{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:42:25Z","timestamp":1761007345042,"version":"build-2065373602"},"reference-count":18,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2007,10,10]],"date-time":"2007-10-10T00:00:00Z","timestamp":1191974400000},"content-version":"vor","delay-in-days":647,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2006,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Humans increasingly interact with information technology (IT) in order to attain both individual and organizational goals. As a result, studies applying motivational theories to the IT field gain importance in the research literature. Emerging from several different scholarly disciplines, motivational theories seek to explain why individuals do what they do (Reeve, ). This paper surveys applications of motivational theories to the IT field using citation analysis of each theory's seminal work. First, the authors identify three approaches that have been used by researchers applying motivational theories to the IT field. Second, the authors examine these applications using an IT lifecycle framework. Last, the authors propose possible directions for future research in this area.<\/jats:p>","DOI":"10.1002\/meet.14504301266","type":"journal-article","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T15:30:25Z","timestamp":1194276625000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Examining applications of motivational theories to the IT field"],"prefix":"10.1002","volume":"43","author":[{"given":"Katie","family":"Parker","sequence":"first","affiliation":[]},{"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,10,10]]},"reference":[{"key":"e_1_2_4_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(99)00038-2"},{"volume-title":"Flow: The psychology of optimal experience","year":"1990","author":"Csikszentmihalyi M.","key":"e_1_2_4_3_1"},{"key":"e_1_2_4_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642652"},{"key":"e_1_2_4_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/01463379809370100"},{"issue":"1","key":"e_1_2_4_6_1","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1207\/153276603768344870","article-title":"Consumer acceptance of online agent advice: Extremity and positivity effects","volume":"13","author":"Gershoff A. D.","year":"2003","journal-title":"Journal of Consumer Psychology"},{"key":"e_1_2_4_7_1","unstructured":"Google(2006)Google scholarRetrieved June 22 2006 from the Google Scholar Web sitehttp:\/\/scholar.google.com\/"},{"key":"e_1_2_4_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/enrs.1998.3940"},{"key":"e_1_2_4_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0048-7333(03)00047-7"},{"volume-title":"The Motivation to Work","year":"1959","author":"Herzberg F.","key":"e_1_2_4_10_1"},{"key":"e_1_2_4_11_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.52.12.1280"},{"key":"e_1_2_4_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1069072703257738"},{"key":"e_1_2_4_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2002.tb00805.x"},{"key":"e_1_2_4_14_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327663JCP13-1&2_01"},{"volume-title":"Understanding Motivation and Emotion","year":"2005","author":"Reeve J.","key":"e_1_2_4_15_1"},{"key":"e_1_2_4_16_1","doi-asserted-by":"crossref","unstructured":"Rotter J. B.(1966) Generalized expectancies for internal versus external control of reinforcementPsychological Monographs80(1) 1\u201328","DOI":"10.1037\/h0092976"},{"key":"e_1_2_4_17_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v1i2.3351"},{"volume-title":"Work and motivation","year":"1964","author":"Vroom V.","key":"e_1_2_4_18_1"},{"key":"e_1_2_4_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1039>3.0.CO;2-O"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504301266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504301266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T12:43:29Z","timestamp":1760964209000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504301266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["10.1002\/meet.14504301266"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504301266","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2006,1]]}}}