|
1 The Updated DeLone and McLean Model of Information Systems Success |
|
|
1 | (18) |
|
|
|
|
2 | (1) |
|
1.2 Development of the D&M IS Success Model |
|
|
3 | (1) |
|
1.3 Constructs and Measures |
|
|
4 | (4) |
|
|
4 | (1) |
|
1.3.2 Information Quality |
|
|
5 | (1) |
|
|
5 | (1) |
|
1.3.4 Intention to Use/Use |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
1.4 Construct Interrelations |
|
|
8 | (3) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.5 Existing Research on IS Success |
|
|
11 | (2) |
|
|
13 | (6) |
|
|
14 | (5) |
|
2 If We Build It They Will Come? The Technology Acceptance Model |
|
|
19 | (18) |
|
|
|
20 | (1) |
|
|
21 | (11) |
|
2.2.1 Expectancy-Value Theory |
|
|
21 | (1) |
|
2.2.2 Theory of Reasoned Action |
|
|
22 | (1) |
|
2.2.3 Technology Acceptance Model |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
2.2.3.3 Types of Information Systems Examined |
|
|
25 | (1) |
|
2.2.3.4 External Variables Tested |
|
|
25 | (1) |
|
|
26 | (1) |
|
2.2.3.6 Characteristics of Research Subjects |
|
|
26 | (1) |
|
2.2.3.7 Major Limitations of the Model |
|
|
27 | (1) |
|
2.2.3.8 Most Published Authors |
|
|
27 | (1) |
|
2.2.3.9 Recent TAM Research |
|
|
27 | (1) |
|
2.2.4 TAM Model Elaborations |
|
|
28 | (1) |
|
|
28 | (1) |
|
2.2.4.2 Unified Theory of Acceptance and Use of Technology (UTAUT) |
|
|
29 | (1) |
|
2.2.4.3 TAM and Task-Technology Fit Model |
|
|
30 | (1) |
|
|
31 | (1) |
|
2.3 Future of the Technology Acceptance Model |
|
|
32 | (1) |
|
|
33 | (4) |
|
|
34 | (3) |
|
3 A Bibliometric Analysis of Articles Citing the Unified Theory of Acceptance and Use of Technology |
|
|
37 | (26) |
|
|
|
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (15) |
|
3.3.1 Demographic Data: Citations by Year |
|
|
40 | (1) |
|
3.3.2 Demographic Data: Citations by Journal/Source |
|
|
40 | (1) |
|
3.3.3 Demographic Data: Most Cited Citations |
|
|
41 | (1) |
|
3.3.4 Analysis and Systematic Review of Articles Citing the UTAUT Originating Article |
|
|
42 | (1) |
|
3.3.4.1 Citations with No Use of UTAUT |
|
|
42 | (1) |
|
3.3.4.2 Citations with Use of UTAUT with Different Research Methods |
|
|
43 | (1) |
|
3.3.4.3 Citations with Partial Use of UTAUT |
|
|
43 | (1) |
|
3.3.4.4 Citations with Complete Use of UTAUT |
|
|
43 | (3) |
|
3.3.5 IS Research Topics and Types of IS Examined |
|
|
46 | (1) |
|
|
46 | (3) |
|
3.3.5.2 Types of IS Investigated |
|
|
49 | (1) |
|
3.3.6 Methodological Analysis |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
3.3.7 Theoretical Analysis |
|
|
52 | (1) |
|
3.3.7.1 External Variables Analysis |
|
|
53 | (1) |
|
3.3.7.2 External Theories Analysis |
|
|
54 | (1) |
|
3.3.7.3 Relationships of External Variables with UTAUT Constructs |
|
|
54 | (1) |
|
|
55 | (2) |
|
|
57 | (6) |
|
|
58 | (5) |
|
4 Why Do People Reject Technologies: A Review of User Resistance Theories |
|
|
63 | (24) |
|
|
|
|
64 | (1) |
|
4.2 Resistance, Rejection, and Non-Adoption |
|
|
65 | (2) |
|
4.3 User Resistance Theories |
|
|
67 | (15) |
|
4.3.1 Multilevel Model of Resistance to Information Technology Implementation |
|
|
69 | (2) |
|
4.3.2 Power, Politics, and MIS Implementation |
|
|
71 | (1) |
|
4.3.3 A Model of Users' Perspective on Change |
|
|
72 | (1) |
|
4.3.4 Passive Resistance Misuse |
|
|
73 | (2) |
|
4.3.5 An Attributional Explanation of Individual Resistance |
|
|
75 | (2) |
|
4.3.6 Inhibitors and Enablers as Dual Factor Concepts in Technology Usage |
|
|
77 | (2) |
|
4.3.7 Physicians' Resistance Toward Health-Care Information Technology |
|
|
79 | (1) |
|
4.3.8 Analyzing Workplace Referents' Social Influence on IT Non-adoption |
|
|
80 | (1) |
|
4.3.9 Investigating User Resistance to Information Systems Implementation: A Status Quo Bias Perspective |
|
|
80 | (2) |
|
|
82 | (5) |
|
|
84 | (3) |
|
5 Task-Technology Fit Theory: A Survey and Synopsis of the Literature |
|
|
87 | (20) |
|
|
|
88 | (1) |
|
|
88 | (2) |
|
5.3 Literature Survey and Synopsis |
|
|
90 | (11) |
|
5.3.1 Definition of Task-Technology Fit |
|
|
91 | (2) |
|
5.3.2 Operationalization of Task-Technology Fit |
|
|
93 | (2) |
|
5.3.3 Research Contexts Employed by TTF Research |
|
|
95 | (2) |
|
5.3.4 Key Outcomes of Interest to TTF Researchers |
|
|
97 | (1) |
|
|
98 | (3) |
|
|
101 | (1) |
|
|
102 | (5) |
|
|
102 | (5) |
|
6 Migrating Processes from Physical to Virtual Environments: Process Virtualization Theory |
|
|
107 | (18) |
|
|
|
108 | (1) |
|
|
108 | (3) |
|
6.3 Process Virtualization Theory: Constructs and Relationships |
|
|
111 | (6) |
|
|
111 | (1) |
|
6.3.2 Independent Variables |
|
|
111 | (1) |
|
6.3.2.1 Characteristics of the Process |
|
|
112 | (1) |
|
6.3.2.2 Characteristics of the Virtualization Mechanism |
|
|
113 | (2) |
|
6.3.3 Clarifications and Adjustments to Process Virtualization Theory |
|
|
115 | (1) |
|
6.3.4 Comments on Empirical Testing |
|
|
116 | (1) |
|
|
116 | (1) |
|
6.4 Relationship of Process Virtualization Theory to IS Research |
|
|
117 | (5) |
|
6.4.1 The Process Virtualization Theme Within IS |
|
|
117 | (1) |
|
6.4.1.1 IS Research on Distributed Decision Support Systems and Virtual Teams |
|
|
118 | (1) |
|
6.4.1.2 IS Research on Electronic Commerce |
|
|
118 | (1) |
|
6.4.1.3 IS Research on Distance Learning |
|
|
119 | (1) |
|
6.4.1.4 IS Research on Business Process Reengineering and Disaggregation |
|
|
119 | (1) |
|
6.4.2 Process Virtualization Theory and Other IS Theories |
|
|
119 | (1) |
|
6.4.3 A "Native" Information Systems Theory |
|
|
120 | (2) |
|
|
122 | (3) |
|
|
122 | (3) |
|
7 The Theory of Deferred Action: Purposive Design as Deferred Systems for Emergent Organisations |
|
|
125 | (26) |
|
|
|
125 | (1) |
|
7.2 The Adaptive IS Problem |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
7.5 Deferred Action as Controlled Emergence of Organisation and Systems |
|
|
130 | (6) |
|
7.6 Implementing Deferred Action |
|
|
136 | (1) |
|
7.7 Data, Information and Knowledge |
|
|
137 | (1) |
|
|
138 | (4) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
7.9 Design Principles for the Practice Framework |
|
|
142 | (2) |
|
7.9.1 Under-Specification |
|
|
142 | (1) |
|
7.9.2 Functional Deferment Points |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
7.9.6 Deferred Design Decisions |
|
|
144 | (1) |
|
7.10 Instantiations of Deferred Systems |
|
|
144 | (2) |
|
7.10.1 Legal Arbitration IS |
|
|
145 | (1) |
|
|
145 | (1) |
|
7.10.3 Deferred Information Technology |
|
|
146 | (1) |
|
|
146 | (1) |
|
7.12 Limitations and Further Theory Development Work |
|
|
147 | (1) |
|
|
148 | (3) |
|
|
148 | (3) |
|
8 Resource-Based View Theory |
|
|
151 | (14) |
|
|
|
152 | (2) |
|
|
154 | (5) |
|
8.2.1 Competitive Advantage |
|
|
154 | (1) |
|
|
155 | (1) |
|
8.2.2.1 Resource Characteristics |
|
|
155 | (2) |
|
|
157 | (2) |
|
8.3 Application of RBV in IS Research |
|
|
159 | (1) |
|
8.3.1 Information System Resources and Capabilities |
|
|
159 | (1) |
|
8.4 Resource Orchestration |
|
|
160 | (1) |
|
8.5 Conclusions and Future Research |
|
|
160 | (5) |
|
|
161 | (4) |
|
9 On the Business Value of Information Technology: A Theory of Slack Resources |
|
|
165 | (34) |
|
|
|
|
166 | (1) |
|
9.2 Theoretical Background |
|
|
167 | (3) |
|
9.2.1 Organizational Slack |
|
|
167 | (1) |
|
9.2.1.1 Organizational Slack and Effectiveness |
|
|
168 | (1) |
|
9.2.1.2 Organizational Slack and Efficiency |
|
|
169 | (1) |
|
9.2.1.3 Organizational Slack and Redeployability |
|
|
169 | (1) |
|
9.3 IT Slack Conceptualization |
|
|
170 | (2) |
|
9.3.1 IT Slack and Redeployability |
|
|
171 | (1) |
|
9.3.2 The Value of IT Slack |
|
|
171 | (1) |
|
9.4 A Typology of IT Slack |
|
|
172 | (6) |
|
9.4.1 Type 1 -- IT Infrastructure-Artifact Slack |
|
|
175 | (1) |
|
9.4.2 Type 2 -- IT Infrastructure-Human Resource Slack |
|
|
176 | (1) |
|
9.4.3 Type 3 -- IT Infrastructure-Time Slack |
|
|
176 | (1) |
|
9.4.4 Type 4 -- IT Application-Artifact Slack |
|
|
177 | (1) |
|
9.4.5 Type 5 -- IT Application-Human Resource Slack |
|
|
177 | (1) |
|
9.4.6 Type 6 -- IT Application-Time Slack |
|
|
178 | (1) |
|
9.5 A Slack View Toward the Value of IT |
|
|
178 | (10) |
|
9.5.1 IT Slack and Organizational Efficiency |
|
|
179 | (1) |
|
9.5.1.1 Type of IT Slack and Organizational Efficiency |
|
|
180 | (6) |
|
9.5.2 IT Slack and Organizational Effectiveness |
|
|
186 | (2) |
|
9.6 Implications and Contributions |
|
|
188 | (3) |
|
|
191 | (8) |
|
|
192 | (3) |
|
|
195 | (4) |
|
10 Portfolio Theory: The Contribution of Markowitz's Theory to Information System Area |
|
|
199 | (14) |
|
|
Antonio Carlos Gastaud Macada |
|
|
|
200 | (1) |
|
|
201 | (7) |
|
10.2.1 Description of Portfolio Theory |
|
|
201 | (1) |
|
10.2.2 Markowitz's Theory and Information System Area |
|
|
202 | (2) |
|
10.2.3 Information Technology Portfolio Management (ITPM) |
|
|
204 | (1) |
|
10.2.3.1 Dimensions of ITPM |
|
|
205 | (1) |
|
10.2.3.2 IT Projects Portfolio |
|
|
206 | (2) |
|
10.3 Links from This Theory to Other Theories |
|
|
208 | (1) |
|
|
208 | (5) |
|
|
209 | (4) |
|
11 The Theory of the Lemon Markets in IS Research |
|
|
213 | (18) |
|
|
|
|
|
214 | (1) |
|
11.2 Dissection of the Theory: Its Nomological Network and Constructs |
|
|
215 | (3) |
|
11.3 Link with Other Theories |
|
|
218 | (2) |
|
11.4 Literature Overview of IS Articles Using LMT |
|
|
220 | (2) |
|
11.5 Bibliographical Analysis of the Original Akerlof Article |
|
|
222 | (5) |
|
|
227 | (4) |
|
|
227 | (4) |
|
12 The Technology--Organization--Environment Framework |
|
|
231 | (16) |
|
|
|
232 | (3) |
|
12.1.1 The Technological Context |
|
|
232 | (1) |
|
12.1.2 The Organizational Context |
|
|
233 | (2) |
|
12.1.3 The Environmental Context |
|
|
235 | (1) |
|
12.2 The Technology--Organization--Environment Framework in Research |
|
|
235 | (2) |
|
12.3 The Technology--Organization--Environment Framework in Future Research |
|
|
237 | (6) |
|
12.3.1 Reasons for Lack of Development |
|
|
237 | (4) |
|
12.3.2 Future Directions for TOE Research |
|
|
241 | (2) |
|
|
243 | (4) |
|
|
243 | (4) |
|
13 Contingency Theory in Information Systems Research |
|
|
247 | (18) |
|
|
|
248 | (1) |
|
|
249 | (9) |
|
13.2.1 Seminal Literature |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
13.2.1.3 Leadership Traits |
|
|
251 | (1) |
|
13.2.2 Contingency Research in IS |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
13.2.2.4 User Involvement |
|
|
256 | (1) |
|
|
257 | (1) |
|
13.2.2.6 Additional Constructs |
|
|
258 | (1) |
|
|
258 | (2) |
|
13.4 Contingency Theory Limitations |
|
|
260 | (1) |
|
|
260 | (1) |
|
13.4.2 Contingency Variables |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (4) |
|
|
262 | (3) |
|
14 IT and Porter's Competitive Forces Model and Strategies |
|
|
265 | (18) |
|
|
|
266 | (1) |
|
14.2 Understanding Porter's Model |
|
|
266 | (3) |
|
14.2.1 Supplier's Bargaining Power |
|
|
267 | (1) |
|
14.2.2 Bargaining Power of Buyers |
|
|
267 | (1) |
|
14.2.3 Threats of New Entrant |
|
|
267 | (1) |
|
14.2.4 Threat of Substitutes |
|
|
268 | (1) |
|
14.2.5 Threats of Rivalry Among Existing Players in Present Market |
|
|
268 | (1) |
|
14.3 Strategic Significance of Information Technology |
|
|
269 | (1) |
|
14.4 Technology-Enabled Strategy |
|
|
270 | (1) |
|
14.5 How Five Forces Help Formulate Strategy |
|
|
271 | (1) |
|
14.6 IT Research and Porter's Five Forces |
|
|
272 | (2) |
|
14.7 IT and Porter's Five Forces |
|
|
274 | (3) |
|
14.7.1 IT and Buying Power |
|
|
275 | (1) |
|
14.7.2 IT and Entry Barrier |
|
|
275 | (1) |
|
14.7.3 IT and Threat of Substitutes |
|
|
275 | (1) |
|
14.7.4 IT and Industry Rivalry |
|
|
276 | (1) |
|
14.7.5 IT and Selling Power |
|
|
276 | (1) |
|
14.8 Changing Times with IT |
|
|
277 | (1) |
|
14.9 Role of Managers in IT-Enabled Strategy |
|
|
278 | (1) |
|
|
279 | (4) |
|
|
280 | (3) |
|
15 Information Technology and Organisational Performance: Reviewing the Business Value of IT Literature |
|
|
283 | (20) |
|
|
|
284 | (2) |
|
|
284 | (1) |
|
|
285 | (1) |
|
15.1.3 IT Business Value Dimensions |
|
|
286 | (1) |
|
15.2 Early Research on IT Business Value |
|
|
286 | (2) |
|
15.3 Current Theoretical Paradigms |
|
|
288 | (8) |
|
15.3.1 Economics-Based IT Business Value Research |
|
|
288 | (3) |
|
15.3.2 Management-Based IT Business Value Research |
|
|
291 | (1) |
|
15.3.2.1 Value Creation Models |
|
|
292 | (1) |
|
15.3.2.2 Performance Measurement Models |
|
|
293 | (1) |
|
15.3.2.3 IT Investment Models |
|
|
294 | (1) |
|
15.3.2.4 IT Governance Models |
|
|
295 | (1) |
|
15.3.3 Sociology-Based IT Business Value Research |
|
|
296 | (1) |
|
15.4 Conclusion and Future Research |
|
|
296 | (7) |
|
|
297 | (6) |
|
16 Applying "Business Case" Construct Using the "Diffusion of Innovations" Theory Framework: Empirical Case Study in the Higher Education |
|
|
303 | (32) |
|
|
|
304 | (3) |
|
16.1.1 Critical Reflective Lenses |
|
|
306 | (1) |
|
|
307 | (1) |
|
16.2 The "Diffusion of Innovations" (DoI) Theory |
|
|
307 | (3) |
|
16.2.1 Perceived Attributes of the Innovation |
|
|
309 | (1) |
|
|
310 | (7) |
|
16.3.1 Research Questions |
|
|
311 | (1) |
|
16.3.2 The Literature Review |
|
|
311 | (1) |
|
16.3.3 Units of Analysis and Limitations |
|
|
311 | (2) |
|
16.3.4 Replication and Challenges in Data Gathering, Analysis, and Narration, Threats to the Single-Case Study, and Control Self-assessment |
|
|
313 | (4) |
|
16.4 The Empirical Evidence |
|
|
317 | (7) |
|
16.4.1 The "Business Case" Document |
|
|
318 | (1) |
|
16.4.1.1 Section 1: The Evaluation Process |
|
|
318 | (1) |
|
16.4.1.2 Section 2: Why is a New Finance System Needed? |
|
|
319 | (1) |
|
16.4.1.3 Section 3: Benefits of a New Financial System |
|
|
320 | (1) |
|
16.4.1.4 Section 4: What is the Recommended Solution? |
|
|
320 | (1) |
|
16.4.1.5 Section 5: What Will Happen if a New Financial System Is Not Implemented? |
|
|
320 | (2) |
|
16.4.1.6 Section 6: Proposed Time Frame |
|
|
322 | (1) |
|
16.4.1.7 Section 7: What Resources will be Required? |
|
|
322 | (1) |
|
16.4.1.8 Attachment A: Project Definition (2 Pages) |
|
|
322 | (1) |
|
16.4.1.9 Attachment B: Project Strategic Evaluation (1 Page) |
|
|
323 | (1) |
|
16.4.1.10 Attachment C: Project Risk Assessments of the Four Options (4 Pages) |
|
|
323 | (1) |
|
16.4.1.11 Attachment D: Cost Summary (1 Page) |
|
|
323 | (1) |
|
16.4.1.12 Attachment E: Cost-Benefit Analysis |
|
|
323 | (1) |
|
|
324 | (2) |
|
16.6 Conclusion and Directions for Future Research |
|
|
326 | (9) |
|
|
327 | (8) |
|
17 Punctuated Equilibrium Theory in IS Research |
|
|
335 | (20) |
|
|
|
|
336 | (1) |
|
|
336 | (6) |
|
|
336 | (1) |
|
17.2.2 Application to Management |
|
|
337 | (1) |
|
17.2.3 Decomposing Punctuated Equilibrium |
|
|
338 | (2) |
|
17.2.4 Discussion of Theory |
|
|
340 | (2) |
|
17.3 Levels of Analysis, Alternative Theories, and Applications |
|
|
342 | (2) |
|
17.3.1 Persistent Gradualism |
|
|
343 | (1) |
|
|
343 | (1) |
|
17.3.3 Turbulent Adaptation |
|
|
344 | (1) |
|
17.4 Four Applications of Punctuated Equilibrium in IS Research |
|
|
344 | (4) |
|
|
346 | (1) |
|
|
346 | (1) |
|
17.4.3 Organizational Change |
|
|
347 | (1) |
|
17.4.4 Strategic Alignment |
|
|
347 | (1) |
|
17.5 Operationalization of Punctuated Equilibrium |
|
|
348 | (2) |
|
17.5.1 Triggering Event: Was the Change Event-Driven? |
|
|
348 | (1) |
|
17.5.2 Pervasive Change: Was There a Transformation? |
|
|
349 | (1) |
|
17.5.3 Entire Organization: Was There an Entity-Wide Systemic Change? |
|
|
349 | (1) |
|
17.5.4 Short Period of Time: Was the Occurrence Rapid? |
|
|
349 | (1) |
|
|
350 | (5) |
|
|
351 | (4) |
|
18 Discrepancy Theory Models of Satisfaction in IS Research |
|
|
355 | (28) |
|
|
|
|
|
356 | (1) |
|
18.2 Origins of Discrepancy-Based Satisfaction |
|
|
357 | (5) |
|
18.2.1 Discrepancy Theory Overview |
|
|
358 | (1) |
|
18.2.2 Management Studies of Job Satisfaction |
|
|
359 | (1) |
|
18.2.3 Marketing Studies of Consumer Satisfaction |
|
|
360 | (2) |
|
18.3 Satisfaction in IS Research |
|
|
362 | (9) |
|
18.3.1 User Satisfaction with Information Systems |
|
|
363 | (4) |
|
18.3.2 Job Satisfaction in the Information Systems Literature |
|
|
367 | (1) |
|
18.3.3 Discrepancy Theory Formation of Satisfaction |
|
|
367 | (4) |
|
18.4 Methodological Issues in Applying Discrepancy Theories |
|
|
371 | (4) |
|
18.4.1 Choosing the Components |
|
|
371 | (1) |
|
18.4.2 Measuring Discrepancy |
|
|
372 | (2) |
|
18.4.3 Choosing the Shape |
|
|
374 | (1) |
|
18.4.4 Analyzing the Relationship |
|
|
374 | (1) |
|
|
375 | (8) |
|
|
376 | (7) |
|
19 Institutional Change and Green IS: Towards Problem-Driven, Mechanism-Based Explanations |
|
|
383 | (26) |
|
|
|
384 | (2) |
|
19.1.1 Green IT and Green IS Defined |
|
|
385 | (1) |
|
19.2 Institutional Theory |
|
|
386 | (4) |
|
19.2.1 Mechanisms-Based Explanations from Institutional and Social Movement Theory |
|
|
387 | (1) |
|
19.2.2 Institutional and Social Movement Theory in IS Research |
|
|
388 | (1) |
|
19.2.3 Evidence of Institutional and Social Mechanisms in IS Research |
|
|
389 | (1) |
|
19.3 Towards a Problem-Driven Explanatory Theory of Green IS |
|
|
390 | (10) |
|
19.3.1 Social Mechanisms Operating from the Regulative Pillar |
|
|
391 | (2) |
|
19.3.2 The Role of Social Mechanisms in Shaping Influences from the Normative Pillar |
|
|
393 | (4) |
|
19.3.3 Social Mechanisms and the Cultural-Cognitive Pillar |
|
|
397 | (3) |
|
|
400 | (9) |
|
19.4.1 Theoretical Development and Implications |
|
|
401 | (2) |
|
|
403 | (6) |
|
20 A Multilevel Social Network Perspective on IT Adoption |
|
|
409 | (32) |
|
|
|
410 | (2) |
|
20.2 Multilevel Research on IT Adoption |
|
|
412 | (4) |
|
20.2.1 Levels of Analysis: Society -- Industries -- Organizations |
|
|
414 | (1) |
|
20.2.2 Levels of Analysis: Industries -- Organizations |
|
|
414 | (1) |
|
20.2.3 Levels of Analysis: Organizations -- Groups/Teams |
|
|
415 | (1) |
|
20.2.4 Levels of Analysis: Groups -- Individuals |
|
|
415 | (1) |
|
20.2.5 Levels of Analysis: Organizations -- Individuals |
|
|
415 | (1) |
|
20.3 Multilevel Framework for Technology Adoption |
|
|
416 | (7) |
|
|
418 | (1) |
|
20.3.1.1 Attributes and Beliefs |
|
|
419 | (1) |
|
|
419 | (1) |
|
20.3.1.3 Adoption Behavior |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
20.3.3 Individual Level and Network Level Interaction |
|
|
422 | (1) |
|
20.4 Social Network Theories |
|
|
423 | (6) |
|
20.4.1 Social Network Analysis |
|
|
423 | (2) |
|
|
425 | (1) |
|
20.4.3 Self-Interest and Collective Action |
|
|
426 | (2) |
|
|
428 | (1) |
|
|
429 | (3) |
|
|
430 | (1) |
|
20.5.2 Self-Interest and Collective Action |
|
|
431 | (1) |
|
|
432 | (1) |
|
20.5.4 Social Network Analysis |
|
|
432 | (1) |
|
20.6 Limitations and Future Research |
|
|
432 | (1) |
|
|
433 | (8) |
|
|
434 | (7) |
|
21 Expectation--Confirmation Theory in Information System Research: A Review and Analysis |
|
|
441 | (30) |
|
|
|
|
442 | (1) |
|
21.2 A Review of ECT and ECM |
|
|
443 | (8) |
|
21.2.1 The Expectation--Confirmation Theory (ECT) |
|
|
443 | (2) |
|
21.2.2 The Evolution of Expectation--Confirmation Model (ECM) |
|
|
445 | (1) |
|
21.2.3 The Anomalies of ECT and ECM |
|
|
446 | (1) |
|
21.2.3.1 Definition Anomaly |
|
|
447 | (2) |
|
21.2.3.2 Relationship Anomaly |
|
|
449 | (1) |
|
21.2.3.3 Measurement Anomaly |
|
|
449 | (1) |
|
21.2.3.4 Additional Variables |
|
|
450 | (1) |
|
21.2.3.5 Other Limitations |
|
|
451 | (1) |
|
|
451 | (12) |
|
21.3.1 Research Methodology |
|
|
451 | (1) |
|
21.3.2 Results and Findings |
|
|
452 | (1) |
|
21.3.2.1 Research Type Used |
|
|
452 | (1) |
|
21.3.2.2 Research Concentration |
|
|
452 | (1) |
|
21.3.2.3 Relevant Theories Used |
|
|
452 | (10) |
|
21.3.2.4 Dependent Variables |
|
|
462 | (1) |
|
21.3.2.5 Independent Variables |
|
|
462 | (1) |
|
|
462 | (1) |
|
21.4 Promising Inquiry for the Future |
|
|
463 | (1) |
|
|
464 | (7) |
|
|
465 | (6) |
|
22 Stakeholder Theory and Applications in Information Systems |
|
|
471 | (18) |
|
|
|
|
472 | (1) |
|
22.2 Stakeholder Theories of Management |
|
|
473 | (2) |
|
22.2.1 Origin of Stakeholder Theory |
|
|
473 | (1) |
|
22.2.2 Descriptive, Instrumental and Normative Views of Stakeholder Theory |
|
|
474 | (1) |
|
22.3 Stakeholder Theories in Information Systems |
|
|
475 | (3) |
|
22.4 Applications of Stakeholder Theory in Information Systems |
|
|
478 | (1) |
|
|
478 | (7) |
|
|
485 | (4) |
|
|
485 | (4) |
About the Author |
|
489 | (10) |
Index |
|
499 | |