We are Social: a Social Influence Perspective to investigate Shadow IT Usage
暂无分享,去创建一个
Andreas Eckhardt | Antonio Carlos Gastaud Maçada | Gabriela Labres Mallmann | Andreas Eckhardt | G. Mallmann | A. C. Maçada
[1] Ephraim R. McLean,et al. The DeLone and McLean Model of Information Systems Success: A Ten-Year Update , 2003, J. Manag. Inf. Syst..
[2] Andrea Back,et al. Shadow it – A View from Behind the Curtain , 2014, Comput. Secur..
[3] Gurpreet Dhillon,et al. A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..
[4] Carsten Felden,et al. Integration of Shadow IT Systems with Enterprise Systems - A Literature Review , 2017, PACIS.
[5] Peter H. Gray,et al. Social Influence and Knowledge Management Systems Use: Evidence from Panel Data , 2013, MIS Q..
[6] Chin-Lung Hsu,et al. Why do people play on-line games? An extended TAM with social influences and flow experience , 2004, Inf. Manag..
[7] Christopher Rentrop,et al. On the Emergence of Shadow IT - a Transaction Cost-Based Approach , 2014, ECIS.
[8] Geoffrey S. Hubona,et al. Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..
[9] Andreas Eckhardt,et al. Normalizing the Shadows - The Role of Symbolic Models for Individuals' Shadow IT Usage , 2014, ICIS.
[10] Andreas Eckhardt,et al. Are Shadow System Users the Better IS Users? - Insights of a Lab Experiment , 2015, ICIS.
[11] Marko Sarstedt,et al. Multigroup Analysis in Partial Least Squares (PLS) Path Modeling: Alternative Methods and Empirical Results , 2011 .
[12] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[13] Victor R. Prybutok,et al. Investigating factors affecting social presence and user satisfaction with Mobile Instant Messaging , 2014, Comput. Hum. Behav..
[14] Dennis F. Galletta,et al. A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior , 2005, J. Manag. Inf. Syst..
[15] Martin H. Levinson. Alone Together: Why We Expect More from Technology and Less from Each Other , 2011 .
[16] Andreas Eckhardt,et al. Shadow IT , 2017, Bus. Inf. Syst. Eng..
[17] Zoonky Lee,et al. Social influence on technology acceptance behavior: self-identity theory perspective , 2006, DATB.
[18] A. Turner. Generation Z: Technology and Social Interest , 2015 .
[19] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[20] Marie-Claude Boudreau,et al. IT-driven identity work: Creating a group identity in a digital environment , 2014, Inf. Organ..
[21] Christopher Rentrop,et al. Shadow IT - Management and Control of Unofficial IT , 2012, ICDS 2012.
[22] Blake Ives,et al. IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.
[23] Jan Marco Leimeister,et al. Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT , 2012, Bus. Inf. Syst. Eng..
[24] Jung P. Shim,et al. Current Status, Issues, and Future of Bring Your Own Device (BYOD) , 2014, Commun. Assoc. Inf. Syst..
[25] Matthew D. Lieberman,et al. Social: Why Our Brains Are Wired to Connect , 2013 .
[26] Andrea Back,et al. A new perspective on neutralization and deterrence: Predicting shadow IT usage , 2017, Inf. Manag..
[27] Varun Grover,et al. Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications , 2015, MIS Q..
[28] Steffi Haag,et al. Appearance of Dark Clouds? - An Empirical Analysis of Users' Shadow Sourcing of Cloud Services , 2015, Wirtschaftsinformatik.
[29] Daniel Fürstenau,et al. Shadow IT Systems: Discerning the Good and the evil , 2014, ECIS.
[30] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[31] Steven L. Alter,et al. USF Scholarship: a digital repository @ Gleeson Library | Geschke Center , 2016 .
[32] Frank Teuteberg,et al. Missing cloud security awareness: investigating risk exposure in shadow IT , 2017, J. Enterp. Inf. Manag..
[33] P. Burke,et al. The Past, Present, and Future of an Identity Theory* , 2000 .
[34] Ping Wang,et al. Chasing the Hottest IT: Effects of Information Technology Fashion on Organizations , 2010, MIS Q..
[35] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[36] Walter Brenner,et al. European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .
[37] Weina Qu,et al. The effects of the self and social identity on the intention to microblog: An extension of the theory of planned behavior , 2016, Comput. Hum. Behav..
[38] Carsten Felden,et al. Managing Shadow IT Instances - A Method to Control Autonomous IT Solutions in the Business Departments , 2014, AMCIS.
[39] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[40] P. Burke,et al. Identity theory and social identity theory , 2000 .
[41] Chia-Ying Li,et al. Persuasive messages on information system acceptance: A theoretical extension of elaboration likelihood model and social influence theory , 2013, Comput. Hum. Behav..
[42] Marko Sarstedt,et al. PLS-SEM: Indeed a Silver Bullet , 2011 .
[43] Sven Laumer,et al. Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users , 2017, Eur. J. Inf. Syst..
[44] Sven Laumer,et al. Social Influence in Technology Adoption Research – A Scientometric Study over two DecadesBehavior , 2010 .
[45] H. Kelman. Compliance, identification, and internalization three processes of attitude change , 1958 .
[46] Viswanath Venkatesh,et al. Why Don't Men Ever Stop to Ask for Directions? Gender, Social Influence, and Their Role in Technology Acceptance and Usage Behavior , 2000, MIS Q..
[47] Daniel Fürstenau,et al. Shadow Systems, Risk, and Shifting Power Relations in Organizations , 2017, Commun. Assoc. Inf. Syst..
[48] Sven Laumer,et al. Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption , 2009, J. Inf. Technol..
[49] Heshan Sun,et al. A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology , 2013, MIS Q..
[50] K. Jamieson,et al. The Rise and Fall of a Shadow System: Lessons for Enterprise System Implementation , 2004 .
[51] Carsten Felden,et al. A Multiple Case Study on the Nature and Management of Shadow Information Technology , 2017, J. Inf. Syst..