default search action
Liette Lapointe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Isaac Vaghefi, Bogdan Negoita, Liette Lapointe:
Understanding the Process of IT Addiction Recovery: Insights from a Qualitative Study. HICSS 2024: 6046-6055 - 2023
- [j16]Isaac Vaghefi, Bogdan Negoita, Liette Lapointe:
The Path to Hedonic Information System Use Addiction: A Process Model in the Context of Social Networking Sites. Inf. Syst. Res. 34(1): 85-110 (2023) - 2022
- [c27]Arman Falahati, Liette Lapointe, Anne Beaudry:
Employees' Compliance with ISP: A Socio-Technical Conceptual Model. HICSS 2022: 1-10 - 2021
- [c26]Benoit A. Aubert, Wynne Chin, Guy Paré, Yolande Chan, Marie-Claude Boudreau, Liette Lapointe, Mathieu Templier, Suchit Ahuja, Lakshmi S. Iyer, Ryan T. Wright:
AMCIS 2021 Awards and Closing Ceremony. AMCIS 2021 - 2020
- [j15]Anne Beaudry, Isaac Vaghefi, Fatou Bagayogo, Liette Lapointe:
Impact of IT User Behavior: Observations through a New Lens. Commun. Assoc. Inf. Syst. 46: 15 (2020) - [c25]Arman Falahati, Liette Lapointe:
Compliance with IS-Security-Policies: A Socio-Material Perspective Towards Security. AMCIS 2020
2010 – 2019
- 2019
- [c24]Ghazaleh Aghili, Liette Lapointe:
The Role of Online Communities in Vaccine Controversies. ICIS 2019 - [c23]Suzanne Rivard, Mohammad Moeini Aghkariz, Liette Lapointe:
Exploring the Dynamics of IT Implementers' Responses to User Resistance. ICIS 2019 - 2018
- [j14]Saeed Akhlaghpour, Liette Lapointe:
From Placebo to Panacea: Studying the Diffusion of IT Management Techniques with Ambiguous Efficiencies: The Case of Capability Maturity Model. J. Assoc. Inf. Syst. 19(6): 4 (2018) - [j13]Bogdan Negoita, Liette Lapointe, Suzanne Rivard:
Collective Information System Use: A Typological Theory. MIS Q. 42(4) (2018) - 2017
- [j12]Isaac Vaghefi, Liette Lapointe, Camille Boudreau-Pinsonneault:
A typology of user liability to IT addiction. Inf. Syst. J. 27(2): 125-169 (2017) - [j11]Emmanuelle Vaast, Hani Safadi, Liette Lapointe, Bogdan Negoita:
Social Media Affordances for Connective Action: An Examination of Microblogging Use During the Gulf of Mexico Oil Spill. MIS Q. 41(4): 1179-1205 (2017) - 2016
- [c22]Fatou Bagayogo, Anne Beaudry, Liette Lapointe:
Perceived System Evolution: Measuring Users Perceptions of Changing Systems. AMCIS 2016 - [c21]Liette Lapointe, Anne Beaudry:
The Role of Organizational Internal Communication on Individuals' Reactions to New Information. AMCIS 2016 - [c20]Isaac Vaghefi, Liette Lapointe:
An Examination of Craving for Social Networks. AMCIS 2016 - 2015
- [j10]Régis Meissonier, Liette Lapointe, Emmanuel Houzé:
Légitimer l'implémentation d'un ERP: une comparaison Canada - Thailande. J. Decis. Syst. 24(3): 318-338 (2015) - [c19]Emmanuel Houzé, Liette Lapointe, Régis Meissonier:
Ensuring ERP Projects Achievement through Legitimating Practices. AMCIS 2015 - [c18]Ghazaleh Aghili, Liette Lapointe, Emmanuelle Vaast:
Apparatuses of Knowledge Delivery to Patients: The Role of Social Media in Vaccine Controversies. ICIS 2015 - 2014
- [j9]Fatou Farima Bagayogo, Liette Lapointe, Geneviève Bassellier:
Enhanced Use of IT: A New Perspective on Post-Adoption. J. Assoc. Inf. Syst. 15(7): 3 (2014) - [c17]Fatou Bagayogo, Liette Lapointe, Jui Ramaprasad, Isabelle Vedel:
Co-creation of Knowledge in Healthcare: A Study of Social Media Usage. HICSS 2014: 626-635 - [c16]Isaac Vaghefi, Liette Lapointe:
When Too Much Usage is Too Much: Exploring the Process of IT Addiction. HICSS 2014: 4494-4503 - [c15]Liette Lapointe, Anne Beaudry:
Identifying IT User Mindsets: Acceptance, Resistance and Ambivalence. HICSS 2014: 4619-4628 - 2013
- [j8]Isabelle Vedel, Saeed Akhlaghpour, Isaac Vaghefi, Howard Bergman, Liette Lapointe:
Review: Health information technologies in geriatrics and gerontology: a mixed systematic review. J. Am. Medical Informatics Assoc. 20(6): 1109-1119 (2013) - [j7]Saeed Akhlaghpour, Jing Wu, Liette Lapointe, Alain Pinsonneault:
The ongoing quest for the IT artifact: Looking back, moving forward. J. Inf. Technol. 28(2): 150-166 (2013) - [c14]Liette Lapointe, Jui Ramaprasad, Isabelle Vedel:
Collaborating through Social Media to Create Health Awareness. HICSS 2013: 792-801 - [c13]Liette Lapointe, Camille Boudreau-Pinsonneault, Isaac Vaghefi:
Is Smartphone Usage Truly Smart? A Qualitative Investigation of IT Addictive Behaviors. HICSS 2013: 1063-1072 - [c12]Fatou Bagayogo, Anne-Françoise Beaudry, Liette Lapointe:
Impacts of IT Acceptance and Resistance Behaviors: A Novel Framework. ICIS 2013 - [c11]Regis Meissonier, Liette Lapointe, Emmanuel Houzé:
"Cultural Intelligence" as a Concept to Apprehend Resistance to ERP Implementation. ICIS 2013 - [c10]Bogdan Negoita, Liette Lapointe, Alain Pinsonneault:
Achieving strategic alignment: a decision-making perspective. ICIS 2013 - [c9]Isaac Vaghefi, Liette Lapointe:
Can IT Hurt Productivity? An Investigation of IT Addiction. ICIS 2013 - 2012
- [j6]Isabelle Vedel, Liette Lapointe, Marie-Thérèse Lussier, Claude Richard, Johanne Goudreau, Lyne Lalonde, Alain Turcotte:
Healthcare professionals' adoption and use of a clinical information system (CIS) in primary care: Insights from the Da Vinci study. Int. J. Medical Informatics 81(2): 73-87 (2012) - [j5]Suzanne Rivard, Liette Lapointe:
Information Technology Implementers' Responses to User Resistance: Nature and Effects. MIS Q. 36(3): 897-920 (2012) - [c8]Bogdan Negoita, Yasser Rahrovani, Liette Lapointe, Alain Pinsonneault, Momin Mirza:
IT Champions as Agents of Change: a Social Capital Perspective. ICIS 2012 - [c7]Emmanuelle Vaast, Liette Lapointe, Bogdan Negoita, Hani Safadi:
Stakeholders' Use of Microblogging to Engage in Emotion Strategies During a Crisis. ICIS 2012 - [c6]Isaac Vaghefi, Liette Lapointe:
Information Technology and Social Loafing: A Qualitative Investigation. ICIS 2012 - 2011
- [j4]Liette Lapointe, Muriel Mignerat, Isabelle Vedel:
The IT productivity paradox in health: A stakeholder's perspective. Int. J. Medical Informatics 80(2): 102-115 (2011) - [j3]Suzanne Rivard, Liette Lapointe, Antonio Kappos:
An Organizational Culture-Based Theory of Clinical Information Systems Implementation in Hospitals. J. Assoc. Inf. Syst. 12(2): 3 (2011) - 2010
- [c5]Seyed Eshagh Ashraf Vaghefi, Liette Lapointe:
The Process of Habit Formation In IS Post-adoption. AMCIS 2010: 139 - [c4]Mohammad Moeini, Liette Lapointe:
Selecting an Appropriate Operationalization of the System Usage Construct: An IT Artifact Perspective. AMCIS 2010: 303 - [c3]Suzanne Rivard, Liette Lapointe:
A Cybernetic Theory of the Impact of Implementers' Actions on User Resistance to Information Technology Implementation. HICSS 2010: 1-10
2000 – 2009
- 2009
- [c2]Saeed Akhlaghpour, Jing Wu, Liette Lapointe, Alain Pinsonneault:
Re-examining the Status of "IT" in IT Research - An Update on Orlikowski and Iacono (2001). AMCIS 2009: 187 - 2007
- [j2]Liette Lapointe, Suzanne Rivard:
A Triple Take on Information System Implementation. Organ. Sci. 18(1): 89-107 (2007) - 2005
- [j1]Liette Lapointe, Suzanne Rivard:
A Multilevel Model of Resistance to Information Technology Implementation. MIS Q. 29(3): 461-491 (2005) - 2002
- [c1]Liette Lapointe, Lise Lamothe, Jean-Paul Fortin:
The Dynamics of IT Adoption in a Major Change Process in Healthcare Delivery. HICSS 2002: 148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-04 03:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint