{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T03:00:22Z","timestamp":1775358022235,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T00:00:00Z","timestamp":1505088000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10796-017-9796-5","type":"journal-article","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T22:33:19Z","timestamp":1505169199000},"page":"941-955","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7798-6635","authenticated-orcid":false,"given":"Duy","family":"Dang-Pham","sequence":"first","affiliation":[]},{"given":"Siddhi","family":"Pittayachawan","sequence":"additional","affiliation":[]},{"given":"Vince","family":"Bruno","sequence":"additional","affiliation":[]},{"given":"Karlheinz","family":"Kautz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,11]]},"reference":[{"issue":"4","key":"9796_CR1","doi-asserted-by":"publisher","first-page":"244","DOI":"10.17705\/1jais.00122","volume":"8","author":"RP Bagozzi","year":"2007","unstructured":"Bagozzi, R. P. (2007). The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems, 8(4), 244\u2013254.","journal-title":"Journal of the Association for Information Systems"},{"key":"9796_CR2","doi-asserted-by":"crossref","unstructured":"Bastian, M., Heymann, S., & Jacomy, M. (2009). Gephi: An open source software for exploring and manipulating networks. In International AAAI Conference on Weblogs and Social Media.","DOI":"10.1609\/icwsm.v3i1.13937"},{"issue":"4","key":"9796_CR3","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1287\/mnsc.49.4.432.14428","volume":"49","author":"SP Borgatti","year":"2003","unstructured":"Borgatti, S. P., & Cross, R. (2003). A relational view of information seeking and learning in social networks. Management Science, 49(4), 432\u2013445. https:\/\/doi.org\/10.1287\/mnsc.49.4.432.14428 .","journal-title":"Management Science"},{"issue":"6","key":"9796_CR4","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1016\/S0149-2063(03)00087-4","volume":"29","author":"SP Borgatti","year":"2003","unstructured":"Borgatti, S. P., & Foster, P. (2003). The network paradigm in organizational research: A review and typology. Journal of Management, 29(6), 991\u20131013.","journal-title":"Journal of Management"},{"key":"9796_CR5","volume-title":"Analyzing social networks","author":"SP Borgatti","year":"2013","unstructured":"Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks. Thousand Oaks: Sage Publications Ltd.."},{"issue":"1","key":"9796_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1111\/j.1532-7795.2010.00721.x","volume":"21","author":"WA Brechwald","year":"2011","unstructured":"Brechwald, W. A., & Prinstein, M. J. (2011). Beyond Homophily: A decade of advances in understanding peer influence processes. Journal of research on adolescence\u00a0: the official journal of the Society for Research on Adolescence, 21(1), 166\u2013179. https:\/\/doi.org\/10.1111\/j.1532-7795.2010.00721.x .","journal-title":"Journal of research on adolescence\u00a0: the official journal of the Society for Research on Adolescence"},{"issue":"1974","key":"9796_CR7","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1146\/annurev.psych.55.090902.142015","volume":"55","author":"RB Cialdini","year":"2004","unstructured":"Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: Compliance and conformity. Annual Review of Psychology, 55(1974), 591\u2013621. https:\/\/doi.org\/10.1146\/annurev.psych.55.090902.142015 .","journal-title":"Annual Review of Psychology"},{"key":"9796_CR8","doi-asserted-by":"publisher","unstructured":"Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2016). Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace. Information Management. https:\/\/doi.org\/10.1016\/j.im.2016.12.003 .","DOI":"10.1016\/j.im.2016.12.003"},{"issue":"5","key":"9796_CR9","doi-asserted-by":"publisher","first-page":"843","DOI":"10.2307\/2093295","volume":"35","author":"JA Davis","year":"1970","unstructured":"Davis, J. A. (1970). Clustering and hierarchy in interpersonal relations: Testing two graph theoretical models on 742 Sociomatrices. American Sociological Review, 35(5), 843\u2013851.","journal-title":"American Sociological Review"},{"key":"9796_CR10","unstructured":"Dernbecher, S., Beck, R., & Weber, S. (2013). Switch to your own to work with the known: An empirical study on consumerization of IT. In 19th Americas Conference on Information Systems (pp. 1\u201310)."},{"key":"9796_CR11","doi-asserted-by":"publisher","unstructured":"Dong, S., & Yang, X. (2009). An improved motivation model for people behaviors change in virtual communities based on social cognitive theory. In 2009 1st International Conference on Information Science and Engineering, ICISE 2009 (pp. 2274\u20132277). doi: https:\/\/doi.org\/10.1109\/ICISE.2009.277 .","DOI":"10.1109\/ICISE.2009.277"},{"key":"9796_CR12","unstructured":"French, J. R., Raven, B., & Cartwright, D. (1959). The bases of social power. Classics of organization theory, 7, 311\u2013320."},{"issue":"1","key":"9796_CR13","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/07421222.2003.11045830","volume":"22","author":"MJ Gallivan","year":"2005","unstructured":"Gallivan, M. J., Spitler, V. K., & Koufaris, M. (2005). Does information technology training really matter? A social information processing analysis of coworkers\u2019 influence on IT usage in the workplace. Journal of Management Information Systems, 22(1), 153\u2013192.","journal-title":"Journal of Management Information Systems"},{"key":"9796_CR14","unstructured":"Gens, F., Levitas, D., & Sega, R. (2011). 2011 Consumerization of IT Study: Closing the \u201cConsumerization Gap\u201d (Vol. 1156). http:\/\/www.unisys.com\/iview ."},{"issue":"9","key":"9796_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v024.i09","volume":"24","author":"SM Goodreau","year":"2008","unstructured":"Goodreau, S. M., Handcock, M. S., Hunter, D. R., Butts, C. T., & Morris, M. (2008). A statnet Tutorial. Journal of Statistical Software, 24(9), 1\u201327. https:\/\/doi.org\/10.1016\/j.biotechadv.2011.08.021.Secreted .","journal-title":"Journal of Statistical Software"},{"issue":"2","key":"9796_CR16","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1111\/j.1467-985X.2007.00471.x","volume":"170","author":"MS Handcock","year":"2007","unstructured":"Handcock, M. S., Raftery, A. E., & Tantrun, J. M. (2007). Model-based clustering for social networks. Journal of the Royal Statistical Society: Series A (Statistics in Society), 170(2), 301\u2013354.","journal-title":"Journal of the Royal Statistical Society: Series A (Statistics in Society)"},{"key":"9796_CR17","unstructured":"Harris, J. G., Ives, B., & Junglas, I. (2011a). The Genie is out of the bottle: managing the infiltration of consumer IT into the workforce. http:\/\/www.accenture.com\/usen\/Pages\/insight-managing-infiltrationconsumer-itworkforce.aspx ."},{"issue":"2","key":"9796_CR18","first-page":"115","volume":"10","author":"J Harris","year":"2011","unstructured":"Harris, J., Ives, B., & Junglas, I. (2011b). IT consumerization: When gadgets turn into Enterprise IT tools. MIS Quarterly Executive, 10(2), 115\u2013117.","journal-title":"MIS Quarterly Executive"},{"issue":"4","key":"9796_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1002\/piq.20036","volume":"21","author":"J-P Hatala","year":"2009","unstructured":"Hatala, J.-P., & Lutta, J. G. (2009). Managing information sharing within an organizational setting: A social network perspective. Performance Improvement Quarterly, 21(4), 5\u201333.","journal-title":"Performance Improvement Quarterly"},{"issue":"1","key":"9796_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.hitech.2009.02.005","volume":"20","author":"L Hossain","year":"2009","unstructured":"Hossain, L., & de Silva, A. (2009). Exploring user acceptance of technology using social networks. The Journal of High Technology Management Research, 20(1), 1\u201318. https:\/\/doi.org\/10.1016\/j.hitech.2009.02.005 .","journal-title":"The Journal of High Technology Management Research"},{"issue":"3","key":"9796_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v024.i03","volume":"24","author":"DR Hunter","year":"2008","unstructured":"Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., & Morris, M. (2008). Ergm: A package to fit, simulate and diagnose exponential-family models for networks. Journal of Statistical Software, 24(3), 1\u201329.","journal-title":"Journal of Statistical Software"},{"issue":"2","key":"9796_CR22","doi-asserted-by":"publisher","first-page":"277","DOI":"10.2307\/2393414","volume":"38","author":"H Ibarra","year":"1993","unstructured":"Ibarra, H., & Andrews, S. B. (1993). Power, social influence, and sense making: Effects of network centrality and proximity on employee perceptions. Administrative Science Quarterly, 38(2), 277. https:\/\/doi.org\/10.2307\/2393414 .","journal-title":"Administrative Science Quarterly"},{"key":"9796_CR23","doi-asserted-by":"crossref","unstructured":"Kirlappos, I., Parkin, S., & Sasse, M. A. (2014). Learning from \u201cshadow security\u201d: Why understanding non-compliant behaviors provides the basis for effective security. In USEC\u201914 Workshop on Usable Security.","DOI":"10.14722\/usec.2014.23007"},{"issue":"2-3","key":"9796_CR24","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1161345.1161355","volume":"37","author":"Y Lee","year":"2006","unstructured":"Lee, Y., Lee, J., & Lee, Z. (2006). Social influence on technology acceptance behavior: Self-identity theory perspective. Database for Advances in Information Systems, 37(2-3), 60\u201375. https:\/\/doi.org\/10.1145\/1161345.1161355 .","journal-title":"Database for Advances in Information Systems"},{"issue":"1","key":"9796_CR25","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S0378-8733(01)00049-1","volume":"24","author":"RTAJ Leenders","year":"2002","unstructured":"Leenders, R. T. A. J. (2002). Modeling social influence through network autocorrelation: Constructing the weight matrix. Social Networks, 24(1), 21\u201347.","journal-title":"Social Networks"},{"issue":"4","key":"9796_CR26","doi-asserted-by":"publisher","first-page":"657","DOI":"10.2307\/30036552","volume":"27","author":"W Lewis","year":"2003","unstructured":"Lewis, W., Agarwal Robert Smith, R. H., & Sambamurthy Eli, V. (2003). Sources of influence on beliefs about information technology use: An empirical study of knowledge workers. MIS Quarterly, 27(4), 657\u2013678.","journal-title":"MIS Quarterly"},{"key":"9796_CR27","unstructured":"Loose, M., Weeger, A., & Gewald, H. (2013). BYOD\u2013the next big thing in recruiting? Examining the determinants of BYOD service adoption behavior from the perspective of future employees. In 19th Americas Conference on Information Systems (pp. 1\u201312). http:\/\/aisel.aisnet.org\/amcis2013\/EndUserIS\/GeneralPresentations\/12\/ ."},{"key":"9796_CR28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511894701","volume-title":"Exponential random graph models for social networks: Theory, methods, and applications","author":"D Lusher","year":"2012","unstructured":"Lusher, D., Koskinen, J., & Robins, G. (2012). Exponential random graph models for social networks: Theory, methods, and applications. New York: Cambridge University Press."},{"issue":"2001","key":"9796_CR29","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson, M., Smith-lovin, L., & Cook, J. M. (2001). Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27(2001), 415\u2013444. https:\/\/doi.org\/10.1146\/annurev.soc.27.1.415 .","journal-title":"Annual Review of Sociology"},{"issue":"3","key":"9796_CR30","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.socnet.2013.03.004","volume":"35","author":"J Merluzzi","year":"2013","unstructured":"Merluzzi, J., & Burt, R. S. (2013). How many names are enough? Identifying network effects with the least set of listed contacts. Social Networks, 35(3), 331\u2013337. https:\/\/doi.org\/10.1016\/j.socnet.2013.03.004 .","journal-title":"Social Networks"},{"issue":"4","key":"9796_CR31","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.18637\/jss.v024.i04","volume":"24","author":"M Morris","year":"2008","unstructured":"Morris, M., Handcock, M. S., & Hunter, D. R. (2008). Specification of exponential-family random graph models: Terms and computational aspects. Journal of Statistical Software, 24(4), 1548\u20137660 http:\/\/www.pubmedcentral.nih.gov\/articlerender.fcgi?artid=2481518&tool=pmcentrez&rendertype=abstract .","journal-title":"Journal of Statistical Software"},{"key":"9796_CR32","unstructured":"Niehaves, B., K\u00f6ffer, S., & Ortbach, K. (2012). IT consumerization \u2013 a theory and practice review. In 18th Americas Conference on Information Systems (AMCIS)."},{"issue":"6","key":"9796_CR33","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1177\/016555150202800601","volume":"28","author":"E Otte","year":"2002","unstructured":"Otte, E., & Rousseau, R. (2002). Social network analysis: A powerful strategy, also for the information sciences. Journal of Information Science, 28(6), 441\u2013453. https:\/\/doi.org\/10.1177\/016555150202800601 .","journal-title":"Journal of Information Science"},{"issue":"2","key":"9796_CR34","doi-asserted-by":"publisher","first-page":"219","DOI":"10.2307\/2393354","volume":"36","author":"RE Rice","year":"1991","unstructured":"Rice, R. E., & Aydin, C. E. (1991). Attitudes toward new organizational technology: Network proximity as a mechanism for social information processing. Administrative Science Quarterly, 36(2), 219. https:\/\/doi.org\/10.2307\/2393354 .","journal-title":"Administrative Science Quarterly"},{"issue":"2","key":"9796_CR35","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.socnet.2006.08.002","volume":"29","author":"G Robins","year":"2007","unstructured":"Robins, G., Pattison, P., Kalish, Y., & Lusher, D. (2007). An introduction to exponential random graph (p*) models for social networks. Social Networks, 29(2), 173\u2013191. https:\/\/doi.org\/10.1016\/j.socnet.2006.08.002 .","journal-title":"Social Networks"},{"key":"9796_CR36","volume-title":"Diffusion of innovations","author":"EM Rogers","year":"1995","unstructured":"Rogers, E. M. (1995). Diffusion of innovations (3rd ed.). New York: The Free Press.","edition":"3"},{"issue":"1","key":"9796_CR37","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.socnet.2008.09.001","volume":"31","author":"J Saint-Charles","year":"2009","unstructured":"Saint-Charles, J., & Mongeau, P. (2009). Different relationships for coping with ambiguity and uncertainty in organizations. Social Networks, 31(1), 33\u201339. https:\/\/doi.org\/10.1016\/j.socnet.2008.09.001 .","journal-title":"Social Networks"},{"key":"9796_CR38","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.cose.2014.06.007","volume":"45","author":"M Silic","year":"2014","unstructured":"Silic, M., & Back, A. (2014). Shadow IT \u2013 A view from behind the curtain. Computers & Security, 45, 274\u2013283. https:\/\/doi.org\/10.1016\/j.cose.2014.06.007 .","journal-title":"Computers & Security"},{"issue":"2","key":"9796_CR39","doi-asserted-by":"publisher","first-page":"371","DOI":"10.2307\/20650296","volume":"33","author":"T Sykes","year":"2009","unstructured":"Sykes, T., Venkatesh, V., & Gosain, S. (2009). Model of acceptance with peer support: A social network perspective to understand employees\u2019 system use. MIS Quarterly, 33(2), 371\u2013393.","journal-title":"MIS Quarterly"},{"key":"9796_CR40","unstructured":"ten Kate, S., Haverkamp, S., & Feldberg, F. (2010). Social network influences on technology acceptance\u00a0: A matter of tie strength, centrality and density. In 23rd Bled eConference eTrust (pp. 18\u201332)."},{"issue":"2","key":"9796_CR41","first-page":"452","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(2), 452\u2013478.","journal-title":"MIS Quarterly"},{"issue":"4","key":"9796_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(13)70049-7","volume":"2013","author":"R Walters","year":"2013","unstructured":"Walters, R. (2013). Bringing IT out of the shadows. Network Security, 2013(4), 5\u201311. https:\/\/doi.org\/10.1016\/S1353-4858(13)70049-7 .","journal-title":"Network Security"},{"key":"9796_CR43","unstructured":"Weeger, A., & Gewald, H. (2014). Factors influencing future employees decision-making to participate in a BYOD program: Does risk matter? In 22nd European Conference on Information Systems (ECIS) (pp. 1\u201314)."},{"issue":"4","key":"9796_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2277\/0521663636","volume":"15","author":"E Wenger","year":"1998","unstructured":"Wenger, E. (1998). Community of Practice: A brief introduction. Learning in doing, 15(4), 1\u20137. https:\/\/doi.org\/10.2277\/0521663636 .","journal-title":"Learning in doing"},{"issue":"4","key":"9796_CR45","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1177\/0266382112470412","volume":"29","author":"M White","year":"2012","unstructured":"White, M. (2012). Digital workplaces: Vision and reality. Business Information Review, 29(4), 205\u2013214.","journal-title":"Business Information Review"},{"issue":"3","key":"9796_CR46","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.im.2005.08.006","volume":"43","author":"MY Yi","year":"2006","unstructured":"Yi, M. Y., Jackson, J. D., Park, J. S., & Probst, J. C. (2006). Understanding information technology acceptance by individual professionals: Toward an integrative view. Information Management, 43(3), 350\u2013363. https:\/\/doi.org\/10.1016\/j.im.2005.08.006 .","journal-title":"Information Management"},{"issue":"3","key":"9796_CR47","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1136\/jamia.2009.000877","volume":"17","author":"K Zheng","year":"2010","unstructured":"Zheng, K., Padman, R., Krackhardt, D., Johnson, M. P., & Diamond, H. S. (2010). Social networks and physician adoption of electronic health records: Insights from an empirical study. Journal of the American Medical Informatics Association\u00a0: JAMIA, 17(3), 328\u2013336.","journal-title":"Journal of the American Medical Informatics Association\u00a0: JAMIA"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9796-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-017-9796-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-017-9796-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T17:34:44Z","timestamp":1692984884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-017-9796-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,11]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["9796"],"URL":"https:\/\/doi.org\/10.1007\/s10796-017-9796-5","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,11]]},"assertion":[{"value":"11 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}