Unified theory of acceptance and use of technology: A synthesis and the road ahead

V Venkatesh, JYL Thong, X Xu - Journal of the association for …, 2016 - papers.ssrn.com
The unified theory of acceptance and use of technology (UTAUT) is a little over a decade old
and has been used extensively in information systems (IS) and other fields, as the large …

A systematic review of UTAUT and UTAUT2 as a baseline framework of information system research in adopting new technology: a case study of IPV6 adoption

I Alghatrifi, H Khalid - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
This paper reviews the most recent literature on UTAUT/UTAUT 2 (Unified Theory of
Acceptance, and Use of Technology) by focusing on the findings and recommended future …

Data-driven modeling of technology acceptance: A machine learning perspective

ASA Alwabel, XJ Zeng - Expert Systems with Applications, 2021 - Elsevier
Understanding, explaining, and predicting technology acceptance have dominated the
research of information systems (IS) for more than two decades. Past research has favored …

IT consumerization: BYOD-program acceptance and its impact on employer attractiveness

A Weeger, X Wang, H Gewald - Journal of Computer Information …, 2016 - Taylor & Francis
Many firms are considering 'bring-your-own-device'(BYOD) programs, under which their
employees are allowed to bring their own devices to work and use them for both private and …

Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue

H Chen, Y Li, L Chen, J Yin - Journal of Enterprise Information …, 2021 - emerald.com
Purpose While the bring-your-own-device (BYOD) trend provides benefits for employees, it
also poses security risks to organizations. This study explores whether and how employees …

Understanding the effect of digital literacy on employees' digital workplace continuance intentions and individual performance

E Marsh - … on digital transformation, organizational change, and …, 2021 - igi-global.com
While a growing body of literature suggests that employees' digital skills are important to
enable both individuals and organisations to make the most of the digital workplace …

[PDF][PDF] On the Emergence of Shadow IT-a Transaction Cost-Based Approach.

S Zimmermann, C Rentrop - ECIS, 2014 - academia.edu
Abstract Information Technology (IT) used for business processes is not only provided by the
organization's IT department. Business departments and users autonomously implement IT …

[PDF][PDF] Employees compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory

FF Putri, A Hovav - 2014 - scholar.archive.org
The trend of bring your own device (BYOD) has been rapidly adopted by organizations.
Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep …

The effect of bring your own device (BYOD) adoption on work performance and motivation

MS Doargajudhur, P Dell - Journal of Computer Information …, 2020 - Taylor & Francis
Many organizations are considering Bring Your Own Device (BYOD) programs, in which
employees are permitted to use personal mobile devices for work-related purposes. Based …