2013
DOI: 10.25300/misq/2013/37.1.10
|View full text |Cite
|
Sign up to set email alerts
|

The Embeddedness of Information Systems Habits in Organizational and Individual Level Routines: Development and Disruption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
90
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(92 citation statements)
references
References 80 publications
2
90
0
Order By: Relevance
“…During the past 20 years, the IS community has put considerable attention on the ICT acceptance theories including the social cognitive theory (Compeau, Higgins, & Huff, 1999;Polites & Karahanna, 2013), technology acceptance model (Davis, 1989), theory of reasoned actions/planned behavior (Nasri & Charfeddine, 2012;Szajna, 1996), Triandis Model (Thompson, Higgins, & Howell, 1991), unified theory of acceptance and use of technology (Martins, Oliveiraa, & Popovic, 2014;Venkatesh, Morris, Davis, & Davis, 2003). These models have been applied to different technologies (e.g., word processors, e-mail, World Wide Web, group support systems, hospital information systems) under different situations (e.g., time and culture) with different control factors (e.g., gender, organizational type and size) and with different subjects (e.g., undergraduate students, MBA recipients, and knowledge workers), proving their robustness through several tests and replications.…”
Section: Ict Acceptance Theoriesmentioning
confidence: 99%
“…During the past 20 years, the IS community has put considerable attention on the ICT acceptance theories including the social cognitive theory (Compeau, Higgins, & Huff, 1999;Polites & Karahanna, 2013), technology acceptance model (Davis, 1989), theory of reasoned actions/planned behavior (Nasri & Charfeddine, 2012;Szajna, 1996), Triandis Model (Thompson, Higgins, & Howell, 1991), unified theory of acceptance and use of technology (Martins, Oliveiraa, & Popovic, 2014;Venkatesh, Morris, Davis, & Davis, 2003). These models have been applied to different technologies (e.g., word processors, e-mail, World Wide Web, group support systems, hospital information systems) under different situations (e.g., time and culture) with different control factors (e.g., gender, organizational type and size) and with different subjects (e.g., undergraduate students, MBA recipients, and knowledge workers), proving their robustness through several tests and replications.…”
Section: Ict Acceptance Theoriesmentioning
confidence: 99%
“…This mental effort occurs mainly in short-term working memory [50]. Additionally, IS literature shows that IT usage is over time a function of habit rather than of conscious intentions [50,[54][55][56][57]. Habits activate technology use without any conscious effort, because information is stored in implicit long-term memory [50].…”
Section: Discussion Implication and Future Researchmentioning
confidence: 99%
“…The choice to send an email likely triggers an emotional reaction in the sender, but also the message recipient as he or she composes a response. Flaming in email (Polites & Karahanna, 2013) may not only be caused by poor message content, but also by the emotions that composing email induces which may spill over into the message content.…”
Section: Implications For Practicementioning
confidence: 99%
“…Whether due to limitations of the technology (e.g., the inability to convey vocal tone) or cultural norms, some media are considered less appropriate for some types of communication (Kock, 2004;Sussman & Sproull, 1999). For example, email and text chat are considered poor for communicating emotion (Byron, 2008;Hancock, Landrigan, & Silver, 2007) because they may increase interpersonal conflict (Polites & Karahanna, 2013), yet other research shows they are suitable for building interpersonal relationships (Walther, 1996).…”
Section: Introductionmentioning
confidence: 97%