{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:27:45Z","timestamp":1742912865882,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031153419"},{"type":"electronic","value":"9783031153426"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15342-6_32","type":"book-chapter","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T23:02:35Z","timestamp":1662418955000},"page":"416-421","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Technology Legitimation and User Resistance: The NHS COVID-19 App"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5786-123X","authenticated-orcid":false,"given":"Carlos","family":"Ferreira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7777-7756","authenticated-orcid":false,"given":"Maureen","family":"Meadows","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9926-6199","authenticated-orcid":false,"given":"Evronia","family":"Azer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"key":"32_CR1","unstructured":"Ferreira, C., Merendino, A., Meadows, M., Simkin, L.: Learning, leading, linking: managing digital disruption. Centre for Business in Society, Coventry University, Coventry (2022)"},{"key":"32_CR2","volume-title":"The Innovator\u2019s Dilemma: When New Technologies Cause Great Firms to Fail","author":"CM Christensen","year":"1997","unstructured":"Christensen, C.M.: The Innovator\u2019s Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press, Boston (1997)"},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.techfore.2017.10.020","volume":"129","author":"C Millar","year":"2018","unstructured":"Millar, C., Lockett, M., Ladd, T.: Disruption: technology, innovation and society. Technol. Forecast. Soc. Chang. 129, 254\u2013260 (2018). https:\/\/doi.org\/10.1016\/j.techfore.2017.10.020","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.techfore.2017.09.034","volume":"129","author":"K Kilkki","year":"2018","unstructured":"Kilkki, K., M\u00e4ntyl\u00e4, M., Karhu, K., H\u00e4mm\u00e4inen, H., Ailisto, H.: A disruption framework. Technol. Forecast. Soc. Chang. 129, 275\u2013284 (2018). https:\/\/doi.org\/10.1016\/j.techfore.2017.09.034","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"32_CR5","doi-asserted-by":"publisher","unstructured":"Ferreira, C., Merendino, A., Meadows, M.: Disruption and legitimacy: big data in society. Inf. Syst. Front. https:\/\/doi.org\/10.1007\/s10796-021-10155-3","DOI":"10.1007\/s10796-021-10155-3"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"571","DOI":"10.2307\/258788","volume":"20","author":"MC Suchman","year":"1995","unstructured":"Suchman, M.C.: Managing legitimacy: strategic and institutional approaches. Acad. Manag. Rev. 20, 571 (1995). https:\/\/doi.org\/10.2307\/258788","journal-title":"Acad. Manag. Rev."},{"key":"32_CR7","doi-asserted-by":"publisher","unstructured":"Bunduchi, R., Candi, M.: Technology legitimation: a product\u2010level examination across the technology lifecycle. Br. J. Manag. (2021). https:\/\/doi.org\/10.1111\/1467-8551.12562","DOI":"10.1111\/1467-8551.12562"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1057\/palgrave.ejis.3000629","volume":"15","author":"EH Ferneley","year":"2006","unstructured":"Ferneley, E.H., Sobreperez, P.: Resist, comply or workaround? An examination of different facets of user engagement with information systems. Eur. J. Inf. Syst. 15, 345\u2013356 (2006). https:\/\/doi.org\/10.1057\/palgrave.ejis.3000629","journal-title":"Eur. J. Inf. Syst."},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"686","DOI":"10.5465\/AMR.2011.65554690","volume":"36","author":"LP Tost","year":"2011","unstructured":"Tost, L.P.: An integrative model of legitimacy judgments. Acad. Manag. Rev. 36, 686\u2013710 (2011). https:\/\/doi.org\/10.5465\/AMR.2011.65554690","journal-title":"Acad. Manag. Rev."},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5465\/amr.2013.0318","volume":"40","author":"A Bitektine","year":"2015","unstructured":"Bitektine, A., Haack, P.: The \u201cmacro\u201d and the \u201cmicro\u201d of legitimacy: toward a multilevel theory of the legitimacy process. AMR 40, 49\u201375 (2015). https:\/\/doi.org\/10.5465\/amr.2013.0318","journal-title":"AMR"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"151","DOI":"10.5465\/amr.2009.0382","volume":"36","author":"A Bitektine","year":"2011","unstructured":"Bitektine, A.: Toward a theory of social judgments of organizations: the case of legitimacy, reputation, and status. Acad. Manag. Rev. 36, 151\u2013179 (2011). https:\/\/doi.org\/10.5465\/amr.2009.0382","journal-title":"Acad. Manag. Rev."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Deephouse, D.L., Bundy, J., Tost, L.P., Suchman, M.C.: Organizational legitimacy: six key questions. In: Greenwood, R., Oliver, C., Lawrence, T., Meyer, R. (eds.) The SAGE Handbook of Organizational Institutionalism. SAGE, Thousand Oaks (2017)","DOI":"10.4135\/9781446280669.n2"},{"key":"32_CR13","doi-asserted-by":"publisher","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425 (2003). https:\/\/doi.org\/10.2307\/30036540","DOI":"10.2307\/30036540"},{"key":"32_CR14","doi-asserted-by":"publisher","unstructured":"Venkatesh, V., Thong, J., Xu, X.: Unified theory of acceptance and use of technology: a synthesis and the road ahead. JAIS 17, 328\u2013376 (2016). https:\/\/doi.org\/10.17705\/1jais.00428","DOI":"10.17705\/1jais.00428"},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"103315","DOI":"10.1016\/j.jbi.2019.103315","volume":"100","author":"A Shachak","year":"2019","unstructured":"Shachak, A., Kuziemsky, C., Petersen, C.: Beyond TAM and UTAUT: future directions for HIT implementation research. J. Biomed. Inform. 100, 103315 (2019). https:\/\/doi.org\/10.1016\/j.jbi.2019.103315","journal-title":"J. Biomed. Inform."},{"key":"32_CR16","doi-asserted-by":"publisher","first-page":"567","DOI":"10.2307\/20650309","volume":"33","author":"K Kim","year":"2009","unstructured":"Kim, K.: Investigating user resistance to information systems implementation: a status quo bias perspective. MIS Q. 33, 567 (2009). https:\/\/doi.org\/10.2307\/20650309","journal-title":"MIS Q."},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1111\/j.1365-2575.2011.00386.x","volume":"22","author":"L Selander","year":"2012","unstructured":"Selander, L., Henfridsson, O.: Cynicism as user resistance in IT implementation: cynicism as user resistance in IT implementation. Inf. Syst. J. 22, 289\u2013312 (2012). https:\/\/doi.org\/10.1111\/j.1365-2575.2011.00386.x","journal-title":"Inf. Syst. J."},{"key":"32_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1057\/jit.2015.17","volume":"31","author":"S Laumer","year":"2016","unstructured":"Laumer, S., Maier, C., Eckhardt, A., Weitzel, T.: User personality and resistance to mandatory information systems in organizations: a theoretical model and empirical test of dispositional resistance to change. J. Inf. Technol. 31, 67\u201382 (2016). https:\/\/doi.org\/10.1057\/jit.2015.17","journal-title":"J. Inf. Technol."},{"key":"32_CR19","doi-asserted-by":"publisher","first-page":"897","DOI":"10.2307\/41703485","volume":"36","author":"L Rivard","year":"2012","unstructured":"Rivard, L.: Information technology implementers\u2019 responses to user resistance: nature and effects. MIS Q. 36, 897 (2012). https:\/\/doi.org\/10.2307\/41703485","journal-title":"MIS Q."}],"container-title":["Lecture Notes in Computer Science","The Role of Digital Technologies in Shaping the Post-Pandemic World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15342-6_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T14:22:50Z","timestamp":1710339770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15342-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031153419","9783031153426"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15342-6_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newcastle upon Tyne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/i3e2022.com\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}