


default search action
Information Technology & People, Volume 38
Volume 38, Number 1, 2025
- Siv Elisabeth Rosendahl Skard, Herbjørn Nysveen, Per Egil Pedersen:

Adoption of ambient-assisted living: the relevance of practices, ecosystems and temporality. 1-22 - Xiaodong Li

, Zibing Liu
, Yuan Chen
, Ai Ren:
Consumer avoidance toward message stream advertising on mobile social media: a stimulus-organism-response perspective. 23-47 - Zheshi Bao, Yun Zhu:

Understanding online reviews adoption in social network communities: an extension of the information adoption model. 48-69 - Ashraf Khalil

, Salam Abdallah
, Rafiq Hijazi
, Kundan Sheikh:
Trust but verify: the effect of religiosity and social conformity on verification of content shared via social media. 70-86 - Yuan Sun, Mengyi Zhu

, Anand Jeyaraj:
How enterprise social media affordances affect employee agility: a self-determination theory perspective. 87-115 - Francesca Bonetti

, Patsy Perry
, Gary Warnaby
:
Managerial approaches and sociotechnical implications of the adoption of consumer-facing in-store technology in organizational processes: the case of fashion retail. 116-136 - Xiao-Yu Xu

, Syed Muhammad Usman Tayyab
, Qing-Dan Jia, Albert H. Huang:
A multi-model approach for the extension of the use and gratification theory in video game streaming. 137-179 - Liang Ma, Xin Zhang:

Effects of work interruption on employees' work performance: moderating role of social media usage. 180-197 - Aman Kumar

, Amit Shankar
, Aqueeb Sohail Shaik, Girish Jain
, Areej Malibari:
Risking it all in the metaverse ecosystem: forecasting resistance towards the enterprise metaverse. 198-218 - Sigi Goode

, Amir Riaz:
Comparing security perceptions and relationship configurations of mobile device modders and non-modders. 219-248 - Luminita Hurbean

, Louie H. M. Wong
, Carol Xiaojuan Ou
, Robert M. Davison
, Octavian Dospinescu:
Instant messaging, interruptions, stress and work performance. 249-278 - Fei Jin

, Xiaodan Zhang
:
Artificial intelligence or human: when and why consumers prefer AI recommendations. 279-303 - Jean Robert Kala Kamdjoug, Serge-Lopez Wamba-Taguimdje

, Martin Tchoukoua:
Knowledge management as an asset for operational processes in marginal healthcare centers. 304-337 - Jian-Ren Hou

, Yen-Hsi Li, Sarawut Kankham
:
The service attributes of robo-advisors: a choice-based conjoint analysis. 338-362 - Brad McKenna

, Wenjie Cai
, Hyunsun Yoon
:
Chinese older adults' social media use: a study of WeChat from a social practice perspective. 363-379 - Stefano De Paoli

, Jason Johnstone:
A qualitative study of penetration testers and what they can tell us about information security in organisations. 380-398 - Sunil Sahadev

, Sean Chung
, Mustafeed Zaman
, Indria Handoko
, Tan Vo-Thanh, Nguyen Phong Nguyen, Rajeev Kumra:
Exploring the antecedents of "deep" eWOM providing behaviour in mobile shopping: a multi-country study. 399-418 - Teck Lee Yap

, Rajkishore Nayak, Nhung T. H. Vu, Duy Tung Bui
, Thi Thu Tra Pham
, Darcy W. E. Allen:
Adopting blockchain-based traceability in the fruit supply chain in a developing economy: facilitators and barriers. 419-441 - Jiahua Jin, Qin Chen

, Xiangbin Yan:
Do the certainty tone and seniority of physicians matter in patients' information adoption in online health communities? 442-471 - Hsiao-Ting Tseng

, Waqar Nadeem, M. Sam Hajli, Mauricio Featherman, Nick Hajli
:
Understanding consumers' interest in social commerce: the role of privacy, trust and security. 472-496 - Milad Dehghani, Dionysios Karavidas

, Alexandra Rese
, Fulya Acikgoz:
Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach-avoidance behavior for potential users and continuation usage for actual users. 497-530 - Anna Sigridur Islind, Johan Lundin

, Katerina Cerná
, Tomas Lindroth, Linda Åkeflo
, Gunnar Steineck:
Proxy design: a method for involving proxy users to speak on behalf of vulnerable or unreachable users in co-design. 531-552
Volume 38, Number 2, 2025
- Jun Yu

, Zhengcong Ma
, Lin Zhu:
The configurational effects of artificial intelligence-based hiring decisions on applicants' justice perception and organisational commitment. 553-581 - Yubing Sui, Adeel Luqman

, Manish Unhale, Francesco Schiavone, Maria Teresa Cuomo
:
Unraveling real-time mobile connectivity paradox and emotional ambivalence: a quasi-experimental design from a multi-source perspective. 582-603 - Marko Niemimaa:

Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency. 604-625 - Simon Lansmann

, Jana Mattern
, Simone Krebber, Joschka Andreas Hüllmann
:
The future of working from home: a mixed-methods study with IT professionals to learn from enforced working from home. 626-659 - Guangxi Zhang, Sunfan Mao:

A double-edged sword: social media use and creativity. 660-685 - Olatunji David Adekoya

, Chima Mordi
, Hakeem Adeniyi Ajonbadi, Weifeng Chen
:
Implications of algorithmic management on careers and employment relationships in the gig economy - a developing country perspective. 686-713 - Ben Krishna

, Satish Krishnan
, M. P. Sebastian:
Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspective. 714-756 - Labeeba Kothur

, Vidushi Pandey:
Role of social media news consumption in cultivating opinion polarization. 757-786 - Qin Yuan

, Jun Kong, Chun Liu
, Yushi Jiang:
Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidence. 787-826 - Sann Ryu:

A framework for consumers' assessments of location-based advertising (LBA) and selective exposure to privacy-related online information. 827-850 - Shixuan Fu

, Jianhua Jordan Yu, Huimin Gu, Xiaoxiao Song:
Unpacking dual effects of ambivalence toward technologies in online live streaming learning. 851-874 - Kai Wang

, Chi-Feng Tai
, Han-fen Hu:
Social influence processes within MMORPG guilds: a mixed-methods approach of nomological network analysis. 875-912 - Ayesha Masood, Anas A. Salameh

, Ashraf Khalil
, Qingyu Zhang
, Armando Papa
:
Synergizing organizational inclusion and IT competencies through resource orchestration: a longitudinal exploration. 913-936 - Qian Chen, Changqin Yin, Yeming Gong

:
Would an AI chatbot persuade you: an empirical answer from the elaboration likelihood model. 937-962 - Hung-Yue Suen

, Kuo-En Hung
:
Comparing job applicant deception in asynchronous vs synchronous video interviews, with and without AI-assisted assessments. 963-983 - Joshua Ofoeda

, Richard Boateng, John Effah
:
An institutional perspective on application programming interface development and integration. 984-1016 - Yao Chen

, Liangqing Zhang
, Meng Chen
, Hefu Liu
:
IT-business alignment and business model design: a moderated mediation model of organizational learning and data-driven culture. 1017-1044 - Haroon Iqbal Maseeh

, Charles Jebarajakirthy, Achchuthan Sivapalan
, Mitchell Ross, Mehak Rehman
:
Understanding smartphone users' app usage with restricted permissions. 1045-1088 - Wantao Yu

, Qi Liu, Roberto Chavez
, Linchang Zheng
:
Does training provision matter? Unravelling the impact of digital transformation on environmental sustainability. 1089-1109 - Jitendra Yadav

, Kuldeep Singh
, Nripendra P. Rana
, Denis Dennehy
:
Social media as a behavior depolarizer: evidence from Russia-Ukraine conflict. 1110-1133
Volume 38, Number 3, 2025
- Tingxi Wang, Qianyu Lin, Zhaobiao Zong

, Yue Zhou:
Work-related computing at home and nonwork-related computing at work: a self-determination perspective. 1137-1151 - Fushu Luan

, Wenhua Qi
, Wentao Zhang
, Victor Chang
:
Do industrial robots matter for corporate environmental governance? Evidence from Chinese firms. 1152-1177 - George Okello Candiya Bongomin

, Charles Akol Malinga, Alain Manzi Amani, Rebecca Balinda:
Recalibrating the scope of financial inclusion through financial technologies in the digital age: the role of digital literacy as a moderator in rural Uganda. 1178-1207 - Annette Mills, Nelly Todorova, Jing Zhang:

The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems. 1208-1229 - Abdul Hameed Pitafi:

Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility. 1230-1253 - Sundeep Sahay, Esther N. Landen:

ICTs mediated identity work of community health workers: a comparative case study from Africa. 1254-1280 - Mohd Hanafi Azman Ong

, Nur Syafikah Ibrahim:
Towards the formation of we-intention to continue playing mobile multiplayer games: importance of gamification design elements and social play habit roles. 1281-1304 - Gaurav Bansal

, Zhuoli Axelton
:
She's worth IT: challenges for female CIOs in ensuring IT security compliance. 1305-1327 - Xing Chen

, Ashley D. Lloyd:
Understanding the challenges of blockchain technology adoption: evidence from China's developing carbon markets. 1328-1362 - Hakeem Owolabi

, Azeez A. Oyedele
, Lukumon O. Oyedele
, Hafiz Alaka, Oladimeji A. Olawale, Oluseyi Aju
, Lukman Adéwálé Àkànbí, Sikiru A. Ganiyu
:
Big data innovation and implementation in projects teams: towards a SEM approach to conflict prevention. 1363-1402 - Jorge Alfonso Lara-Pérez

, Francisco Canibe-Cruz, Antonio Duréndez
:
How the interaction of innovation and ERP systems on business intelligence affects the performance of Mexican manufacturing companies. 1403-1429 - Xiang Gong

, Zhenxin Xiao, Xiaoxiao Liu, Matthew K. O. Lee
:
Behavioral dedication, constraint or obligation? A tripartite model of active participation in multiplayer online battle arena game community. 1430-1460 - Alemayehu Molla

, Victor Gekara
, Stan Karanasios
, Darryn Snell
:
Modeling digital skills beyond the IT workforce: construct definition, measurement and impact on digitalization value. 1461-1504 - Hsiao-Ting Tseng

, Shizhen (Jasper) Jia, Tahir M. Nisar, Nick Hajli
, Haseeb Shabbir
:
The study of social commerce in Generation Z context: the role of social support and privacy risk. 1505-1525 - Nehemia Sugianto

, Dian Tjondronegoro
, Golam Sorwar
:
Collaborative federated learning framework to minimize data transmission for AI-enabled video surveillance. 1526-1550 - Lingzhi Brian Fang

:
Ownership leads to conflicts: the double-edged impact of psychological ownership on communication satisfaction in virtual communities. 1551-1575 - Njod Aljabr

, Dimitra I. Petrakaki
, Petros Chamakiotis
:
Unpacking the sociomaterial parameters of connectivity management practices in the Saudi academic context. 1576-1600 - Manoj Krishnan, Satish Krishnan

:
Investigating resistance to IT projects: a conceptual model from a meta-synthesis approach. 1601-1629
Volume 38, Number 4, 2025
- Publisher's Note. 1633-1634

- Xiaopan Wang

, Junpeng Guo
, Yi Wu:
Framing beneficiary photos to elicit donations in online medical crowdfunding: through the perspectives of sympathy and deliberation. 1635-1658 - Farjam Eshraghian

, Najmeh Hafezieh
, Farveh Farivar
, Sergio de Cesare
:
AI in software programming: understanding emotional responses to GitHub Copilot. 1659-1685 - Ransome Epie Bawack

, Emilie Bonhoure, Sabrine Mallek
:
Why would consumers risk taking purchase recommendations from voice assistants? 1686-1711 - Princely Ifinedo, Francine Vachon, Anteneh Ayanso:

Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome. 1712-1734 - Zhaohua Deng

, Jiaxin Xue, Tailai Wu, Zhuo Chen
:
Sharing information about medical crowdfunding projects on social networking sites: the integration of attribution-affect model of helping and social capital theory. 1735-1765 - Hui-Min Lai, Shin-Yuan Hung, David C. Yen:

How do people search for knowledge? Ask-directed searching and browsing strategies in professional virtual communities. 1766-1798 - Noor Fadzlina Mohd Fadhil

, Say Yen Teoh
, Leslie William Young, Nilmini Wickramasinghe
:
Use of HIS in achieving preventive care performance: a resource orchestration study. 1799-1842 - Furong Jia

, Jie Yu
:
Disentangling e-commerce gamification affordances on recommendation acceptances from a perceived value perspective. 1843-1870 - Yu-Leung Ng

:
A longitudinal model of continued acceptance of conversational artificial intelligence. 1871-1889 - Cheong Kim

, Jungwoo Lee, Kun Chang Lee
:
Online review data analytics to explore factors affecting consumers' airport recommendations. 1890-1924 - Menghan Shen, Efpraxia D. Zamani

:
Gender differences in remote work: a study on the boundary management tactics of women and men. 1925-1947 - Hsiao-Pei (Sophie) Yang

, Tommy K. H. Chan
, Hai-Anh Tran
, Bach Nguyen
, Han Lin
:
See it, share it: what makes social media content viral in the higher education context? The power of positive affective content. 1948-1968 - Ariane Ollier-Malaterre, Marianne Redston:

Enterprise social networks and the work context: a case study of mandated use. 1969-1990 - Afshin Omidi

, Cinzia Dal Zotto
, Robert G. Picard:
Audience analytics and tensions in digital news work: evidence from Swiss news media. 1991-2014 - Duong Cong Doanh

, Thi Viet Nga Ngo, The Anh Khuc
, Nhat Minh Tran, Thi Phuong Thu Nguyen:
Unraveling the dark side of ChatGPT: a moderated mediation model of technology anxiety and technostress. 2015-2040 - Naurin Farooq Khan, Hajra Murtaza

, Komal Malik, Muzammil Mahmood, Muhammad Aslam Asadi:
Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach. 2041-2068 - Rachid Jabbouri, Helmi Issa

, Roy Dakroub, Ahmed Ankit:
Unlocking immersive education: the emergence of the meta-governance framework. 2069-2093

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














