


default search action
Information Technology & People, Volume 38
Volume 38, Number 1, 2025
- Siv Elisabeth Rosendahl Skard, Herbjørn Nysveen, Per Egil Pedersen:
Adoption of ambient-assisted living: the relevance of practices, ecosystems and temporality. 1-22 - Xiaodong Li, Zibing Liu, Yuan Chen, Ai Ren:
Consumer avoidance toward message stream advertising on mobile social media: a stimulus-organism-response perspective. 23-47 - Zheshi Bao, Yun Zhu:
Understanding online reviews adoption in social network communities: an extension of the information adoption model. 48-69 - Ashraf Khalil, Salam Abdallah, Rafiq Hijazi, Kundan Sheikh:
Trust but verify: the effect of religiosity and social conformity on verification of content shared via social media. 70-86 - Yuan Sun, Mengyi Zhu, Anand Jeyaraj:
How enterprise social media affordances affect employee agility: a self-determination theory perspective. 87-115 - Francesca Bonetti, Patsy Perry, Gary Warnaby:
Managerial approaches and sociotechnical implications of the adoption of consumer-facing in-store technology in organizational processes: the case of fashion retail. 116-136 - Xiao-Yu Xu, Syed Muhammad Usman Tayyab, Qing-Dan Jia, Albert H. Huang:
A multi-model approach for the extension of the use and gratification theory in video game streaming. 137-179 - Liang Ma, Xin Zhang:
Effects of work interruption on employees' work performance: moderating role of social media usage. 180-197 - Aman Kumar, Amit Shankar, Aqueeb Sohail Shaik, Girish Jain, Areej Malibari:
Risking it all in the metaverse ecosystem: forecasting resistance towards the enterprise metaverse. 198-218 - Sigi Goode, Amir Riaz:
Comparing security perceptions and relationship configurations of mobile device modders and non-modders. 219-248 - Luminita Hurbean, Louie H. M. Wong, Carol Xiaojuan Ou, Robert M. Davison, Octavian Dospinescu:
Instant messaging, interruptions, stress and work performance. 249-278 - Fei Jin, Xiaodan Zhang:
Artificial intelligence or human: when and why consumers prefer AI recommendations. 279-303 - Jean Robert Kala Kamdjoug, Serge-Lopez Wamba-Taguimdje, Martin Tchoukoua:
Knowledge management as an asset for operational processes in marginal healthcare centers. 304-337 - Jian-Ren Hou, Yen-Hsi Li, Sarawut Kankham:
The service attributes of robo-advisors: a choice-based conjoint analysis. 338-362 - Brad McKenna, Wenjie Cai, Hyunsun Yoon:
Chinese older adults' social media use: a study of WeChat from a social practice perspective. 363-379 - Stefano De Paoli, Jason Johnstone:
A qualitative study of penetration testers and what they can tell us about information security in organisations. 380-398 - Sunil Sahadev, Sean Chung, Mustafeed Zaman, Indria Handoko, Tan Vo-Thanh, Nguyen Phong Nguyen, Rajeev Kumra:
Exploring the antecedents of "deep" eWOM providing behaviour in mobile shopping: a multi-country study. 399-418 - Teck Lee Yap, Rajkishore Nayak, Nhung T. H. Vu, Duy Tung Bui, Thi Thu Tra Pham, Darcy W. E. Allen:
Adopting blockchain-based traceability in the fruit supply chain in a developing economy: facilitators and barriers. 419-441 - Jiahua Jin, Qin Chen, Xiangbin Yan:
Do the certainty tone and seniority of physicians matter in patients' information adoption in online health communities? 442-471 - Hsiao-Ting Tseng, Waqar Nadeem, M. Sam Hajli, Mauricio Featherman, Nick Hajli:
Understanding consumers' interest in social commerce: the role of privacy, trust and security. 472-496 - Milad Dehghani, Dionysios Karavidas, Alexandra Rese, Fulya Acikgoz:
Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach-avoidance behavior for potential users and continuation usage for actual users. 497-530 - Anna Sigridur Islind, Johan Lundin, Katerina Cerná, Tomas Lindroth, Linda Åkeflo, Gunnar Steineck:
Proxy design: a method for involving proxy users to speak on behalf of vulnerable or unreachable users in co-design. 531-552

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.