default search action
Information Technology & People, Volume 32
Volume 32, Number 1, 2019
- Niki Panteli, Zeynep Y. Yalabik, Andriana Rapti:
Fostering work engagement in geographically-dispersed and asynchronous virtual teams. 2-17 - Iris Reychav, Ofer Inbar, Tomer Simon, Roger McHaney, Lin Zhu:
Emotion in enterprise social media systems. 18-46 - Outi Tuisku, Satu Pekkarinen, Lea Hennala, Helinä Melkas:
"Robots do not replace a nurse with a beating heart". 47-67 - Zaryab Sheikh, Yezheng Liu, Tahir Islam, Zahid Hameed, Ikram Ullah Khan:
Impact of social commerce constructs and social support on social commerce intentions. 68-93 - Moutusy Maity, Kallol Kumar Bagchi, Arunima Shah, Ankita Misra:
Explaining normative behavior in information technology use. 94-117 - Bartosz Marcinkowski, Bartlomiej Gawin:
A study on the adaptive approach to technology-driven enhancement of multi-scenario business processes. 118-146 - Nianxin Wang, Yajiong Xue, Huigang Liang, Zhining Wang, Shilun Ge:
The dual roles of the government in cloud computing assimilation: an empirical study in China. 147-170 - Arnela Ceric, Peter Holland:
The role of cognitive biases in anticipating and responding to cyberattacks. 171-188 - Ricardo Martins, Tiago Oliveira, Manoj A. Thomas, Sara Tomás:
Firms' continuance intention on SaaS use - an empirical study. 189-216 - Kit Hong Wong, Hsin Hsin Chang, Chih Heng Yeh:
The effects of consumption values and relational benefits on smartphone brand switching behavior. 217-243
Volume 32, Number 2, 2019
- Melina Seedoyal Doargajudhur, Peter Dell:
Impact of BYOD on organizational commitment: an empirical investigation. 246-268 - A. K. M. Najmul Islam, Matti Mäntymäki, Izak Benbasat:
Duality of self-promotion on social networking sites. 269-296 - Santanu Mandal:
The influence of big data analytics management capabilities on supply chain preparedness, alertness and agility. 297-318 - Woo-Chul Cho, Kyung Young Lee, Sung-Byung Yang:
What makes you feel attached to smartwatches? The stimulus-organism-response (S-O-R) perspectives. 319-343 - Chien Wen Yuan, Benjamin V. Hanrahan, John M. Carroll:
Assessing timebanking use and coordination: implications for service exchange tools. 344-363 - Mijail Naranjo-Zolotov, Tiago Oliveira, Sven Casteleyn:
Citizens' intention to use and recommend e-participation. 364-386 - Athanasios Poulis, Ioannis Rizomyliotis, Kleopatra Konstantoulaki:
Do firms still need to be social? Firm generated content in social media. 387-404 - Khalid Hafeez, Fathalla M. Alghatas, Pantea Foroudi, Bang Nguyen, Suraksha Gupta:
Knowledge sharing by entrepreneurs in a virtual community of practice (VCoP). 405-429 - Jean-François Stich, Monideepa Tarafdar, Patrick Stacey, Cary L. Cooper:
E-mail load, workload stress and desired e-mail load: a cybernetic approach. 430-452 - Caroline Marchant, Stephanie O'Donohoe:
Homo prostheticus? Intercorporeality and the emerging adult-smartphone assemblage. 453-474
Volume 32, Number 3, 2019
- Mohammad Abbaszadeh, Mohammad Bagher Alizadeh Aghdam, Reza Pourhosein, Leila Nasrolahi Vosta:
Technological media and development. 478-515 - Konstantina Spanaki, Zeynep Gürgüç, Catherine Mulligan, Emil Lupu:
Organizational cloud security and control: a proactive approach. 516-537 - Zilong Liu, Xuequn Wang, Jun Liu:
How digital natives make their self-disclosure decisions: a cross-cultural comparison. 538-558 - Depeng Zhang, Fuli Zhang, Si Liu, Helen S. Du:
Impact of referral reward program on innovative customers' follow-up e-referral. 559-578 - Ted Saarikko, Katrin Jonsson, Thommie Burström:
Software platform establishment: effectuation and entrepreneurial awareness. 579-602 - Navdeep Athwal, Doga Istanbulluoglu, Sophie Elizabeth McCormack:
The allure of luxury brands' social media activities: a uses and gratifications perspective. 603-626 - Minna Saunila, Juhani Ukko, Tero Rantala:
Value co-creation through digital service capabilities: the role of human factors. 627-645 - Ezlika M. Ghazali, Dilip S. Mutum, Mei-Yuen Woon:
Exploring player behavior and motivations to continue playing Pokémon GO. 646-667 - Mohammad Kamel Daradkeh:
Determinants of visual analytics adoption in organizations. 668-695 - Daniel Nylén, Jonny Holmström:
Digital innovation in context. 696-714 - Vincent Blijleven, Yiwei Gong, Afshin Mehrsai, Kitty Koelemeijer:
Critical success factors for Lean implementation in IT outsourcing relationships. 715-730 - Ewa Ziemba:
The contribution of ICT adoption to sustainability: households' perspective. 731-753 - Shanshan Zhang, Ron Chi-Wai Kwok, Paul Benjamin Lowry, Zhiying Liu:
Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks. 754-780
Volume 32, Number 4, 2019
- Patrick McCole, Elaine Ramsey, Andrew Kincaid, Yulin Fang, Huifang Li:
The role of structural assurance on previous satisfaction, trust and continuance intention. 781-801 - Ying Li, Ke Yang, Jin Chen, Sumeet Gupta, Feiyang Ning:
Can an apology change after-crisis user attitude? The role of social media in online crisis management. 802-827 - Alain Claude Tambe Ebot:
How stage theorizing can improve recommendations against phishing attacks. 828-857 - Hyungjin Lukas Kim, Jinyoung Han:
Do employees in a "good" company comply better with information security policy? A corporate social responsibility perspective. 858-875 - Vladlena Benson, Jean-Noël Ezingeard, Chris Hand:
An empirical study of purchase behaviour on social platforms. 876-896 - Simplice A. Asongu, Sara le Roux, Jacinta C. Nwachukwu, Chris Pyke:
The mobile phone as an argument for good governance in sub-Saharan Africa. 897-920 - Inma Rodríguez-Ardura, Antoni Meseguer-Artola:
Imagine, feel "there", and flow! Immersive experiences on m-Facebook, and their affective and behavioural effects. 921-947 - Anton Manfreda, Mojca Indihar Stemberger:
Establishing a partnership between top and IT managers. 948-972 - Hao Chen, Patrick Y. K. Chau, Wenli Li:
The effects of moral disengagement and organizational ethical climate on insiders' information security policy violation behavior. 973-992 - Jeffrey P. Kaleta, Jong Seok Lee, Sungjin Yoo:
Nudging with construal level theory to improve online password use and intended password choice. 993-1020 - Rana Tassabehji, Ray Hackney, Takao Maruyama:
Evaluating digital public services. 1021-1043 - Xiao-Ling Jin, Zhongyun Zhou, Xiaoyu Yu:
Predicting Users' willingness to diffuse healthcare knowledge in social media. 1044-1064 - Jia Li, Jie Tang, David C. Yen, Xuan Liu:
Disease risk and its moderating effect on the e-consultation market offline and online signals. 1065-1084 - Xiong Zhang, Wei T. Yue, Wendy Hui:
Software piracy and bundling in the cloud-based software era. 1085-1122
Volume 32, Number 5, 2019
- Mahmood Hussain Shah, Paul Jones, Jyoti Choudrie:
Cybercrimes prevention: promising organisational practices. 1125-1129 - Curtis C. Campbell:
Solutions for counteracting human deception in social engineering attacks. 1130-1152 - Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi, Hatice Kizgin:
Prevention of cybercrimes in smart cities of India: from a citizen's perspective. 1153-1183 - Abdullah Maitlo, Nisreen Ameen, Hamid Reza Peikari, Mahmood Hussain Shah:
Preventing identity theft. 1184-1214 - Simplice A. Asongu, Jacinta C. Nwachukwu, Stella-Maris Orim, Chris Pyke:
Crime and social media. 1215-1233 - John A. Aloysius, Ankur Arora, Viswanath Venkatesh:
Shoplifting in mobile checkout settings: cybercrime in retail stores. 1234-1261 - Daniel Perez González, Sara Trigueros-Preciado, Pedro Solana González:
Organizational practices as antecedents of the information security management performance. 1262-1275 - Ehinome Ikhalia, Alan Serrano, David Bell, Panos Louvieris:
Online social network security awareness: mass interpersonal persuasion using a Facebook app. 1276-1300 - Vanessa Ratten:
The effect of cybercrime on open innovation policies in technology firms. 1301-1317 - Stale Ekelund, Zilia Iskoujina:
Cybersecurity economics - balancing operational security spending. 1318-1342
Volume 32, Number 6, 2019
- Dina H. Bassiouni, Chris Hackley, Hakim Meshreki:
The integration of video games in family-life dynamics. 1376-1396 - Robert E. Hooker, Molly Wasko, David B. Paradice, Robin Teigland, Charles F. Hofacker:
Beyond gaming. 1397-1422 - Cheng-Kui Huang, Chun-Der Chen, Yu-Tzu Liu:
To stay or not to stay? Discontinuance intention of gamification apps. 1423-1445 - Serkan Celik:
Experiences of internet users regarding cyberhate. 1446-1471 - Carlo Gabriel Porto Bellini, Prashant Palvia, Valter Moreno, Tim Jacks, Alexandre R. Graeml:
Should I stay or should I go? A study of IT professionals during a national crisis. 1472-1495 - Jie Xiong, Meiyun Zuo:
How does family support work when older adults obtain information from mobile internet? 1496-1516 - Agneta Ranerup, Helle Zinner Henriksen:
Enrolling citizens as informed consumers in quasi-markets. 1517-1535 - Ahmed Imran, Shirley Gregor:
Conceptualising an IT mindset and its relationship to IT knowledge and intention to explore IT in the workplace. 1536-1563 - Shwadhin Sharma, Anita Khadka:
Role of empowerment and sense of community on online social health support group. 1564-1590 - Alireza Souri, Amir Masoud Rahmani, Nima Jafari Navimipour, Reza Rezaei:
Formal modeling and verification of a service composition approach in the social customer relationship management system. 1591-1607 - Juhi Gahlot Sarkar, Abhigyan Sarkar:
Young adult consumers' involvement in branded smartphone based service apps. 1608-1632 - Soud M. Almahamid:
The influence of ERP system usage on agile capabilities. 1633-1656 - Ruihe Yan, Kem Z. K. Zhang, Yugang Yu:
Switching from hotels to peer-to-peer accommodation: an empirical study. 1657-1678 - Le Wang, Zao Sun, Xiaoyong Dai, Yixin Zhang, Hai-hua Hu:
Retaining users after privacy invasions. 1679-1703
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.