{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:21:18Z","timestamp":1743103278825,"version":"3.40.3"},"publisher-location":"Cham","reference-count":77,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030308735"},{"type":"electronic","value":"9783030308742"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30874-2_26","type":"book-chapter","created":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T12:17:36Z","timestamp":1568981856000},"page":"323-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Motivations and Inhibitions Behind the Adoption and Continuous Use of IoT Wearable Devices: Exploring and Comparing Three Major Frameworks"],"prefix":"10.1007","author":[{"given":"Mourad","family":"Touzani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmed Anis","family":"Charfi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,9,21]]},"reference":[{"issue":"2","key":"26_CR1","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.ijinfomgt.2012.10.001","volume":"33","author":"N Adhiarna","year":"2013","unstructured":"Adhiarna, N., Hwang, Y.M., Park, M.J., Rho, J.J.: An integrated framework for RFID adoption and diffusion with a stage-scale-scope cubicle model: a case of indonesia. Int. J. Inf. Manag. 33(2), 378\u2013389 (2013)","journal-title":"Int. J. Inf. Manag."},{"issue":"2","key":"26_CR2","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1287\/isre.9.2.204","volume":"9","author":"R Agarwal","year":"1998","unstructured":"Agarwal, R., Prasad, J.: A conceptual and operational definition of personal innovativeness in the domain of information technology. Inf. Syst. Res. 9(2), 204\u2013215 (1998)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"26_CR3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50(2), 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"doi-asserted-by":"crossref","unstructured":"Arpaci, I.: A theoretical framework for IT consumerization: factors influencing the adoption of BYOD. In: Handbook of Research on Technology Integration in the Global World, pp. 114\u2013129. IGI Global (2019)","key":"26_CR4","DOI":"10.4018\/978-1-5225-6367-9.ch006"},{"key":"26_CR5","doi-asserted-by":"crossref","first-page":"178","DOI":"10.2307\/2786945","volume":"55","author":"RP Bagozzi","year":"1992","unstructured":"Bagozzi, R.P.: The self-regulation of attitudes, intentions, and behavior. Soc. Psychol. Q. 55, 178\u2013204 (1992)","journal-title":"Soc. Psychol. Q."},{"issue":"3","key":"26_CR6","doi-asserted-by":"crossref","first-page":"351","DOI":"10.2307\/3250921","volume":"25","author":"A Bhattacherjee","year":"2001","unstructured":"Bhattacherjee, A.: Understanding information systems continuance: an expectation-confirmation model. MIS Q. 25(3), 351\u2013370 (2001)","journal-title":"MIS Q."},{"issue":"4","key":"26_CR7","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1108\/QMR-06-2016-0053","volume":"19","author":"CR Boddy","year":"2016","unstructured":"Boddy, C.R.: Sample size for qualitative research. Qual. Mark. Res.: Int. J. 19(4), 426\u2013432 (2016)","journal-title":"Qual. Mark. Res.: Int. J."},{"issue":"1","key":"26_CR8","first-page":"62","volume":"5","author":"M Brown","year":"2004","unstructured":"Brown, M., Muchira, R.: Investigating the relationship between internet privacy concerns and online purchase behavior. J. Electron. Commer. Res. 5(1), 62\u201370 (2004)","journal-title":"J. Electron. Commer. Res."},{"key":"26_CR9","doi-asserted-by":"crossref","DOI":"10.4324\/9780203359648","volume-title":"Research Methods and Organization Studies","author":"A Bryman","year":"2003","unstructured":"Bryman, A.: Research Methods and Organization Studies. Routledge, Abingdon (2003)"},{"issue":"3","key":"26_CR10","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.im.2016.09.002","volume":"54","author":"K Carillo","year":"2017","unstructured":"Carillo, K., Scornavacca, E., Za, S.: The role of media dependency in predicting continuance intention to use ubiquitous media systems. Inf. Manag. 54(3), 317\u2013335 (2017)","journal-title":"Inf. Manag."},{"doi-asserted-by":"crossref","unstructured":"Cecchinato, M.E., Cox, A.L., Bird, J.: Smartwatches: the good, the bad and the ugly?. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, April, pp. 2133\u20132138 (2015)","key":"26_CR11","DOI":"10.1145\/2702613.2732837"},{"issue":"4","key":"26_CR12","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1111\/j.1540-5915.2001.tb00978.x","volume":"32","author":"PY Chau","year":"2001","unstructured":"Chau, P.Y., Hu, P.J.H.: Information technology acceptance by individual professionals: a model comparison approach. Decis. Sci. 32(4), 699\u2013719 (2001)","journal-title":"Decis. Sci."},{"key":"26_CR13","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1016\/j.chb.2016.06.007","volume":"63","author":"J Choi","year":"2016","unstructured":"Choi, J., Kim, S.: Is the smartwatch an IT product or a fashion product? A study on factors affecting the intention to use smartwatches. Comput. Hum. Behav. 63, 777\u2013786 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"26_CR14","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","volume":"19","author":"DR Compeau","year":"1995","unstructured":"Compeau, D.R., Higgins, C.A.: Computer self-efficacy: development of a measure and initial test. MIS Q. 19(2), 189\u2013211 (1995)","journal-title":"MIS Q."},{"issue":"3","key":"26_CR15","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"14","key":"26_CR16","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","volume":"22","author":"FD Davis","year":"1992","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: Extrinsic and intrinsic motivation to use computers in the workplace. J. Appl. Soc. Psychol. 22(14), 1111\u20131132 (1992)","journal-title":"J. Appl. Soc. Psychol."},{"key":"26_CR17","first-page":"1","volume-title":"Introduction: the Discipline and Practice of Qualitative Research the Sage Handbook of Qualitative Research","author":"NK Denzin","year":"2005","unstructured":"Denzin, N.K., Lincoln, Y.S.: Introduction: the Discipline and Practice of Qualitative Research the Sage Handbook of Qualitative Research, 3rd edn, pp. 1\u201332. Sage Publications Ltd, Thousand Oaks (2005)","edition":"3"},{"issue":"1","key":"26_CR18","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1108\/ITP-11-2015-0272","volume":"30","author":"X Dong","year":"2017","unstructured":"Dong, X., Chang, Y., Wang, Y., Yan, J.: Understanding usage of internet of Things (IOT) systems in China: cognitive experience and affect experience as moderator. Inf. Technol. People 30(1), 117\u2013138 (2017)","journal-title":"Inf. Technol. People"},{"issue":"8","key":"26_CR19","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1016\/j.jbusres.2006.02.006","volume":"59","author":"MA Eastlick","year":"2006","unstructured":"Eastlick, M.A., Lotz, S.L., Warrington, P.: Understanding online B-to-C relationships: an integrated model of privacy concerns, trust, and commitment. J. Bus. Res. 59(8), 877\u2013886 (2006)","journal-title":"J. Bus. Res."},{"issue":"1","key":"26_CR20","doi-asserted-by":"crossref","first-page":"25","DOI":"10.5465\/amj.2007.24160888","volume":"50","author":"KM Eisenhardt","year":"2007","unstructured":"Eisenhardt, K.M., Graebner, M.E.: Theory building from cases: opportunities and challenges. Acad. Manag. J. 50(1), 25\u201332 (2007)","journal-title":"Acad. Manag. J."},{"unstructured":"Fishbein, M., Ajzen, I.: Belief, Attitude, Intention, and Behaviour: An Introduction to Theory and Research (1975)","key":"26_CR21"},{"issue":"2","key":"26_CR22","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1108\/APJML-06-2013-0061","volume":"26","author":"L Gao","year":"2014","unstructured":"Gao, L., Bai, X.: A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pac. J. Mark. Logist. 26(2), 211\u2013231 (2014)","journal-title":"Asia Pac. J. Mark. Logist."},{"issue":"11","key":"26_CR23","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1002\/mar.10045","volume":"19","author":"L Gentry","year":"2002","unstructured":"Gentry, L., Calantone, R.: A comparison of three models to explain shop-bot use on the web. Psychol. Mark. 19(11), 945\u2013956 (2002)","journal-title":"Psychol. Mark."},{"key":"26_CR24","doi-asserted-by":"crossref","DOI":"10.4324\/9780203793206","volume-title":"Discovery of Grounded Theory: Strategies for Qualitative Research","author":"BG Glaser","year":"2017","unstructured":"Glaser, B.G., Strauss, A.L.: Discovery of Grounded Theory: Strategies for Qualitative Research. Routledge, Abingdon (2017)"},{"issue":"1","key":"26_CR25","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1177\/1525822X05279903","volume":"18","author":"G Guest","year":"2006","unstructured":"Guest, G., Bunce, A., Johnson, L.: How many interviews are enough? An experiment with data saturation and variability. Field Methods 18(1), 59\u201382 (2006)","journal-title":"Field Methods"},{"key":"26_CR26","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ijpe.2014.09.005","volume":"159","author":"I Harris","year":"2015","unstructured":"Harris, I., Wang, Y., Wang, H.: ICT in multimodal transport and technological trends: Unleashing potential for the future. Int. J. Prod. Econ. 159, 88\u2013103 (2015)","journal-title":"Int. J. Prod. Econ."},{"issue":"2","key":"26_CR27","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1287\/isre.8.2.171","volume":"8","author":"DA Harrison","year":"1997","unstructured":"Harrison, D.A., Mykytyn Jr., P.P., Riemenschneider, C.K.: Executive decisions about adoption of information technology in small business: theory and empirical tests. Inf. Syst. Res. 8(2), 171\u2013195 (1997)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"26_CR28","first-page":"1","volume":"13","author":"S Huh","year":"2008","unstructured":"Huh, S., Bowman, N.D.: Perception and addiction of online games as a function of personality traits. J. Media Psychol. 13(2), 1\u201331 (2008)","journal-title":"J. Media Psychol."},{"issue":"4","key":"26_CR29","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1177\/0266666915578201","volume":"32","author":"YM Hwang","year":"2016","unstructured":"Hwang, Y.M., Kim, M.G., Rho, J.J.: Understanding internet of things (IoT) diffusion: focusing on value configuration of rfid and sensors in business cases (2008\u20132012). Inf. Dev. 32(4), 969\u2013985 (2016)","journal-title":"Inf. Dev."},{"issue":"2","key":"26_CR30","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/249751","volume":"23","author":"E Karahanna","year":"1999","unstructured":"Karahanna, E., Straub, D.W., Chervany, N.L.: Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Q. 23(2), 183\u2013213 (1999)","journal-title":"MIS Q."},{"issue":"1","key":"26_CR31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/19761597.2017.1302549","volume":"25","author":"JH Kim","year":"2017","unstructured":"Kim, J.H., Yoo, M., Lee, K.N., Seo, H.: The innovation of the internet: a semantic network analysis of the internet of things. Asian J. Technol. Innov. 25(1), 129\u2013139 (2017)","journal-title":"Asian J. Technol. Innov."},{"issue":"1","key":"26_CR32","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1177\/0002764215601713","volume":"60","author":"YC Kim","year":"2016","unstructured":"Kim, Y.C., Shin, E.K.: Localized use of information and communication technologies in Seoul\u2019s urban neighborhoods. Am. Behav. Sci. 60(1), 81\u2013100 (2016)","journal-title":"Am. Behav. Sci."},{"issue":"1","key":"26_CR33","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ijinfomgt.2014.10.001","volume":"35","author":"C Koo","year":"2015","unstructured":"Koo, C., Chung, N., Nam, K.: Assessing the impact of intrinsic and extrinsic motivators on smart green IT device use: reference group perspectives. Int. J. Inf. Manag. 35(1), 64\u201379 (2015)","journal-title":"Int. J. Inf. Manag."},{"doi-asserted-by":"crossref","unstructured":"Li, L., Rong, M., Zhang, G.: An internet of things QoE evaluation method based on multiple linear regression analysis. In: 10th International Conference on Computer Science & Education (ICCSE) July, pp. 925\u2013928. IEEE (2015)","key":"26_CR34","DOI":"10.1109\/ICCSE.2015.7250382"},{"issue":"4","key":"26_CR35","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"M Limayem","year":"2007","unstructured":"Limayem, M., Hirt, S.G., Cheung, C.M.K.: How habit limits the predictive power of intention: the case of information systems continuance. MIS Q. 31(4), 705\u2013737 (2007)","journal-title":"MIS Q."},{"issue":"4","key":"26_CR36","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.elerap.2007.02.002","volume":"6","author":"HF Lin","year":"2007","unstructured":"Lin, H.F.: Predicting consumer intentions to shop online: an empirical test of competing theories. Electron. Commer. Res. Appl. 6(4), 433\u2013442 (2007)","journal-title":"Electron. Commer. Res. Appl."},{"key":"26_CR37","volume-title":"Unlocking the Potential of the Internet of Things","author":"J Manyika","year":"2015","unstructured":"Manyika, J., et al.: Unlocking the Potential of the Internet of Things. McKinsey Global Institute, New York (2015)"},{"key":"26_CR38","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.chb.2017.07.016","volume":"76","author":"A Marakhimov","year":"2017","unstructured":"Marakhimov, A., Joo, J.: Consumer adaptation and infusion of wearable devices for healthcare. Comput. Hum. Behav. 76, 135\u2013148 (2017)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"26_CR39","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1287\/isre.2.3.173","volume":"2","author":"K Mathieson","year":"1991","unstructured":"Mathieson, K.: Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Inf. Syst. Res. 2(3), 173\u2013191 (1991)","journal-title":"Inf. Syst. Res."},{"issue":"11","key":"26_CR40","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1016\/S0148-2963(01)00276-4","volume":"56","author":"ML Meuter","year":"2003","unstructured":"Meuter, M.L., Ostrom, A.L., Bitner, M.J., Roundtree, R.: The influence of technology anxiety on consumer use and experiences with self-service technologies. J. Bus. Res. 56(11), 899\u2013906 (2003)","journal-title":"J. Bus. Res."},{"key":"26_CR41","volume-title":"Qualitative Data Analysis: An Expanded Sourcebook","author":"MB Miles","year":"1994","unstructured":"Miles, M.B., Huberman, A.M.: Qualitative Data Analysis: An Expanded Sourcebook. Sage, Thousand Oaks (1994)"},{"key":"26_CR42","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.techfore.2017.03.001","volume":"136","author":"M Mital","year":"2018","unstructured":"Mital, M., Chang, V., Choudhary, P., Papa, A., Pani, A.K.: Adoption of internet of things in India: a test of competing models using a structured equation modeling approach. Technol. Forecast. Soc. Change 136, 339\u2013346 (2018)","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"1","key":"26_CR43","first-page":"51","volume":"1","author":"AM Momani","year":"2017","unstructured":"Momani, A.M., Jamous, M.: The evolution of technology acceptance theories. Int. J. Contemp. Comput. Res. 1(1), 51\u201358 (2017)","journal-title":"Int. J. Contemp. Comput. Res."},{"key":"26_CR44","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-0-387-34982-4_10","volume-title":"Diffusion and Adoption of Information Technology","author":"GC Moore","year":"1996","unstructured":"Moore, G.C., Benbasat, I.: Integrating diffusion of innovations and theory of reasoned action models to predict utilization of information technology by end-users. In: Kautz, K., Pries-Heje, J. (eds.) Diffusion and Adoption of Information Technology. ITIFIP, pp. 132\u2013146. Springer, Boston (1996). \n                    https:\/\/doi.org\/10.1007\/978-0-387-34982-4_10"},{"issue":"6","key":"26_CR45","doi-asserted-by":"crossref","first-page":"2342","DOI":"10.1109\/JIOT.2017.2750765","volume":"4","author":"E Park","year":"2017","unstructured":"Park, E., Cho, Y., Han, J., Kwon, S.J.: Comprehensive approaches to user acceptance of internet of things in a smart home environment. IEEE Internet Things J. 4(6), 2342\u20132350 (2017)","journal-title":"IEEE Internet Things J."},{"volume-title":"Designs, Methods and Practices for Research of Project Management","year":"2015","unstructured":"Pasian, M.B. (ed.): Designs, Methods and Practices for Research of Project Management. Gower Publishing, Ltd., Farnham (2015)","key":"26_CR46"},{"issue":"1","key":"26_CR47","first-page":"5","volume":"2","author":"R Piyare","year":"2013","unstructured":"Piyare, R.: Internet of things: ubiquitous home control and monitoring system using android based smart phone. Int. J. Internet Things 2(1), 5\u201311 (2013)","journal-title":"Int. J. Internet Things"},{"issue":"1","key":"26_CR48","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/2629633","volume":"58","author":"R Rawassizadeh","year":"2014","unstructured":"Rawassizadeh, R., Price, B.A., Petre, M.: Wearables: has the age of smartwatches finally arrived? Commun. ACM 58(1), 45\u201347 (2014)","journal-title":"Commun. ACM"},{"issue":"3","key":"26_CR49","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.ijinfomgt.2011.11.007","volume":"32","author":"MMMA Riffai","year":"2012","unstructured":"Riffai, M.M.M.A., Grant, K., Edgar, D.: Big TAM in Oman: exploring the promise of on-line banking, its adoption by customers and the challenges of banking in Oman. Int. J. Inf. Manag. 32(3), 239\u2013250 (2012)","journal-title":"Int. J. Inf. Manag."},{"issue":"7","key":"26_CR501","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/S1070-3241(16)30155-9","volume":"21","author":"Everett M. Rogers","year":"1995","unstructured":"Rogers, E.M.: Lessons for guidelines from the diffusion of innovations. Joint Comm. J. Qual. Patient Saf. 21(7), 324\u2013328 (1995)","journal-title":"The Joint Commission Journal on Quality Improvement"},{"key":"26_CR50","volume-title":"Diffusion of Innovations","author":"EM Rogers","year":"2010","unstructured":"Rogers, E.M.: Diffusion of Innovations. Simon and Schuster, New York (2010)"},{"unstructured":"Rogers, E.M., Shoemaker, F.F.: Communication of Innovations; A Cross-Cultural Approach (1971).","key":"26_CR502"},{"issue":"8","key":"26_CR51","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1016\/j.im.2017.02.006","volume":"54","author":"DH Shin","year":"2017","unstructured":"Shin, D.H.: Conceptualizing and measuring quality of experience of the internet of things: exploring how quality is perceived by users. Inf. Manag. 54(8), 998\u20131011 (2017)","journal-title":"Inf. Manag."},{"volume-title":"Research Methods in the Social Sciences","year":"2005","unstructured":"Somekh, B., Lewin, C. (eds.): Research Methods in the Social Sciences. Sage, Thousand Oaks (2005)","key":"26_CR52"},{"issue":"6","key":"26_CR53","doi-asserted-by":"crossref","first-page":"932","DOI":"10.1509\/jmr.16.0209","volume":"54","author":"A Sood","year":"2017","unstructured":"Sood, A., Kumar, V.: Analyzing client profitability across diffusion segments for a continuous innovation. J. Mark. Res. 54(6), 932\u2013951 (2017)","journal-title":"J. Mark. Res."},{"key":"26_CR54","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1002\/9780470687994.ch4","volume-title":"Developing and Delivering Practice-Based Evidence","author":"WB Stiles","year":"2010","unstructured":"Stiles, W.B.: Theory-building case studies as practice-based evidence. In: Barkham, M., Hardy, G.E., Mellor-Clark, J. (eds.) Developing and Delivering Practice-Based Evidence, pp. 91\u2013108. Wiley, Hoboken (2010)"},{"issue":"2","key":"26_CR55","first-page":"183","volume":"14","author":"Y Sun","year":"2013","unstructured":"Sun, Y., Wang, N., Guo, X., Peng, Z.: Understanding the acceptance of mobile health services: a comparison and integration of alternative models. J. Electron. Commer. Res. 14(2), 183 (2013)","journal-title":"J. Electron. Commer. Res."},{"issue":"4","key":"26_CR56","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/0144929X.2011.553740","volume":"32","author":"GB Svendsen","year":"2013","unstructured":"Svendsen, G.B., Johnsen, J.A.K., Alm\u00e5s-S\u00f8rensen, L., Vitters\u00f8, J.: Personality and technology acceptance: the influence of personality factors on the core constructs of the technology acceptance model. Behav. Inf. Technol. 32(4), 323\u2013334 (2013)","journal-title":"Behav. Inf. Technol."},{"issue":"2","key":"26_CR57","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144\u2013176 (1995)","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"26_CR58","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2307\/249443","volume":"15","author":"RL Thompson","year":"1991","unstructured":"Thompson, R.L., Higgins, C.A., Howell, J.M.: Personal computing: toward a conceptual model of utilization. MIS Q. 15(1), 125\u2013143 (1991)","journal-title":"MIS Q."},{"issue":"4","key":"26_CR59","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.im.2017.11.002","volume":"55","author":"M Touzani","year":"2018","unstructured":"Touzani, M., Charfi, A.A., Boistel, P., Niort, M.-C.: Connecto ergo sum! An exploratory study of the motivations behind the usage of connected objects. Inf. Manag. 55(4), 472\u2013481 (2018)","journal-title":"Inf. Manag."},{"issue":"5","key":"26_CR60","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1057\/ejis.2012.1","volume":"21","author":"O Turel","year":"2012","unstructured":"Turel, O., Serenko, A.: The benefits and dangers of enjoyment with social networking websites. Eur. J. Inf. Syst. 21(5), 512\u2013528 (2012)","journal-title":"Eur. J. Inf. Syst."},{"issue":"4","key":"26_CR61","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.2307\/41409972","volume":"35","author":"O Turel","year":"2011","unstructured":"Turel, O., Serenko, A., Giles, P.: Integrating technology addiction and use: an empirical investigation of online auction users. MIS Q. 35(4), 1043\u20131062 (2011)","journal-title":"MIS Q."},{"issue":"4","key":"26_CR62","doi-asserted-by":"crossref","first-page":"695","DOI":"10.2307\/25148660","volume":"28","author":"H Heijden Van der","year":"2004","unstructured":"Van der Heijden, H.: User acceptance of hedonic information systems. MIS Q. 28(4), 695\u2013704 (2004)","journal-title":"MIS Q."},{"issue":"2","key":"26_CR63","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39(2), 273\u2013315 (2008)","journal-title":"Decis. Sci."},{"issue":"2","key":"26_CR64","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag. Sci. 46(2), 186\u2013204 (2000)","journal-title":"Manag. Sci."},{"issue":"3","key":"26_CR65","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"3","key":"26_CR66","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.tele.2009.11.001","volume":"27","author":"H Verkasalo","year":"2010","unstructured":"Verkasalo, H., L\u00f3pez-Nicol\u00e1s, C., Molina-Castillo, F.J., Bouwman, H.: Analysis of users and non-users of smartphone applications. Telemat. Inform. 27(3), 242\u2013255 (2010)","journal-title":"Telemat. Inform."},{"key":"26_CR67","volume-title":"The Diffusion of Innovations. A Communication Science Perspective","author":"A Vishwanath","year":"2011","unstructured":"Vishwanath, A., Barnett, G.A.: The Diffusion of Innovations. A Communication Science Perspective. Peter Lang, New York (2011)"},{"issue":"6","key":"26_CR68","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1177\/0093650211408593","volume":"39","author":"H Wang","year":"2012","unstructured":"Wang, H., Chung, J.E., Park, N., McLaughlin, M.L., Fulk, J.: Understanding online community participation: a technology acceptance perspective. Commun. Res. 39(6), 781\u2013801 (2012)","journal-title":"Commun. Res."},{"issue":"1","key":"26_CR69","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1287\/isre.1050.0042","volume":"16","author":"BH Wixom","year":"2005","unstructured":"Wixom, B.H., Todd, P.A.: A theoretical integration of user satisfaction and technology acceptance. Inf. Syst. Res. 16(1), 85\u2013102 (2005)","journal-title":"Inf. Syst. Res."},{"key":"26_CR503","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.chb.2016.10.028","volume":"67","author":"Bing Wu","year":"2017","unstructured":"Wu, B., Chen, X.: Continuance intention to use MOOCs: integrating the technology acceptance model (TAM) and task technology fit (TTF) model. Comput. Hum. Behav. 67, 221\u2013232 (2017)","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"26_CR70","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.tele.2004.11.003","volume":"22","author":"KC Yang","year":"2005","unstructured":"Yang, K.C.: Exploring factors affecting the adoption of mobile commerce in Singapore. Telemat. Inform. 22(3), 257\u2013277 (2005)","journal-title":"Telemat. Inform."},{"issue":"4","key":"26_CR71","first-page":"334","volume":"14","author":"K Yang","year":"2013","unstructured":"Yang, K., Forney, J.C.: The moderating role of consumer technology anxiety in mobile shopping adoption: differential effects of facilitating conditions and social influences. J. Electron. Commer. Res. 14(4), 334 (2013)","journal-title":"J. Electron. Commer. Res."},{"issue":"1","key":"26_CR72","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.chb.2011.08.019","volume":"28","author":"S Yang","year":"2012","unstructured":"Yang, S., Lu, Y., Gupta, S., Cao, Y., Zhang, R.: Mobile payment services adoption across time: an empirical study of the effects of behavioral beliefs, social influences, and personal traits. Comput. Hum. Behav. 28(1), 129\u2013142 (2012)","journal-title":"Comput. Hum. Behav."},{"issue":"5","key":"26_CR73","doi-asserted-by":"crossref","first-page":"1902","DOI":"10.1016\/j.chb.2012.05.008","volume":"28","author":"L Zhang","year":"2012","unstructured":"Zhang, L., Zhu, J., Liu, Q.: A meta-analysis of mobile commerce adoption and the moderating effect of culture. Comput. Hum. Behav. 28(5), 1902\u20131911 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"26_CR74","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.ijinfomgt.2017.08.006","volume":"43","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manag. 43, 342\u2013350 (2018)","journal-title":"Int. J. Inf. Manag."}],"container-title":["Lecture Notes in Business Information Processing","Digital Economy. Emerging Technologies and Business Innovation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30874-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T20:36:32Z","timestamp":1571776592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30874-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030308735","9783030308742"],"references-count":77,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30874-2_26","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDEc","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beirut","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lebanon","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aten.tn\/ICDEc2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,38","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1,74","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}