The Content and Context of Identity in a Digital Society
暂无分享,去创建一个
Deborah Compeau | Marc Schmalz | Michelle Carter | Michael Ian Lawrence Kennedy | Deborah R. Compeau | Michelle Carter | Marc L. Schmalz | M. Kennedy
[1] Alan R. Dennis,et al. Individual Swift Trust and Knowledge-Based Trust in Face-to-Face and Virtual Team Members , 2009, J. Manag. Inf. Syst..
[2] Martin H. Levinson. Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .
[3] Alicia D. Cast,et al. A Theory of Self-Esteem , 2002 .
[4] P. Burke,et al. A sociological approach to self and identity , 2003 .
[5] Lin Yan,et al. Writing to the unknown: bloggers and the presence of backpackers , 2011, Inf. Technol. People.
[6] N. Hoffart. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .
[7] L. Floridi. Information: A Very Short Introduction , 2010 .
[8] Na Liu,et al. Understanding the Influence of Social Identity on Social Support Seeking Behaviors in Virtual Healthcare Community , 2010, ICIS.
[9] M. Kuhn,et al. An empirical investigation of self-attitudes. , 1954 .
[10] Jason Bennett Thatcher,et al. Mobile Devices and the Self: Developing the Concept of Mobile Phone Identity , 2013 .
[11] W. Swann,et al. Self-verification: The search for coherence , 2003 .
[12] P. Burke,et al. Trust and commitment through self-verification. , 1999 .
[13] Ulrike Schultze,et al. Performing embodied identity in virtual worlds , 2014, Eur. J. Inf. Syst..
[14] Viswanath Venkatesh,et al. Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead , 2016, J. Assoc. Inf. Syst..
[15] Ritu Agarwal,et al. Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective , 2012, Inf. Syst. Res..
[16] Susan Clayton,et al. Environmental Identity: A Conceptual and an Operational Definition. , 2003 .
[17] Cathy Urquhart,et al. Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..
[18] Varun Grover,et al. Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications , 2015, MIS Q..
[19] Ute Hillmer. Technology Acceptance in Mechatronics: The Influence of Identity on Technology Acceptance , 2009 .
[20] Peter Burke,et al. The Roots of Identity Theory , 2009 .
[21] S. Stryker. Symbolic Interactionism: A Social Structural Version , 1980 .
[22] P. Burke,et al. The Past, Present, and Future of an Identity Theory* , 2000 .
[23] Rosío Alvarez,et al. Examining technology, structure and identity during an Enterprise System implementation , 2008, Inf. Syst. J..
[24] Peter Burke,et al. The Link between Identity and Role Performance , 1981 .
[25] Roger Martin,et al. Social Entrepreneurship: The Case for Definition , 2007 .
[26] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[27] Mireille Gettler-Summa,et al. Expectable use: An important facet of IT usage , 2016, J. Strateg. Inf. Syst..
[28] Koen Luyckx,et al. Introduction: Toward an Integrative View of Identity , 2011 .
[29] Emmanuelle Vaast,et al. Speaking as one, but not speaking up: Dealing with new moral taint in an occupational online community , 2015, Inf. Organ..