The digitization of the individual: conceptual foundations and opportunities for research

[1]  Jochen Gönsch,et al.  Is the Time Ripe? How the Value of Waiting and Incentives Affect Users’ Switching Behaviors for Smart Home Devices , 2018, Schmalenbach Business Review.

[2]  Hamed Qahri Saremi,et al.  School engagement, information technology use, and educational development: An empirical investigation of adolescents , 2016, Comput. Educ..

[3]  Ofir Turel,et al.  Quitting the use of a habituated hedonic information system: a theoretical model and empirical examination of Facebook users , 2015, Eur. J. Inf. Syst..

[4]  Daniel J. Veit,et al.  Uncertainty in cloud service relationships: Uncovering the differential effect of three social influence processes on potential and current users , 2018, Inf. Manag..

[5]  Yufei Yuan,et al.  Online game addiction among adolescents: motivation and prevention factors , 2012, Eur. J. Inf. Syst..

[6]  Thomas Hess,et al.  Escaping from the Filter Bubble? The Effects of Novelty and Serendipity on Users' Evaluations of Online Recommendations , 2014, ICIS.

[7]  Charlie Wilson,et al.  Smart homes and their users: a systematic analysis and key challenges , 2014, Personal and Ubiquitous Computing.

[8]  Rüdiger Zarnekow,et al.  Digital Life as a Topic of Business and Information Systems Engineering? , 2014, Bus. Inf. Syst. Eng..

[9]  Ravi Vatrapu,et al.  Understanding electronic word of behavior: conceptualization of the observable digital traces of consumers’ behaviors , 2018, Electron. Mark..

[10]  Zach W. Y. Lee,et al.  1 Massively multiplayer online game addiction : instrument development and validation , 2018 .

[11]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[12]  W. Bennett Changing Citizenship in the Digital Age , 2008 .

[13]  Monideepa Tarafdar,et al.  Reflecting on the "Dark Side" of Information Technology Use , 2012, Commun. Assoc. Inf. Syst..

[14]  J. Armarego,et al.  Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments , 2015 .

[15]  Shahper Vodanovich,et al.  Research Commentary - Digital Natives and Ubiquitous Information Systems , 2010, Inf. Syst. Res..

[16]  Sven Laumer,et al.  Perceived information sensitivity and interdependent privacy protection: a quantitative study , 2019, Electronic Markets.

[17]  Daniel J. Veit,et al.  How to Succeed with Cloud Services? , 2017, Business & Information Systems Engineering.

[18]  Timo Saarinen,et al.  Playing for fun or for profit: how extrinsically-motivated and intrinsically-motivated players make the choice between competing dual-purposed gaming platforms , 2018, Electronic Markets.

[19]  Ofir Turel,et al.  Neuroticism Magnifies the Detrimental Association between Social Media Addiction Symptoms and Wellbeing in Women, but Not in Men: a three-Way Moderation Model , 2018, Psychiatric Quarterly.

[20]  Matthew K. O. Lee,et al.  Online social networks: Why do students use facebook? , 2011, Comput. Hum. Behav..

[21]  Juho Hamari,et al.  The sharing economy: Why people participate in collaborative consumption , 2016, J. Assoc. Inf. Sci. Technol..

[22]  Penny Thompson,et al.  The digital natives as learners: Technology use patterns and approaches to learning , 2013, Comput. Educ..

[23]  Heiko Gewald,et al.  It Consumerization: Byod-Program Acceptance and its Impact on Employer Attractiveness , 2016, J. Comput. Inf. Syst..

[24]  Bo Xiao,et al.  Does gender matter in cyberbullying perpetration? An empirical investigation , 2018, Comput. Hum. Behav..

[25]  Hamed Qahri Saremi,et al.  Explaining unplanned online media behaviors: Dual system theory models of impulsive use and swearing on social networking sites , 2018, New Media Soc..

[26]  Thomas Hess,et al.  Options for Formulating a Digital Transformation Strategy , 2020, MIS Q. Executive.

[27]  Fred D. Davis,et al.  The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance , 2018, J. Manag. Inf. Syst..

[28]  Bo Sophia Xiao,et al.  Do actions speak louder than voices? The signaling role of social information cues in influencing consumer purchase decisions , 2014, Decis. Support Syst..

[29]  S. Pihet,et al.  Specific Contributions of Age of Onset, Callous-Unemotional Traits and Impulsivity to Reactive and Proactive Aggression in Youths with Conduct Disorders , 2018, Psychiatric Quarterly.

[30]  Michael J. Jensen,et al.  Digital Media and Political Engagement Worldwide: Acknowledgments , 2012 .

[31]  Sven Casteleyn,et al.  E-participation adoption models research in the last 17 years: A weight and meta-analytical review , 2018, Comput. Hum. Behav..

[32]  Daniel J. Veit,et al.  Beyond the Personalization–Privacy Paradox: Privacy Valuation, Transparency Features, and Service Personalization , 2017, J. Manag. Inf. Syst..

[33]  A. Bechara,et al.  Brain anatomy alterations associated with Social Networking Site (SNS) addiction , 2017, Scientific Reports.

[34]  Kire Trivodaliev,et al.  A review of Internet of Things for smart home: Challenges and solutions , 2017 .

[35]  Matthew K. O. Lee,et al.  An empirical investigation of information sharing behavior on social commerce sites , 2016, Int. J. Inf. Manag..

[36]  Liette Lapointe,et al.  Appendix C : The Interview Guide Liability to IT addiction , 2016 .

[37]  Saonee Sarker,et al.  Work-Life Conflict of Globally Distributed Software Development Personnel: An Empirical Investigation Using Border Theory , 2018, Inf. Syst. Res..

[38]  Peter Buxmann,et al.  Understanding the role of social networking sites in the subjective well-being of users: a diary study , 2018, Eur. J. Inf. Syst..

[39]  Jian-hua Wang,et al.  Energy Reduction Effect of the South-to-North Water Diversion Project in China , 2017, Scientific Reports.