{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T03:50:32Z","timestamp":1773114632296,"version":"3.50.1"},"reference-count":48,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["The Journal of Strategic Information Systems"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1016\/j.jsis.2022.101735","type":"journal-article","created":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T07:19:43Z","timestamp":1659165583000},"page":"101735","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"title":["From information systems resources to effective use: Moderating effect of network embeddedness"],"prefix":"10.1016","volume":"31","author":[{"given":"He","family":"Li","sequence":"first","affiliation":[]},{"given":"Sungjin","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0005","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1287\/isre.2020.0936","article-title":"The Effects of Operational and Financial Performance Failure on BI&A-Enabled Search Behaviors: A Theory of Performance-Driven Search","volume":"31","author":"Anand","year":"2020","journal-title":"Inform. Syst. Res."},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0010","doi-asserted-by":"crossref","first-page":"535","DOI":"10.2307\/249554","article-title":"Production and Transaction Economies and IS Outsourcing: A Study of the U.S. Banking Industry","volume":"22","author":"Ang","year":"1998","journal-title":"MIS Quarterly"},{"issue":"8","key":"10.1016\/j.jsis.2022.101735_b0015","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1287\/mnsc.1100.1183","article-title":"Social Contagion and Information Technology Diffusion: The Adoption of Electronic Medical Records in U.S. Hospitals","volume":"56","author":"Angst","year":"2010","journal-title":"Manage. Sci."},{"issue":"6","key":"10.1016\/j.jsis.2022.101735_b0020","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1287\/mnsc.2017.2750","article-title":"The Spillover Effects of Health IT Investments on Regional Healthcare Costs","volume":"64","author":"Atasoy","year":"2018","journal-title":"Manage. Sci."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0025","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1080\/07421222.2017.1373003","article-title":"Reflective Technology Assimilation: Facilitating Electronic Health Record Assimilation in Small Physician Practices","volume":"34","author":"Baird","year":"2017","journal-title":"J. Manage. Inform. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0030","doi-asserted-by":"crossref","first-page":"169","DOI":"10.2307\/3250983","article-title":"A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation","volume":"24","author":"Bharadwaj","year":"2000","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0035","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1287\/isre.1120.0444","article-title":"From Use to Effective Use: A Representation Theory Perspective","volume":"24","author":"Burton-Jones","year":"2013","journal-title":"Inform. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0040","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1287\/isre.2017.0702","article-title":"How Can We Develop Contextualized Theories of Effective Use? A Demonstration in the Context of Community-Care Electronic Health Records","volume":"28","author":"Burton-Jones","year":"2017","journal-title":"Inform. Syst. Res."},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0045","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1057\/palgrave.ejis.3000454","article-title":"Using Resource-Based Theory to Interpret the Successful Adoption and Use of Information Systems and Technology in Manufacturing Small and Medium-Sized Enterprise","volume":"12","author":"Caldeira","year":"2003","journal-title":"Eur. J. Inform. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0050","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1287\/isre.1090.0278","article-title":"Alliances, Rivalry, and Firm Performance in Enterprise Systems Software Markets: A Social Network Approach","volume":"21","author":"Chellappa","year":"2010","journal-title":"Inform. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0055","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1287\/isre.1100.0296","article-title":"Information Technology, Network Structure, and Competitive Action","volume":"21","author":"Chi","year":"2010","journal-title":"Inform. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0060","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1287\/mnsc.49.3.273.12736","article-title":"Performance Impacts of Information Technology: Is Actual Usage the Missing Link?","volume":"49","author":"Devaraj","year":"2003","journal-title":"Manage. Sci."},{"issue":"9-10","key":"10.1016\/j.jsis.2022.101735_b0065","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.infsof.2008.01.006","article-title":"Empirical Studies of Agile Software Development: A Systematic Review","volume":"50","author":"Dyb\u00e5","year":"2008","journal-title":"Inf. Softw. Technol."},{"issue":"13","key":"10.1016\/j.jsis.2022.101735_b0070","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1002\/smj.503","article-title":"Efficiency, Flexibility, or Both? Evidence Linking Strategy to Performance in Small Firms","volume":"26","author":"Ebben","year":"2005","journal-title":"Strateg. Manag. J."},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0075","doi-asserted-by":"crossref","first-page":"393","DOI":"10.25300\/MISQ\/2015\/39.2.06","article-title":"Leading Collaboration in Online Communities","volume":"39","author":"Faraj","year":"2015","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0080","first-page":"210","article-title":"Ownership and the Internalization of Small Firms","volume":"31","author":"George","year":"2005","journal-title":"J. Manage."},{"issue":"7","key":"10.1016\/j.jsis.2022.101735_b0085","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1287\/mnsc.1060.0550","article-title":"Location, Location, Location: How Network Embeddedness Affects Project Success in Open Source Systems","volume":"52","author":"Grewal","year":"2006","journal-title":"Manage. Sci."},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0090","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1002\/(SICI)1097-0266(199804)19:4<293::AID-SMJ982>3.0.CO;2-M","article-title":"Alliances and Networks","volume":"19","author":"Gulati","year":"1998","journal-title":"Strateg. Manag. J."},{"issue":"5","key":"10.1016\/j.jsis.2022.101735_b0095","doi-asserted-by":"crossref","first-page":"1439","DOI":"10.1086\/210179","article-title":"Where Do Interorganizational Networks Come From?","volume":"104","author":"Gulati","year":"1999","journal-title":"Am. J. Sociol."},{"key":"10.1016\/j.jsis.2022.101735_b0100","first-page":"133","article-title":"Unbundling the Corporation","volume":"77","author":"Hagel","year":"1999","journal-title":"Harvard Business Rev."},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0105","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1287\/isre.2017.0746","article-title":"Quantifying the Impact of Social Influence on the Information Technology Implementation Process by Physicians: A Hierarchical Bayesian Learning Approach","volume":"29","author":"Hao","year":"2018","journal-title":"Inform. Syst. Res."},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0110","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1057\/palgrave.ejis.3000446","article-title":"The Business Model Concept: Theoretical Underpnnings and Empirical Illustrations","volume":"12","author":"Hedman","year":"2003","journal-title":"Eur. J. Inform. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0115","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.2307\/41409973","article-title":"Centrality-IS Proficieny Alignment and Workgroup Performance","volume":"35","author":"Kane","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0120","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1287\/isre.2016.0622","article-title":"Content and Collaboration: An Affiliation Network Approach to Information Quality in Online Peer Production Communities","volume":"27","author":"Kane","year":"2016","journal-title":"Inform. Syst. Res."},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0125","doi-asserted-by":"crossref","first-page":"274","DOI":"10.25300\/MISQ\/2014\/38.1.13","article-title":"What\u2019s Different about Social Media Networks? A Framework and Research Agenda","volume":"38","author":"Kane","year":"2014","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0130","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1287\/isre.1120.0473","article-title":"A View from the Top: Integrated Information Delivery and Effective Information Use from the Senior Executive\u2019s Perspective","volume":"24","author":"Kettinger","year":"2013","journal-title":"Inform. Syst. Res."},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0135","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1287\/isre.2019.0858","article-title":"How Do EHRs and a Meaningful Use Initiative Affect Breaches of Patient Information?","volume":"30","author":"Kim","year":"2019","journal-title":"Inform. Syst. Res."},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0140","first-page":"23","article-title":"Business Value of IT: An Essay on Expanding Research Directions to Keep up with the Times","volume":"9","author":"Kohli","year":"2008","journal-title":"J. Assoc. Inform. Syst."},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0145","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.25300\/MISQ\/2018\/13580","article-title":"Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?","volume":"42","author":"Kwon","year":"2018","journal-title":"MIS Quarterly"},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0150","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.25300\/MISQ\/2019\/14370","article-title":"Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach","volume":"43","author":"Lee","year":"2019","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0155","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management","volume":"31","author":"Liang","year":"2007","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0160","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1287\/isre.2018.0813","article-title":"Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act","volume":"30","author":"Lin","year":"2019","journal-title":"Inform. Syst. Res."},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0165","doi-asserted-by":"crossref","first-page":"283","DOI":"10.2307\/25148636","article-title":"Review: Information Technology and Organizational Performance: An Integrative Model of IT Business Value","volume":"28","author":"Melville","year":"2004","journal-title":"MIS Quarterly"},{"issue":"3-part-1","key":"10.1016\/j.jsis.2022.101735_b0170","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1287\/isre.1110.0407","article-title":"Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective","volume":"23","author":"Mishra","year":"2012","journal-title":"Inform. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0175","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1287\/isre.1110.0349","article-title":"An Analysis of the Adoption of Digital Health Records Under Switching Costs","volume":"22","author":"Ozdemir","year":"2011","journal-title":"Inform. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0180","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1287\/isre.1060.0094","article-title":"From IT Leveraging Competence to Competitive Advantage in Turbulent Environments: The Case of New Product Development","volume":"17","author":"Pavlou","year":"2006","journal-title":"Inform. Syst. Res."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0185","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07421222.2014.994672","article-title":"Healthcare IT Adoption: An Analysis of Knowledge Transfer in Socioeconomic Networks","volume":"31","author":"Peng","year":"2014","journal-title":"J. Manage. Inform. Syst."},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0190","doi-asserted-by":"crossref","first-page":"189","DOI":"10.25300\/MISQ\/2018\/13275","article-title":"CPOE-Enabled Coordination: Appropriation for Deep Structure Use and Impacts on Patient Outcomes","volume":"42","author":"Romanow","year":"2018","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0195","first-page":"31","article-title":"Developing Long-Term Competitiveness through IT Resources","volume":"38","author":"Ross","year":"1996","journal-title":"Sloan Manage. Rev."},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0200","doi-asserted-by":"crossref","first-page":"261","DOI":"10.2307\/249754","article-title":"Arrangements for Information Technology Governance: A Theory of Multiple Contingencies","volume":"23","author":"Sambamurthy","year":"1999","journal-title":"MIS Quarterly"},{"issue":"3-part-1","key":"10.1016\/j.jsis.2022.101735_b0205","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1287\/isre.1110.0388","article-title":"The Effects of Social Network Structure on Enterprise Systems Success: A Longitudinal Multilevel Analysis","volume":"23","author":"Sasidharan","year":"2012","journal-title":"Inform. Syst. Res."},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0210","doi-asserted-by":"crossref","first-page":"533","DOI":"10.2307\/30036548","article-title":"The Contingent Effects of Management Support and Task Interdependence on Successful Information Systems Implementation","volume":"27","author":"Sharma","year":"2003","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0215","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0305-0483(00)00035-9","article-title":"Resource Constraints and Information Systems Implementation in Singaporean Small Businesses","volume":"29","author":"Thong","year":"2001","journal-title":"Omega"},{"issue":"4","key":"10.1016\/j.jsis.2022.101735_b0220","doi-asserted-by":"crossref","first-page":"674","DOI":"10.2307\/2096399","article-title":"The Sources and Consequences of Embeddedness for the Economic Performance of Organizations: The Network Effect","volume":"61","author":"Uzzi","year":"1996","journal-title":"Am. Sociol. Rev."},{"issue":"1","key":"10.1016\/j.jsis.2022.101735_b0225","doi-asserted-by":"crossref","first-page":"107","DOI":"10.2307\/25148626","article-title":"Review: The Resource-Based View and Information Systems Research: Review, Extension, and Suggestions for Future Research","volume":"28","author":"Wade","year":"2004","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0230","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.jsis.2016.01.003","article-title":"Expectable Use: An Important Facet of IT Usage","volume":"25","author":"Walsh","year":"2016","journal-title":"J. Strategic Inform. Syst."},{"issue":"2","key":"10.1016\/j.jsis.2022.101735_b0235","doi-asserted-by":"crossref","first-page":"325","DOI":"10.2753\/MIS0742-1222290211","article-title":"Resource Structuring or Capability Building? An Empirical Study of the Business Value of Information Technology","volume":"29","author":"Wang","year":"2012","journal-title":"J. Manage. Inform. Syst."},{"issue":"3","key":"10.1016\/j.jsis.2022.101735_b0240","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1287\/isre.2015.0585","article-title":"Network Dynamics: How Can We Find Patients Like Us?","volume":"26","author":"Yan","year":"2015","journal-title":"Inform. Syst. Res."}],"container-title":["The Journal of Strategic Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0963868722000312?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0963868722000312?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T13:02:49Z","timestamp":1760792569000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0963868722000312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["S0963868722000312"],"URL":"https:\/\/doi.org\/10.1016\/j.jsis.2022.101735","relation":{},"ISSN":["0963-8687"],"issn-type":[{"value":"0963-8687","type":"print"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"From information systems resources to effective use: Moderating effect of network embeddedness","name":"articletitle","label":"Article Title"},{"value":"The Journal of Strategic Information Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jsis.2022.101735","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101735"}}