Skip to Main Content
Keywords: Behaviour
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal Articles
Journal Articles
Journal Articles
Information Technology & People (2019) 32 (1): 94–117.
Published: 08 January 2019
...Moutusy Maity; Kallol Bagchi; Arunima Shah; Ankita Misra Purpose The purpose of this paper is to identify a model that provides explanations for normative behavior in information technology (IT) use, and to test the model across two different types of normative behavior (i.e. green information...
Journal Articles
Journal Articles
Journal Articles
Journal Articles
Information Technology & People (2018) 31 (2): 348–367.
Published: 03 April 2018
..., as this is a factor which has been largely ignored in contemporary accounts of compliance behaviour. This study is also original, in that it fills a methodological gap, by balancing the voices of both user representatives and senior organisational stakeholders, in a single study. © Emerald Publishing Limited 2018...
Journal Articles
Journal Articles
Journal Articles
Information Technology & People (2017) 30 (1): 189–209.
Published: 06 March 2017
... know if they are present at all, which amplifies the disinhibition effect (Suler, 2004). Behaviour change Behaviour Virtual community Socio-technical theory Online communication frameworks are showing rapid usage and growth over the last decade; computer bulletin boards, instant...
Journal Articles
Information Technology & People (2017) 30 (1): 210–226.
Published: 06 March 2017
..., users, site designers and academics. Jack is a final year undergraduate student studying away from home. He is a member of various sports clubs and societies and spends a lot of time at their social events, which often include heavy drinking and risqué behavior. He and his friends are avid Facebook...
Journal Articles
Information Technology & People (2016) 29 (4): 876–900.
Published: 07 November 2016
... health actions are greater than the barrier perceptions, then the individual is more likely to adopt the behavior (Kim et al., 2012). This is because they must believe the action to be effective and must associate it with the likelihood of preventing a health outcome. This is necessary...
Journal Articles
Information Technology & People (2016) 29 (4): 774–806.
Published: 07 November 2016
... and calculative commitment, which in turn affect knowledge outcomes, suggesting the important role of the perceived quality in stimulating a member’s post-adoption reactions. Originality/value This study contributes to the research on post-adoption behavior in an e-community context by accounting...
Journal Articles
Information Technology & People (2016) 29 (3): 597–617.
Published: 01 August 2016
... management on social media. © Emerald Group Publishing Limited 2016 Organizational change Behaviour Interpretivist research Small and medium-sized enterprises (SMEs) Recent industry reports suggest that organizations are increasingly sophisticated in their use of social media...
Journal Articles
Information Technology & People (2016) 29 (3): 580–596.
Published: 01 August 2016
... spaces in which C2C communication can actively occur within brand communities, for example, in a discussion forum. Dong-Hee Shin can be contacted at: dshin1030@gmail.com © Emerald Group Publishing Limited 2016 Behaviour Brands Community Online shopping A brand community...
Journal Articles
Information Technology & People (2015) 28 (2): 281–303.
Published: 01 June 2015
...Li-Chun Huang; Wen-Lung Shiau Purpose – The purpose of this paper is to investigate the factors that affect how people maintain their friendships by using information on Plurk. Design/methodology/approach – This study extended the Theory of Planned Behavior model to include both...
Journal Articles
Information Technology & People (2015) 28 (1): 133–162.
Published: 02 March 2015
... linked to the second-order factor. User competence is then significantly related to IS infusion, both explorative use and exploitative use. Research limitations/implications – This study discusses individual usage behavior related to IS infusion usage. The authors conceptualized that exploitative...
Journal Articles
Information Technology & People (2014) 27 (2): 129–154.
Published: 27 May 2014
...Alemayehu Molla; Ahmad Abareshi; Vanessa Cooper Purpose – The purpose of this paper is to analyze the beliefs and attitudinal factors that affect the private sphere pro-environmental behavior of information technology (IT) professionals in using personal computers. Design/methodology/approach...
Journal Articles

or Create an Account

Close Modal
Close Modal