Semantic Filter
show all semantic filters
Found 4 articles
  • Social Influence Effect on Consumers’ Intention to Adopt Mobile Banking Services

    PDF

    2022 | Information Systems Management | Citations: 0

    Authors: Arruda Filho, Emílio José Montero; Nogueira, Aline Cristina Lobo; Costa, Everaldo Marcelo Souza da

    Abstract: This article analyzes how the perception of risk moderates the relationships bet ... Expand

    Semantic filters: Amazon region

    Topics: social influence banking sytem mobile application user experience technology adoption

    Methods: partial least squares regression partial least squares path modeling survey PLS tool structural equation modeling

  • Blockchain in the Green Treasure: Different Investment Objectives

    2019 | Americas Conference on Information Systems | Citations: 0

    Authors: Correa Tavares, Edson; Meirelles, Fernando; Tavares, Eduardo Correa; Cunha, Maria Alexandra; Schunk, Leandro

    Abstract: Blockchain is a recent certification technology with high transformative power ... Expand

    Semantic filters: Amazon region

    Topics: blockchain privacy anonymity marketing management competitive advantage

    Methods: qualitative interview case study triangulation literature study structured literature research

  • Um Mapeamento das Startups de Tecnologia de Belém, Pará, Brazil

    2017 | Americas Conference on Information Systems | Citations: 0

    Authors: Torres, Nágila N J; Lima, Adailton M

    Abstract: There is a growing interest in many cities around the world in incentivizing sta ... Expand

    Semantic filters: Amazon region

    Methods: qualitative interview

  • Conceptions of control and IT artefacts: an institutional account of the Amazon rainforest monitoring system

    PDF

    2009 | Journal of Information Technology | Citations: 7

    Authors: Rajão, Raoni; Hayes, Niall

    Abstract: Based on Fligstein's (1990) work on ‘conceptions of control’ (broad managerial p ... Expand

    Semantic filters: Amazon region

    Topics: information system use organizational change computer hardware armed conflict internet technology

    Methods: design artifact qualitative interview case study longitudinal research

    Theories: institutional theory