) | Kim, G., Shin, B., & Lee, H. G. (2009). Understanding dynamics between initial trust and usage intentions of mobile banking. Information Systems Journal, 19(3), 283-311. doi:10.1111/j.1365-2575.2007.00269.x | Analyzed |
(G. Shmueli & Koppius, 2011) | Shmueli, G., & Koppius, O. R. (2011). Predictive analytics in information systems research. MIS Quarterly, 35(3), 553-572. | Analyzed |
(Gallivan & Keil, 2003) | Gallivan, M. J., & Keil, M. (2003). The user-developer communication process: A critical case study. Information Systems Journal, 13 (1), 37-68. doi:10.1046/j.1365-2575.2003.00138.x | Analyzed |
(Gallivan, Spitler, & Koufaris, 2005) | Gallivan, M. J., Spitler, V. K., & Koufaris, M. (2005). Does information technology training really matter? A social information processing analysis of coworkers' influence on IT usage in the Workplace. Journal of Management Information Systems, 22 (1), 153-192. | Analyzed |
(Gaskin, Lowry, & Hull, 2016) | Gaskin, J. E., Lowry, P. B., & Hull, D. M. (2016). Leveraging multimedia to advance science by disseminating a greater variety of scholarly contributions in more accessible formats. Journal of the Association of Information Systems, 17 (6), 413-434. | Analyzed |
(Gebauer, Shaw, & Gribbins, 2010) | Gebauer, J., Shaw, M. J., & Gribbins, M. L. (2010). Task-technology fit for mobile information systems. Journal of Information Technology, 25 (3), 259-272. | Analyzed |
(Gefen & Straub, 1997) | Gefen, D., & Straub, D. W. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS Quarterly: Management Information Systems, 21(4), 389-400. | Analyzed |
(Gefen, 2004) | Gefen, D. (2004). What makes an ERP implementation relationship worthwhile: Linking trust mechanisms and ERP usefulness. Journal of Management Information Systems, 21(1), 263-288. | Analyzed |
(Gefen, Benbasat, & Pavlou, 2008) | Gefen, D., Benbasat, I., & Pavlou, P. A. (2008). A research agenda for trust in online environments. Journal of Management Information Systems, 24 (4), 275-286. doi:10.2753/mis0742-1222240411 | Analyzed |
(Gefen, Karahanna, & Straub, 2003) | Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90. | Analyzed |
(Gengatharen & Standing, 2005) | Gengatharen, D. E., & Standing, C. (2005). A framework to assess the factors affecting success or failure of the implementation of government-supported regional e-marketplaces for SMEs. European Journal of Information Systems, 14 (4), 417-433. doi:10.1057/palgrave.ejis.3000551 | Analyzed |
(Germonprez, Hovorka, & Gal, 2011) | Germonprez, M., Hovorka, D., & Gal, U. (2011). Secondary Design: A Case of Behavioral Design Science Research. Journal of the Association for Information Systems, 12 (10), 662-683. | Analyzed |
(Gerow, Ayyagari, Thatcher, & Roth, 2013) | Gerow, J. E., Ayyagari, R., Thatcher, J. B., & Roth, P. L. (2013). Can we have fun @ work? the role of intrinsic motivation for utilitarian systems. European Journal of Information Systems, 22 (3), 360-380. doi:10.1057/ejis.2012.25 | Analyzed |
(Gil-Garcia, Chengalur-Smith, & Duchessi, 2007) | Gil-Garcia, J. R., Chengalur-Smith, I., & Duchessi, P. (2007). Collaborative e-Government: impediments and benefits of information-sharing projects in the public sector. European Journal of Information Systems, 16 (2), 121-133. doi:10.1057/palgrave.ejis.3000673 | Analyzed |
(Gill, 1996) | Gill, T. G. (1996). Expert systems usage: Task change and intrinsic motivation. MIS Quarterly: Management Information Systems, 20(3), 301-323. | Analyzed |
(Gnyawali, Fan, & Penner, 2010) | Gnyawali, D. R., Fan, W. G., & Penner, J. (2010). Competitive Actions and Dynamics in the Digital Age: An Empirical Investigation of Social Networking Firms. Information Systems Research, 21 (3), 594-613. doi:10.1287/isre.1100.0294 | Analyzed |
(Goel, Johnson, Junglas, & Ives, 2011) | Goel, L., Johnson, N. A., Junglas, I., & Ives, B. (2011). From space to place: predicting users' intentions to return to virtual worlds. MIS Quarterly, 35(3), 749-771. | Analyzed |
(Goel, Johnson, Junglas, & Ives, 2013) | Goel, L., Johnson, N., Junglas, I., & Ives, B. (2013). Predicting users' return to virtual worlds: a social perspective. Information Systems Journal, 23(1), 35-63. doi:10.1111/j.1365-2575.2011.00396.x | Analyzed |
(Gregor, 2006) | Gregor, S. (2006). The nature of theory in information systems. MIS Quarterly, 30(3), 611-642. | Analyzed |
(Grgecic, Holten, & Rosenkranz, 2015) | Grgecic, D., Holten, R., & Rosenkranz, C. (2015). The Impact of Functional Affordances and Symbolic Expressions on the Formation of Beliefs. Journal of the Association for Information Systems, 16 (7), 580-607. | Analyzed |
(Grover & Lyytinen, 2015) | Grover, V., & Lyytinen, K. (2015). New state of play in information systems research: the push to the edges. MIS Quarterly, 39(2), 271-U310. | Analyzed |
(Grover, 1997) | Grover, V. (1997). An extension of the tri-core model of information systems innovation: strategic and technological moderators. European Journal of Information Systems, 6(4), 232-242. doi:10.1038/sj.ejis.3000274 | Analyzed |
(Grover, Fiedler, & Teng, 1997) | Grover, V., Fiedler, K., & Teng, J. (1997). Empirical evidence on Swanson's tri-core model of information systems innovation. Information Systems Research, 8(3), 273-287. doi:10.1287/isre.8.3.273 | Analyzed |
(Guo, Yuan, Archer, & Connelly, 2011) | Guo, K. H., Yuan, Y. F., Archer, N. P., & Connelly, C. E. (2011). Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model. Journal of Management Information Systems, 28 (2), 203-236. doi:10.2753/mis0742-1222280208 | Analyzed |
(Gurbaxani & Mendelson, 1994) | Gurbaxani, V., & Mendelson, H. (1994). Modeling vs. forecasting: The case of information systems spending. Information Systems Research, 5 (2), 180-190. | Analyzed |
(H. G. Brown, Poole, & Rodgers, 2004) | Brown, H. G., Poole, M. S., & Rodgers, T. L. (2004). Interpersonal traits, complementarity, and trust in virtual collaboration. Journal of Management Information Systems, 20(4), 115-137. | Analyzed |
(H. S. Sun & Zhang, 2006) | Sun, H. S., & Zhang, P. (2006). Causal relationships between perceived enjoyment and perceived ease of use: An alternative approach. Journal of the Association for Information Systems, 7(9), 618-645. | Analyzed |
(H. S. Sun, 2010) | Sun, H. S. (2010). Sellers' Trust and Continued Use of Online Marketplaces. Journal of the Association for Information Systems, 11 (4), 182-211. | Analyzed |
(H. S. Sun, 2012) | Sun, H. S. (2012). Understanding user revisions when using information systems features: adaptive system use and triggers. MIS Quarterly, 36(2), 453-478. | Analyzed |
(H. S. Sun, 2013) | Sun, H. S. (2013). A longitudinal study of herd behavior in the adoption and continued use of technology. MIS Quarterly, 37(4). | Analyzed |
(H. W. Kim & Kankanhalli, 2009) | Kim, H. W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS Quarterly: Management Information Systems, 33(3), 567-582. | Analyzed |
(H. W. Kim, Chan, & Kankanhalli, 2012) | Kim, H. W., Chan, H. C., & Kankanhalli, A. (2012). What Motivates People to Purchase Digital Items on Virtual Community Websites? The Desire for Online Self-Presentation. Information Systems Research, 23(4), 1232-1245. doi:10.1287/isre.1110.0411 | Analyzed |
(Hann, Hui, Lee, & Png, 2007) | Hann, I.-H., Hui, K.-L., Lee, S.-Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24 (2), 13-42. | Analyzed |
(Hanseth & Lyytinen, 2010) | Hanseth, O., & Lyytinen, K. (2010). Design theory for dynamic complexity in information infrastructures: the case of building internet. Journal of Information Technology, 25 (1), 1-19. doi:10.1057/jit.2009.19 | Analyzed |
(Hardgrave, Davis, & Riemenschneider, 2003) | Hardgrave, B. C., Davis, F. D., & Riemenschneider, C. K. (2003). Investigating determinants of software developers' intentions to follow methodologies. Journal of Management Information Systems, 20 (1), 123-151. | Analyzed |
(Hardin, Looney, & Fuller, 2014) | Hardin, A. M., Looney, C. A., & Fuller, M. A. (2014). Self-efficacy, learning method appropriation and software skills acquisition in learner-controlled CSSTS environments. Information Systems Journal, 24 (1), 3-27. doi:10.1111/isj.12016 | Analyzed |
(He & King, 2008) | He, J., & King, W. R. (2008). The Role of User Participation in Information Systems Development: Implications from a Meta-Analysis. Journal of Management Information Systems, 25 (1), 301-331. doi:10.2753/mis0742-1222250111 | Analyzed |
(Heinze & Hu, 2009) | Heinze, N., & Hu, Q. (2009). Why college undergraduates choose IT: a multi-theoretical perspective. European Journal of Information Systems, 18 (5), 462-475. doi:10.1057/ejis.2009.30 | Analyzed |
(Herath & Rao, 2009) | Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125. doi:10.1057/ejis.2009.6 | Analyzed |
(Herath et al., 2014) | Herath, T., Chen, R., Wang, J. G., Banjara, K., Wilbur, J., & Rao, H. R. (2014). Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61-84. doi:10.1111/j.1365-2575.2012.00420.x | Analyzed |
(Hess, Fuller, & Mathew, 2005) | Hess, T. J., Fuller, M. A., & Mathew, J. (2005). Involvement and decision-making performance with a decision aid: The influence of social multimedia, gender, and playfulness. Journal of Management Information Systems, 22 (3), 15-54. | Analyzed |
(Hess, McNab, & Basoglu, 2014) | Hess, T. J., McNab, A. L., & Basoglu, K. A. (2014). Reliability generalization of perceived ease of use, perceived usefulness, and behavioral intentions. MIS Quarterly: Management Information Systems, 38(1), 1-28. | Analyzed |
(Ho & Bodoff, 2014) | Ho, S. Y., & Bodoff, D. (2014). The effects of web personalization on user attitude and behavior: an integration of the elaboration likeliwood model and consumer search theory. MIS Quarterly, 38(2). | Analyzed |
(Hoefnagel, Oerlemans, & Goedee, 2014) | Hoefnagel, R., Oerlemans, L., & Goedee, J. (2014). How anchoring and adjusting influence citizens' acceptance of video-mediated crime reporting: A narrative approach. Journal of Strategic Information Systems, 23 (4), 305-322. doi:10.1016/j.jsis.2014.09.002 | Analyzed |
(Hoehle & Venkatesh, 2015) | Hoehle, H., & Venkatesh, V. (2015). Mobile application usability: conceptualization and instrument development. MIS Quarterly, 39(2), 435-472. | Analyzed |
(Hoehle, Zhang, & Venkatesh, 2015) | Hoehle, H., Zhang, X. J., & Venkatesh, V. (2015). An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability. European Journal of Information Systems, 24 (3), 337-359. doi:10.1057/ejis.2014.43 | Analyzed |
(Hoffmann, Lutz, & Meckel, 2014) | Hoffmann, C. P., Lutz, C., & Meckel, M. (2014). Digital Natives or Digital Immigrants? The Impact of User Characteristics on Online Trust. Journal of Management Information Systems, 31 (3), 138-171. doi:10.1080/07421222.2014.995538 | Analyzed |
(Hong & Tam, 2006) | Hong, S. J., & Tam, K. Y. (2006). Understanding the adoption of multipurpose information appliances: The case of mobile data services. Information Systems Research, 17 (2), 162-179. doi:10.1287/isre.1060.0088 | Analyzed |
(Horton, Buck, Waterson, & Clegg, 2001) | Horton, R. P., Buck, T., Waterson, P. E., & Clegg, C. W. (2001). Explaining intranet use with the technology acceptance model. Journal of Information Technology, 16 (4), 237-248. doi:10.1080/02683960110102407 | Analyzed |
(Hsieh & Wang, 2007) | Hsieh, J. J. P. A., & Wang, W. (2007). Explaining employees' extended use of complex information systems. European Journal of Information Systems, 16(3), 216-227. doi:10.1057/palgrave.ejis.3000663 | Analyzed |
(Hsieh, Rai, & Keil, 2011) | Hsieh, J. J. P. A., Rai, A., & Keil, M. (2011). Addressing Digital Inequality for the Socioeconomically Disadvantaged Through Government Initiatives: Forms of Capital That Affect ICT Utilization. Information Systems Research, 22(2), 233-253. doi:10.1287/isre.1090.0256 | Analyzed |
(Hsu, Lin, & Wang, 2015) | Hsu, C., Lin, Y. T., & Wang, T. (2015). A legitimacy challenge of a cross-cultural interorganizational information system. European Journal of Information Systems, 24(3), 278-294. doi:10.1057/ejis.2014.33 | Analyzed |
(Iivari & Huisman, 2007) | Iivari, J., & Huisman, M. (2007). The relationship between organizational culture and the deployment of systems development methodologies. MIS Quarterly, 31(1), 35-58. | Analyzed |
(Irani, Elliman, & Jackson, 2007) | Irani, Z., Elliman, T., & Jackson, P. (2007). Electronic transformation of government in the U.K.: a research agenda. European Journal of Information Systems, 16 (4), 327-335. doi:10.1057/palgrave.ejis.3000698 | Analyzed |
(J. D. Xu, Benbasat, & Cenfetelli, 2011) | Xu, J. D., Benbasat, I., & Cenfetelli, R. (2011). The Effects of Service and Consumer Product Knowledge on Online Customer Loyalty. Journal of the Association for Information Systems, 12 (11), 741-766. | Analyzed |
(J. D. Xu, Benbasat, & Cenfetelli, 2013) | Xu, J. D., Benbasat, I., & Cenfetelli, R. T. (2013). Integrating service quality with system and information quality: An empirical test in the E-service context. MIS Quarterly: Management Information Systems, 37(3), 777-794. | Analyzed |
(J. J. Xu, Abdinnour, & Chaparro, 2017) | Xu, J. J., Abdinnour, S., & Chaparro, B. (2017). An Integrated Temporal Model of Belief and Attitude Change: An Empirical Test With the iPad. Journal of the Association for Information Systems, 18 (2), 113-140. | Analyzed |
(J. J. Xu, Benbasat, & Cenfetelli, 2014) | Xu, J. J., Benbasat, I., & Cenfetelli, R. T. (2014). The nature and consequences of trade-off transparency in the context of recommendation agents. MIS Quarterly, 38(2), 379-406. | Analyzed |
(J. Lee & Rao, 2012) | Lee, J., & Rao, H. R. (2012). Service source and channel choice in G2C service environments: a model comparison in the anti/counter-terrorism domain. Information Systems Journal, 22(4), 313-341. doi:10.1111/j.1365-2575.2011.00388.x | Analyzed |
(J. Wu & Du, 2012) | Wu, J., & Du, H. W. (2012). Toward a better understanding of behavioral intention and system usage constructs. European Journal of Information Systems, 21 (6), 680-698. doi:10.1057/ejis.2012.15 | Analyzed |
(J. Wu & Lederer, 2009) | Wu, J., & Lederer, A. (2009). A meta-analysis of the role of environment-based voluntariness in information technology acceptance. MIS Quarterly: Management Information Systems, 33(2), 419-432. | Analyzed |
(J. Wu & Lu, 2013) | Wu, J., & Lu, X. J. (2013). Effects of Extrinsic and Intrinsic Motivators on Using Utilitarian, Hedonic, and Dual-Purposed Information Systems: A Meta-Analysis. Journal of the Association for Information Systems, 14 (3), 153-191. | Analyzed |
(Jasperson, Carter, & Zmud, 2005) | Jasperson, J. S., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS Quarterly, 29(3), 525-557. | Analyzed |
(Jensen, Kjaergaard, & Svejvig, 2009) | Jensen, T. B., Kjaergaard, A., & Svejvig, P. (2009). Using institutional theory with sensemaking theory: a case study of information system implementation in healthcare. Journal of Information Technology, 24 (4), 343-353. doi:10.1057/jit.2009.11 | Analyzed |
(Jeyaraj, Balser, Chowa, & Griggs, 2009) | Jeyaraj, A., Balser, D. B., Chowa, C., & Griggs, G. M. (2009). Organizational and institutional determinants of B2C adoption under shifting environments. Journal of Information Technology, 24 (3), 219-230. doi:10.1057/jit.2008.22 | Analyzed |
(Jeyaraj, Rottman, & Lacity, 2006) | Jeyaraj, A., Rottman, J. W., & Lacity, M. C. (2006). A review of the predictors, linkages, and biases in IT innovation adoption research. Journal of Information Technology, 21 (1), 1-23. doi:10.1057/palgrave.jit.2000056 | Analyzed |
(Jiang & Benbasat, 2004) | Jiang, Z. H., & Benbasat, I. (2004). Virtual product experience: Effects of visual and functional control of products on perceived diagnosticity and flow in electronic shopping. Journal of Management Information Systems, 21 (3), 111-147. | Analyzed |
(Johnston & Warkentin, 2010) | Johnston, A. C., & Warkentin, M. (2010). FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. MIS Quarterly, 34(3), 549-566. | Analyzed |
(Joshi, 1991) | Joshi, K. (1991). A model of users' perspective on change: The case of information systems technology implementation. MIS Quarterly: Management Information Systems, 15(2), 229-242. | Analyzed |
(Jung, 2014) | Jung, Y. (2014). What a smartphone is to me: understanding user values in using smartphones. Information Systems Journal, 24 (4), 299-321. doi:10.1111/isj.12031 | Analyzed |
(Junglas, Goel, Abraham, & Ives, 2013) | Junglas, I., Goel, L., Abraham, C., & Ives, B. (2013). The Social Component of Information Systems-How Sociability Contributes to Technology Acceptance. Journal of the Association for Information Systems, 14 (10), 585-616. | Analyzed |
(K. H. Lim & Benbasat, 2000) | Lim, K. H., & Benbasat, I. (2000). The effect of multimedia on perceived equivocality and perceived usefulness of information systems. MIS Quarterly, 24(3), 449-471. doi:10.2307/3250969 | Analyzed |
(K. H. Lim, Sia, Lee, & Benbasat, 2006) | Lim, K. H., Sia, C. L., Lee, M. K. O., & Benbasat, I. (2006). Do I trust you online, and if so, will I buy? An empirical study of two trust-building strategies. Journal of Management Information Systems, 23 (2), 233-266. doi:10.2753/mis0742-1222230210 | Analyzed |
(K. Zhu & Kraemer, 2005) | Zhu, K., & Kraemer, K. L. (2005). Post-adoption variations in usage and value of e-business by organizations: Cross-country evidence from the retail industry. Information Systems Research, 16 (1), 61-84. doi:10.1287/isre.1050.0045 | Analyzed |
(K. Zhu, Kraemer, Gurbaxani, & Xu, 2006) | Zhu, K., Kraemer, K. L., Gurbaxani, V., & Xu, S. X. (2006). Migration to open-standard interorganizational systems: Network effects, switching costs, and path dependency. MIS Quarterly, 30, 515-539. | Analyzed |
(Kaba & Touré, 2014) | Kaba, B., & Touré, B. (2014). Understanding information and communication technology behavioral intention to use: Applying the UTAUT model to social networking site adoption by young people in a least developed country. Journal of the Association for Information Science and Technology, 65 (8), 1662-1674. | Analyzed |
(Kaganer, Pawlowski, & Wiley-Patton, 2010) | Kaganer, E., Pawlowski, S. D., & Wiley-Patton, S. (2010). Building Legitimacy for IT Innovations: The Case of Computerized Physician Order Entry Systems. Journal of the Association for Information Systems, 11 (1), 1-33. | Analyzed |
(Kamis, Koufaris, & Stern, 2008) | Kamis, A., Koufaris, M., & Stern, T. (2008). Using an attribute-based decision support system for user-customized products online: An experimental investigation. MIS Quarterly, 32(1), 159-177. | Analyzed |
(Kane & Borgatti, 2011) | Kane, G. C., & Borgatti, S. P. (2011). CENTRALITY-IS PROFICIENCY ALIGNMENT AND WORKGROUP PERFORMANCE. MIS Quarterly, 35(4), 1063-1078. | Analyzed |
(Kang, Lim, Kim, & Yang, 2012) | Kang, S., Lim, K. H., Kim, M. S., & Yang, H. D. (2012). A Multilevel Analysis of the Effect of Group Appropriation on Collaborative Technologies Use and Performance. Information Systems Research, 23 (1), 214-230. doi:10.1287/isre.1100.0342 | Analyzed |
(Kankanhalli, Tan, & Wei, 2005) | Kankanhalli, A., Tan, B. C. Y., & Wei, K. K. (2005). Contributing knowledge to electronic knowledge repositories: An empirical investigation. MIS Quarterly, 29(1), 113-143. | Analyzed |
(Karimi, Somers, & Bhattacherjee, 2007) | Karimi, J., Somers, T. M., & Bhattacherjee, A. (2007). The impact of ERP implementation on business process outcomes: A factor-based study. Journal of Management Information Systems, 24 (1), 101-134. doi:10.2753/MIS0742-1222240103 | Analyzed |
(Kayande, De Bruyn, Lilien, Rangaswamy, & van Bruggen, 2009) | Kayande, U., De Bruyn, A., Lilien, G. L., Rangaswamy, A., & van Bruggen, G. H. (2009). How Incorporating Feedback Mechanisms in a DSS Affects DSS Evaluations. Information Systems Research, 20 (4), 527-546. doi:10.1287/isre.1080.0198 | Analyzed |
(Ke, Tan, Sia, & Wei, 2012) | Ke, W. L., Tan, C. H., Sia, C. L., & Wei, K. K. (2012). Inducing Intrinsic Motivation to Explore the Enterprise System: The Supremacy of Organizational Levers. Journal of Management Information Systems, 29 (3), 257-289. doi:10.2753/mis0742-1222290308 | Analyzed |
(Keith, Babb, Lowry, Furner, & Abdullat, 2015) | Keith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., & Abdullat, A. (2015). The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal, 25 (6), 637-667. doi:10.1111/isj.12082 | Analyzed |
(Kelley, Chiasson, Downey, & Pacaud, 2011) | Kelley, H., Chiasson, M., Downey, A., & Pacaud, D. (2011). The clinical impact of ehealth on the self-management of diabetes: A double adoption perspective. Journal of the Association of Information Systems, 12 (3), 208-234. | Analyzed |
(Keutel, Michalik, & Richter, 2014) | Keutel, M., Michalik, B., & Richter, J. (2014). Towards mindful case study research in IS: a critical analysis of the past ten years. European Journal of Information Systems, 23 (3), 256-272. doi:10.1057/ejis.2013.26 | Analyzed |
(Khalifa & Liu, 2007) | Khalifa, M., & Liu, V. (2007). Online consumer retention: contingent effects of online shopping habit and online shopping experience. European Journal of Information Systems, 16 (6), 780-792. doi:10.1057/palgrave.ejis.3000711 | Analyzed |
(Khoumbati, Themistocleous, & Irani, 2006) | Khoumbati, K., Themistocleous, M., & Irani, Z. (2006). Evaluating the adoption of enterprise application integration in health-care organizations. Journal of Management Information Systems, 22 (4), 69-108. doi:10.2753/mis0742-1222220404 | Analyzed |
(Klaus, Wingreen, & Blanton, 2010) | Klaus, T., Wingreen, S. C., & Blanton, J. E. (2010). Resistant groups in enterprise system implementations: a Q-methodology examination. Journal of Information Technology, 25 (1), 91-106. doi:10.1057/jit.2009.7 | Analyzed |
(Klein, 2007) | Klein, R. (2007). An empirical examination of patient-physician portal acceptance. European Journal of Information Systems, 16 (6), 751-760. doi:10.1057/palgrave.ejis.3000719 | Analyzed |
(Ko & Dennis, 2011) | Ko, D. G., & Dennis, A. R. (2011). Profiting from Knowledge Management: The Impact of Time and Experience. Information Systems Research, 22(1), 134-152. doi:10.1287/isre.1090.0247 | Analyzed |
(Ko, Kirsch, & King, 2005) | Ko, D. G., Kirsch, L. J., & King, W. R. (2005). Antecedents of Knowledge Transfer from Consultants to Clients in Enterprise System Implementations. MIS Quarterly, 29(1), 59-85. | Analyzed |
(Koch, Gonzalez, & Leidner, 2012) | Koch, H., Gonzalez, E., & Leidner, D. (2012). Bridging the work/social divide: the emotional response to organizational social networking sites. European Journal of Information Systems, 21 (6), 699-717. doi:10.1057/ejis.2012.18 | Analyzed |
(Komiak & Benbasat, 2006) | Komiak, S. Y. X., & Benbasat, I. (2006). The effects of personalization and familiarity on trust and adoption of recommendation agents. MIS Quarterly, 30(4), 941-960. | Analyzed |
(Koufaris, 2002) | Koufaris, M. (2002). Applying the Technology Acceptance Model and flow theory to online Consumer Behavior. Information Systems Research, 13 (2), 205-223. | Analyzed |
(Kung, Cegielski, & Kung, 2015) | Kung, L., Cegielski, C. G., & Kung, H. J. (2015). An integrated environmental perspective on software as a service adoption in manufacturing and retail firms. Journal of Information Technology, 30 (4), 352-363. doi:10.1057/jit.2015.14 | Analyzed |
(Kurnia & Johnston, 2000) | Kurnia, S., & Johnston, R. B. (2000). The need for a processual view of inter-organizational systems adoption. Journal of Strategic Information Systems, 9 (4), 295-319. doi:10.1016/s0963-8687(00)00050-0 | Analyzed |
(L. Chen, Hsieh, Van de Vliert, & Huang, 2015) | Chen, L., Hsieh, J., Van de Vliert, E., & Huang, X. (2015). Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization. European Journal of Information Systems, 24(3), 314-336. doi:10.1057/ejis.2014.26 | Analyzed |
(L. Q. Deng, Turner, Gehling, & Prince, 2010) | Deng, L. Q., Turner, D. E., Gehling, R., & Prince, B. (2010). User experience, satisfaction, and continual usage intention of IT. European Journal of Information Systems, 19(1), 60-75. doi:10.1057/ejis.2009.50 | Analyzed |
(Lam & Lee, 2006) | Lam, J. C. Y., & Lee, M. K. O. (2006). Digital inclusiveness - Longitudinal study of Internet adoption by older adults. Journal of Management Information Systems, 22 (4), 177-206. doi:10.2753/mis0742-1222220407 | Analyzed |
(Lamb & Kling, 2003) | Lamb, R., & Kling, R. (2003). Reconceptualizing users as social actors in information systems research. MIS Quarterly, 27(2), 197-235. | Analyzed |
(Larsen, 2003) | Larsen, K. R. T. (2003). A taxonomy of antecedents of information systems success: Variable analysis studies. Journal of Management Information Systems, 20(2), 169-246. | Analyzed |
(Laumer, Maier, Eckhardt, & Weitzel, 2016) | Laumer, S., Maier, C., Eckhardt, A., & Weitzel, T. (2016). User personality and resistance to mandatory information systems in organizations: A theoretical model and empirical test of dispositional resistance to change. Journal of Information Technology, 31 (1), 67-82. doi:10.1057/jit.2015.17 | Analyzed |
(Lederman & Johnston, 2011) | Lederman, R., & Johnston, R. B. (2011). Decision support or support for situated choice: lessons for system design from effective manual systems. European Journal of Information Systems, 20 (5), 510-528. doi:10.1057/ejis.2011.11 | Analyzed |
(Liang & Xue, 2009) | Liang, H. G., & Xue, Y. J. (2009). AVOIDANCE OF INFORMATION TECHNOLOGY THREATS: A THEORETICAL PERSPECTIVE. MIS Quarterly, 33(1), 71-90. | Analyzed |
(Liang & Xue, 2010) | Liang, H. G., & Xue, Y. J. (2010). Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Journal of the Association for Information Systems, 11 (7), 394-413. | Analyzed |
(Liang, Peng, Xue, Guo, & Wang, 2015) | Liang, H. G., Peng, Z. Y., Xue, Y. J., Guo, X. T., & Wang, N. M. (2015). Employees' Exploration of Complex Systems: An Integrative View. Journal of Management Information Systems, 32 (1), 322-357. doi:10.1080/07421222.2015.1029402 | Analyzed |
(Liang, Saraf, Hu, & Xue, 2007) | Liang, H. G., Saraf, N., Hu, Q., & Xue, Y. J. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59-87. | Analyzed |
(Liang, Xue, & Wu, 2013) | Liang, H. G., Xue, Y. J., & Wu, L. S. (2013). Ensuring Employees' IT Compliance: Carrot or Stick? Information Systems Research, 24 (2), 279-294. doi:10.1287/isre.1120.0427 | Analyzed |
(Liang, Xue, Ke, & Wei, 2010) | Liang, H. G., Xue, Y. J., Ke, W. L., & Wei, K. K. (2010). Understanding the Influence of Team Climate on IT Use. Journal of the Association for Information Systems, 11(8), 414-432. | Analyzed |
(Limayem, Hirt, & Cheung, 2007) | Limayem, M., Hirt, S. G., & Cheung, C. M. K. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705-737. | Analyzed |
(Lin & Bhattacherjee, 2010) | Lin, C. P., & Bhattacherjee, A. (2010). Extending technology usage models to interactive hedonic technologies: A theoretical model and empirical test. Information Systems Journal, 20 (2), 163-181. doi:10.1111/j.1365-2575.2007.00265.x | Analyzed |
(Lioliou & Zimmermann, 2015) | Lioliou, E., & Zimmermann, A. (2015). Vendor opportunism in IT outsourcing: a TCE and social capital perspective. Journal of Information Technology, 30 (4), 307-324. doi:10.1057/jit.2015.3 | Analyzed |
(Liu, Mezei, Kostakos, & Li, 2017) | Liu, Y., Mezei, J., Kostakos, V., & Li, H. X. (2017). Applying configurational analysis to IS behavioural research: a methodological alternative for modelling combinatorial complexities. Information Systems Journal, 27 (1), 59-89. doi:10.1111/isj.12094 | Analyzed |
(Lowry, Cao, & Everard, 2011) | Lowry, P. B., Cao, J. W., & Everard, A. (2011). Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures. Journal of Management Information Systems, 27 (4), 163-200. doi:10.2753/mis0742-1222270406 | Analyzed |
(Lowry, Gaskin, & Moody, 2015) | Lowry, P. B., Gaskin, J. E., & Moody, G. D. (2015). Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions. Journal of the Association for Information Systems, 16 (7), 515-579. | Analyzed |
(Lowry, Gaskin, Twyman, Hammer, & Roberts, 2013) | Lowry, P. B., Gaskin, J. E., Twyman, N. W., Hammer, B., & Roberts, T. L. (2013). Taking "fun and games" seriously: Proposing the hedonic-motivation system adoption model (HMSAM). Journal of the Association of Information Systems, 14 (11), 617-671. | Analyzed |
(Lu, Guo, Luo, & Chen, 2015) | Lu, B. J., Guo, X. H., Luo, N. L., & Chen, G. Q. (2015). Corporate Blogging and Job Performance: Effects of Work-related and Nonwork-related Participation. Journal of Management Information Systems, 32 (4), 285-314. doi:10.1080/07421222.2015.1138573 | Analyzed |
(Lyytinen & Damsgaard, 2011) | Lyytinen, K., & Damsgaard, J. (2011). Inter-organizational information systems adoption - a configuration analysis approach. European Journal of Information Systems, 20 (5), 496-509. doi:10.1057/ejis.2010.71 | Analyzed |
(Lyytinen & Rose, 2003a) | Lyytinen, K., & Rose, G. M. (2003a). Disruptive information system innovation: the case of internet computing. Information Systems Journal, 13 (4), 301-330. doi:10.1046/j.1365-2575.2003.00155.x | Analyzed |
(Lyytinen & Rose, 2003b) | Lyytinen, K., & Rose, G. M. (2003b). The disruptive nature of information technology innovations: The case of Internet computing in systems development organizations. MIS Quarterly, 27(4), 557-595. | Analyzed |
(M. A. Fuller, Hardin, & Davison, 2006) | Fuller, M. A., Hardin, A. M., & Davison, R. M. (2006). Efficacy in technology-mediated distributed teams. Journal of Management Information Systems, 23(3), 209-235. doi:10.2753/mis0742-1222230308 | Analyzed |
(M. I. Hwang & Schmidt, 2011) | Hwang, M. I., & Schmidt, F. L. (2011). Assessing moderating effect in meta-analysis: a re-analysis of top management support studies and suggestions for researchers. European Journal of Information Systems, 20(6), 693-702. doi:10.1057/ejis.2011.12 | Analyzed |
(M. O. Lewis, Mathiassen, & Rai, 2011) | Lewis, M. O., Mathiassen, L., & Rai, A. (2011). Scalable growth in IT-enabled service provisioning: a sensemaking perspective. European Journal of Information Systems, 20(3), 285-302. doi:10.1057/ejis.2011.5 | Analyzed |
(Ma, Kim, & Kim, 2014) | Ma, X., Kim, S. H., & Kim, S. S. (2014). Online Gambling Behavior: The Impacts of Cumulative Outcomes, Recent Outcomes, and Prior Use. Information Systems Research, 25 (3), 511-527. doi:10.1287/isre.2014.0517 | Analyzed |
(Macredie & Mijinyawa, 2011) | Macredie, R. D., & Mijinyawa, K. (2011). A theory-grounded framework of Open Source Software adoption in SMEs. European Journal of Information Systems, 20 (2), 237-250. doi:10.1057/ejis.2010.60 | Analyzed |
(Maier, Laumer, Weinert, & Weitzel, 2015) | Maier, C., Laumer, S., Weinert, C., & Weitzel, T. (2015). The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use. Information Systems Journal, 25 (3), 275-308. doi:10.1111/isj.12068 | Analyzed |
(Malhotra & Galletta, 2005) | Malhotra, Y., & Galletta, D. (2005). A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information Systems, 22 (1), 117-151. | Analyzed |
(Malhotra, Galletta, & Kirsch, 2008) | Malhotra, Y., Galletta, D. F., & Kirsch, L. J. (2008). How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations. Journal of Management Information Systems, 25 (1), 267-299. doi:10.2753/mis0742-1222250110 | Analyzed |
(Mangalaraj, Mahapatra, & Nerur, 2009) | Mangalaraj, G., Mahapatra, R., & Nerur, S. (2009). Acceptance of software process innovations - the case of extreme programming. European Journal of Information Systems, 18 (4), 344-354. doi:10.1057/ejis.2009.23 | Analyzed |
(Mao & Benbasat, 1998) | Mao, J. Y., & Benbasat, I. (1998). Contextualized access to knowledge: theoretical perspectives and a process‐tracing study. Information Systems Journal, 8 (3), 217-239. | Analyzed |
(Marakas, Johnson, & Clay, 2007) | Marakas, G. M., Johnson, R. D., & Clay, P. F. (2007). The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems, 8 (1), 15-46. | Analyzed |
(Marakas, Yi, & Johnson, 1998) | Marakas, G. M., Yi, M. Y., & Johnson, R. D. (1998). The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research, 9 (2), 126-163. doi:10.1287/isre.9.2.126 | Analyzed |
(Marcolin, Compeau, Munro, & Huff, 2000) | Marcolin, B. L., Compeau, D. R., Munro, M. C., & Huff, S. L. (2000). Assessing user competence: Conceptualization and measurement. Information Systems Research, 11 (1), 37-60. doi:10.1287/isre.11.1.37.11782 | Analyzed |
(Marginson, King, & McAulay, 2000) | Marginson, D., King, M., & McAulay, L. (2000). Executives' use of information technology: comparison of electronic mail and an accounting information system. Journal of Information Technology, 15 (2), 149-164. | Analyzed |
(Markus & Silver, 2008) | Markus, M. L., & Silver, M. S. (2008). A Foundation for the Study of IT Effects: A New Look at DeSanctis and Poole's Concepts of Structural Features and Spirit. Journal of the Association for Information Systems, 9 (10), 609-632. | Analyzed |
(Markus, Steinfield, Wigand, & Minton, 2006) | Markus, M. L., Steinfield, C. W., Wigand, R. T., & Minton, G. (2006). Industry-wide information systems standardization as collective action: The case of the US residential mortgage industry. MIS Quarterly, 30, 439-465. | Analyzed |
(Maruping & Magni, 2015) | Maruping, L. M., & Magni, M. (2015). MOTIVATING EMPLOYEES TO EXPLORE COLLABORATION TECHNOLOGY IN TEAM CONTEXTS. MIS Quarterly, 39(1), 1-U369. | Analyzed |
(Mathieson, 1991) | Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2 (3), 173-191. | Analyzed |
(McCoy, Galletta, & King, 2007) | McCoy, S., Galletta, D. F., & King, W. R. (2007). Applying TAM across cultures: The need for caution. European Journal of Information Systems, 16 (1), 81-90. doi:10.1057/palgrave.ejis.3000659 | Analyzed |
(McElroy, Hendrickson, Townsend, & DeMarie, 2007) | McElroy, J. C., Hendrickson, A. R., Townsend, A. M., & DeMarie, S. M. (2007). Dispositional factors in internet use: Personality versus cognitive style. MIS Quarterly, 31(4), 809-820. | Analyzed |
(McKnight, Choudhury, & Kacmar, 2002a) | McKnight, D. H., Choudhury, V., & Kacmar, C. (2002a). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13 (3), 334-359. doi:10.1287/isre.13.3.334.81 | Analyzed |
(McKnight, Choudhury, & Kacmar, 2002b) | McKnight, D. H., Choudhury, V., & Kacmar, C. (2002b). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems, 11 (3-4), 297-323. | Analyzed |
(Melas, Zampetakis, Dimopoulou, & Moustakis, 2014) | Melas, C. D., Zampetakis, L. A., Dimopoulou, A., & Moustakis, V. S. (2014). An empirical investigation of Technology Readiness among medical staff based in Greek hospitals. European Journal of Information Systems, 23 (6), 672-690. doi:10.1057/ejis.2013.23 | Analyzed |
(Meso, Musa, & Mbarika, 2005) | Meso, P., Musa, P., & Mbarika, V. (2005). Towards a model of consumer use of mobile information and communication technology in LDCs: the case of sub-Saharan Africa. Information Systems Journal, 15 (2), 119-146. doi:10.1111/j.1365-2575.2005.00190.x | Analyzed |
(Messerschmidt & Hinz, 2013) | Messerschmidt, C. M., & Hinz, O. (2013). Explaining the adoption of grid computing: An integrated institutional theory and organizational capability approach. Journal of Strategic Information Systems, 22 (2), 137-156. doi:10.1016/j.jsis.2012.10.005 | Analyzed |
(Mignerat & Rivard, 2009) | Mignerat, M., & Rivard, S. (2009). Positioning the institutional perspective in information systems research. Journal of Information Technology, 24 (4), 369-391. doi:10.1057/jit.2009.13 | Analyzed |
(Miranda, Kim, & Summers, 2015) | Miranda, S. M., Kim, I., & Summers, J. D. (2015). Jamming with social media: How cognitive structuring of organizing vision facets affects it innovation diffusion. MIS Quarterly: Management Information Systems, 39(3), 591-614. | Analyzed |
(Mirchandani & Lederer, 2014) | Mirchandani, D. A., & Lederer, A. L. (2014). Autonomy and procedural justice in strategic systems planning. Information Systems Journal, 24 (1), 29-59. doi:10.1111/j.1365-2575.2012.00419.x | Analyzed |
(Money, 1995) | Money, W. H. (1995). Applying group support systems to classroom settings: A social cognitive learning theory explanation. Journal of Management Information Systems, 12 (3), 65-80. | Analyzed |
(Montoya, Massey, & Khatri, 2010) | Montoya, M. M., Massey, A. P., & Khatri, V. (2010). Connecting IT Services Operations to Services Marketing Practices. Journal of Management Information Systems, 26 (4), 65-85. doi:10.2753/mis0742-1222260403 | Analyzed |
(Mueller, Viering, Legner, & Riempp, 2010) | Mueller, B., Viering, G., Legner, C., & Riempp, G. (2010). Understanding the Economic Potential of Service-Oriented Architecture. Journal of Management Information Systems, 26 (4), 145-180. doi:10.2753/mis0742-1222260406 | Analyzed |
(Murray & Haubl, 2011) | Murray, K. B., & Haubl, G. (2011). FREEDOM OF CHOICE, EASE OF USE, AND THE FORMATION OF INTERFACE PREFERENCES. MIS Quarterly, 35(4), 955-976. | Analyzed |
(Mustonen-Ollila & Lyytinen, 2003) | Mustonen-Ollila, E., & Lyytinen, K. (2003). Why organizations adopt information system process innovations: a longitudinal study using Diffusion of Innovation theory. Information Systems Journal, 13 (3), 275-297. doi:10.1046/j.1365-2575.2003.00141.x | Analyzed |
(Myyry, Siponen, Pahnila, Vartiainen, & Vance, 2009) | Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18 (2), 126-139. | Analyzed |
(N. Au, Ngai, & Cheng, 2008) | Au, N., Ngai, E. W. T., & Cheng, T. C. E. (2008). Extending the Understanding of End User Information Systems Satisfaction Formation: An Equitable Needs Fulfillment Model Approach. MIS Quarterly, 32(1), 43-66. | Analyzed |
(N. K. Lankton & McKnight, 2012) | Lankton, N. K., & McKnight, H. D. (2012). Examining Two Expectation Disconfirmation Theory Models: Assimilation and Asymmetry Effects. Journal of the Association for Information Systems, 13(2), 88-115. | Analyzed |
(N. Lankton, McKnight, & Thatcher, 2014) | Lankton, N., McKnight, D. H., & Thatcher, J. B. (2014). Incorporating trust-in-technology into Expectation Disconfirmation Theory. Journal of Strategic Information Systems, 23(2), 128-145. doi:10.1016/j.jsis.2013.09.001 | Analyzed |
(Nadkarni & Gupta, 2007) | Nadkarni, S., & Gupta, R. (2007). A task-based model of perceived website complexity. MIS Quarterly, 31(3), 501-524. | Analyzed |
(Nah, Eschenbrenner, & DeWester, 2011) | Nah, F. F.-H., Eschenbrenner, B., & DeWester, D. (2011). Enhancing brand equity through flow and telepresence: A comparison of 2D and 3D virtual worlds. MIS Quarterly, 35(3), 731-747. | Analyzed |
(Nambisan, 2003) | Nambisan, S. (2003). Information systems as a reference discipline for new product development. MIS Quarterly, 27(1), 1-18. | Analyzed |
(Nambisan, Agarwal, & Tanniru, 1999) | Nambisan, S., Agarwal, R., & Tanniru, M. (1999). Organizational mechanisms for enhancing user innovation in information technology. MIS Quarterly, 23(3), 365-395. doi:10.2307/249468 | Analyzed |
(Nan & Johnston, 2009) | Nan, N., & Johnston, E. W. (2009). Using Multi-Agent Simulation to Explore the Contribution of Facilitation to GSS Transition. Journal of the Association for Information Systems, 10 (3), 252-277. | Analyzed |
(Nan & Lu, 2014) | Nan, N., & Lu, Y. (2014). HARNESSING THE POWER OF SELF-ORGANIZATION IN AN ONLINE COMMUNITY DURING ORGANIZATIONAL CRISIS. MIS Quarterly, 38(4), 1135-1157. | Analyzed |
(Nan, 2011) | Nan, N. (2011). CAPTURING BOTTOM-UP INFORMATION TECHNOLOGY USE PROCESSES: A COMPLEX ADAPTIVE SYSTEMS MODEL. MIS Quarterly, 35(2), 505-532. | Analyzed |
(Nardon & Aten, 2012) | Nardon, L., & Aten, K. (2012). Valuing Virtual Worlds: The Role of Categorization in Technology Assessment. Journal of the Association for Information Systems, 13 (10), 772-796. | Analyzed |
(Nelson & Cheney, 1987) | Nelson, R. R., & Cheney, P. H. (1987). Training end users: An exploratory study. MIS Quarterly: Management Information Systems, 11(4), 547-559. | Analyzed |
(Nelson, Todd, & Wixom, 2005) | Nelson, R. R., Todd, P. A., & Wixom, B. H. (2005). Antecedents of information and system quality: An empirical examination within the context of data warehousing. Journal of Management Information Systems, 21 (4), 199-235. | Analyzed |
(Nevo, Nevo, & Kim, 2012) | Nevo, S., Nevo, D., & Kim, H. (2012). From recreational applications to workplace technologies: an empirical study of cross-context IS continuance in the case of virtual worlds. Journal of Information Technology, 27 (1), 74-86. doi:10.1057/jit.2011.18 | Analyzed |
(Nevo, Nevo, & Pinsonneault, 2016) | Nevo, S., Nevo, D., & Pinsonneault, A. (2016). A temporally situated self-agency theory of information technology reinvention. MIS Quarterly: Management Information Systems, 40(1), 157-186. | Analyzed |
(Nicolaou & McKnight, 2006) | Nicolaou, A. I., & McKnight, D. H. (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information systems research, 17 (4), 332-351. | Analyzed |
(Nicolaou & McKnight, 2011) | Nicolaou, A. I., & McKnight, D. H. (2011). System Design Features and Repeated Use of Electronic Data Exchanges. Journal of Management Information Systems, 28 (2), 269-304. doi:10.2753/mis0742-1222280210 | Analyzed |
(O. Shmueli, Pliskin, & Fink, 2016) | Shmueli, O., Pliskin, N., & Fink, L. (2016). Can the outside-view approach improve planning decisions in software development projects? Information Systems Journal, 26(4), 395-418. doi:10.1111/isj.12091 | Analyzed |
(Olivera, Goodman, & Tan, 2008) | Olivera, F., Goodman, P. S., & Tan, S. S.-L. (2008). Contribution Behaviors in Distributed Environments. MIS Quarterly, 32(1), 23-42. | Analyzed |
(Ondrus, Gannamaneni, & Lyytinen, 2015) | Ondrus, J., Gannamaneni, A., & Lyytinen, K. (2015). The impact of openness on the market potential of multi-sided platforms: a case study of mobile payment platforms. Journal of Information Technology, 30 (3), 260-275. doi:10.1057/jit.2015.7 | Analyzed |
(Osei-Bryson & Ngwenyama, 2011) | Osei-Bryson, K. M., & Ngwenyama, O. (2011). Using decision tree modelling to support Peircian abduction in IS research: a systematic approach for generating and evaluating hypotheses for systematic theory development. Information Systems Journal, 21(5), 407-440. doi:10.1111/j.1365-2575.2010.00368.x | Analyzed |
(Osei-Bryson, Dong, & Ngwenyama, 2008) | Osei-Bryson, K. M., Dong, L. Y., & Ngwenyama, O. (2008). Exploring managerial factors affecting ERP implementation: an investigation of the Klein-Sorra model using regression splines. Information Systems Journal, 18(5), 499-527. doi:10.1111/j.1365-2575.2008.00309.x | Analyzed |
(P. F. Wu, 2012) | Wu, P. F. (2012). A Mixed Methods Approach to Technology Acceptance Research. Journal of the Association for Information Systems, 13(3), 172-187. | Analyzed |
(P. Wang & Ramiller, 2009) | Wang, P., & Ramiller, N. C. (2009). COMMUNITY LEARNING IN INFORMATION TECHNOLOGY INNOVATION. MIS Quarterly, 33(4), 709-734. | Analyzed |
(P. Wang, 2010) | Wang, P. (2010). Chasing the hottest it: Effects of information technology fashion on organizations. MIS Quarterly: Management Information Systems, 34(1), 63-85. | Analyzed |
(P. Zhang, 2013) | Zhang, P. (2013). THE AFFECTIVE RESPONSE MODEL: A THEORETICAL FRAMEWORK OF AFFECTIVE CONCEPTS AND THEIR RELATIONSHIPS IN THE ICT CONTEXT. MIS Quarterly, 37(1), 247-+. | Analyzed |
(Palka, Pousttchi, & Wiedemann, 2009) | Palka, W., Pousttchi, K., & Wiedemann, D. G. (2009). Mobile word-of-mouth - A grounded theory of mobile viral marketing. Journal of Information Technology, 24 (2), 122-185. doi:10.1057/jit.2008.37 | Analyzed |
(Parboteeah, Valacich, & Wells, 2009) | Parboteeah, D. V., Valacich, J. S., & Wells, J. D. (2009). The Influence of Website Characteristics on a Consumer's Urge to Buy Impulsively. Information Systems Research, 20 (1), 60-78. doi:10.1287/isre.1070.0157 | Analyzed |
(Park, Sharman, & Rao, 2015) | Park, I., Sharman, R., & Rao, H. R. (2015). DISASTER EXPERIENCE AND HOSPITAL INFORMATION SYSTEMS: AN EXAMINATION OF PERCEIVED INFORMATION ASSURANCE, RISK, RESILIENCE, AND HIS USEFULNESS. MIS Quarterly, 39(2), 317-U372. | Analyzed |
(Pavlou, 2011) | Pavlou, P. A. (2011). STATE OF THE INFORMATION PRIVACY LITERATURE: WHERE ARE WE NOW AND WHERE SHOULD WE GO? MIS Quarterly, 35(4), 977-988. | Analyzed |
(Peace, Galletta, & Thong, 2003) | Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20 (1), 153-177. | Analyzed |
(Peng, Dey, & Lahiri, 2014) | Peng, G., Dey, D., & Lahiri, A. (2014). Healthcare IT Adoption: An Analysis of Knowledge Transfer in Socioeconomic Networks. Journal of Management Information Systems, 31 (3), 7-34. doi:10.1080/07421222.2014.994672 | Analyzed |
(Petter, DeLone, & McLean, 2008) | Petter, S., DeLone, W., & McLean, E. (2008). Measuring information systems success: models, dimensions, measures, and interrelationships. European Journal of Information Systems, 17 (3), 236-263. doi:10.1057/ejis.2008.15 | Analyzed |
(Petter, DeLone, & McLean, 2013) | Petter, S., DeLone, W., & McLean, E. R. (2013). Information Systems Success: The Quest for the Independent Variables. Journal of Management Information Systems, 29 (4), 7-61. doi:10.2753/MIS0742-1222290401 | Analyzed |
(Phang, Kankanhalli, & Huang, 2014) | Phang, C. W., Kankanhalli, A., & Huang, L. (2014). Drivers of quantity and quality of participation in online policy deliberation forums. Journal of Management Information Systems, 31 (3), 172-212. | Analyzed |
(Phelps & Mok, 1999) | Phelps, R., & Mok, M. (1999). Managing the risks of intranet implementation: an empirical study of user satisfaction. Journal of Information Technology, 14 (1), 39-52. | Analyzed |
(Polites, Roberts, & Thatcher, 2012) | Polites, G. L., Roberts, N., & Thatcher, J. (2012). Conceptualizing models using multidimensional constructs: a review and guidelines for their use. European Journal of Information Systems, 21 (1), 22-48. doi:10.1057/ejis.2011.10 | Analyzed |
(Popovic, Hackney, Coelho, & Jaklic, 2014) | Popovic, A., Hackney, R., Coelho, P. S., & Jaklic, J. (2014). How information-sharing values influence the use of information systems: An investigation in the business intelligence systems context. Journal of Strategic Information Systems, 23 (4), 270-283. doi:10.1016/j.jsis.2014.08.003 | Analyzed |
(Porra, Hirschheim, & Parks, 2005) | Porra, J., Hirschheim, R., & Parks, M. S. (2005). The history of texaco's corporate information technology function: a general systems theoretical interpretation. MIS Quarterly, 29(4), 721-746. | Analyzed |
(Pozzebon, Mackrell, & Nielsen, 2014) | Pozzebon, M., Mackrell, D., & Nielsen, S. (2014). Structuration bridging diffusion of innovations and gender relations theories: A case of paradigmatic pluralism in IS research. Information Systems Journal, 24 (3), 229-248. doi:10.1111/isj.12007 | Analyzed |
(Pramatari & Theotokis, 2009) | Pramatari, K., & Theotokis, A. (2009). Consumer acceptance of RFID-enabled services: A model of multiple attitudes, perceived system characteristics and individual traits. European Journal of Information Systems, 18 (6), 541-552. doi:10.1057/ejis.2009.40 | Analyzed |
(Premkumar, Ramamurthy, & Nilakanta, 1994) | Premkumar, G., Ramamurthy, K., & Nilakanta, S. (1994). Implementation of electronic data interchange: An innovation diffusion perspective. Journal of Management Information Systems, 11 (2), 157-186. | Analyzed |
(Q. Hu, West, & Smarandescu, 2015) | Hu, Q., West, R., & Smarandescu, L. (2015). The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. Journal of Management Information Systems, 31(4), 6-48. doi:10.1080/07421222.2014.1001255 | Analyzed |
(Q. Huang, Chen, Ou, Davison, & Hua, 2017) | Huang, Q., Chen, X. Y., Ou, C. X., Davison, R. M., & Hua, Z. S. (2017). Understanding buyers' loyalty to a C2C platform: the roles of social capital, satisfaction and perceived effectiveness of e-commerce institutional mechanisms. Information Systems Journal, 27(1), 91-119. doi:10.1111/isj.12079 | Analyzed |
(Qiu & Benbasat, 2009) | Qiu, L. Y., & Benbasat, I. (2009). Evaluating Anthropomorphic Product Recommendation Agents: A Social Relationship Perspective to Designing Information Systems. Journal of Management Information Systems, 25 (4), 145-181. doi:10.2753/mis0742-1222250405 | Analyzed |
(Quaddus & Hofmeyer, 2007) | Quaddus, M., & Hofmeyer, G. (2007). An investigation into the factors influencing the adoption of B2B trading exchanges in small businesses. European Journal of Information Systems, 16 (3), 202-215. doi:10.1057/palgrave.ejis.3000671 | Analyzed |
(R. Chen & Sharma, 2015) | Chen, R., & Sharma, S. K. (2015). Learning and self-disclosure behavior on social networking sites: the case of Facebook users. European Journal of Information Systems, 24(1), 93-106. doi:10.1057/ejis.2013.31 | Analyzed |
(R. D. Johnson & Marakas, 2000) | Johnson, R. D., & Marakas, G. M. (2000). Research report: The role of behavioral modeling in computer skills acquisition - Toward refinement of the model. Information Systems Research, 11(4), 402-417. doi:10.1287/isre.11.4.402.11869 | Analyzed |
(R. M. Fuller & Dennis, 2009) | Fuller, R. M., & Dennis, A. R. (2009). Does fit matter? The impact of task-technology fit and appropriation on team performance in repeated tasks. Information Systems Research, 20(1), 2-17. | Analyzed |
(Ragowsky, Stern, & Adams, 2000) | Ragowsky, A., Stern, M., & Adams, D. A. (2000). Relating benefits from using IS to an organization's operating characteristics: Interpreting results from two countries. Journal of Management Information Systems, 16 (4), 175-194. | Analyzed |
(Ragu-Nathan, Tarafdar, Ragu-Nathan, & Tu, 2008) | Ragu-Nathan, T. S., Tarafdar, M., Ragu-Nathan, B. S., & Tu, Q. (2008). The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation. Information Systems Research, 19 (4), 417-433. doi:10.1287/isre.1070.0165 | Analyzed |
(Ramiller & Pentland, 2009) | Ramiller, N. C., & Pentland, B. T. (2009). Management Implications in Information Systems Research: The Untold Story. Journal of the Association for Information Systems, 10 (6), 474-494. | Analyzed |
(Ramiller & Swanson, 2003) | Ramiller, N. C., & Swanson, E. B. (2003). Organizing visions for information technology and the information systems executive response. Journal of Management Information Systems, 20 (1), 13-50. | Analyzed |
(Ranganathan, Seo, & Babad, 2006) | Ranganathan, C., Seo, D., & Babad, Y. (2006). Switching behavior of mobile users: do users' relational investments and demographics matter? European Journal of Information Systems, 15 (3), 269-276. doi:10.1057/palgrave.ejis.3000616 | Analyzed |
(Recker, 2010) | Recker, J. (2010). Continued use of process modeling grammars: the impact of individual difference factors. European Journal of Information Systems, 19 (1), 76-92. doi:10.1057/ejis.2010.5 | Analyzed |
(Rensel, Abbas, & Rao, 2006) | Rensel, A. D., Abbas, J. M., & Rao, H. R. (2006). Private transactions in public places: an exploration of the impact of the computer environment on public transactional web site use. Journal of the Association for Information Systems, 7 (1), 19-51. | Analyzed |
(Riaz, Rambli, Salleh, & Mushtaq, 2011) | Riaz, S., Rambli, D. R. A., Salleh, R., & Mushtaq, A. (2011). Exploratory Factor Analysis (EFA) to Examine Learner’s Aesthetic Perceptions and Motivation Through their Aesthetic-Emotions in Informal Visual Environments. 10 (7), 1268- 1284. | Analyzed |
(Riedl, Mohr, Kening, Davis, & Hekeren, 2014) | Riedl, R., Mohr, P. N. C., Kening, P. H., Davis, F. D., & Hekeren, H. R. (2014). Trusting Humans and Avatars: A Brain Imaging Study Based on Evolution Theory. Journal of Management Information Systems, 30 (4), 83-113. doi:10.2753/mis0742-1222300404 | Analyzed |
(Riemer & Johnston, 2014) | Riemer, K., & Johnston, R. B. (2014). Rethinking the place of the artefact in IS using Heidegger's analysis of equipment. European Journal of Information Systems, 23 (3), 273-288. doi:10.1057/ejis.2013.5 | Analyzed |
(Robert & Sykes, 2017) | Robert, L. P., & Sykes, T. A. (2017). Extending the Concept of Control Beliefs: Integrating the Role of Advice Networks. Information Systems Research, 28 (1), 84-96. doi:10.1287/isre.2016.0666 | Analyzed |
(Robey, Im, & Wareham, 2008) | Robey, D., Im, G., & Wareham, J. D. (2008). Theoretical Foundations of Empirical Research on Interorganizational Systems: Assessing Past Contributions and Guiding Future Directions. Journal of the Association for Information Systems, 9 (9), 497-518. | Analyzed |
(Romano, Pick, & Roztocki, 2010) | Romano, N. C., Pick, J. B., & Roztocki, N. (2010). A motivational model for technology-supported cross-organizational and cross-border collaboration. European Journal of Information Systems, 19 (2), 117-133. | Analyzed |
(Rowe, 2005) | Rowe, F. (2005). Are decision support systems getting people to conform? the impact of work organisation and segmentation on user behaviour in a French bank. Journal of Information Technology, 20 (2), 103-116. doi:10.1057/palgrave.jit.2000042 | Analyzed |
(Ruth, 2012) | Ruth, R. D. (2012). Conversation as a source of satisfaction and continuance in a question-and-answer site. European Journal of Information Systems, 21 (4), 427-437. doi:10.1057/ejis.2011.42 | Analyzed |
(S. A. Brown & Venkatesh, 2005) | Brown, S. A., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle. MIS Quarterly, 29(3), 399-426. | Analyzed |
(S. L. Johnson, Faraj, & Kudaravalli, 2014) | Johnson, S. L., Faraj, S., & Kudaravalli, S. (2014). Emergence of Power Laws in Online Communities: The Role of Social Mechanisms and Preferential Attachment. MIS Quarterly, 38(3), 795-808. | Analyzed |
(S. Lee, Shin, & Lee, 2009) | Lee, S., Shin, B., & Lee, H. G. (2009). Understanding Post-adoption Usage of Mobile Data Services: The Role of Supplier-side Variables. Journal of the Association for Information Systems, 10(12), 860-888. | Analyzed |
(S. S. Kim & Son, 2009) | Kim, H. W., & Kankanhalli, A. (2009). Investigating user resistance to information systems implementation: A status quo bias perspective. MIS Quarterly: Management Information Systems, 33(3), 567-582. | Analyzed |
(S. S. Kim, Malhotra, & Narasimhan, 2005) | Kim, S. S., Malhotra, N. K., & Narasimhan, S. (2005). Two competing perspectives on automatic use: A theoretical and empirical comparison. Information Systems Research, 16(4), 418-432. doi:10.1287/isre.1050.0070 | Analyzed |
(Saccol & Reinhard, 2006) | Saccol, A. Z., & Reinhard, N. (2006). The Hospitality Metaphor as a theoretical lens for understanding the ICT adoption process. Journal of Information Technology, 21 (3), 154-164. doi:10.1057/palgrave.jit.2000067 | Analyzed |
(Saeed & Abdinnour, 2013) | Saeed, K. A., & Abdinnour, S. (2013). Understanding post-adoption IS usage stages: an empirical assessment of self-service information systems. Information Systems Journal, 23 (3), 219-244. doi:10.1111/j.1365-2575.2011.00389.x | Analyzed |
(Santhanarn, Sasidharan, & Webster, 2008) | Santhanarn, R., Sasidharan, S., & Webster, J. (2008). Using self-regulatory learning to enhance e-learning-based information technology training. Information Systems Research, 19 (1), 26-47. doi:10.1287/isre.1070.0141 | Analyzed |
(Scheepers, 2006) | Scheepers, R. (2006). A conceptual framework for the implementation of enterprise information portals in large organizations. European Journal of Information Systems, 15 (6), 635-647. doi:10.1057/palgrave.ejis.3000646 | Analyzed |
(Schmitz, Teng, & Webb, 2016) | Schmitz, K., Teng, J. T., & Webb, K. (2016). Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals. MIS Quarterly, 40(3), 663-686. | Analyzed |
(Schwarz & Chin, 2007) | Schwarz, A., & Chin, W. (2007). Looking forward: Toward an understanding of the nature and definition of IT acceptance. Journal of the Association of Information Systems, 8 (4), 230-243. | Analyzed |
(Schwarz, Chin, Hirschheim, & Schwarz, 2014) | Schwarz, A., Chin, W. W., Hirschheim, R., & Schwarz, C. (2014). Toward a process-based view of information technology acceptance. Journal of Information Technology, 29 (1), 73-96. doi:10.1057/jit.2013.31 | Analyzed |
(Seddon, 1997) | Seddon, P. B. (1997). A respecification and extension of the DeLone and McLean model of IS success. Information Systems Research, 8 (3), 240-253. doi:10.1287/isre.8.3.240 | Analyzed |
(Seidel, Recker, & vom Brocke, 2013) | Seidel, S., Recker, J., & vom Brocke, J. (2013). SENSEMAKING AND SUSTAINABLE PRACTICING: FUNCTIONAL AFFORDANCES OF INFORMATION SYSTEMS IN GREEN TRANSFORMATIONS. MIS Quarterly, 37(4), 1275-+. | Analyzed |
(Sen, 2007) | Sen, R. (2007). A strategic analysis of competition between open source and proprietary software. Journal of Management Information Systems, 24 (1), 233-257. doi:10.2753/mis0742-1222240107 | Analyzed |
(Serrano & Karahanna, 2016) | Serrano, C., & Karahanna, E. (2016). The Compensatory Interaction between User Capabilities and Technology Capabilities in Influencing Task Performance: An Empirical Assessment in Telemedicine Consultations. Management Information Systems Quarterly, 40 (3), 597-621. | Analyzed |
(Sharma & Yetton, 2003) | Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS Quarterly, 27(4), 533-555. | Analyzed |
(Sharma, Yetton, & Crawford, 2009) | Sharma, R., Yetton, P., & Crawford, J. (2009). Estimating the effect of common method variance: The method-method pair technique with an illustration from tam research. MIS Quarterly: Management Information Systems, 33(3), 473-490. | Analyzed |
(Shayo, Olfman, & Teitelroit, 1999) | Shayo, C., Olfman, L., & Teitelroit, R. (1999). An exploratory study of the value of pretraining end-user participation. Information Systems Journal, 9 (1), 55-79. doi:10.1046/j.1365-2575.1999.00049.x | Analyzed |
(Shen, Lee, Cheung, & Chen, 2010) | Shen, A. X. L., Lee, M. K. O., Cheung, C. M. K., & Chen, H. P. (2010). Gender differences in intentional social action: we-intention to engage in social network-facilitated team collaboration. Journal of Information Technology, 25 (2), 152-169. doi:10.1057/jit.2010.12 | Analyzed |
(Shepherd, Clegg, & Stride, 2009) | Shepherd, C., Clegg, C., & Stride, C. (2009). Opening the black box: A multi-method analysis of an enterprise resource planning implementation. Journal of Information Technology, 24 (1), 81-102. doi:10.1057/jit.2008.32 | Analyzed |
(Shuraida & Barki, 2013) | Shuraida, S., & Barki, H. (2013). The influence of analyst communication in IS projects. Journal of the Association of Information Systems, 14 (9), 482-520. | Analyzed |
(Sia et al., 2009) | Sia, C. L., Lim, K. H., Leung, K., Lee, M. K. O., Huang, W. W., & Benbasat, I. (2009). WEB STRATEGIES TO PROMOTE INTERNET SHOPPING: IS CULTURAL-CUSTOMIZATION NEEDED? MIS Quarterly, 33(3), 491-512. | Analyzed |
(Silva, 2007) | Silva, L. (2007). Post-positivist review of Technology Acceptance Model. Journal of the Association of Information Systems, 8 (4), 255-266. | Analyzed |
(Singh, Dalal, & Spears, 2005) | Singh, S. N., Dalal, N., & Spears, N. (2005). Understanding Web home page perception. European Journal of Information Systems, 14 (3), 288-302. doi:10.1057/palgrave.ejis.3000525 | Analyzed |
(Sipior, Ward, & Connolly, 2011) | Sipior, J. C., Ward, B. T., & Connolly, R. (2011). The digital divide and t-government in the United States: Using the technology acceptance model to understand usage. European Journal of Information Systems, 20 (3), 308-328. doi:10.1057/ejis.2010.64 | Analyzed |
(Siponen & Iivari, 2006) | Siponen, M., & Iivari, J. (2006). Six design theories for IS security policies and guidelines. Journal of the Association for Information Systems, 7 (7), 445-472. | Analyzed |
(Skerlavaj, Dimovski, & Desouza, 2010) | Skerlavaj, M., Dimovski, V., & Desouza, K. C. (2010). Patterns and structures of intra-organizational learning networks within a knowledge-intensive organization. Journal of Information Technology, 25 (2), 189-204. doi:10.1057/jit.2010.3 | Analyzed |
(Smith, Johnston, & Howard, 2011) | Smith, S. P., Johnston, R. B., & Howard, S. (2011). Putting Yourself in the Picture: An Evaluation of Virtual Model Technology as an Online Shopping Tool. Information Systems Research, 22 (3), 640-659. doi:10.1287/isre.1090.0279 | Analyzed |
(Sojer, Alexy, Kleinknecht, & Henkel, 2014) | Sojer, M., Alexy, O., Kleinknecht, S., & Henkel, J. (2014). Understanding the Drivers of Unethical Programming Behavior: The Inappropriate Reuse of Internet-Accessible Code. Journal of Management Information Systems, 31 (3), 287-325. doi:10.1080/07421222.2014.995563 | Analyzed |
(Söllner, Hoffmann, & Leimeister, 2016) | Söllner, M., Hoffmann, A., & Leimeister, J. M. (2016). Why different trust relationships matter for information systems users. European Journal of Information Systems, 25(3), 274-287. doi:10.1057/ejis.2015.17 | Analyzed |
(Son & Benbasat, 2007) | Son, J. Y., & Benbasat, I. (2007). Organizational Buyers' adoption and use of B2B electronic marketplaces: Efficiency- and legitimacy-oriented perspectives. Journal of Management Information Systems, 24 (1), 55-99. doi:10.2753/mis0742-1222240102 | Analyzed |
(Sorensen & Lundh-Snis, 2001) | Sorensen, C., & Lundh-Snis, U. (2001). Innovation through knowledge codification. Journal of Information Technology, 16 (2), 83-97. doi:10.1080/026839600110054771 | Analyzed |
(Soror, Hammer, Steelman, Davis, & Limayem, 2015) | Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective. Information Systems Journal, 25 (4), 403-427. doi:10.1111/isj.12065 | Analyzed |
(Stafford & Turan, 2011) | Stafford, T. F., & Turan, A. H. (2011). Online tax payment systems as an emergent aspect of governmental transformation. European Journal of Information Systems, 20 (3), 343-357. doi:10.1057/ejis.2010.63 | Analyzed |
(Stanko, 2016) | Stanko, M. A. (2016). Toward a theory of remixing in online innovation communities. Information Systems Research, 27 (4), 773-791. doi:10.1287/isre.2016.0650 | Analyzed |
(Steelman, Hammer, & Limayem, 2014) | Steelman, Z. R., Hammer, B. I., & Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. MIS Quarterly: Management Information Systems, 38(2), 355-378. | Analyzed |
(Stein, Newell, Wagner, & Galliers, 2015) | Stein, M. K., Newell, S., Wagner, E. L., & Galliers, R. D. (2015). COPING WITH INFORMATION TECHNOLOGY: MIXED EMOTIONS, VACILLATION, AND NONCONFORMING USE PATTERNS. MIS Quarterly, 39(2), 367-U434. | Analyzed |
(Stewart, Ammeter, & Maruping, 2006) | Stewart, K. J., Ammeter, A. P., & Maruping, L. M. (2006). Impacts of license choice and organizational sponsorship on user interest and development activity in open source software projects. Information Systems Research, 17 (2), 126-144. doi:10.1287/isre.1060.0082 | Analyzed |
(Strader, Ramaswami, & Houle, 2007) | Strader, T. J., Ramaswami, S. N., & Houle, P. A. (2007). Perceived network externalities and communication technology acceptance. European Journal of Information Systems, 16 (1), 54-65. doi:10.1057/palgrave.ejis.3000657 | Analyzed |
(Straub & Burton-Jones, 2007) | Straub, D. W., & Burton-Jones, A. (2007). Veni, vidi, vici: Breaking the TAM logjam. Journal of the Association for Information Systems, 8(4), 223-229. | Analyzed |
(Straub, 1994) | Straub, D. W. (1994). The effect of culture on IT diffusion: E-mail and FAX in Japan and the U.S. Information Systems Research, 5(1), 23-47. | Analyzed |
(Sussman & Siegal, 2003) | Sussman, S. W., & Siegal, W. S. (2003). Informational influence in organizations: An integrated approach to knowledge adoption. Information Systems Research, 14 (1), 47-65. doi:10.1287/isre.14.1.47.14767 | Analyzed |
(T. Hu, Kettinger, & Poston, 2015) | Hu, T., Kettinger, W. J., & Poston, R. S. (2015). The effect of online social value on satisfaction and continued use of social media. European Journal of Information Systems, 24(4), 391-410. doi:10.1057/ejis.2014.22 | Analyzed |
(Tam & Ho, 2006) | Tam, K. Y., & Ho, S. Y. (2006). Understanding the impact of web personalization on user information processing and decision outcomes. MIS Quarterly, 30(4), 865-890. | Analyzed |
(Tarafdar, Pullins, & Ragu-Nathan, 2015) | Tarafdar, M., Pullins, E. B., & Ragu-Nathan, T. S. (2015). Technostress: negative effect on performance and possible mitigations. Information Systems Journal, 25 (2), 103-132. doi:10.1111/isj.12042 | Analyzed |
(Tarafdar, Tu, & Ragu-Nathan, 2010) | Tarafdar, M., Tu, Q. A., & Ragu-Nathan, T. S. (2010). Impact of Technostress on End-User Satisfaction and Performance. Journal of Management Information Systems, 27 (3), 303-334. doi:10.2753/mis0742-1222270311 | Analyzed |
(Taylor, 2004) | Taylor, W. A. (2004). Computer-mediated knowledge sharing and individual user differences: an exploratory study. European Journal of Information Systems, 13 (1), 52-64. doi:10.1057/palgrave.ejis.3000484 | Analyzed |
(Teo, Wei, & Benbasat, 2003) | Teo, H. H., Wei, K. K., & Benbasat, I. (2003). Predicting intention to adopt interorganizational linkages: An institutional perspective. MIS Quarterly, 27(1), 19-49. | Analyzed |
(Thatcher & Perrewe, 2002) | Thatcher, J. B., & Perrewe, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26(4), 381-396. doi:10.2307/4132314 | Analyzed |
(Theotokis, Vlachos, & Pramatari, 2008) | Theotokis, A., Vlachos, P. A., & Pramatari, K. (2008). The moderating role of customer-technology contact on attitude towards technology-based services. European Journal of Information Systems, 17 (4), 343-351. doi:10.1057/ejis.2008.32 | Analyzed |
(Thiesse, 2007) | Thiesse, F. (2007). RFID, privacy and the perception of risk: A strategic framework. Journal of Strategic Information Systems, 16 (2), 214-232. doi:10.1016/j.jsis.2007.05.006 | Analyzed |
(Thomas & Bostrom, 2010) | Thomas, D. M., & Bostrom, R. P. (2010). Team leader strategies for enabling collaboration technology adaptation: team technology knowledge to improve globally distributed systems development work. European Journal of Information Systems, 19 (2), 223-237. doi:10.1057/ejis.2010.14 | Analyzed |
(Townsend, Demarie, & Hendrickson, 2001) | Townsend, A. M., Demarie, S. M., & Hendrickson, A. R. (2001). Desktop video conferencing in virtual workgroups: Anticipation, system evaluation and performance. Information Systems Journal, 11 (3), 213-227. doi:10.1046/j.1365-2575.2001.00103.x | Analyzed |
(Trier & Molka-Danielsen, 2013) | Trier, M., & Molka-Danielsen, J. (2013). Sympathy or strategy: social capital drivers for collaborative contributions to the IS community. European Journal of Information Systems, 22 (3), 317-335. doi:10.1057/ejis.2012.27 | Analyzed |
(Turel & Qahri-Saremi, 2016) | Turel, O., & Qahri-Saremi, H. (2016). Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective. Journal of Management Information Systems, 33(4), 1087-1116. doi:10.1080/07421222.2016.1267529 | Analyzed |
(Turel, 2015) | Turel, O. (2015). Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users. European Journal of Information Systems, 24 (4), 431-446. doi:10.1057/ejis.2014.19 | Analyzed |
(Turel, 2016) | Turel, O. (2016). Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System. European Journal of Information Systems, 25 (5), 432-447. doi:10.1057/s41303-016-0002-5 | Analyzed |
(Turel, Serenko, & Giles, 2011) | Turel, O., Serenko, A., & Giles, P. (2011). INTEGRATING TECHNOLOGY ADDICTION AND USE: AN EMPIRICAL INVESTIGATION OF ONLINE AUCTION USERS. MIS Quarterly, 35(4), 1043-1061. | Analyzed |
(Van Akkeren & Rowlands, 2007) | Van Akkeren, J., & Rowlands, B. (2007). An epidemic of pain in an Australian radiology practice. European Journal of Information Systems, 16 (6), 695-711. doi:10.1057/palgrave.ejis.3000715 | Analyzed |
(Van Der Heijden, 2004) | Van Der Heijden, H. (2004). User acceptance of hedonic information systems. MIS Quarterly: Management Information Systems, 28(4), 695-704. | Analyzed |
(Van Der Heijden, Verhagen, & Creemers, 2003) | Van Der Heijden, H., Verhagen, T., & Creemers, M. (2003). Understanding online purchase intentions: contributions from technology and trust perspectives. European Journal of Information Systems, 12 (1), 41-48. doi:10.1057/palgrave.ejis.3000445 | Analyzed |
(van Offenbeek, Boonstra, & Seo, 2013) | van Offenbeek, M., Boonstra, A., & Seo, D. (2013). Towards integrating acceptance and resistance research: evidence from a telecare case study. European Journal of Information Systems, 22 (4), 434-454. doi:10.1057/ejis.2012.29 | Analyzed |
(Vega, Chiasson, & Brown, 2008) | Vega, A., Chiasson, M., & Brown, D. (2008). Extending the research agenda on diffusion: The case of public program interventions for the adoption of e-business systems in SMEs. Journal of Information Technology, 23 (2), 109-117. doi:10.1057/palgrave.jit.2000135 | Analyzed |
(Veiga, Floyd, & Dechant, 2001) | Veiga, J. F., Floyd, S., & Dechant, K. (2001). Towards modelling the effects of national culture on IT implementation and acceptance. Journal of Information Technology, 16 (3), 145-158. doi:10.1080/02683960110063654 | Analyzed |
(Venkatesh, 1999) | Venkatesh, V. (1999). Creation of favorable user perceptions: Exploring the role of intrinsic motivation. MIS Quarterly: Management Information Systems, 23(2), 239-260. | |
(Venkatesh & Brown, 2001) | Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: Adoption determinants and emerging challenges. MIS Quarterly, 25(1), 71-102. doi:10.2307/3250959 | Analyzed |
(Venkatesh & Ramesh, 2006) | Venkatesh, V., & Ramesh, V. (2006). Web and wireless site usability: Understanding differences and modeling use. MIS Quarterly: Management Information Systems, 30(1), 181-206. | Analyzed |
(Venkatesh & Sykes, 2013) | Venkatesh, V., & Sykes, T. A. (2013). Digital Divide Initiative Success in Developing Countries: A Longitudinal Field Study in a Village in India. Information Systems Research, 24(2), 239-260. doi:10.1287/isre.1110.0409 | Analyzed |
(Venkatesh & Windeler, 2012) | Venkatesh, V., & Windeler, J. B. (2012). Hype or Help? A Longitudinal Field Study of Virtual World Use for Team Collaboration. Journal of the Association for Information Systems, 13(10), 735-771. | Analyzed |
(Venkatesh, Brown, Maruping, & Bala, 2008) | Venkatesh, V., Brown, S. A., Maruping, L. M., & Bala, H. (2008). Predicting different conceptualizations of system USE: The competing roles of behavioral intention, facilitating conditions, and behavioral expectation. MIS Quarterly: Management Information Systems, 32(3), 483-502. | Analyzed |
(Venkatesh, Davis, & Morris, 2007) | Venkatesh, V., Davis, F. D., & Morris, M. G. (2007). Dead or alive? The development, trajectory and future of technology adoption research. Journal of the Association for Information Systems, 8(4), 267-286. | Analyzed |
(Venkatesh, Sykes, & Venkatraman, 2014) | Venkatesh, V., Sykes, T. A., & Venkatraman, S. (2014). Understanding e-Government portal use in rural India: role of demographic and personality characteristics. Information Systems Journal, 24(3), 249-269. doi:10.1111/isj.12008 | Analyzed |
(Venkatesh, Thong, & Xu, 2016) | Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead. Journal of the Association for Information Systems, 17(5), 328-376. | Analyzed |
(Venkatesh, Thong, Chan, & Hu, 2016) | Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., & Hu, P. J. H. (2016). Managing Citizens' Uncertainty in E-Government Services: The Mediating and Moderating Roles of Transparency and Trust. Information Systems Research, 27(1), 87-111. doi:10.1287/isre.2015.0612 | Analyzed |
(Venkatesh, Thong, Chan, Hu, & Brown, 2011) | Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., Hu, P. J. H., & Brown, S. A. (2011). Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Information Systems Journal, 21(6), 527-555. doi:10.1111/j.1365-2575.2011.00373.x | Analyzed |
(Venkatesh, Zhang, & Sykes, 2011) | Venkatesh, V., Zhang, X. J., & Sykes, T. A. (2011). "Doctors Do Too Little Technology": A Longitudinal Field Study of an Electronic Healthcare System Implementation. Information Systems Research, 22(3), 523-546. doi:10.1287/isre.1110.0383 | Analyzed |
(Vidgen, Henneberg, & Naude, 2007) | Vidgen, R., Henneberg, S., & Naude, P. (2007). What sort of community is the European Conference on Information Systems? A social network analysis 1993-2005. European Journal of Information Systems, 16 (1), 5-19. doi:10.1057/palgrave.ejis.3000661 | Analyzed |
(Vitharana, Zahedi, & Jain, 2016) | Vitharana, P., Zahedi, M. F., & Jain, H. K. (2016). Enhancing analysts’ mental models for improving requirements elicitation: A two-stage theoretical framework and empirical results. Journal of the Association of Information Systems, 17 (12), 804-840. | Analyzed |
(von Krogh & Spaeth, 2007) | von Krogh, G., & Spaeth, S. (2007). The open source software phenomenon: Characteristics that promote research. Journal of Strategic Information Systems, 16 (3), 236-253. doi:10.1016/j.jsis.2007.06.001 | Analyzed |
(W. Lewis, Agarwal, & Sambamurthy, 2003) | Lewis, W., Agarwal, R., & Sambamurthy, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly, 27(4), 657-678. | Analyzed |
(W. Q. Wang & Benbasat, 2007) | Wang, W. Q., & Benbasat, I. (2007). Recommendation agents for electronic commerce: Effects of explanation facilities on trusting beliefs. Journal of Management Information Systems, 23(4), 217-246. doi:10.2753/mis0742-122230410 | Analyzed |
(Wakefield & Wakefield, 2016) | Wakefield, R. L., & Wakefield, K. (2016). Social media network behavior: A study of user passion and affect. Journal of Strategic Information Systems, 25 (2), 140-156. doi:10.1016/j.jsis.2016.04.001 | Analyzed |
(Wakefield, Wakefield, Baker, & Wang, 2011) | Wakefield, R. L., Wakefield, K. L., Baker, J., & Wang, L. C. (2011). How website socialness leads to website use. European Journal of Information Systems, 20 (1), 118-132. doi:10.1057/ejis.2010.47 | Analyzed |
(Walden & Browne, 2009) | Walden, E. A., & Browne, G. J. (2009). Sequential Adoption Theory: A Theory for Understanding Herding Behavior in Early Adoption of Novel Technologies. Journal of the Association for Information Systems, 10 (1), 31-62. | Analyzed |
(Walsh, Gettler-Summa, & Kalika, 2016) | Walsh, I., Gettler-Summa, M., & Kalika, M. (2016). Expectable use: An important facet of IT, usage. Journal of Strategic Information Systems, 25 (3), 177-210. doi:10.1016/j.jsis.2016.01.003 | Analyzed |
(Walsh, Kefi, & Baskerville, 2010) | Walsh, I., Kefi, H., & Baskerville, R. (2010). Managing culture creep: Toward a strategic model of user IT culture. Journal of Strategic Information Systems, 19 (4), 257-280. doi:10.1016/j.jsis.2010.09.002 | Analyzed |
(Wan, Compeau, & Haggerty, 2012) | Wan, Z. Y., Compeau, D., & Haggerty, N. (2012). The Effects of Self-Regulated Learning Processes on E-Learning Outcomes in Organizational Settings. Journal of Management Information Systems, 29 (1), 307-339. doi:10.2753/mis0742-1222290109 | Analyzed |
(Waring & Wainwright, 2000) | Waring, T., & Wainwright, D. (2000). Interpreting integration with respect to information systems in organizations-image, theory and reality. Journal of Information Technology, 15 (2), 131-147. doi:10.1080/026839600344320 | Analyzed |
(Wattal, Racherla, & Mandviwalla, 2010) | Wattal, S., Racherla, P., & Mandviwalla, M. (2010). Network Externalities and Technology Use: A Quantitative Analysis of Intraorganizational Blogs. Journal of Management Information Systems, 27 (1), 145-173. doi:10.2753/mis0742-1222270107 | Analyzed |
(Weerakkody, Dwivedi, & Irani, 2009) | Weerakkody, V., Dwivedi, Y. K., & Irani, Z. (2009). The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey. Journal of Information Technology, 24 (4), 354-368. doi:10.1057/jit.2009.16 | Analyzed |
(Wei, Teo, Chan, & Tan, 2011) | Wei, K. K., Teo, H. H., Chan, H. C., & Tan, B. C. Y. (2011). Conceptualizing and Testing a Social Cognitive Model of the Digital Divide. Information Systems Research, 22 (1), 170-187. doi:10.1287/isre.1090.0273 | Analyzed |
(Wells, Parboteeah, & Valacich, 2011) | Wells, J. D., Parboteeah, V., & Valacich, J. S. (2011). Online Impulse Buying: Understanding the Interplay between Consumer Impulsiveness and Website Quality. Journal of the Association for Information Systems, 12 (1), 32-56. | Analyzed |
(Williams, Dwivedi, Lal, & Schwarz, 2009) | Williams, M. D., Dwivedi, Y. K., Lal, B., & Schwarz, A. (2009). Contemporary trends and issues in IT adoption and diffusion research. Journal of Information Technology, 24 (1), 1-10. doi:10.1057/jit.2008.30 | Analyzed |
(Windeler & Riemenschneider, 2016) | Windeler, J. B., & Riemenschneider, C. K. (2016). The influence of ethnicity on organizational commitment and merit pay of IT workers: the role of leader support. Information Systems Journal, 26 (2), 157-190. doi:10.1111/isj.12058 | Analyzed |
(Wingreen & Blanton, 2017) | Wingreen, S. C., & Blanton, J. E. (2017). IT professionals' person-organization fit with IT training and development priorities. Information Systems Journal . doi:10.1111/isj.12135 | Analyzed |
(Winter & Gill, 2001) | Winter, S. J., & Gill, T. G. (2001). OFFICETECH®: A new paradigm in office services? Journal of Information Technology, 16 (1), 23-32. doi:10.1080/02683960122282 | Analyzed |
(Wixom & Watson, 2001) | Wixom, B. H., & Watson, H. J. (2001). An empirical investigation of the factors affecting data warehousing success. MIS Quarterly, 25(1), 17-41. doi:10.2307/3250957 | Analyzed |
(X. F. Deng & Chi, 2012) | Deng, X. F., & Chi, L. (2012). Understanding Postadoptive Behaviors in Information Systems Use: A Longitudinal Analysis of System Use Problems in the Business Intelligence Context. Journal of Management Information Systems, 29(3), 291-325. doi:10.2753/mis0742-1222290309 | Analyzed |
(X. Fang, Benamati, & Lederer, 2011) | Fang, X., Benamati, J., & Lederer, A. L. (2011). Coping with rapid information technology change in different national cultures. European Journal of Information Systems, 20 (5), 560-573. doi:10.1057/ejis.2011.20 | Analyzed |
(X. Fang, Hu, Li, & Tsai, 2013) | Fang, X., Hu, P. J. H., Li, Z. P., & Tsai, W. Y. (2013). Predicting Adoption Probabilities in Social Networks. Information Systems Research, 24 (1), 128-145. doi:10.1287/isre.1120.0461 | Analyzed |
(X. Li, Hess, & Valacich, 2008) | Li, X., Hess, T. J., & Valacich, J. S. (2008). Why do we trust new technology? A study of initial trust formation with organizational information systems. Journal of Strategic Information Systems, 17(1), 39-71. doi:10.1016/j.jsis.2008.01.001 | Analyzed |
(X. Q. Zhang & Zhang, 2015) | Zhang, X. Q., & Zhang, L. H. (2015). HOW DOES THE INTERNET AFFECT THE FINANCIAL MARKET? AN EQUILIBRIUM MODEL OF INTERNET-FACILITATED FEEDBACK TRADING. MIS Quarterly, 39(1), 17-+. | Analyzed |
(X. W. Fang, Chan, Brzezinski, & Xu, 2005) | Fang, X. W., Chan, S., Brzezinski, J., & Xu, S. (2005). Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems, 22(3), 123-157. | Analyzed |
(X. X. Li, Hsieh, & Rai, 2013) | Li, X. X., Hsieh, J., & Rai, A. (2013). Motivational Differences Across Post-Acceptance Information System Usage Behaviors: An Investigation in the Business Intelligence Systems Context. Information Systems Research, 24(3), 659-682. doi:10.1287/isre.1120.0456 | Analyzed |
(X. Xu, Thong, & Venkatesh, 2014) | Xu, X., Thong, J. Y. L., & Venkatesh, V. (2014). Effects of ICT Service Innovation and Complementary Strategies on Brand Equity and Customer Loyalty in a Consumer Technology Market. Information Systems Research, 25(4), 710-729. doi:10.1287/isre.2014.0540 | Analyzed |
(X. Zhang & Venkatesh, 2013) | Zhang, X., & Venkatesh, V. (2013). Explaining employee job performance: The role of online and offline workplace communication networks. MIS Quarterly: Management Information Systems, 37(3), 695-722. | Analyzed |
(X. Zhang, Venkatesh, & Brown, 2011) | Zhang, X., Venkatesh, V., & Brown, S. A. (2011). Designing collaborative systems to enhance team performance. Journal of the Association for Information Systems, 12 (8), 556. | Analyzed |
(Xiao & Benbasat, 2007) | Xiao, B., & Benbasat, I. (2007). E-commerce product recommendation agents: Use, characteristics, and impact. MIS Quarterly, 31(1), 137-209. | Analyzed |
(Xue, Liang, & Wu, 2011) | Xue, Y. J., Liang, H. G., & Wu, L. S. (2011). Punishment, Justice, and Compliance in Mandatory IT Settings. Information Systems Research, 22(2), 400-414. doi:10.1287/isre.1090.0266 | Analyzed |
(Y. A. Au & Kauffman, 2003) | Au, Y. A., & Kauffman, R. J. (2003). What do you know? Rational expectations in information technology adoption and investment. Journal of Management Information Systems, 20(2), 49-76. | Analyzed |
(Y. Chen & Zahedi, 2016) | Chen, Y., & Zahedi, F. M. (2016). INDIVIDUALS' INTERNET SECURITY PERCEPTIONS AND BEHAVIORS: POLYCONTEXTUAL CONTRASTS BETWEEN THE UNITED STATES AND CHINA. MIS Quarterly, 40(1), 205-+. | Analyzed |
(Y. E. Lee & Benbasat, 2011) | Lee, Y. E., & Benbasat, I. (2011). The Influence of Trade-off Difficulty Caused by Preference Elicitation Methods on User Acceptance of Recommendation Agents Across Loss and Gain Conditions. Information Systems Research, 22(4), 867-884. doi:10.1287/isre.1100.0334 | Analyzed |
(Y. J. Hwang, Kettinger, & Yi, 2015) | Hwang, Y. J., Kettinger, W. J., & Yi, M. Y. (2015). Personal information management effectiveness of knowledge workers: conceptual development and empirical validation. European Journal of Information Systems, 24(6), 588-606. doi:10.1057/ejis.2014.24 | Analyzed |
(Y. J. Xu, Yang, Cheng, & Lim, 2014) | Xu, Y. J., Yang, Y. P., Cheng, Z. Y., & Lim, J. (2014). Retaining and attracting users in social networking services: An empirical investigation of cyber migration. Journal of Strategic Information Systems, 23(3), 239-253. doi:10.1016/j.jsis.2014.03.002 | Analyzed |
(Y. L. Wang, Meister, & Gray, 2013) | Wang, Y. L., Meister, D. B., & Gray, P. H. (2013). SOCIAL INFLUENCE AND KNOWLEDGE MANAGEMENT SYSTEMS USE: EVIDENCE FROM PANEL DATA. MIS Quarterly, 37(1), 299-313. | Analyzed |
(Y. Lee & Chen, 2011) | Lee, Y., & Chen, A. N. K. (2011). Usability Design and Psychological Ownership of a Virtual World. Journal of Management Information Systems, 28(3), 269-307. doi:10.2753/mis0742-1222280308 | Analyzed |
(Y. Lee & Larsen, 2009) | Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 18(2), 177-187. doi:10.1057/ejis.2009.11 | Analyzed |
(Y. Lee, Chen, & Ilie, 2012) | Lee, Y., Chen, A. N. K., & Ilie, V. (2012). CAN ONLINE WAIT BE MANAGED? THE EFFECTS OF FILLER INTERFACES AND PRESENTATION MODES ON PERCEIVED WAITING TIME ONLINE. MIS Quarterly, 36(2), 365-394. | Analyzed |
(Y. Q. Sun, Fang, Lim, & Straub, 2012) | Sun, Y. Q., Fang, Y. L., Lim, K. H., & Straub, D. (2012). User Satisfaction with Information Technology Service Delivery: A Social Capital Perspective. Information Systems Research, 23(4), 1195-1211. doi:10.1287/isre.1120.0421 | Analyzed |
(Y.-F. Huang, Hsu, Chen, & Dong, 2011) | Huang, Y.-F., Hsu, K.-H., Chen, P.-S., & Dong, S.-H. (2011). Discussing performance index of human resource valuation with AHP-occupational safety section in T company in Taiwan as the case study. Information Technology Journal, 10(3), 549-556. | Analyzed |
(Yen, Hu, Hsu, & Li, 2015) | Yen, H. R., Hu, P. J. H., Hsu, S. H. Y., & Li, E. Y. (2015). A Multilevel Approach to Examine Employees' Loyal Use of ERP Systems in Organizations. Journal of Management Information Systems, 32 (4), 144-178. doi:10.1080/07421222.2015.1138373 | Analyzed |
(Yetton, Sharma, & Southon, 1999) | Yetton, P., Sharma, R., & Southon, G. (1999). Successful IS innovation: the contingent contributions of innovation characteristics and implementation process. Journal of Information Technology, 14 (1), 53-68. | Analyzed |
(Yi & Davis, 2003) | Yi, M. Y., & Davis, F. D. (2003). Developing and validating an observational learning model of computer software training and skill acquisition. Information Systems Research, 14 (2), 146-169. doi:10.1287/isre.14.2.146.16016 | Analyzed |
(Yoo, Lyytinen, & Yang, 2005) | Yoo, Y., Lyytinen, K., & Yang, H. D. (2005). The role of standards in innovation and diffusion of broadband mobile services: The case of South Korea. Journal of Strategic Information Systems, 14 (3), 323-353. doi:10.1016/j.jsis.2005.07.007 | Analyzed |
(Young, Mathiassen, & Davidson, 2016) | Young, B. W., Mathiassen, L., & Davidson, E. (2016). Inconsistent and Incongruent Frames During IT-enabled Change: An Action Research Study into Sales Process Innovation. Journal of the Association for Information Systems, 17 (7), 495-520. | Analyzed |
(Yu, Hu, & Cheng, 2015) | Yu, J., Hu, P. J. H., & Cheng, T. H. (2015). Role of Affect in Self-Disclosure on Social Network Websites: A Test of Two Competing Models. Journal of Management Information Systems, 32 (2), 239-277. doi:10.1080/07421222.2015.1063305 | Analyzed |
(Z. C. Xu, Turel, & Yuan, 2012) | Xu, Z. C., Turel, O., & Yuan, Y. F. (2012). Online game addiction among adolescents: motivation and prevention factors. European Journal of Information Systems, 21(3), 321-340. doi:10.1057/ejis.2011.56 | Analyzed |
(Z. H. Jiang & I. Benbasat, 2007) | Jiang, Z. H., & Benbasat, I. (2007). Investigating the influence of the functional mechanisms of online product presentations. Information Systems Research, 18(4), 454-470. doi:10.1287/isre.1070.0124 | Analyzed |
(Z. J. Jiang & I. Benbasat, 2007) | Jiang, Z. J., & Benbasat, I. (2007). The effects of presentation formats and task complexity on online consumers' product understanding. MIS Quarterly, 31(3), 475-500. | Analyzed |
(Zahedi & Song, 2008) | Zahedi, F., & Song, J. (2008). Dynamics of trust revision: Using health infomediaries. Journal of Management Information Systems, 24(4), 225-248. doi:10.2753/mis0742-1222240409 | Analyzed |
(Zhao, Detlor, & Connelly, 2016) | Zhao, L., Detlor, B., & Connelly, C. E. (2016). Sharing Knowledge in Social Q&A Sites: The Unintended Consequences of Extrinsic Motivation. Journal of Management Information Systems, 33(1), 70-100. doi:10.1080/07421222.2016.1172459 | Analyzed |
(Zigurs & Buckland, 1998) | Zigurs, I., & Buckland, B. K. (1998). A Theory of Task/Technology Fit and Group Support Systems Effectiveness. MIS Quarterly, 22(3), 313-334. | Analyzed |
(Zimmermann & Ravishankar, 2014) | Zimmermann, A., Raab, K., & Zanotelli, L. (2012). Vicious and virtuous circles of offshoring attitudes and relational behaviours. A configurational study of German IT developers. Information Systems Journal . doi:10.1111/j.1365-2575.2012.00399.x | Analyzed |
(Zimmermann, Raab, & Zanotelli, 2012) | Zimmermann, A., & Ravishankar, M. (2014). Knowledge transfer in IT offshoring relationships: the roles of social capital, efficacy and outcome expectations. Information Systems Journal, 24 (2), 167-202. | Analyzed |