{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T21:23:31Z","timestamp":1768598611002,"version":"3.49.0"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000858","name":"University of Sheffield","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000858","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2021,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This study investigates how tablet users react when technology falls short of their expectations. We deploy a data\/frame model to study this process and investigate resistance-related reactions and the deployment of accommodating practices at the individual level. Analyzing user blogs that provide narratives on user interaction with tablets, we identify triggers of episodes of disillusionment and illustrate five sensemaking paths that users follow, eventually leading to one of three practices: 1) users choose to defer tasks until the situation changes, or they abandon the platform altogether; 2) they develop workarounds at different levels of proficiency; or 3) they proceed by reframing their expectations of the platform. By revealing user decision-making process during episodes of disillusionment, the findings contribute to information systems post-adoption research. At a practical level, the findings inform IT artifact and application design by offering insights on how users process discrepancies between their expectations and actual use experience.<\/jats:p>","DOI":"10.1007\/s10796-019-09972-4","type":"journal-article","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T17:03:52Z","timestamp":1574269432000},"page":"453-475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Accommodating Practices During Episodes of Disillusionment with Mobile IT"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3110-7495","authenticated-orcid":false,"given":"Efpraxia D.","family":"Zamani","sequence":"first","affiliation":[]},{"given":"Nancy","family":"Pouloudi","sequence":"additional","affiliation":[]},{"given":"George","family":"Giaglis","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Wareham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,20]]},"reference":[{"issue":"5","key":"9972_CR1","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1007\/s10796-017-9814-7","volume":"21","author":"M Albashrawi","year":"2019","unstructured":"Albashrawi, M., & Motiwalla, L. (2019). Privacy and personalization in continued usage intention of Mobile banking: An integrative perspective. Information Systems Frontiers, 21(5), 1031\u20131043. https:\/\/doi.org\/10.1007\/s10796-017-9814-7.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"9972_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1365-2575.2007.00286.x","volume":"18","author":"R Alvarez","year":"2008","unstructured":"Alvarez, R. (2008). Examining technology, structure and identity during an enterprise system implementation. Information Systems Journal, 18(2), 203\u2013224. https:\/\/doi.org\/10.1111\/j.1365-2575.2007.00286.x.","journal-title":"Information Systems Journal"},{"issue":"4","key":"9972_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1162\/desi.2008.24.4.3","volume":"24","author":"P Atkinson","year":"2008","unstructured":"Atkinson, P. (2008). A bitter pill to swallow: The rise and fall of the tablet computer. Design Issues, 24(4), 3\u201325.","journal-title":"Design Issues"},{"issue":"4","key":"9972_CR4","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1057\/ejis.2011.48","volume":"21","author":"B Azad","year":"2011","unstructured":"Azad, B., & King, N. (2011). Institutionalized computer workaround practices in a Mediterranean country: An examination of two organizations. European Journal of Information Systems, 21(4), 358\u2013372.","journal-title":"European Journal of Information Systems"},{"key":"9972_CR5","unstructured":"Bagayogo, F. F., Beaudry, A., & Lapointe, L. (2013). Impacts of IT acceptance and resistance behaviors: A novel framework. Presented at the International Conference of Information Systems, Milan, Italy (ICIS 2013)."},{"issue":"3","key":"9972_CR6","doi-asserted-by":"publisher","first-page":"493","DOI":"10.2307\/25148693","volume":"29","author":"A Beaudry","year":"2005","unstructured":"Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493\u2013524.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9972_CR7","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1080\/10253860500160403","volume":"8","author":"RW Belk","year":"2005","unstructured":"Belk, R. W., & Tumbat, G. (2005). The cult of Macintosh. Consumption, Markets and Culture, 8(3), 205\u2013217.","journal-title":"Consumption, Markets and Culture"},{"issue":"2","key":"9972_CR8","doi-asserted-by":"publisher","first-page":"229","DOI":"10.2307\/25148634","volume":"28","author":"A Bhattacherjee","year":"2004","unstructured":"Bhattacherjee, A., & Premkumar, G. (2004). Understanding changes in belief and attitude toward information technology usage: A theoretical model and longitudinal test. MIS Quarterly, 28(2), 229\u2013254. https:\/\/doi.org\/10.2307\/25148634.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9972_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1287\/orsc.1040.0103","volume":"16","author":"M-C Boudreau","year":"2005","unstructured":"Boudreau, M.-C., & Robey, D. (2005). Enacting integrated information technology: A human agency perspective. Organization Science, 16(1), 3\u201318.","journal-title":"Organization Science"},{"issue":"4","key":"9972_CR10","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1207\/s15327051hci0104_4","volume":"1","author":"JS Brown","year":"1985","unstructured":"Brown, J. S., & Newman, S. E. (1985). Issues in cognitive and social ergonomics: From our house to Bauhaus. Human\u2013Computer Interaction, 1(4), 359\u2013391.","journal-title":"Human\u2013Computer Interaction"},{"key":"9972_CR11","doi-asserted-by":"publisher","unstructured":"Cao, X., Khan, A. N., Ali, A., & Khan, N. A. (2019). Consequences of cyberbullying and social overload while using SNSs: A study of users\u2019 discontinuous usage behavior in SNSs. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-019-09936-8.","DOI":"10.1007\/s10796-019-09936-8"},{"key":"9972_CR12","first-page":"244","volume-title":"The American tradition in qualitative research","author":"K Charmaz","year":"2001","unstructured":"Charmaz, K. (2001). Grounded theory in the 21st century: Applications for advancing social justice studies. In N. K. Denzin & Y. Lincoln (Eds.), The American tradition in qualitative research (Vol. 2, pp. 244\u2013285). London: Sage."},{"key":"9972_CR13","first-page":"585","volume":"28","author":"Y Chen","year":"2011","unstructured":"Chen, Y., & Potter, R. (2011). The role of habit in post-adoption switching of personal information technologies: An empirical investigation. Communications of the Association for Information Systems, 28, 585\u2013610.","journal-title":"Communications of the Association for Information Systems"},{"key":"9972_CR14","first-page":"72","volume-title":"The SAGE encyclopedia of qualitative research methods","author":"R Chenail","year":"2008","unstructured":"Chenail, R. (2008). Categorization. In L. M. Given (Ed.), The SAGE encyclopedia of qualitative research methods (Vol. 1 & 2, pp. 72\u201373). Los Angeles, London, New Delhi, Singapore: SAGE."},{"issue":"2","key":"9972_CR15","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1057\/jit.2016.9","volume":"31","author":"J Choudrie","year":"2016","unstructured":"Choudrie, J., Zamani, E. D., Krepel, B., & Stewart, M. \u0391. (2016). Understanding individual user resistance and workarounds of enterprise social networks: The case of service Ltd. Journal of Information Technology, 31(2), 130\u2013151. https:\/\/doi.org\/10.1057\/jit.2016.9.","journal-title":"Journal of Information Technology"},{"key":"9972_CR16","unstructured":"Clements, J. A., & Bush, A. A. (2011). Habitual IS Use and Continuance. Presented at the Southern Association for Information Systems Conference, Atlanta, GA (SAIS 2011). Retrieved from http:\/\/aisel.aisnet.org\/sais2011\/16"},{"issue":"2","key":"9972_CR17","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1017\/S174413741000024X","volume":"7","author":"L D\u2019Adderio","year":"2011","unstructured":"D\u2019Adderio, L. (2011). Artifacts at the centre of routines: Performing the material turn in routines theory. Journal of Institutional Economics, 7(2), 197\u2013230.","journal-title":"Journal of Institutional Economics"},{"issue":"4","key":"9972_CR18","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/s10796-017-9796-5","volume":"21","author":"D Dang-Pham","year":"2019","unstructured":"Dang-Pham, D., Pittayachawan, S., Bruno, V., & Kautz, K. (2019). Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis. Information Systems Frontiers, 21(4), 941\u2013955. https:\/\/doi.org\/10.1007\/s10796-017-9796-5.","journal-title":"Information Systems Frontiers"},{"key":"9972_CR19","unstructured":"Dervin, B. (1983). An overview of sense-making research: Concepts, methods, and results to date. Presented at the International Communication Association Annual Meeting, Dallas, Texas, USA, May l983."},{"issue":"1","key":"9972_CR20","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10796-014-9513-6","volume":"17","author":"A Elbanna","year":"2015","unstructured":"Elbanna, A., & Linderoth, H. C. J. (2015). The formation of technology mental models: The case of voluntary use of technology in organizational setting. Information Systems Frontiers, 17(1), 95\u2013108. https:\/\/doi.org\/10.1007\/s10796-014-9513-6.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"9972_CR21","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1057\/palgrave.ejis.3000629","volume":"15","author":"EH Ferneley","year":"2006","unstructured":"Ferneley, E. H., & Sobreperez, P. (2006). Resist, comply or workaround? An examination of different facets of user engagement with information systems. European Journal of Information Systems, 15(4), 345\u2013356.","journal-title":"European Journal of Information Systems"},{"key":"9972_CR22","unstructured":"Glaser, B. G., & Holton, J. (2004). Remodeling grounded theory. Forum: Qualitative Social Research, 5(2)."},{"issue":"4","key":"9972_CR23","first-page":"1225","volume":"42","author":"RW Gregory","year":"2018","unstructured":"Gregory, R. W., Kaganer, E., Henfridsson, O., & Ruch, T. J. (2018). IT consumerization and the transformation of IT governance. MIS Quarterly, 42(4), 1225\u20131253.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9972_CR24","doi-asserted-by":"publisher","first-page":"472","DOI":"10.5465\/amr.1999.2202132","volume":"24","author":"TL Griffith","year":"1999","unstructured":"Griffith, T. L. (1999). Technology features as triggers for sensemaking. Academy of Management Review, 24(3), 472\u2013488.","journal-title":"Academy of Management Review"},{"issue":"1","key":"9972_CR25","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1177\/1468794107085298","volume":"8","author":"NS Hookway","year":"2008","unstructured":"Hookway, N. S. (2008). \u2018Entering the blogosphere\u2019: Some strategies for using blogs in social research. Qualitative Research, 8(1), 91\u2013113.","journal-title":"Qualitative Research"},{"issue":"1","key":"9972_CR26","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ipm.2012.05.003","volume":"49","author":"S Huuskonen","year":"2013","unstructured":"Huuskonen, S., & Vakkari, P. (2013). \u201cI did it my way\u201d: Social workers as secondary designers of a client information system. Information Processing & Management, 49(1), 380\u2013391.","journal-title":"Information Processing & Management"},{"issue":"3","key":"9972_CR27","doi-asserted-by":"publisher","first-page":"525","DOI":"10.2307\/25148694","volume":"29","author":"J Jasperson","year":"2005","unstructured":"Jasperson, J., Carter, P. E., & Zmud, R. W. (2005). A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems. MIS Quarterly, 29(3), 525\u2013557. https:\/\/doi.org\/10.2307\/25148694.","journal-title":"MIS Quarterly"},{"key":"9972_CR28","doi-asserted-by":"publisher","unstructured":"Kim, J. U., & Kishore, R. (2018). Do we fully understand information systems failure? An exploratory study of the cognitive schema of IS professionals. Information Systems Frontiers., 1\u201335. https:\/\/doi.org\/10.1007\/s10796-018-9838-7.","DOI":"10.1007\/s10796-018-9838-7"},{"key":"9972_CR29","unstructured":"Klein, D. E., Klein, H. A., & Klein, G. (2000). Macrocognition: Linking cognitive psychology and cognitive ergonomics. Proceedings of the 5th International Conference on Human Interactions with Complex Systems,\u00a0Urbana-Champaign: University of Illinois at Urbana-Champaign,\u00a0173\u2013177."},{"issue":"4","key":"9972_CR30","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIS.2006.75","volume":"21","author":"G Klein","year":"2006","unstructured":"Klein, G., Moon, B., & Hoffman, R. R. (2006a). Making sense of sensemaking 1: Alternative perspectives. IEEE Intelligent Systems, 21(4), 70\u201373. https:\/\/doi.org\/10.1109\/MIS.2006.75.","journal-title":"IEEE Intelligent Systems"},{"issue":"5","key":"9972_CR31","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MIS.2006.100","volume":"21","author":"G Klein","year":"2006","unstructured":"Klein, G., Moon, B., & Hoffman, R. R. (2006b). Making sense of sensemaking 2: A macrocognitive model. IEEE Intelligent Systems, 21(5), 88\u201392. https:\/\/doi.org\/10.1109\/MIS.2006.100.","journal-title":"IEEE Intelligent Systems"},{"key":"9972_CR32","unstructured":"Klein, G., Phillips, J. K., Rall, E. L., & Peluso, D. A. (2007). In R. R. Hoffman (Ed.), A data\/frame theory of sensemaking. Lawrence Erlbaum Associates, Taylor & Francis Group."},{"issue":"6","key":"9972_CR33","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIS.2003.1249172","volume":"18","author":"P Koopman","year":"2003","unstructured":"Koopman, P., & Hoffman, R. R. (2003). Work-arounds, make-work, and kludges. IEEE Intelligent Systems, 18(6), 70\u201375.","journal-title":"IEEE Intelligent Systems"},{"key":"9972_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/9781118955567.wbieoc185","volume-title":"The international encyclopedia of organizational communication","author":"MW Kramer","year":"2016","unstructured":"Kramer, M. W. (2016). Sensemaking. In C. R. Scott, J. R. Barker, T. Kuhn, J. Keyton, P. K. Turner, & L. K. Lewis (Eds.), The international encyclopedia of organizational communication (pp. 1\u201310). https:\/\/doi.org\/10.1002\/9781118955567.wbieoc185."},{"issue":"3","key":"9972_CR35","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s10796-015-9550-9","volume":"18","author":"V Krishnaraju","year":"2016","unstructured":"Krishnaraju, V., Mathew, S. K., & Sugumaran, V. (2016). Web personalization for user acceptance of technology: An empirical investigation of E-government services. Information Systems Frontiers, 18(3), 579\u2013595. https:\/\/doi.org\/10.1007\/s10796-015-9550-9.","journal-title":"Information Systems Frontiers"},{"key":"9972_CR36","doi-asserted-by":"publisher","unstructured":"Kwahk, K.-Y. (2011). Investigating the coping mechanism towards technochanges: A perspective of social network theory (pp. 1\u201310). https:\/\/doi.org\/10.1109\/HICSS.2011.253.","DOI":"10.1109\/HICSS.2011.253"},{"issue":"3","key":"9972_CR37","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1097\/00006842-199305000-00002","volume":"55","author":"RS Lazarus","year":"1993","unstructured":"Lazarus, R. S. (1993). Coping theory and research: Past, present, and future. Psychosomatic Medicine, 55(3), 234\u2013247.","journal-title":"Psychosomatic Medicine"},{"issue":"1","key":"9972_CR38","doi-asserted-by":"publisher","first-page":"71","DOI":"10.2307\/20650279","volume":"33","author":"H Liang","year":"2009","unstructured":"Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71\u201390.","journal-title":"MIS Quarterly"},{"issue":"2","key":"9972_CR39","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.apergo.2012.09.003","volume":"44","author":"S Malakis","year":"2013","unstructured":"Malakis, S., & Kontogiannis, T. (2013). A sensemaking perspective on framing the mental picture of air traffic controllers. Applied Ergonomics, 44(2), 327\u2013339.","journal-title":"Applied Ergonomics"},{"issue":"6","key":"9972_CR40","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1145\/358141.358148","volume":"26","author":"ML Markus","year":"1983","unstructured":"Markus, M. L. (1983). Power, politics, and MIS implementation. Communications of the ACM, 26(6), 430\u2013444.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9972_CR41","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1080\/0960085X.2018.1524420","volume":"28","author":"M Mesgari","year":"2019","unstructured":"Mesgari, M., & Okoli, C. (2019). Critical review of organisation-technology sensemaking: Towards technology materiality, discovery, and action. European Journal of Information Systems, 28(2), 205\u2013232. https:\/\/doi.org\/10.1080\/0960085X.2018.1524420.","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"9972_CR42","first-page":"145","volume":"29","author":"DT Moore","year":"2011","unstructured":"Moore, D. T., & Hoffman, R. R. (2011). Data-frame theory of sensemaking as a best model for intelligence. American Intelligence Journal, 29(2), 145\u2013158.","journal-title":"American Intelligence Journal"},{"issue":"4","key":"9972_CR43","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.chb.2009.12.015","volume":"26","author":"H Nach","year":"2010","unstructured":"Nach, H., & Lejeune, A. (2010). Coping with information technology challenges to identity: A theoretical framework. Computers in Human Behavior, 26(4), 618\u2013629. https:\/\/doi.org\/10.1016\/j.chb.2009.12.015.","journal-title":"Computers in Human Behavior"},{"key":"9972_CR44","unstructured":"Niehaves, B., Koffer, S., & Ortbach, K. (2012). IT Consumerization\u2014A theory and practice review. Americas Conference on Information Systems (AMCIS 2012). Presented at the Americas conference on information systems (AMCIS 2012)."},{"issue":"4","key":"9972_CR45","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1037\/0022-3514.35.4.250","volume":"35","author":"RE Nisbett","year":"1977","unstructured":"Nisbett, R. E., & Wilson, T. D. (1977). The halo effect: Evidence for unconscious alteration of judgments. Journal of Personality and Social Psychology, 35(4), 250\u2013256.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"9972_CR46","doi-asserted-by":"publisher","first-page":"309","DOI":"10.2307\/249774","volume":"17","author":"W Orlikowski","year":"1993","unstructured":"Orlikowski, W. (1993). CASE tools as organizational change: Investigating incremental and radical changes in systems development. MIS Quarterly, 17(3), 309\u2013340.","journal-title":"MIS Quarterly"},{"issue":"4","key":"9972_CR47","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1287\/orsc.11.4.404.14600","volume":"11","author":"W Orlikowski","year":"2000","unstructured":"Orlikowski, W. (2000). Using technology and constituting structures: A practice lens for studying technology in organizations. Organization Science, 11(4), 404\u2013428.","journal-title":"Organization Science"},{"issue":"1","key":"9972_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/isre.2.1.1","volume":"2","author":"W Orlikowski","year":"1991","unstructured":"Orlikowski, W., & Baroudi, J. J. (1991). Studying information technology in organizations: Research approaches and assumptions. Information Systems Research, 2(1), 1\u201328.","journal-title":"Information Systems Research"},{"issue":"3","key":"9972_CR49","doi-asserted-by":"publisher","first-page":"433","DOI":"10.2307\/20650303","volume":"33","author":"A Ortiz de Guinea","year":"2009","unstructured":"Ortiz de Guinea, A., & Markus, M. L. (2009). Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use. MIS Quarterly, 33(3), 433\u2013444. https:\/\/doi.org\/10.2307\/20650303.","journal-title":"MIS Quarterly"},{"issue":"1","key":"9972_CR50","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1037\/0033-2909.124.1.54","volume":"124","author":"JA Ouellette","year":"1998","unstructured":"Ouellette, J. A., & Wood, W. (1998). Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. Psychological Bulletin, 124(1), 54\u201374.","journal-title":"Psychological Bulletin"},{"key":"9972_CR51","first-page":"697","volume-title":"The SAGE encyclopedia of qualitative research methods","author":"T Palys","year":"2008","unstructured":"Palys, T. (2008). Purposive sampling. In L. M. Given (Ed.), The SAGE encyclopedia of qualitative research methods (Vol. 1 & 2, pp. 697\u2013698). Los Angeles, London, New Delhi, Singapore: SAGE."},{"issue":"1\u20132","key":"9972_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07370024.2011.556557","volume":"26","author":"P Pirolli","year":"2011","unstructured":"Pirolli, P., & Russell, D. M. (2011). Introduction to this special issue on Sensemaking. Human\u2013Computer Interaction, 26(1\u20132), 1\u20138. https:\/\/doi.org\/10.1080\/07370024.2011.556557.","journal-title":"Human\u2013Computer Interaction"},{"key":"9972_CR53","unstructured":"Riemer, K., Overfeld, P., Scifleet, P., & Richter, A. (2012). Eliciting the anatomy of technology appropriation processes: A case study in Enterprise social media. European Conference of Information Systems (ECIS 2012)."},{"key":"9972_CR54","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jbusres.2019.04.014","volume":"101","author":"T R\u00f6th","year":"2019","unstructured":"R\u00f6th, T., & Spieth, P. (2019). The influence of resistance to change on evaluating an innovation project\u2019s innovativeness and risk: A sensemaking perspective. Journal of Business Research, 101, 83\u201392. https:\/\/doi.org\/10.1016\/j.jbusres.2019.04.014.","journal-title":"Journal of Business Research"},{"issue":"3","key":"9972_CR55","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s10796-014-9506-5","volume":"17","author":"R Seethamraju","year":"2015","unstructured":"Seethamraju, R. (2015). Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs). Information Systems Frontiers, 17(3), 475\u2013492. https:\/\/doi.org\/10.1007\/s10796-014-9506-5.","journal-title":"Information Systems Frontiers"},{"key":"9972_CR56","doi-asserted-by":"crossref","unstructured":"Sieck, W. R., Klein, G., Peluso, D. A., Smith, J. L., & Harris-Thompson, D. (2007). FOCUS: A model of sensemaking. United States Army Research Institute for the Behavioral and Social Sciences. Technical Report 1200.","DOI":"10.1037\/e500432012-001"},{"key":"9972_CR57","doi-asserted-by":"publisher","unstructured":"Silic, M., & Lowry, P. B. (2019). Breaking bad in cyberspace: Understanding why and how black hat hackers manage their nerves to commit their virtual crimes. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-019-09949-3.","DOI":"10.1007\/s10796-019-09949-3"},{"key":"9972_CR58","first-page":"213","volume-title":"The SAGE encyclopedia of qualitative research methods","author":"K Smith-Sullivan","year":"2008","unstructured":"Smith-Sullivan, K. (2008). Diaries and journals. In L. M. Given (Ed.), The SAGE encyclopedia of qualitative research methods (Vol. 1 & 2, pp. 213\u2013215). Los Angeles, London, New Delhi, Singapore: SAGE."},{"key":"9972_CR59","doi-asserted-by":"publisher","unstructured":"Soliman, W., & Rinta-Kahila, T. (2019). Toward a refined conceptualization of IS discontinuance: Reflection on the past and a way forward. Information & Management, 103167. https:\/\/doi.org\/10.1016\/j.im.2019.05.002.","DOI":"10.1016\/j.im.2019.05.002"},{"issue":"6","key":"9972_CR60","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1111\/isj.12123","volume":"27","author":"A Spierings","year":"2017","unstructured":"Spierings, A., Kerr, D., & Houghton, L. (2017). Issues that support the creation of ICT workarounds: Towards a theoretical understanding of feral information systems. Information Systems Journal, 27(6), 775\u2013794. https:\/\/doi.org\/10.1111\/isj.12123.","journal-title":"Information Systems Journal"},{"issue":"4","key":"9972_CR61","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1007\/s10796-016-9638-x","volume":"19","author":"M Sprenger","year":"2017","unstructured":"Sprenger, M., Mettler, T., & Winter, R. (2017). A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions. Information Systems Frontiers, 19(4), 899\u2013922. https:\/\/doi.org\/10.1007\/s10796-016-9638-x.","journal-title":"Information Systems Frontiers"},{"key":"9972_CR62","unstructured":"Statista (2019). Tablet market share by vendor 2019. Retrieved October 18, 2019, from Statista website: https:\/\/www.statista.com\/statistics\/276635\/market-share-held-by-tablet-vendors\/."},{"key":"9972_CR63","volume-title":"Grounded theory for qualitative research. A practical guide","author":"C Urquhart","year":"2012","unstructured":"Urquhart, C. (2012). Grounded theory for qualitative research. A practical guide. London: SAGE Publications Ltd.."},{"key":"9972_CR64","unstructured":"Urquhart, C., & Fern\u00e1ndez, W. (2006). Grounded theory method: The researcher as blank slate and other myths. International conference information systems (ICIS 2006), 457\u2013464."},{"issue":"6","key":"9972_CR65","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1111\/j.1365-2575.2011.00373.x","volume":"21","author":"V Venkatesh","year":"2011","unstructured":"Venkatesh, V., Thong, J. Y. L., Chan, F. K. Y., Hu, P. J.-H., & Brown, S. A. (2011). Extending the two-stage information systems continuance model: Incorporating UTAUT predictors and the role of context. Information Systems Journal, 21(6), 527\u2013555.","journal-title":"Information Systems Journal"},{"issue":"2","key":"9972_CR66","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1057\/ejis.1995.9","volume":"4","author":"G Walsham","year":"1995","unstructured":"Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European Journal of Information Systems, 4(2), 74\u201381.","journal-title":"European Journal of Information Systems"},{"key":"9972_CR67","doi-asserted-by":"publisher","unstructured":"Weeger, A., Wang, X., Gewald, H., Raisinghani, M., Sanchez, O., Grant, G., & Pittayachawan, S. (2018). Determinants of intention to participate in corporate BYOD-programs: The case of digital natives. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-018-9857-4.","DOI":"10.1007\/s10796-018-9857-4"},{"issue":"4","key":"9972_CR68","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1111\/j.1467-6486.1988.tb00039.x","volume":"25","author":"KE Weick","year":"1988","unstructured":"Weick, K. E. (1988). Enacted sensemaking in crisis situations. Journal of Management Studies, 25(4), 305\u2013317.","journal-title":"Journal of Management Studies"},{"issue":"4","key":"9972_CR69","doi-asserted-by":"publisher","first-page":"628","DOI":"10.2307\/2393339","volume":"38","author":"KE Weick","year":"1993","unstructured":"Weick, K. E. (1993). The collapse of sensemaking in organizations: The Mann Gulch disaster. Administrative Science Quarterly, 38(4), 628\u2013652.","journal-title":"Administrative Science Quarterly"},{"key":"9972_CR70","volume-title":"Sensemaking in organisations","author":"KE Weick","year":"1995","unstructured":"Weick, K. E. (1995). Sensemaking in organisations. London: Sage."},{"issue":"3","key":"9972_CR71","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1111\/j.1467-6486.2010.00900.x","volume":"47","author":"KE Weick","year":"2010","unstructured":"Weick, K. E. (2010). Reflections on enacted sensemaking in the Bhopal disaster. Journal of Management Studies, 47(3), 537\u2013550. https:\/\/doi.org\/10.1111\/j.1467-6486.2010.00900.x.","journal-title":"Journal of Management Studies"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-019-09972-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-019-09972-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-019-09972-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T04:12:14Z","timestamp":1620792734000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-019-09972-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,20]]},"references-count":71,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["9972"],"URL":"https:\/\/doi.org\/10.1007\/s10796-019-09972-4","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,20]]},"assertion":[{"value":"20 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}