


default search action
Information Technology & People, Volume 38
Volume 38, Number 1, 2025
- Siv Elisabeth Rosendahl Skard, Herbjørn Nysveen, Per Egil Pedersen:
Adoption of ambient-assisted living: the relevance of practices, ecosystems and temporality. 1-22 - Xiaodong Li
, Zibing Liu
, Yuan Chen
, Ai Ren:
Consumer avoidance toward message stream advertising on mobile social media: a stimulus-organism-response perspective. 23-47 - Zheshi Bao, Yun Zhu:
Understanding online reviews adoption in social network communities: an extension of the information adoption model. 48-69 - Ashraf Khalil
, Salam Abdallah
, Rafiq Hijazi
, Kundan Sheikh:
Trust but verify: the effect of religiosity and social conformity on verification of content shared via social media. 70-86 - Yuan Sun, Mengyi Zhu
, Anand Jeyaraj:
How enterprise social media affordances affect employee agility: a self-determination theory perspective. 87-115 - Francesca Bonetti
, Patsy Perry
, Gary Warnaby
:
Managerial approaches and sociotechnical implications of the adoption of consumer-facing in-store technology in organizational processes: the case of fashion retail. 116-136 - Xiao-Yu Xu
, Syed Muhammad Usman Tayyab
, Qing-Dan Jia, Albert H. Huang:
A multi-model approach for the extension of the use and gratification theory in video game streaming. 137-179 - Liang Ma, Xin Zhang:
Effects of work interruption on employees' work performance: moderating role of social media usage. 180-197 - Aman Kumar
, Amit Shankar
, Aqueeb Sohail Shaik, Girish Jain
, Areej Malibari:
Risking it all in the metaverse ecosystem: forecasting resistance towards the enterprise metaverse. 198-218 - Sigi Goode
, Amir Riaz:
Comparing security perceptions and relationship configurations of mobile device modders and non-modders. 219-248 - Luminita Hurbean
, Louie H. M. Wong
, Carol Xiaojuan Ou
, Robert M. Davison
, Octavian Dospinescu:
Instant messaging, interruptions, stress and work performance. 249-278 - Fei Jin
, Xiaodan Zhang:
Artificial intelligence or human: when and why consumers prefer AI recommendations. 279-303 - Jean Robert Kala Kamdjoug, Serge-Lopez Wamba-Taguimdje
, Martin Tchoukoua:
Knowledge management as an asset for operational processes in marginal healthcare centers. 304-337 - Jian-Ren Hou
, Yen-Hsi Li, Sarawut Kankham
:
The service attributes of robo-advisors: a choice-based conjoint analysis. 338-362 - Brad McKenna
, Wenjie Cai
, Hyunsun Yoon
:
Chinese older adults' social media use: a study of WeChat from a social practice perspective. 363-379 - Stefano De Paoli
, Jason Johnstone:
A qualitative study of penetration testers and what they can tell us about information security in organisations. 380-398 - Sunil Sahadev
, Sean Chung
, Mustafeed Zaman
, Indria Handoko
, Tan Vo-Thanh, Nguyen Phong Nguyen, Rajeev Kumra:
Exploring the antecedents of "deep" eWOM providing behaviour in mobile shopping: a multi-country study. 399-418 - Teck Lee Yap
, Rajkishore Nayak, Nhung T. H. Vu, Duy Tung Bui, Thi Thu Tra Pham
, Darcy W. E. Allen:
Adopting blockchain-based traceability in the fruit supply chain in a developing economy: facilitators and barriers. 419-441 - Jiahua Jin, Qin Chen
, Xiangbin Yan:
Do the certainty tone and seniority of physicians matter in patients' information adoption in online health communities? 442-471 - Hsiao-Ting Tseng
, Waqar Nadeem, M. Sam Hajli, Mauricio Featherman, Nick Hajli
:
Understanding consumers' interest in social commerce: the role of privacy, trust and security. 472-496 - Milad Dehghani, Dionysios Karavidas
, Alexandra Rese
, Fulya Acikgoz:
Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach-avoidance behavior for potential users and continuation usage for actual users. 497-530 - Anna Sigridur Islind, Johan Lundin
, Katerina Cerná
, Tomas Lindroth, Linda Åkeflo
, Gunnar Steineck:
Proxy design: a method for involving proxy users to speak on behalf of vulnerable or unreachable users in co-design. 531-552
Volume 38, Number 2, 2025
- Jun Yu
, Zhengcong Ma
, Lin Zhu:
The configurational effects of artificial intelligence-based hiring decisions on applicants' justice perception and organisational commitment. 553-581 - Yubing Sui, Adeel Luqman
, Manish Unhale, Francesco Schiavone, Maria Teresa Cuomo
:
Unraveling real-time mobile connectivity paradox and emotional ambivalence: a quasi-experimental design from a multi-source perspective. 582-603 - Marko Niemimaa:
Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency. 604-625 - Simon Lansmann
, Jana Mattern
, Simone Krebber, Joschka Andreas Hüllmann
:
The future of working from home: a mixed-methods study with IT professionals to learn from enforced working from home. 626-659 - Guangxi Zhang, Sunfan Mao:
A double-edged sword: social media use and creativity. 660-685 - Olatunji David Adekoya
, Chima Mordi, Hakeem Adeniyi Ajonbadi, Weifeng Chen
:
Implications of algorithmic management on careers and employment relationships in the gig economy - a developing country perspective. 686-713 - Ben Krishna
, Satish Krishnan, M. P. Sebastian:
Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspective. 714-756 - Labeeba Kothur
, Vidushi Pandey:
Role of social media news consumption in cultivating opinion polarization. 757-786 - Qin Yuan
, Jun Kong, Chun Liu
, Yushi Jiang:
Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidence. 787-826 - Sann Ryu:
A framework for consumers' assessments of location-based advertising (LBA) and selective exposure to privacy-related online information. 827-850 - Shixuan Fu
, Jianhua Jordan Yu, Huimin Gu, Xiaoxiao Song:
Unpacking dual effects of ambivalence toward technologies in online live streaming learning. 851-874 - Kai Wang
, Chi-Feng Tai
, Han-fen Hu:
Social influence processes within MMORPG guilds: a mixed-methods approach of nomological network analysis. 875-912 - Ayesha Masood, Anas A. Salameh
, Ashraf Khalil
, Qingyu Zhang
, Armando Papa
:
Synergizing organizational inclusion and IT competencies through resource orchestration: a longitudinal exploration. 913-936 - Qian Chen, Changqin Yin, Yeming Gong
:
Would an AI chatbot persuade you: an empirical answer from the elaboration likelihood model. 937-962 - Hung-Yue Suen
, Kuo-En Hung
:
Comparing job applicant deception in asynchronous vs synchronous video interviews, with and without AI-assisted assessments. 963-983 - Joshua Ofoeda
, Richard Boateng, John Effah
:
An institutional perspective on application programming interface development and integration. 984-1016 - Yao Chen
, Liangqing Zhang
, Meng Chen
, Hefu Liu
:
IT-business alignment and business model design: a moderated mediation model of organizational learning and data-driven culture. 1017-1044 - Haroon Iqbal Maseeh
, Charles Jebarajakirthy, Achchuthan Sivapalan
, Mitchell Ross, Mehak Rehman
:
Understanding smartphone users' app usage with restricted permissions. 1045-1088 - Wantao Yu
, Qi Liu, Roberto Chavez
, Linchang Zheng
:
Does training provision matter? Unravelling the impact of digital transformation on environmental sustainability. 1089-1109 - Jitendra Yadav
, Kuldeep Singh
, Nripendra P. Rana
, Denis Dennehy:
Social media as a behavior depolarizer: evidence from Russia-Ukraine conflict. 1110-1133
Volume 38, Number 3, 2025
- Tingxi Wang, Qianyu Lin, Zhaobiao Zong
, Yue Zhou:
Work-related computing at home and nonwork-related computing at work: a self-determination perspective. 1137-1151 - Fushu Luan
, Wenhua Qi
, Wentao Zhang
, Victor Chang
:
Do industrial robots matter for corporate environmental governance? Evidence from Chinese firms. 1152-1177 - George Okello Candiya Bongomin
, Charles Akol Malinga, Alain Manzi Amani, Rebecca Balinda:
Recalibrating the scope of financial inclusion through financial technologies in the digital age: the role of digital literacy as a moderator in rural Uganda. 1178-1207 - Annette Mills, Nelly Todorova, Jing Zhang:
The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systems. 1208-1229 - Abdul Hameed Pitafi:
Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibility. 1230-1253 - Sundeep Sahay, Esther N. Landen:
ICTs mediated identity work of community health workers: a comparative case study from Africa. 1254-1280 - Mohd Hanafi Azman Ong
, Nur Syafikah Ibrahim:
Towards the formation of we-intention to continue playing mobile multiplayer games: importance of gamification design elements and social play habit roles. 1281-1304 - Gaurav Bansal
, Zhuoli Axelton
:
She's worth IT: challenges for female CIOs in ensuring IT security compliance. 1305-1327 - Xing Chen
, Ashley D. Lloyd:
Understanding the challenges of blockchain technology adoption: evidence from China's developing carbon markets. 1328-1362 - Hakeem Owolabi
, Azeez A. Oyedele
, Lukumon O. Oyedele
, Hafiz Alaka, Oladimeji A. Olawale, Oluseyi Aju
, Lukman Adéwálé Àkànbí, Sikiru A. Ganiyu
:
Big data innovation and implementation in projects teams: towards a SEM approach to conflict prevention. 1363-1402 - Jorge Alfonso Lara-Pérez
, Francisco Canibe-Cruz, Antonio Duréndez
:
How the interaction of innovation and ERP systems on business intelligence affects the performance of Mexican manufacturing companies. 1403-1429 - Xiang Gong
, Zhenxin Xiao, Xiaoxiao Liu, Matthew K. O. Lee
:
Behavioral dedication, constraint or obligation? A tripartite model of active participation in multiplayer online battle arena game community. 1430-1460 - Alemayehu Molla
, Victor Gekara, Stan Karanasios
, Darryn Snell:
Modeling digital skills beyond the IT workforce: construct definition, measurement and impact on digitalization value. 1461-1504 - Hsiao-Ting Tseng
, Shizhen (Jasper) Jia, Tahir M. Nisar, Nick Hajli
, Haseeb Shabbir
:
The study of social commerce in Generation Z context: the role of social support and privacy risk. 1505-1525 - Nehemia Sugianto
, Dian Tjondronegoro
, Golam Sorwar
:
Collaborative federated learning framework to minimize data transmission for AI-enabled video surveillance. 1526-1550 - Lingzhi Brian Fang
:
Ownership leads to conflicts: the double-edged impact of psychological ownership on communication satisfaction in virtual communities. 1551-1575 - Njod Aljabr
, Dimitra I. Petrakaki
, Petros Chamakiotis
:
Unpacking the sociomaterial parameters of connectivity management practices in the Saudi academic context. 1576-1600 - Manoj Krishnan, Satish Krishnan:
Investigating resistance to IT projects: a conceptual model from a meta-synthesis approach. 1601-1629
Volume 38, Number 4, 2025
- Publisher's Note. 1633-1634
- Xiaopan Wang, Junpeng Guo, Yi Wu:
Framing beneficiary photos to elicit donations in online medical crowdfunding: through the perspectives of sympathy and deliberation. 1635-1658 - Farjam Eshraghian, Najmeh Hafezieh, Farveh Farivar, Sergio de Cesare:
AI in software programming: understanding emotional responses to GitHub Copilot. 1659-1685 - Ransome Epie Bawack, Emilie Bonhoure, Sabrine Mallek:
Why would consumers risk taking purchase recommendations from voice assistants? 1686-1711 - Princely Ifinedo, Francine Vachon, Anteneh Ayanso:
Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome. 1712-1734 - Zhaohua Deng, Jiaxin Xue, Tailai Wu, Zhuo Chen:
Sharing information about medical crowdfunding projects on social networking sites: the integration of attribution-affect model of helping and social capital theory. 1735-1765 - Hui-Min Lai, Shin-Yuan Hung, David C. Yen:
How do people search for knowledge? Ask-directed searching and browsing strategies in professional virtual communities. 1766-1798 - Noor Fadzlina Mohd Fadhil, Say Yen Teoh, Leslie William Young, Nilmini Wickramasinghe:
Use of HIS in achieving preventive care performance: a resource orchestration study. 1799-1842 - Furong Jia, Jie Yu:
Disentangling e-commerce gamification affordances on recommendation acceptances from a perceived value perspective. 1843-1870 - Yu-Leung Ng:
A longitudinal model of continued acceptance of conversational artificial intelligence. 1871-1889 - Cheong Kim, Jungwoo Lee, Kun Chang Lee:
Online review data analytics to explore factors affecting consumers' airport recommendations. 1890-1924 - Menghan Shen, Efpraxia D. Zamani:
Gender differences in remote work: a study on the boundary management tactics of women and men. 1925-1947 - Hsiao-Pei (Sophie) Yang, Tommy K. H. Chan, Hai-Anh Tran, Bach Nguyen, Han Lin:
See it, share it: what makes social media content viral in the higher education context? The power of positive affective content. 1948-1968 - Ariane Ollier-Malaterre, Marianne Redston:
Enterprise social networks and the work context: a case study of mandated use. 1969-1990 - Afshin Omidi, Cinzia Dal Zotto, Robert G. Picard:
Audience analytics and tensions in digital news work: evidence from Swiss news media. 1991-2014 - Duong Cong Doanh, Thi Viet Nga Ngo, The Anh Khuc, Nhat Minh Tran, Thi Phuong Thu Nguyen:
Unraveling the dark side of ChatGPT: a moderated mediation model of technology anxiety and technostress. 2015-2040 - Naurin Farooq Khan, Hajra Murtaza, Komal Malik, Muzammil Mahmood, Muhammad Aslam Asadi:
Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach. 2041-2068 - Rachid Jabbouri, Helmi Issa, Roy Dakroub, Ahmed Ankit:
Unlocking immersive education: the emergence of the meta-governance framework. 2069-2093

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.