Examining explorative and exploitative uses of smartphones: a user competence perspective
暂无分享,去创建一个
[1] Louis Raymond,et al. Impact of task uncertainty, end-user involvement, and competence on the success of end-user computing , 1998, Inf. Manag..
[2] Bong Gyou Lee,et al. Analyzing User's Intention and Innovation Diffusion of Smartphones , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.
[3] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[4] Barry L. Lewis,et al. Determinants of Auditor Expertise , 1990 .
[5] Brenda Eschenbrenner,et al. Towards a model of information systems user competency , 2010 .
[6] David Gefen,et al. Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice , 2000 .
[7] Zi-Lin He,et al. Exploration vs. Exploitation: An Empirical Test of the Ambidexterity Hypothesis , 2004, Organ. Sci..
[8] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and Voice Mail Emotion/Adoption Study , 1996, ICIS.
[9] FangXiaowen,et al. Moderating Effects of Task Type on Wireless Technology Acceptance , 2006 .
[10] Izak Benbasat,et al. The Influence of Business Managers' IT Competence on Championing IT , 2003, Inf. Syst. Res..
[11] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[12] LimayemMoez,et al. How habit limits the predictive power of intention , 2007 .
[13] Myeong-Cheol Park,et al. Mobile internet acceptance in Korea , 2005, Internet Res..
[14] Jeanne W. Ross,et al. Learning to Implement Enterprise Systems: An Exploratory Study of the Dialectics of Change , 2002, J. Manag. Inf. Syst..
[15] Hye-Jin Lee,et al. Facets of simplicity for the smartphone interface: A structural model , 2012, Int. J. Hum. Comput. Stud..
[16] Richard Alba,et al. Rethinking Assimilation Theory for a New Era of Immigration 1 , 1997, The International migration review.
[17] A. Bandura. Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.
[18] Nick Bontis,et al. The impact of distractions on the usability and intention to use mobile devices for wireless data services , 2012, Comput. Hum. Behav..
[19] Sumeet Gupta,et al. A User Empowerment Approach to Information Systems Infusion , 2014, IEEE Transactions on Engineering Management.
[20] Cheryl Burke Jarvis,et al. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .
[21] L HuffSid,et al. Assessing User Competence , 2000 .
[22] Dale Goodhue,et al. Task-Technology Fit and Individual Performance , 1995, MIS Q..
[23] Yinglei Wang,et al. Individual Virtual Competence and Its Influence on Work Outcomes , 2011, J. Manag. Inf. Syst..
[24] D. Campbell,et al. Convergent and discriminant validation by the multitrait-multimethod matrix. , 1959, Psychological bulletin.
[25] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[26] R. Zmud,et al. Information technology implementation research: a technological diffusion approach , 1990 .
[27] Hao Zhou,et al. Smart phone for mobile commerce , 2009, Comput. Stand. Interfaces.
[28] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[29] Shao-I Chiu,et al. A model of the relationship between psychological characteristics, mobile phone addiction and use of mobile phones by Taiwanese university female students , 2012, Comput. Hum. Behav..
[30] Ritu Agarwal,et al. Organizational Mechanisms for Enhancing User Innovation in Information Technology , 1999, MIS Q..
[31] B. Menguc,et al. Balancing exploration and exploitation: The moderating role of competitive intensity , 2005 .
[32] Neda Abasi,et al. Information systems success: the quest for the dependent variable , 2015 .
[33] Moez Limayem,et al. How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance , 2007, MIS Q..
[34] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[35] KimHee-Woong,et al. Value-based Adoption of Mobile Internet , 2007 .
[36] BhattacherjeeAnol,et al. Influence processes for information technology acceptance , 2006 .
[37] Shuang Xu,et al. Moderating Effects of Task Type on Wireless Technology Acceptance , 2005, J. Manag. Inf. Syst..
[38] Malcolm Munro,et al. Understanding and measuring user competence , 1997, Inf. Manag..
[39] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[40] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[41] Varun Grover,et al. Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms , 2003, MIS Q..
[42] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[43] Robert W. Zmud,et al. Measuring technology incorporation/infusion , 1992 .
[44] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[45] Yinglei Wang,et al. Knowledge transfer in virtual settings: the role of individual virtual competency , 2009, Inf. Syst. J..
[46] Jengchung V. Chen,et al. Acceptance and adoption of the innovative use of smartphone , 2007, Ind. Manag. Data Syst..
[47] Sean Xin Xu,et al. Extracting Business Value from IT: A Sensemaking Perspective of Post-Adoptive Use , 2011, Manag. Sci..
[48] Antti Oulasvirta,et al. Habits make smartphone use more pervasive , 2011, Personal and Ubiquitous Computing.
[49] Sangmoon Park,et al. Separating early-adopters from the majority: The case of Broadband Internet access in Korea , 2005 .
[50] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[51] James T. C. Teng,et al. Information Systems Use: Construct conceptualization and scale development , 2012, Comput. Hum. Behav..
[52] R. Schalock. Conceptualization and measurement , 1996 .
[53] Robert W. Zmud,et al. The Nature and Determinants of IT Acceptance, Routinization, and Infusion , 1993, Diffusion, Transfer and Implementation of Information Technology.
[54] Chulmo Koo,et al. E-Smart Health Information Adoption Processes: Central versus Peripheral Route* , 2014 .
[55] Anol Bhattacherjee,et al. Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..
[56] Izak Benbasat,et al. Business Competence of Information Technology Professionals: Conceptual Development and Influence on IT-Business Partnerships , 2004, MIS Q..
[57] Magid Igbaria,et al. Determinants of intranet diffusion and infusion , 2001 .
[58] Wynne W. Chin,et al. The future of diffusion research , 2001, DATB.
[59] William J. Kettinger,et al. What Determines Actual Use of Mobile Web Browsing Services? A Contextual Study in Korea , 2011, Commun. Assoc. Inf. Syst..
[60] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[61] Viswanath Venkatesh,et al. A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..
[62] James G. Phillips,et al. Personality and self reported mobile phone use , 2008, Comput. Hum. Behav..
[63] Daniel A. Levinthal,et al. Exploration and Exploitation in Organizational Learning , 2007 .
[64] Bradley Wilson,et al. Using PLS to Investigate Interaction Effects Between Higher Order Branding Constructs , 2010 .
[65] Sue Abdinnour-Helm,et al. Understanding post‐adoption IS usage stages: an empirical assessment of self‐service information systems , 2013, Inf. Syst. J..
[66] Wei Wang,et al. AIS Electronic , 2022 .
[67] Izak Benbasat,et al. Information Technology Competence of Business Managers: A Definition and Research Model , 2001, J. Manag. Inf. Syst..
[68] Jason Bennett Thatcher,et al. The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems , 2011, IEEE Transactions on Engineering Management.
[69] Dennis F. Galletta,et al. Research Note - Knowledge Exploration and Exploitation: The Impacts of Psychological Climate and Knowledge Management System Access , 2011, Inf. Syst. Res..
[70] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[71] Jason Bennett Thatcher,et al. Moving Beyond Intentions and Toward the Theory of Trying: Effects of Work Environment and Gender on Post-Adoption Information Technology Use , 2005, MIS Q..
[72] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[73] Jörg Henseler,et al. Testing Moderating Effects in PLS Path Models. An Illustration of Available Procedures , 2005 .
[74] Ritu Agarwal. Individual Acceptance of Information Technologies , 2000 .
[75] Saonee Sarker,et al. Trends in Mobile Computing within the IS Discipline : A Ten-Year Retrospective Trends in Mobile Computing within the IS Discipline : A Ten-Year Retrospective , 2018 .
[76] Robert W. Zmud,et al. A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems , 2005, MIS Q..
[77] Wei Wang,et al. ScholarWorks @ Georgia State University , 2022 .
[78] Ephraim R. McLean,et al. The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..
[79] Avi Goldfarb,et al. How Is the Mobile Internet Different? Search Costs and Local Activities , 2013, Inf. Syst. Res..
[80] J. J. Po-An Hsieh,et al. Addressing Digital Inequality for the Socioeconomically Disadvantaged Through Government Initiatives: Forms of Capital That Affect ICT Utilization , 2011, Inf. Syst. Res..
[81] H DeloneWilliam,et al. The DeLone and McLean Model of Information Systems Success , 2003 .
[82] Mani Subramani,et al. How Do Suppliers Benefit from Information Technology Use in Supply Chain Relationships? , 2004, MIS Q..
[83] Malcolm Munro,et al. Assessing User Competence: Conceptualization and Measurement , 2000, Inf. Syst. Res..
[84] Sumeet Gupta,et al. Value-based Adoption of Mobile Internet: An empirical investigation , 2007, Decis. Support Syst..
[85] Detmar W. Straub,et al. Reconceptualizing System Usage: An Approach and Empirical Test , 2006, Inf. Syst. Res..
[86] A. Bandura,et al. Self-Efficacy: The Exercise of Control , 1999, Journal of Cognitive Psychotherapy.
[87] Viswanath Venkatesh,et al. Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology , 2012, MIS Q..
[88] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[89] Ephraim R. McLean,et al. Information Systems Success: The Quest for the Dependent Variable , 1992, Inf. Syst. Res..
[90] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[91] Deborah Compeau,et al. Experience effects on the accuracy of self-assessed user competence , 2006, Inf. Manag..