Information Technology & People: Volume 35 Issue 1

Subjects:

Table of contents

Digital access through smartphones and well-being of BoP women: insights from a field study in India

Rishikesan Parthiban, Saravana Jaikumar, Jayanta Basak, Somprakash Bandyopadhyay

The authors study the effect of access to smartphones on the socio-economic well-being in the case of rural base of the pyramid (BoP) women. While smartphone access may have its…

Investigating predictors of online vigilance among university students

Daniel B. Le Roux, Douglas A. Parry

Online vigilance is a novel construct which describes individual differences in users' cognitive orientation to online connectedness, their attention to and integration of…

Understanding determinants of social networking service fatigue: an interpretive structural modeling approach

Lin Xiao, Ting Pan, Jian Mou, Lihua Huang

The purpose of this paper is to build a comprehensive structural model to demonstrate the interrelationships of factors influencing social networking service (SNS) fatigue and to…

946

Exhaustion and dependency: a habituation–sensitization perspective on the duality of habit in social media use

Amr Soror, Zachary R. Steelman, Ofir Turel

The current work builds on the dual process theory of habituation and sensitization to empirically investigate theory-based mechanisms through which social media use habit…

1535

Anxiety buffers and the threat of extreme automation: a terror management theory perspective

Frank Goethals, Jennifer L. Ziegelmayer

The advent of extreme automation from new technologies such as artificial intelligence portends a massive increase in unemployment. The psychological impact of this threat on the…

Technostress and its influence on employee information security policy compliance

Forough Nasirpouri Shadbad, David Biros

This study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to…

1247

Tablets for problem-solving through a flow theory: the impact of navigation and visual appearance on perceived performance and efficiency

Dezhi Wu, Jingjun (David) Xu, Sue Abdinnour

The paper aims to investigate how a tablet's design features, namely, its navigation design and visual appearance, influence users' enjoyment, concentration and control, when…

The role of intrinsic and extrinsic motivations in sharing economy post-adoption

Tiago Oliveira, Iolanda Barbeitos, Antonela Calado

The purpose of this paper is to examine use and sharing economy (SE) continuance intention, and the mediation effects of use between individuals' motivations and SE continuance…

1667

The impact of information technology culture and personal innovativeness in information technology on digital entrepreneurship success

Mumin Abubakre, Yiwei Zhou, Zhongyun Zhou

Very little or no study has explored the predictors of behaviour and traits that determine digital entrepreneurship (DE) success. In response, the purpose of this paper is to…

2120

Dynamics of convergence behaviour in social media crisis communication – a complexity perspective

Milad Mirbabaie, Stefan Stieglitz, Felix Brünker

The purpose of this study is to investigate communication on Twitter during two unpredicted crises (the Manchester bombings and the Munich shooting) and one natural disaster…

1041

Trust and elderly users' continuance intention regarding mobile health services: the contingent role of health and technology anxieties

Fanbo Meng, Xitong Guo, Zeyu Peng, Qiang Ye, Kee-Hung Lai

Mobile health (mHealth) services are considered an important means of relieving the problems of the aging population. The efficiency of mHealth services can be enhanced by…

2367

Gamified money: exploring the effectiveness of gamification in mobile payment adoption among the silver generation in China

Donna Wong, Hongfei Liu, Yue Meng-Lewis, Yan Sun, Yun Zhang

This study investigates the use of gamification in promoting the silver generation's adoption of mobile payment technology through the gamified cultural practice of gifting red…

3204

Avoidance behaviour towards using pirated software: testing a seven-component model on SME employees

Muhammad Sabbir Rahman, Md Afnan Hossain, Fadi Abdel Muniem Abdel Fattah, Abdel Mubdiu Ibne Mokter

This research aims to develop and test a conceptual model for shaping small and medium enterprise (SME) employees' avoidance behaviour towards using pirated software. The model…

Social media use by first-generation college students and two forms of social capital: a revealed causal mapping approach

Xuefei (Nancy) Deng, Yesenia Fernández, Meng Zhao

The purpose of this study is to examine social media use and its impacts on first generation students by answering the two questions: how do FGS use social media on college…

Enhancing supply chain sensing capability through social media: an environmental scanning perspective

Jiahe Song, Kang-Bok Lee, Zhongyun Zhou, Lin Jia, Casey Cegielski, Soo Il Shin

The purpose of this study is to investigate the relationship between social media and sensing capability for supply chain management (SCM) from an environmental scanning…

WeChat relationships maintenance behavior and social entrepreneurial intention under conditions of dual narcissism: the mediating role of social capital

Wenqing Wu, Yuzheng Su, Chia-Huei Wu, Sang-Bing Tsai, Yu-Hsi Yuan

As social networking sites (SNSs) gain popularity, they are being widely used by entrepreneurs to obtain social capital to carry out business ventures. However not all SNS usage…

Team social media usage and intra-team competition and cooperation: a social information processing perspective

Shuqin Zhang, Qian Huang, Hefu Liu, Youying Wang

This study aims to explore how team task-related social media usage (TSMU) and social-related social media usage (SSMU) affect employees' perceptions of intra-team cooperation and…

1093

Understanding employees' information security identities: an interpretive narrative approach

Jeffrey D. Wall, Prashant Palvia

The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors…

Cover of Information Technology & People

ISSN:

0959-3845

Online date, start – end:

1992

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editors:

  • Prof Edgar Whitley
  • Prof Kevin Crowston
  • Prof Yulin Fang
  • Prof Jyoti Choudrie