Semantic Filter
show all semantic filters
Found 290 articles
  • A Task-Technology-Identity Fit Model of Smartwatch Utilisation and User Satisfaction: A Hybrid SEM-Neural Network Approach

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: El-Masri, Mazen; Al-Yafi, Karim; Kamal, Muhammad Mustafa

    Abstract: Smartwatches are wearable devices intended to be smartphone companions that capt ... Expand

    Semantic filters: scale reliability

    Topics: smart watch mobile system user satisfaction personality smart wearable device

    Methods: structural equation modeling data transformation survey factor analysis principal component analysis

    Theories: theory of task technology fit unified theory of acceptance and use of technology technology acceptance model

  • What do growing early-stage digital start-ups look like? A mixed-methods approach

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Griva, Anastasia; Kotsopoulos, Dimosthenis; Karagiannaki, Angeliki; Zamani, Efpraxia D.

    Abstract: Digital entrepreneurship is one of the most important and impactful forms of ent ... Expand

    Semantic filters: scale reliability

    Topics: digital entrepreneurship human resource management entrepreneurship innovation management absorptive capacity

    Methods: survey delphi study mixed method qualitative interview case study

    Theories: dynamic capabilities theory

  • An Integration of Cognitive Absorption and Interruption Overload Through the Lens of Neurodiversity: Some Preliminary Results

    2023 | HICSS | Citations: 0

    Authors: Jia, Ronnie; Steelman, Zach; Jia, Heather

    Abstract: One prominent stream of IS research focuses on cognitive absorption during techn ... Expand

    Semantic filters: scale reliability

    Topics: cognitive absorption knowledge work crowdsourcing data quality pandemic

    Methods: survey statistical hypothesis test descriptive statistic scale reliability experiment

  • When do details matter? News source evaluation summaries and details against misinformation on social media

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Kim, Antino; Moravec, Patricia L.; Dennis, Alan R.

    Abstract: News source evaluations based on fact-checking can help curb the consumption and ... Expand

    Semantic filters: scale reliability

    Topics: social media Facebook fake news user interface usability

    Methods: experiment theory development descriptive statistic linear regression analysis survey

  • Deepfake Valence: A Double-edged Sword

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Liang, Huigang; Chew, Shao

    Abstract: Deepfakes have garnered widespread attention for their malicious use. Despite i ... Expand

    Semantic filters: scale reliability

    Topics: deepfake social norm technology adoption computer crime

    Methods: SEM tool survey statistical hypothesis test scale reliability field study

    Theories: rational choice theory big five model

  • “My Precious!”: A Values-Affordances Perspective on the Adoption of Bitcoin

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Lichti, Constantin; Tumasjan, Andranik

    Abstract: Given the growing pervasiveness of information systems (IS) in everyday life, r ... Expand

    Semantic filters: scale reliability

    Topics: Bitcoin affordance blockchain information system use user experience

    Methods: theory development survey design artifact data transformation post-hoc analysis

    Theories: theory of affordance sociomaterialism theory socio technical theory

  • Beyond effective use: Integrating wise reasoning in machine learning development

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Namvar, Morteza; Intezari, Ali; Akhlaghpour, Saeed; Brienza, Justin P.

    Abstract: The introduction of machine learning (ML), as the engine of many artificial inte ... Expand

    Semantic filters: scale reliability

    Topics: decision making human in the loop human computer interaction mobile system internet of things

    Methods: conceptual modelling qualitative interview survey partial least squares path modeling descriptive statistic

    Theories: big five model theory of effective use

  • Effects of gender congruity in human-robot service interactions: The moderating role of masculinity

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Pitardi, Valentina; Bartikowski, Boris; Osburg, Victoria-Sophie; Yoganathan, Vignesh

    Abstract: Despite humanoid service robots having attracted considerable research attention ... Expand

    Semantic filters: scale reliability

    Topics: robotic consumer behavior social norm human computer interaction artificial intelligence

    Methods: experiment survey ANOVA parametric test statistical hypothesis test

    Theories: social identity theory

  • Email Overload: Investigating Technology-fit Antecedents and Job-related Outcome

    PDF

    2023 | ACM SIGMIS Database | Citations: 0

    Authors: Tarafdar, Monideepa; Wenninger, Helena; Stich, Jean-François

    Abstract: Email is the communication application most widely used in organizations. Yet, e ... Expand

    Semantic filters: scale reliability

    Topics: electronic mail communication service infrastructure productivity job satisfaction human resource management

    Methods: survey qualitative interview mixed method statistical hypothesis test theory development

    Theories: theory of task technology fit

  • Security is Local: The Influence of the Immediate Workgroup on Information Security

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Wang, Dawei; Durcikova, Alexandra; Dennis, Alan

    Abstract: Information security is a multilevel phenomenon with employee security decision ... Expand

    Semantic filters: scale reliability

    Topics: data security IT security threat IT security password self efficacy

    Methods: survey theory development descriptive statistic data transformation factor analysis

    Theories: big five model social learning theory leader–member exchange theory