{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T08:29:58Z","timestamp":1714033798974},"reference-count":70,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Systems Management"],"published-print":{"date-parts":[[2016,4,2]]},"DOI":"10.1080\/10580530.2016.1155951","type":"journal-article","created":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T03:47:55Z","timestamp":1456372075000},"page":"179-195","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["User Resistance to Information System Implementations: A Dual-Mode Processing Perspective"],"prefix":"10.1080","volume":"33","author":[{"given":"Robert Hugh","family":"Campbell","sequence":"first","affiliation":[]},{"given":"Mark","family":"Grimshaw","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"issue":"3","key":"CIT0002","first-page":"46","volume":"7","author":"Akpinar Y.","year":"2008","journal-title":"The Turkish Online Journal of Educational Technology"},{"issue":"3","key":"CIT0003","doi-asserted-by":"crossref","first-page":"835","DOI":"10.25300\/MISQ\/2013\/37.3.08","volume":"37","author":"Allen D. K.","year":"2013","journal-title":"MIS Quarterly"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2008.12.014"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00026-3"},{"key":"CIT0007","volume-title":"Social Learning Theory","author":"Bandura A.","year":"1977"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1037\/h0076771"},{"key":"CIT0009","volume-title":"Judgment in managerial decision making","author":"Bazerman M. H.","year":"2006"},{"issue":"3","key":"CIT0010","doi-asserted-by":"crossref","first-page":"493","DOI":"10.2307\/25148693","volume":"29","author":"Beaudry A.","year":"2005","journal-title":"MIS Quarterly"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"issue":"4","key":"CIT0012","doi-asserted-by":"crossref","first-page":"805","DOI":"10.2307\/25148755","volume":"30","author":"Bhattacherjee A.","year":"2006","journal-title":"MIS Quarterly"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/s12063-012-0062-1"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1037\/h0021225"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1207\/s15324834basp1901_2"},{"key":"CIT0016","volume-title":"Unintended thought","author":"Chaiken S.","year":"1989"},{"key":"CIT0017","unstructured":"Coklin, A. (2006).Computer security behaviors of home PC users: A diffusion of innovation approach(Ph.D. thesis). University of Texas at San Antonio, San Antonio, TX."},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1177\/1468794106065007"},{"key":"CIT0020","doi-asserted-by":"crossref","DOI":"10.4135\/9781412983235","volume-title":"A narrative approach to organization studies","author":"Czarniawska B.","year":"1998"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"CIT0022","doi-asserted-by":"crossref","first-page":"37","DOI":"10.28945\/427","volume":"12","author":"Donat E.","year":"2009","journal-title":"Informing Science: the International Journal of an Emerging Transdiscipline"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000629"},{"key":"CIT0024","volume-title":"Belief, attitude, intention and behaviour: An introduction to theory and research","author":"Fishbein M.","year":"1975"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000541"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(08)60212-9"},{"key":"CIT0027","volume-title":"Stages of scale development and validation: The example of the generalized expertise measure (GEM)","author":"Germain M.","year":"2006"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1108\/03090590910985381"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.43.1.159"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1111\/puar.2007.67.issue-5"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X05279903"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.11.009"},{"issue":"3","key":"CIT0033","doi-asserted-by":"crossref","first-page":"567","DOI":"10.2307\/20650309","volume":"33","author":"Hee-Woong K.","year":"2009","journal-title":"Management Information Systems Quarterly"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/31.5.398"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1995.1039"},{"issue":"1","key":"CIT0036","first-page":"41","volume":"2","author":"Johnson J.","year":"1995","journal-title":"Application Development Trends"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1111\/joms.2005.42.issue-2"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1177\/002200275800200106"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1823-1"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1145\/1120501.1120506"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.01.011"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.05.003"},{"key":"CIT0043","volume-title":"Experiential learning: Experience as the source of learning and development","author":"Kolb D. A.","year":"1984"},{"key":"CIT0044","doi-asserted-by":"crossref","first-page":"461","DOI":"10.2307\/25148692","volume":"29","author":"Lapointe L.","year":"2005","journal-title":"MIS Quarterly"},{"key":"CIT0045","volume-title":"Information systems theory\u2014explaining and predicting our digital society","volume":"1","author":"Laumer S.","year":"2012"},{"issue":"1","key":"CIT0046","first-page":"147","volume":"18","author":"Lee W.","year":"2008","journal-title":"Asia Pacific Journal of Information Systems"},{"issue":"12","key":"CIT0047","first-page":"1","volume":"31","author":"Lee W.","year":"2011","journal-title":"Behaviour & Information Technology"},{"key":"CIT0048","volume-title":"Thought reform and the psychology of totalism: A study of \u201cbrainwashing\u201d in China","author":"Lifton R. J.","year":"1961"},{"key":"CIT0049","first-page":"257","volume":"4","author":"Lyytinen K.","year":"1987","journal-title":"Oxford Surveys in Information Technology"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(96)00010-9"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00061-6"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.2.5.523"},{"issue":"2","key":"CIT0055","first-page":"327","volume":"12","author":"Nolon S. F.","year":"2011","journal-title":"Cardozo Journal of Conflict Negotiation"},{"key":"CIT0056","first-page":"105","volume":"41","author":"Onwuegbuzie A. J.","year":"2007","journal-title":"International Journal of Methodology"},{"key":"CIT0057","volume-title":"Imagery and verbal processes","author":"Paivio A.","year":"1971"},{"key":"CIT0058","volume-title":"Mental representations: A dual-coding approach","author":"Paivio A.","year":"1986"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4964-1"},{"key":"CIT0060","volume-title":"The handbook of social psychology","author":"Petty R. E.","year":"1998","edition":"4"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1207\/pspr.1997.1.issue-1"},{"key":"CIT0062","volume-title":"Attitude organization and change","author":"Rosenburg M.","year":"1960"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.12.013"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.10.007"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1111\/isj.2012.22.issue-4"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1080\/10196780601136708"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1108\/09534819610113739"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.1.47.14767"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1177\/146879410200200304"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-8-53"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"issue":"3","key":"CIT0074","doi-asserted-by":"crossref","first-page":"426","DOI":"10.2307\/30036540","volume":"27","author":"Venkatesh V.","year":"2003","journal-title":"MIS Quarterly"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.51.1.539"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21116"}],"container-title":["Information Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10580530.2016.1155951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T23:44:17Z","timestamp":1567640657000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10580530.2016.1155951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,24]]},"references-count":70,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2016,2,24]]},"published-print":{"date-parts":[[2016,4,2]]}},"alternative-id":["10.1080\/10580530.2016.1155951"],"URL":"https:\/\/doi.org\/10.1080\/10580530.2016.1155951","relation":{},"ISSN":["1058-0530","1934-8703"],"issn-type":[{"value":"1058-0530","type":"print"},{"value":"1934-8703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uism20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}