default search action
Information Technology & People, Volume 32
Volume 32, Number 1, 2019
- Niki Panteli, Zeynep Y. Yalabik
, Andriana Rapti:
Fostering work engagement in geographically-dispersed and asynchronous virtual teams. 2-17 - Iris Reychav
, Ofer Inbar, Tomer Simon, Roger McHaney
, Lin Zhu:
Emotion in enterprise social media systems. 18-46 - Outi Tuisku
, Satu Pekkarinen
, Lea Hennala, Helinä Melkas
:
"Robots do not replace a nurse with a beating heart". 47-67 - Zaryab Sheikh
, Yezheng Liu, Tahir Islam
, Zahid Hameed
, Ikram Ullah Khan
:
Impact of social commerce constructs and social support on social commerce intentions. 68-93 - Moutusy Maity
, Kallol Kumar Bagchi, Arunima Shah, Ankita Misra
:
Explaining normative behavior in information technology use. 94-117 - Bartosz Marcinkowski
, Bartlomiej Gawin:
A study on the adaptive approach to technology-driven enhancement of multi-scenario business processes. 118-146 - Nianxin Wang
, Yajiong Xue, Huigang Liang
, Zhining Wang, Shilun Ge:
The dual roles of the government in cloud computing assimilation: an empirical study in China. 147-170 - Arnela Ceric
, Peter Holland
:
The role of cognitive biases in anticipating and responding to cyberattacks. 171-188 - Ricardo Martins
, Tiago Oliveira
, Manoj A. Thomas
, Sara Tomás:
Firms' continuance intention on SaaS use - an empirical study. 189-216 - Kit Hong Wong, Hsin Hsin Chang, Chih Heng Yeh:
The effects of consumption values and relational benefits on smartphone brand switching behavior. 217-243
Volume 32, Number 2, 2019
- Melina Seedoyal Doargajudhur
, Peter Dell
:
Impact of BYOD on organizational commitment: an empirical investigation. 246-268 - A. K. M. Najmul Islam, Matti Mäntymäki
, Izak Benbasat:
Duality of self-promotion on social networking sites. 269-296 - Santanu Mandal
:
The influence of big data analytics management capabilities on supply chain preparedness, alertness and agility. 297-318 - Woo-Chul Cho, Kyung Young Lee, Sung-Byung Yang:
What makes you feel attached to smartwatches? The stimulus-organism-response (S-O-R) perspectives. 319-343 - Chien Wen Yuan
, Benjamin V. Hanrahan, John M. Carroll:
Assessing timebanking use and coordination: implications for service exchange tools. 344-363 - Mijail Naranjo-Zolotov, Tiago Oliveira
, Sven Casteleyn
:
Citizens' intention to use and recommend e-participation. 364-386 - Athanasios Poulis
, Ioannis Rizomyliotis, Kleopatra Konstantoulaki
:
Do firms still need to be social? Firm generated content in social media. 387-404 - Khalid Hafeez, Fathalla M. Alghatas, Pantea Foroudi
, Bang Nguyen
, Suraksha Gupta:
Knowledge sharing by entrepreneurs in a virtual community of practice (VCoP). 405-429 - Jean-François Stich
, Monideepa Tarafdar
, Patrick Stacey, Cary L. Cooper
:
E-mail load, workload stress and desired e-mail load: a cybernetic approach. 430-452 - Caroline Marchant, Stephanie O'Donohoe
:
Homo prostheticus? Intercorporeality and the emerging adult-smartphone assemblage. 453-474
Volume 32, Number 3, 2019
- Mohammad Abbaszadeh, Mohammad Bagher Alizadeh Aghdam, Reza Pourhosein, Leila Nasrolahi Vosta:
Technological media and development. 478-515 - Konstantina Spanaki
, Zeynep Gürgüç, Catherine Mulligan
, Emil Lupu:
Organizational cloud security and control: a proactive approach. 516-537 - Zilong Liu, Xuequn Wang
, Jun Liu:
How digital natives make their self-disclosure decisions: a cross-cultural comparison. 538-558 - Depeng Zhang, Fuli Zhang, Si Liu, Helen S. Du:
Impact of referral reward program on innovative customers' follow-up e-referral. 559-578 - Ted Saarikko, Katrin Jonsson, Thommie Burström:
Software platform establishment: effectuation and entrepreneurial awareness. 579-602 - Navdeep Athwal
, Doga Istanbulluoglu
, Sophie Elizabeth McCormack:
The allure of luxury brands' social media activities: a uses and gratifications perspective. 603-626 - Minna Saunila
, Juhani Ukko
, Tero Rantala
:
Value co-creation through digital service capabilities: the role of human factors. 627-645 - Ezlika M. Ghazali
, Dilip S. Mutum
, Mei-Yuen Woon:
Exploring player behavior and motivations to continue playing Pokémon GO. 646-667 - Mohammad Kamel Daradkeh:
Determinants of visual analytics adoption in organizations. 668-695 - Daniel Nylén, Jonny Holmström:
Digital innovation in context. 696-714 - Vincent Blijleven, Yiwei Gong
, Afshin Mehrsai, Kitty Koelemeijer:
Critical success factors for Lean implementation in IT outsourcing relationships. 715-730 - Ewa Ziemba
:
The contribution of ICT adoption to sustainability: households' perspective. 731-753 - Shanshan Zhang
, Ron Chi-Wai Kwok, Paul Benjamin Lowry, Zhiying Liu:
Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks. 754-780
Volume 32, Number 4, 2019
- Patrick McCole, Elaine Ramsey
, Andrew Kincaid, Yulin Fang, Huifang Li:
The role of structural assurance on previous satisfaction, trust and continuance intention. 781-801 - Ying Li, Ke Yang, Jin Chen, Sumeet Gupta
, Feiyang Ning:
Can an apology change after-crisis user attitude? The role of social media in online crisis management. 802-827 - Alain Claude Tambe Ebot:
How stage theorizing can improve recommendations against phishing attacks. 828-857 - Hyungjin Lukas Kim
, Jinyoung Han
:
Do employees in a "good" company comply better with information security policy? A corporate social responsibility perspective. 858-875 - Vladlena Benson
, Jean-Noël Ezingeard, Chris Hand
:
An empirical study of purchase behaviour on social platforms. 876-896 - Simplice A. Asongu
, Sara le Roux, Jacinta C. Nwachukwu, Chris Pyke:
The mobile phone as an argument for good governance in sub-Saharan Africa. 897-920 - Inma Rodríguez-Ardura
, Antoni Meseguer-Artola
:
Imagine, feel "there", and flow! Immersive experiences on m-Facebook, and their affective and behavioural effects. 921-947 - Anton Manfreda
, Mojca Indihar Stemberger
:
Establishing a partnership between top and IT managers. 948-972 - Hao Chen
, Patrick Y. K. Chau, Wenli Li:
The effects of moral disengagement and organizational ethical climate on insiders' information security policy violation behavior. 973-992 - Jeffrey P. Kaleta
, Jong Seok Lee, Sungjin Yoo
:
Nudging with construal level theory to improve online password use and intended password choice. 993-1020 - Rana Tassabehji, Ray Hackney, Takao Maruyama
:
Evaluating digital public services. 1021-1043 - Xiao-Ling Jin, Zhongyun Zhou, Xiaoyu Yu
:
Predicting Users' willingness to diffuse healthcare knowledge in social media. 1044-1064 - Jia Li, Jie Tang, David C. Yen
, Xuan Liu:
Disease risk and its moderating effect on the e-consultation market offline and online signals. 1065-1084 - Xiong Zhang, Wei T. Yue, Wendy Hui
:
Software piracy and bundling in the cloud-based software era. 1085-1122
Volume 32, Number 5, 2019
- Mahmood Hussain Shah
, Paul Jones
, Jyoti Choudrie:
Cybercrimes prevention: promising organisational practices. 1125-1129 - Curtis C. Campbell:
Solutions for counteracting human deception in social engineering attacks. 1130-1152 - Sheshadri Chatterjee
, Arpan Kumar Kar
, Yogesh K. Dwivedi
, Hatice Kizgin
:
Prevention of cybercrimes in smart cities of India: from a citizen's perspective. 1153-1183 - Abdullah Maitlo, Nisreen Ameen, Hamid Reza Peikari, Mahmood Hussain Shah
:
Preventing identity theft. 1184-1214 - Simplice A. Asongu
, Jacinta C. Nwachukwu, Stella-Maris Orim
, Chris Pyke:
Crime and social media. 1215-1233 - John A. Aloysius, Ankur Arora, Viswanath Venkatesh:
Shoplifting in mobile checkout settings: cybercrime in retail stores. 1234-1261 - Daniel Perez González
, Sara Trigueros-Preciado, Pedro Solana González
:
Organizational practices as antecedents of the information security management performance. 1262-1275 - Ehinome Ikhalia, Alan Serrano, David Bell
, Panos Louvieris:
Online social network security awareness: mass interpersonal persuasion using a Facebook app. 1276-1300 - Vanessa Ratten:
The effect of cybercrime on open innovation policies in technology firms. 1301-1317 - Stale Ekelund, Zilia Iskoujina:
Cybersecurity economics - balancing operational security spending. 1318-1342
Volume 32, Number 6, 2019
- Dina H. Bassiouni
, Chris Hackley
, Hakim Meshreki
:
The integration of video games in family-life dynamics. 1376-1396 - Robert E. Hooker, Molly Wasko
, David B. Paradice
, Robin Teigland
, Charles F. Hofacker
:
Beyond gaming. 1397-1422 - Cheng-Kui Huang, Chun-Der Chen
, Yu-Tzu Liu:
To stay or not to stay? Discontinuance intention of gamification apps. 1423-1445 - Serkan Celik:
Experiences of internet users regarding cyberhate. 1446-1471 - Carlo Gabriel Porto Bellini
, Prashant Palvia, Valter Moreno
, Tim Jacks, Alexandre R. Graeml:
Should I stay or should I go? A study of IT professionals during a national crisis. 1472-1495 - Jie Xiong
, Meiyun Zuo:
How does family support work when older adults obtain information from mobile internet? 1496-1516 - Agneta Ranerup, Helle Zinner Henriksen:
Enrolling citizens as informed consumers in quasi-markets. 1517-1535 - Ahmed Imran
, Shirley Gregor
:
Conceptualising an IT mindset and its relationship to IT knowledge and intention to explore IT in the workplace. 1536-1563 - Shwadhin Sharma, Anita Khadka:
Role of empowerment and sense of community on online social health support group. 1564-1590 - Alireza Souri
, Amir Masoud Rahmani
, Nima Jafari Navimipour
, Reza Rezaei:
Formal modeling and verification of a service composition approach in the social customer relationship management system. 1591-1607 - Juhi Gahlot Sarkar
, Abhigyan Sarkar
:
Young adult consumers' involvement in branded smartphone based service apps. 1608-1632 - Soud M. Almahamid
:
The influence of ERP system usage on agile capabilities. 1633-1656 - Ruihe Yan, Kem Z. K. Zhang, Yugang Yu:
Switching from hotels to peer-to-peer accommodation: an empirical study. 1657-1678 - Le Wang
, Zao Sun, Xiaoyong Dai, Yixin Zhang, Hai-hua Hu:
Retaining users after privacy invasions. 1679-1703
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.