Comparing security perceptions and relationship configurations of mobile...
Comparing security perceptions and relationship configurations of mobile device modders and non-moddersSigi Goode, Amir RiazInformation Technology & People, Vol. ahead-of-print, No. ahead-of-print,...
View ArticleKnowledge management as an asset for operational processes in marginal...
Knowledge management as an asset for operational processes in marginal healthcare centersJean Robert Kala Kamdjoug, Serge-Lopez Wamba-Taguimdje, Martin TchoukouaInformation Technology & People,...
View ArticleArtificial intelligence or human: when and why consumers prefer AI...
Artificial intelligence or human: when and why consumers prefer AI recommendationsFei Jin, Xiaodan ZhangInformation Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-Artificial...
View ArticleA qualitative study of penetration testers and what they can tell us about...
A qualitative study of penetration testers and what they can tell us about information security in organisationsStefano De Paoli, Jason JohnstoneInformation Technology & People, Vol....
View ArticleChinese older adults' social media use: a study of WeChat from a social...
Chinese older adults' social media use: a study of WeChat from a social practice perspectiveBrad McKenna, Wenjie Cai, Hyunsun YoonInformation Technology & People, Vol. ahead-of-print, No....
View ArticleExploring the antecedents of “deep” eWOM providing behaviour in mobile...
Exploring the antecedents of “deep” eWOM providing behaviour in mobile shopping: a multi-country studySunil Sahadev, Sean Chung, Mustafeed Zaman, Indria Handoko, Tan Vo-Thanh, Nguyen Phong Nguyen,...
View ArticleAdopting blockchain-based traceability in the fruit supply chain in a...
Adopting blockchain-based traceability in the fruit supply chain in a developing economy: facilitators and barriersTeck Lee Yap, Rajkishore Nayak, Nhung T.H. Vu, Duy Tung Bui, Thi Thu Tra Pham, Darcy...
View ArticleProxy design: a method for involving proxy users to speak on behalf of...
Proxy design: a method for involving proxy users to speak on behalf of vulnerable or unreachable users in co-designAnna Sigridur Islind, Johan Lundin, Katerina Cerna, Tomas Lindroth, Linda Åkeflo,...
View ArticleDo the certainty tone and seniority of physicians matter in patients'...
Do the certainty tone and seniority of physicians matter in patients' information adoption in online health communities?Jiahua Jin, Qin Chen, Xiangbin YanInformation Technology & People, Vol....
View ArticleBridging the adoption gap for cryptocurrencies: understanding the affordances...
Bridging the adoption gap for cryptocurrencies: understanding the affordances that impact approach–avoidance behavior for potential users and continuation usage for actual usersMilad Armani Dehghani,...
View ArticleUnderstanding consumers' interest in social commerce: the role of privacy,...
Understanding consumers' interest in social commerce: the role of privacy, trust and securityHsiao-Ting Tseng, Waqar Nadeem, M. Sam Hajli, Mauricio Featherman, Nick HajliInformation Technology &...
View ArticleThe configurational effects of artificial intelligence-based hiring decisions...
The configurational effects of artificial intelligence-based hiring decisions on applicants' justice perception and organisational commitmentJun Yu, Zhengcong Ma, Lin ZhuInformation Technology &...
View ArticleEvaluating compliance for organizational information security and business...
Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agencyMarko NiemimaaInformation Technology & People, Vol. ahead-of-print, No....
View ArticleUnraveling real-time mobile connectivity paradox and emotional ambivalence: a...
Unraveling real-time mobile connectivity paradox and emotional ambivalence: a quasi-experimental design from a multi-source perspectiveYubing Sui, Adeel Luqman, Manish Unhale, Francesco Schiavone,...
View ArticleThe future of working from home: a mixed-methods study with IT professionals...
The future of working from home: a mixed-methods study with IT professionals to learn from enforced working from homeSimon Lansmann, Jana Mattern, Simone Krebber, Joschka Andreas HüllmannInformation...
View ArticleA double-edged sword: social media use and creativity
A double-edged sword: social media use and creativityGuangxi Zhang, Sunfan MaoInformation Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-The use of social media is an integral...
View ArticleImplications of algorithmic management on careers and employment...
Implications of algorithmic management on careers and employment relationships in the gig economy – a developing country perspectiveOlatunji David Adekoya, Chima Mordi, Hakeem Adeniyi Ajonbadi, Weifeng...
View ArticleRole of social media news consumption in cultivating opinion polarization
Role of social media news consumption in cultivating opinion polarizationLabeeba Kothur, Vidushi PandeyInformation Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-This paper aims...
View ArticleA framework for consumers' assessments of location-based advertising (LBA)...
A framework for consumers' assessments of location-based advertising (LBA) and selective exposure to privacy-related online informationSann RyuInformation Technology & People, Vol. ahead-of-print,...
View ArticleWould an AI chatbot persuade you: an empirical answer from the elaboration...
Would an AI chatbot persuade you: an empirical answer from the elaboration likelihood modelQian Chen, Changqin Yin, Yeming GongInformation Technology & People, Vol. ahead-of-print, No....
View ArticleUnderstanding the effects of specific techno-stressors on strain and job...
Understanding the effects of specific techno-stressors on strain and job performance: a meta-analysis of the empirical evidenceQin Yuan, Jun Kong, Chun Liu, Yushi JiangInformation Technology &...
View ArticleUnderstanding the process of building institutional trust among digital...
Understanding the process of building institutional trust among digital payment users through national cybersecurity commitment trustworthiness cues: a critical realist perspectiveBen Krishna, Satish...
View ArticleUnpacking dual effects of ambivalence toward technologies in online live...
Unpacking dual effects of ambivalence toward technologies in online live streaming learningShixuan Fu, Jianhua Jordan Yu, Huimin Gu, Xiaoxiao SongInformation Technology & People, Vol....
View ArticleSynergizing organizational inclusion and IT competencies through resource...
Synergizing organizational inclusion and IT competencies through resource orchestration: a longitudinal explorationAyesha Masood, Anas A. Salameh, Ashraf Khalil, Qingyu Zhang, Armando PapaInformation...
View ArticleAn institutional perspective on application programming interface development...
An institutional perspective on application programming interface development and integrationJoshua Ofoeda, Richard Boateng, John EffahInformation Technology & People, Vol. ahead-of-print, No....
View ArticleSocial influence processes within MMORPG guilds: a mixed-methods approach of...
Social influence processes within MMORPG guilds: a mixed-methods approach of nomological network analysisKai Wang, Chi-Feng Tai, Han-fen HuInformation Technology & People, Vol. ahead-of-print, No....
View ArticleComparing job applicant deception in asynchronous vs synchronous video...
Comparing job applicant deception in asynchronous vs synchronous video interviews, with and without AI-assisted assessmentsHung-Yue Suen, Kuo-En HungInformation Technology & People, Vol....
View ArticleDoes training provision matter? Unravelling the impact of digital...
Does training provision matter? Unravelling the impact of digital transformation on environmental sustainabilityWantao Yu, Qi Liu, Roberto Chavez, Linchang ZhengInformation Technology & People,...
View ArticleDo industrial robots matter for corporate environmental governance? Evidence...
Do industrial robots matter for corporate environmental governance? Evidence from Chinese firmsFushu Luan, Wenhua Qi, Wentao Zhang, Victor ChangInformation Technology & People, Vol. ahead-of-print,...
View ArticleWork-related computing at home and nonwork-related computing at work: a...
Work-related computing at home and nonwork-related computing at work: a self-determination perspectiveTingxi Wang, Qianyu Lin, Zhaobiao Zong, Yue ZhouInformation Technology & People, Vol....
View ArticleEnterprise social media as enablers of employees' agility: the impact of work...
Enterprise social media as enablers of employees' agility: the impact of work stress and enterprise social media visibilityAbdul Hameed PitafiInformation Technology & People, Vol. ahead-of-print,...
View ArticleSocial media as a behavior depolarizer: evidence from Russia–Ukraine conflict
Social media as a behavior depolarizer: evidence from Russia–Ukraine conflictJitendra Yadav, Kuldeep Singh, Nripendra P. Rana, Denis DennehyInformation Technology & People, Vol. ahead-of-print, No....
View ArticleTowards the formation of we-intention to continue playing mobile multiplayer...
Towards the formation of we-intention to continue playing mobile multiplayer games: importance of gamification design elements and social play habit rolesMohd Hanafi Azman Ong, Nur Syafikah...
View ArticleShe’s worth IT: challenges for female CIOs in ensuring IT security compliance
She’s worth IT: challenges for female CIOs in ensuring IT security complianceGaurav Bansal, Zhuoli AxeltonInformation Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-IT security...
View ArticleOnline privacy literacy and users' information privacy empowerment: the case...
Online privacy literacy and users' information privacy empowerment: the case of GDPR in EuropeChristine Prince, Nessrine Omrani, Francesco SchiavoneInformation Technology & People, Vol. 37, No. 8,...
View ArticleUnderstanding the challenges of blockchain technology adoption: evidence from...
Understanding the challenges of blockchain technology adoption: evidence from China’s developing carbon marketsXing Chen, Ashley D. LloydInformation Technology & People, Vol. ahead-of-print, No....
View ArticleThe role of threat and coping appraisals in motivating the use of...
The role of threat and coping appraisals in motivating the use of personalised mobile emergency alert systemsAnnette Mills, Nelly Todorova, Jing ZhangInformation Technology & People, Vol....
View ArticleQuantified academics: Heideggerian technology critical analysis of the...
Quantified academics: Heideggerian technology critical analysis of the academic ranking competitionJani Koskinen, Kai Kristian Kimppa, Janne Lahtiranta, Sami HyrynsalmiInformation Technology &...
View ArticleBig data innovation and implementation in projects teams: towards a SEM...
Big data innovation and implementation in projects teams: towards a SEM approach to conflict preventionHakeem A. Owolabi, Azeez A. Oyedele, Lukumon Oyedele, Hafiz Alaka, Oladimeji Olawale, Oluseyi Aju,...
View ArticleHow the interaction of innovation and ERP systems on business intelligence...
How the interaction of innovation and ERP systems on business intelligence affects the performance of Mexican manufacturing companiesJorge Alfonso Lara-Pérez, Francisco Canibe-Cruz, Antonio...
View ArticleTransactive memory systems in superteams: the effect of an intelligent...
Transactive memory systems in superteams: the effect of an intelligent assistant in virtual teamsDenise J. McWilliams, Adriane B. RandolphInformation Technology & People, Vol. ahead-of-print, No....
View ArticlePrinciples for analyzing, designing and evaluating the situated use of...
Principles for analyzing, designing and evaluating the situated use of intelligent machinesSteven AlterInformation Technology & People, Vol. ahead-of-print, No. ahead-of-print, pp.-The lack of...
View ArticleInvestigating engagement and burnout of gig-workers in the age of algorithms:...
Investigating engagement and burnout of gig-workers in the age of algorithms: an empirical study in digital labor platformsNastaran Hajiheydari, Mohammad Soltani DelgoshaInformation Technology &...
View ArticleICTs mediated identity work of community health workers: a comparative case...
ICTs mediated identity work of community health workers: a comparative case study from AfricaSundeep Sahay, Esther N. LandenInformation Technology & People, Vol. ahead-of-print, No. ahead-of-print,...
View ArticleIT–business alignment and business model design: a moderated mediation model...
IT–business alignment and business model design: a moderated mediation model of organizational learning and data-driven cultureYao Chen, Liangqing Zhang, Meng Chen, Hefu LiuInformation Technology &...
View ArticleModeling digital skills beyond the IT workforce: construct definition,...
Modeling digital skills beyond the IT workforce: construct definition, measurement and impact on digitalization valueAlemayehu Molla, Victor Gekara, Stan Karanasios, Darryn SnellInformation Technology...
View ArticleCollaborative federated learning framework to minimize data transmission for...
Collaborative federated learning framework to minimize data transmission for AI-enabled video surveillanceNehemia Sugianto, Dian Tjondronegoro, Golam SorwarInformation Technology & People, Vol....
View ArticleOwnership leads to conflicts: the double-edged impact of psychological...
Ownership leads to conflicts: the double-edged impact of psychological ownership on communication satisfaction in virtual communitiesLingzhi Brian FangInformation Technology & People, Vol....
View ArticleRecalibrating the scope of financial inclusion through financial technologies...
Recalibrating the scope of financial inclusion through financial technologies in the digital age: the role of digital literacy as a moderator in rural UgandaGeorge Okello Candiya Bongomin, Charles Akol...
View ArticleCaught in the web: a meta-analysis of Internet addiction, excessive daytime...
Caught in the web: a meta-analysis of Internet addiction, excessive daytime sleepiness and depressive symptoms in adolescentsHassam Waheed, Peter J.R. Macaulay, Hamdan Amer Ali Al-Jaifi, Kelly-Ann...
View Article
More Pages to Explore .....