{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T10:35:01Z","timestamp":1774262101777,"version":"3.50.1"},"reference-count":94,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T00:00:00Z","timestamp":1326240000000},"content-version":"vor","delay-in-days":375,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2011,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber\u2010infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post\u2010adoption (continued use) research. In addition, we review studies specifically regarding cyber\u2010infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber\u2010infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber\u2010infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.<\/jats:p>","DOI":"10.1002\/meet.2011.14504801197","type":"journal-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T12:23:03Z","timestamp":1326284583000},"page":"1-10","source":"Crossref","is-referenced-by-count":33,"title":["Technology adoption and use theory review for studying scientists' continued use of cyber\u2010infrastructure"],"prefix":"10.1002","volume":"48","author":[{"given":"Youngseek","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Crowston","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2012,1,11]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"Agarwal R.(2000).Framing the Domains of IT Management Research: Glimpsing the Future through the Past. Paper presented at the Pinnaflex."},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1997.tb01322.x"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/17.865899"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148691"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.29.5.530"},{"key":"e_1_2_7_9_1","volume-title":"Social Learning Theory","author":"Bandura A.","year":"1977"},{"key":"e_1_2_7_10_1","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","author":"Bandura A.","year":"1986"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00064-1"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00111-7"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000717"},{"issue":"4","key":"e_1_2_7_15_1","first-page":"69","article-title":"Reconceptualizing Organizational Support and its Effect on Information Technology Usage: Evidence from the Health Care Sector","volume":"48","author":"Bhattacherjee A.","year":"2008","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148634"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.2.115"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000438"},{"key":"e_1_2_7_19_1","unstructured":"Carroll J.(2005 November 29 \u2013 December 2).Technology Portfolios: A Metaphor For Users' Technology Selections While Mobile?Paper presented at the Australasian Conference on Information Systems Sydney Australia."},{"key":"e_1_2_7_20_1","unstructured":"Carroll J.(2008).Theorizing the IT Artifact for Mobility: A Portfolio Not a Singularity. Paper presented at the International Conference on Information Systems Paris France."},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0163"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2004070102"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2001.tb00978.x"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.003"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.118"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0030644"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00101-3"},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1998.tb00879.x"},{"key":"e_1_2_7_33_1","unstructured":"Dutton W. H. &Meyer E. T.(2008 June 18\u201319).e\u2010Social Science as an Experience Technology: Distance From and Attitudes Toward e\u2010Research. Paper presented at the International Conference on e\u2010Social Science Manchester UK."},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/258557"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.43.10.1345"},{"key":"e_1_2_7_36_1","volume-title":"Belief, Attitude, Intention, and Behavior","author":"Fishbein M.","year":"1975"},{"key":"e_1_2_7_37_1","unstructured":"Hanseth O. &Monteiro E.(1998).Changing irreversible networks. Paper presented at the European Conference on Information Systems Granada Spain."},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/016224399602100402"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/08858621011017750"},{"key":"e_1_2_7_40_1","volume-title":"Scientific Collaboration on the Internet","author":"Hey T.","year":"2008"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0088"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9096-1"},{"key":"e_1_2_7_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.03.009"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148830"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000663"},{"key":"e_1_2_7_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001669969"},{"key":"e_1_2_7_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.04.004"},{"key":"e_1_2_7_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20124"},{"key":"e_1_2_7_49_1","doi-asserted-by":"publisher","DOI":"10.2307\/249751"},{"key":"e_1_2_7_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1994.tb01868.x"},{"key":"e_1_2_7_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.11.009"},{"key":"e_1_2_7_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650307"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60567-7"},{"issue":"50","key":"e_1_2_7_54_1","first-page":"752","article-title":"The Technology Acceptance Model: Past, Present, and Future","volume":"12","author":"Lee Y.","year":"2003","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_7_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2006.05.006"},{"key":"e_1_2_7_56_1","unstructured":"Limayem M. Cheung C. M. K. &Chan G. W. W.(2003).Explaining Information Systems Adoption and Post\u2010Adoption: Toward an Integrative Model. Paper presented at the International Conference on Information Systems."},{"key":"e_1_2_7_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148817"},{"key":"e_1_2_7_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20453"},{"key":"e_1_2_7_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2007.900792"},{"key":"e_1_2_7_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2005.07.003"},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.4.377.75"},{"key":"e_1_2_7_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2000.tb00206.x"},{"key":"e_1_2_7_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.839967"},{"key":"e_1_2_7_64_1","volume-title":"Cyberscience: Research in the Age of the Internet","author":"Nentwich M.","year":"2003"},{"key":"e_1_2_7_65_1","doi-asserted-by":"publisher","DOI":"10.2307\/3150499"},{"key":"e_1_2_7_66_1","doi-asserted-by":"publisher","DOI":"10.2307\/249774"},{"key":"e_1_2_7_67_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.1.54"},{"key":"e_1_2_7_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691181003663601"},{"key":"e_1_2_7_69_1","volume-title":"Introduction to social research: Quantitative and qualitative approaches","author":"Punch K. F.","year":"2005"},{"key":"e_1_2_7_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.01.003"},{"key":"e_1_2_7_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.06.001"},{"key":"e_1_2_7_72_1","volume-title":"Diffusion of Innovations","author":"Rogers E. M.","year":"2003"},{"key":"e_1_2_7_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2008.922623"},{"key":"e_1_2_7_74_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.68.1.59.24029"},{"key":"e_1_2_7_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/03079450094298"},{"key":"e_1_2_7_76_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240102"},{"key":"e_1_2_7_77_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.1.111"},{"key":"e_1_2_7_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.013"},{"key":"e_1_2_7_79_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036520"},{"key":"e_1_2_7_80_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0021101"},{"key":"e_1_2_7_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.05.001"},{"key":"e_1_2_7_82_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"e_1_2_7_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250959"},{"key":"e_1_2_7_84_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1996.tb00860.x"},{"key":"e_1_2_7_85_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"e_1_2_7_86_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250981"},{"key":"e_1_2_7_87_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"e_1_2_7_88_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2002.tb01646.x"},{"key":"e_1_2_7_89_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0992(199709\/10)27:5<539::AID-EJSP831>3.0.CO;2-A"},{"key":"e_1_2_7_90_1","doi-asserted-by":"publisher","DOI":"10.5860\/crl.61.5.421"},{"key":"e_1_2_7_91_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0042"},{"key":"e_1_2_7_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.03.003"},{"key":"e_1_2_7_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.07.001"},{"key":"e_1_2_7_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453794.1453801"},{"key":"e_1_2_7_95_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.8346438"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2011.14504801197","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2011.14504801197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T13:53:41Z","timestamp":1760968421000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2011.14504801197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":94,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1002\/meet.2011.14504801197"],"URL":"https:\/\/doi.org\/10.1002\/meet.2011.14504801197","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"value":"0044-7870","type":"print"},{"value":"1550-8390","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}