Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Meta-analysis of the unified theory of acceptance and use of technology (UTAUT): challenging its validity and charting a research agenda in the red ocean
There are both formal and informal cries that UTAUT and, by association, the stream of
research on technology adoption has reached its limit, with little or no opportunities for new …
research on technology adoption has reached its limit, with little or no opportunities for new …
Unified theory of acceptance and use of technology: A synthesis and the road ahead
The unified theory of acceptance and use of technology (UTAUT) is a little over a decade old
and has been used extensively in information systems (IS) and other fields, as the large …
and has been used extensively in information systems (IS) and other fields, as the large …
A systematic review of UTAUT and UTAUT2 as a baseline framework of information system research in adopting new technology: a case study of IPV6 adoption
This paper reviews the most recent literature on UTAUT/UTAUT 2 (Unified Theory of
Acceptance, and Use of Technology) by focusing on the findings and recommended future …
Acceptance, and Use of Technology) by focusing on the findings and recommended future …
Data-driven modeling of technology acceptance: A machine learning perspective
Understanding, explaining, and predicting technology acceptance have dominated the
research of information systems (IS) for more than two decades. Past research has favored …
research of information systems (IS) for more than two decades. Past research has favored …
IT consumerization: BYOD-program acceptance and its impact on employer attractiveness
Many firms are considering 'bring-your-own-device'(BYOD) programs, under which their
employees are allowed to bring their own devices to work and use them for both private and …
employees are allowed to bring their own devices to work and use them for both private and …
Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue
Purpose While the bring-your-own-device (BYOD) trend provides benefits for employees, it
also poses security risks to organizations. This study explores whether and how employees …
also poses security risks to organizations. This study explores whether and how employees …
Understanding the effect of digital literacy on employees' digital workplace continuance intentions and individual performance
E Marsh - … on digital transformation, organizational change, and …, 2021 - igi-global.com
While a growing body of literature suggests that employees' digital skills are important to
enable both individuals and organisations to make the most of the digital workplace …
enable both individuals and organisations to make the most of the digital workplace …
[PDF][PDF] On the Emergence of Shadow IT-a Transaction Cost-Based Approach.
Abstract Information Technology (IT) used for business processes is not only provided by the
organization's IT department. Business departments and users autonomously implement IT …
organization's IT department. Business departments and users autonomously implement IT …
[PDF][PDF] Employees compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory
The trend of bring your own device (BYOD) has been rapidly adopted by organizations.
Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep …
Despite the pros and cons of BYOD adoption, this trend is expected to inevitably keep …
The effect of bring your own device (BYOD) adoption on work performance and motivation
Many organizations are considering Bring Your Own Device (BYOD) programs, in which
employees are permitted to use personal mobile devices for work-related purposes. Based …
employees are permitted to use personal mobile devices for work-related purposes. Based …