


default search action
Information Technology & People, Volume 32
Volume 32, Number 1, 2019
- Niki Panteli

, Zeynep Y. Yalabik
, Andriana Rapti:
Fostering work engagement in geographically-dispersed and asynchronous virtual teams. 2-17 - Iris Reychav

, Ofer Inbar, Tomer Simon, Roger McHaney
, Lin Zhu:
Emotion in enterprise social media systems. 18-46 - Outi Tuisku

, Satu Pekkarinen
, Lea Hennala, Helinä Melkas
:
"Robots do not replace a nurse with a beating heart". 47-67 - Zaryab Sheikh

, Yezheng Liu, Tahir Islam
, Zahid Hameed
, Ikram Ullah Khan
:
Impact of social commerce constructs and social support on social commerce intentions. 68-93 - Moutusy Maity

, Kallol Kumar Bagchi, Arunima Shah, Ankita Misra
:
Explaining normative behavior in information technology use. 94-117 - Bartosz Marcinkowski

, Bartlomiej Gawin:
A study on the adaptive approach to technology-driven enhancement of multi-scenario business processes. 118-146 - Nianxin Wang

, Yajiong Xue, Huigang Liang
, Zhining Wang, Shilun Ge:
The dual roles of the government in cloud computing assimilation: an empirical study in China. 147-170 - Arnela Ceric

, Peter Holland
:
The role of cognitive biases in anticipating and responding to cyberattacks. 171-188 - Ricardo Martins

, Tiago Oliveira
, Manoj A. Thomas
, Sara Tomás:
Firms' continuance intention on SaaS use - an empirical study. 189-216 - Kit Hong Wong, Hsin Hsin Chang, Chih Heng Yeh:

The effects of consumption values and relational benefits on smartphone brand switching behavior. 217-243
Volume 32, Number 2, 2019
- Melina Seedoyal Doargajudhur

, Peter Dell
:
Impact of BYOD on organizational commitment: an empirical investigation. 246-268 - A. K. M. Najmul Islam, Matti Mäntymäki

, Izak Benbasat:
Duality of self-promotion on social networking sites. 269-296 - Santanu Mandal

:
The influence of big data analytics management capabilities on supply chain preparedness, alertness and agility. 297-318 - Woo-Chul Cho, Kyung Young Lee, Sung-Byung Yang:

What makes you feel attached to smartwatches? The stimulus-organism-response (S-O-R) perspectives. 319-343 - Chien Wen Yuan

, Benjamin V. Hanrahan, John M. Carroll:
Assessing timebanking use and coordination: implications for service exchange tools. 344-363 - Mijail Naranjo-Zolotov, Tiago Oliveira

, Sven Casteleyn
:
Citizens' intention to use and recommend e-participation. 364-386 - Athanasios Poulis

, Ioannis Rizomyliotis, Kleopatra Konstantoulaki
:
Do firms still need to be social? Firm generated content in social media. 387-404 - Khalid Hafeez, Fathalla M. Alghatas, Pantea Foroudi

, Bang Nguyen
, Suraksha Gupta:
Knowledge sharing by entrepreneurs in a virtual community of practice (VCoP). 405-429 - Jean-François Stich

, Monideepa Tarafdar
, Patrick Stacey, Cary L. Cooper
:
E-mail load, workload stress and desired e-mail load: a cybernetic approach. 430-452 - Caroline Marchant, Stephanie O'Donohoe

:
Homo prostheticus? Intercorporeality and the emerging adult-smartphone assemblage. 453-474
Volume 32, Number 3, 2019
- Mohammad Abbaszadeh, Mohammad Bagher Alizadeh Aghdam, Reza Pourhosein, Leila Nasrolahi Vosta:

Technological media and development. 478-515 - Konstantina Spanaki

, Zeynep Gürgüç, Catherine Mulligan
, Emil Lupu:
Organizational cloud security and control: a proactive approach. 516-537 - Zilong Liu, Xuequn Wang

, Jun Liu:
How digital natives make their self-disclosure decisions: a cross-cultural comparison. 538-558 - Depeng Zhang, Fuli Zhang, Si Liu, Helen S. Du:

Impact of referral reward program on innovative customers' follow-up e-referral. 559-578 - Ted Saarikko, Katrin Jonsson, Thommie Burström:

Software platform establishment: effectuation and entrepreneurial awareness. 579-602 - Navdeep Athwal

, Doga Istanbulluoglu
, Sophie Elizabeth McCormack:
The allure of luxury brands' social media activities: a uses and gratifications perspective. 603-626 - Minna Saunila

, Juhani Ukko
, Tero Rantala
:
Value co-creation through digital service capabilities: the role of human factors. 627-645 - Ezlika M. Ghazali

, Dilip S. Mutum
, Mei-Yuen Woon:
Exploring player behavior and motivations to continue playing Pokémon GO. 646-667 - Mohammad Kamel Daradkeh:

Determinants of visual analytics adoption in organizations. 668-695 - Daniel Nylén, Jonny Holmström:

Digital innovation in context. 696-714 - Vincent Blijleven, Yiwei Gong

, Afshin Mehrsai, Kitty Koelemeijer:
Critical success factors for Lean implementation in IT outsourcing relationships. 715-730 - Ewa Ziemba

:
The contribution of ICT adoption to sustainability: households' perspective. 731-753 - Shanshan Zhang

, Ron Chi-Wai Kwok, Paul Benjamin Lowry, Zhiying Liu:
Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks. 754-780
Volume 32, Number 4, 2019
- Patrick McCole, Elaine Ramsey

, Andrew Kincaid, Yulin Fang, Huifang Li:
The role of structural assurance on previous satisfaction, trust and continuance intention. 781-801 - Ying Li, Ke Yang, Jin Chen, Sumeet Gupta

, Feiyang Ning:
Can an apology change after-crisis user attitude? The role of social media in online crisis management. 802-827 - Alain Claude Tambe Ebot:

How stage theorizing can improve recommendations against phishing attacks. 828-857 - Hyungjin Lukas Kim

, Jinyoung Han
:
Do employees in a "good" company comply better with information security policy? A corporate social responsibility perspective. 858-875 - Vladlena Benson

, Jean-Noël Ezingeard, Chris Hand
:
An empirical study of purchase behaviour on social platforms. 876-896 - Simplice A. Asongu

, Sara le Roux, Jacinta C. Nwachukwu, Chris Pyke:
The mobile phone as an argument for good governance in sub-Saharan Africa. 897-920 - Inma Rodríguez-Ardura

, Antoni Meseguer-Artola
:
Imagine, feel "there", and flow! Immersive experiences on m-Facebook, and their affective and behavioural effects. 921-947 - Anton Manfreda

, Mojca Indihar Stemberger
:
Establishing a partnership between top and IT managers. 948-972 - Hao Chen

, Patrick Y. K. Chau, Wenli Li:
The effects of moral disengagement and organizational ethical climate on insiders' information security policy violation behavior. 973-992 - Jeffrey P. Kaleta

, Jong Seok Lee, Sungjin Yoo
:
Nudging with construal level theory to improve online password use and intended password choice. 993-1020 - Rana Tassabehji, Ray Hackney, Takao Maruyama

:
Evaluating digital public services. 1021-1043 - Xiao-Ling Jin, Zhongyun Zhou, Xiaoyu Yu

:
Predicting Users' willingness to diffuse healthcare knowledge in social media. 1044-1064 - Jia Li, Jie Tang, David C. Yen

, Xuan Liu:
Disease risk and its moderating effect on the e-consultation market offline and online signals. 1065-1084 - Xiong Zhang, Wei T. Yue, Wendy Hui

:
Software piracy and bundling in the cloud-based software era. 1085-1122
Volume 32, Number 5, 2019
- Mahmood Hussain Shah

, Paul Jones
, Jyoti Choudrie:
Cybercrimes prevention: promising organisational practices. 1125-1129 - Curtis C. Campbell:

Solutions for counteracting human deception in social engineering attacks. 1130-1152 - Sheshadri Chatterjee

, Arpan Kumar Kar
, Yogesh K. Dwivedi
, Hatice Kizgin
:
Prevention of cybercrimes in smart cities of India: from a citizen's perspective. 1153-1183 - Abdullah Maitlo, Nisreen Ameen, Hamid Reza Peikari, Mahmood Hussain Shah

:
Preventing identity theft. 1184-1214 - Simplice A. Asongu

, Jacinta C. Nwachukwu, Stella-Maris Orim
, Chris Pyke:
Crime and social media. 1215-1233 - John A. Aloysius, Ankur Arora, Viswanath Venkatesh:

Shoplifting in mobile checkout settings: cybercrime in retail stores. 1234-1261 - Daniel Perez González

, Sara Trigueros-Preciado, Pedro Solana González
:
Organizational practices as antecedents of the information security management performance. 1262-1275 - Ehinome Ikhalia, Alan Serrano, David Bell

, Panos Louvieris:
Online social network security awareness: mass interpersonal persuasion using a Facebook app. 1276-1300 - Vanessa Ratten:

The effect of cybercrime on open innovation policies in technology firms. 1301-1317 - Stale Ekelund, Zilia Iskoujina:

Cybersecurity economics - balancing operational security spending. 1318-1342
Volume 32, Number 6, 2019
- Dina H. Bassiouni

, Chris Hackley
, Hakim Meshreki
:
The integration of video games in family-life dynamics. 1376-1396 - Robert E. Hooker, Molly Wasko

, David B. Paradice
, Robin Teigland
, Charles F. Hofacker
:
Beyond gaming. 1397-1422 - Cheng-Kui Huang, Chun-Der Chen

, Yu-Tzu Liu:
To stay or not to stay? Discontinuance intention of gamification apps. 1423-1445 - Serkan Celik:

Experiences of internet users regarding cyberhate. 1446-1471 - Carlo Gabriel Porto Bellini

, Prashant Palvia, Valter Moreno
, Tim Jacks, Alexandre R. Graeml:
Should I stay or should I go? A study of IT professionals during a national crisis. 1472-1495 - Jie Xiong

, Meiyun Zuo:
How does family support work when older adults obtain information from mobile internet? 1496-1516 - Agneta Ranerup, Helle Zinner Henriksen:

Enrolling citizens as informed consumers in quasi-markets. 1517-1535 - Ahmed Imran

, Shirley Gregor
:
Conceptualising an IT mindset and its relationship to IT knowledge and intention to explore IT in the workplace. 1536-1563 - Shwadhin Sharma, Anita Khadka:

Role of empowerment and sense of community on online social health support group. 1564-1590 - Alireza Souri

, Amir Masoud Rahmani
, Nima Jafari Navimipour
, Reza Rezaei:
Formal modeling and verification of a service composition approach in the social customer relationship management system. 1591-1607 - Juhi Gahlot Sarkar

, Abhigyan Sarkar
:
Young adult consumers' involvement in branded smartphone based service apps. 1608-1632 - Soud M. Almahamid

:
The influence of ERP system usage on agile capabilities. 1633-1656 - Ruihe Yan

, Kem Z. K. Zhang, Yugang Yu
:
Switching from hotels to peer-to-peer accommodation: an empirical study. 1657-1678 - Le Wang

, Zao Sun, Xiaoyong Dai, Yixin Zhang, Hai-hua Hu:
Retaining users after privacy invasions. 1679-1703

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














