{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T11:00:08Z","timestamp":1776682808905,"version":"3.51.2"},"reference-count":71,"publisher":"Emerald","issue":"8","license":[{"start":{"date-parts":[[2007,10,2]],"date-time":"2007-10-02T00:00:00Z","timestamp":1191283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10,2]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Using the extended task\u2010technology fit (TTF) model, the purpose of this paper is to examine the impact of intranet usage on middle managers' performance in the port industry.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The study was conducted on 357 middle managers from various organisations in the Malaysian port industry.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The structural equation modelling results indicate that TTF and usage significantly explains the variance on managers' performance. TTF is a predictor of perceived usefulness and usage but it does not predict user resistance. Perceived usefulness is a predictor of usage but it does not predict user resistance. User resistance does not predict managers' performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The study focuses only on the port industry in Malaysia and concentrates only on the management perspective of intranet usage.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The results provide insights on how the Malaysian port industry and other organisations of a similar structure could improve on their intranet adoption.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This study is perhaps one of the first to address the intranet adoption in the port industry using a comprehensive, extended TTF model (perceived usefulness, usage, user resistance) to investigate their influences on individual job performance.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635570710822831","type":"journal-article","created":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T07:02:40Z","timestamp":1188630160000},"page":"1227-1250","source":"Crossref","is-referenced-by-count":49,"title":["Intranet usage and managers' performance in the port industry"],"prefix":"10.1108","volume":"107","author":[{"given":"Mohd","family":"Daud Norzaidi","sequence":"first","affiliation":[]},{"given":"Siong","family":"Choy Chong","sequence":"additional","affiliation":[]},{"given":"Raman","family":"Murali","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Intan Salwani","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012620363027600_b1","doi-asserted-by":"crossref","unstructured":"Bagozzi, R.P. and Phillips, L.W. (1982), \u201cRepresenting and testing organisation theories: a holistic construal\u201d, Administrative Science Quarterly, Vol. 27 No. 3, pp. 459\u201089.","DOI":"10.2307\/2392322"},{"key":"key2022012620363027600_b2","unstructured":"Barbera, J. (1996), \u201cThe intranet: a new concept for corporate information handling\u201d, Online Information 96 Proceedings, pp. 187\u201093."},{"key":"key2022012620363027600_b3","unstructured":"Browne, M.W. and Cudek, R. (1993), \u201cAlternative ways of assessing model fit\u201d, in Bollen, K.A. and Long, J.S. (Eds), Testing Structural Equation Models, Sage, Newbury Park, CA."},{"key":"key2022012620363027600_b4","doi-asserted-by":"crossref","unstructured":"Bukhari, R.H. (2005), \u201cThe relationship between system usage and user satisfaction: a meta\u2010analysis\u201d, The Journal of Enterprise Information Management, Vol. 18 No. 2, pp. 211\u201034.","DOI":"10.1108\/17410390510579927"},{"key":"key2022012620363027600_b5","unstructured":"Chong, S.C. and Choi, Y.S. (2005), \u201cCritical factors in the successful implementation of knowledge management\u201d, Journal of Knowledge Management Practice, Vol. 6, available at: www.tlainc.com\/articl90.htm\/."},{"key":"key2022012620363027600_b6","doi-asserted-by":"crossref","unstructured":"Cumming, M. and Cuthbertson, L. (2001), \u201cWired in Whitehall: a survey of internet and intranet use in government\u201d, Aslib Proceedings, Vol. 53 No. 1, pp. 32\u20108.","DOI":"10.1108\/EUM0000000007035"},{"key":"key2022012620363027600_b7","doi-asserted-by":"crossref","unstructured":"D'Ambra, J. and Wilson, C.S. (2004), \u201cUse of the world wide web for international travel: integrating the construct of uncertainty in information seeking and the task\u2010technology fit (TTF) model\u201d, Journal of the American Society for Information Science and Technology, Vol. 55 No. 8, pp. 731\u201042.","DOI":"10.1002\/asi.20017"},{"key":"key2022012620363027600_b8","unstructured":"Dan, V. (2002), \u201cUsers continue to feel pain on navy's intranet\u201d, Computerworld, Vol. 36 No. 45, pp. 22\u20105."},{"key":"key2022012620363027600_b9","doi-asserted-by":"crossref","unstructured":"Davidson, R.S. and Walley, P.B. (1985), \u201cComputer fear and addiction: analysis prevention and possible modification\u201d, Journal of Organizational Behaviour Management, Vol. 6 Nos 3\/4, pp. 37\u201052.","DOI":"10.1300\/J075v06n03_03"},{"key":"key2022012620363027600_b10","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 319\u201042.","DOI":"10.2307\/249008"},{"key":"key2022012620363027600_b11","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022012620363027600_b12","doi-asserted-by":"crossref","unstructured":"Delone, W.H. and McLane, E.R. (1992), \u201cInformation systems success: the quest for the dependent variable\u201d, Information Systems Research, Vol. 3 No. 1, pp. 60\u201095.","DOI":"10.1287\/isre.3.1.60"},{"key":"key2022012620363027600_b13","doi-asserted-by":"crossref","unstructured":"Dishaw, M.T. and Strong, D.M. (1998), \u201cAssessing software maintenance tool utilisation using task\u2010technology fit and fitness\u2010for\u2010use models\u201d, Journal of Software Maintenance Research and Practice, Vol. 10 No. 3, pp. 151\u201079.","DOI":"10.1002\/(SICI)1096-908X(199805\/06)10:3<151::AID-SMR165>3.0.CO;2-#"},{"key":"key2022012620363027600_b14","doi-asserted-by":"crossref","unstructured":"Dishaw, M.T. and Strong, D.M. (1999), \u201cExtending the technology acceptance model with task\u2010technology fit constructs\u201d, Information & Management, Vol. 36 No. 1, pp. 9\u201021.","DOI":"10.1016\/S0378-7206(98)00101-3"},{"key":"key2022012620363027600_b15","unstructured":"Dishaw, M.T., Strong, D.M. and Bandy, D.B. (2002), \u201cExtending the task\u2010technology fit model with self\u2010efficacy construct\u201d, Proceedings of the Eight Americas Conferences on Information System, pp. 1021\u20107."},{"key":"key2022012620363027600_b16","doi-asserted-by":"crossref","unstructured":"Drennan, J. (1999), \u201cThe introduction of intranets into the newspaper industry\u201d, Aslib Proceedings, Vol. 51 No. 8, pp. 269\u201074.","DOI":"10.1108\/EUM0000000006986"},{"key":"key2022012620363027600_b17","doi-asserted-by":"crossref","unstructured":"Duane, A. and Finnegan, P. (2003), \u201cManaging empowerment and control in an intranet environment\u201d, Information Systems Journal, Vol. 13 No. 2, pp. 133\u201058.","DOI":"10.1046\/j.1365-2575.2003.00148.x"},{"key":"key2022012620363027600_b18","unstructured":"Fisher, W. and Wesolkowski, S. (1999), \u201cThe social and economic costs of technology resistance\u201d, IEEE Canadian Review, No. 31, pp. 14\u201017."},{"key":"key2022012620363027600_b19","doi-asserted-by":"crossref","unstructured":"Gebauer, J. and Shaw, J.M. (2004), \u201cSuccess factors an impact of mobile business applications: results from a mobile e\u2010procument study\u201d, International Journal of Electronic Commerce, Vol. 8 No. 3, pp. 19\u201041.","DOI":"10.1080\/10864415.2004.11044304"},{"key":"key2022012620363027600_b20","doi-asserted-by":"crossref","unstructured":"Goodhue, D.L. (1995), \u201cUnderstanding user evaluations of information systems\u201d, Management Science, Vol. 41 No. 12, pp. 1827\u201044.","DOI":"10.1287\/mnsc.41.12.1827"},{"key":"key2022012620363027600_b21","doi-asserted-by":"crossref","unstructured":"Goodhue, D.L. (1998), \u201cDevelopment and measurement validity of a task\u2010technology fit instrument for user evaluations of information systems\u201d, Decision Sciences, Vol. 29 No. 1, pp. 105\u201038.","DOI":"10.1111\/j.1540-5915.1998.tb01346.x"},{"key":"key2022012620363027600_b22","doi-asserted-by":"crossref","unstructured":"Goodhue, D.L. and Thompson, R.L. (1995), \u201cTask\u2010technology fit and individual performance\u201d, MIS Quarterly, Vol. 19 No. 2, pp. 213\u201036.","DOI":"10.2307\/249689"},{"key":"key2022012620363027600_b23","doi-asserted-by":"crossref","unstructured":"Goodhue, D.L., Klein, B.D. and March, S.T. (2000), \u201cUser evaluations of IS as surrogates for objective performance\u201d, Information & Management, Vol. 38 No. 2, pp. 87\u2010101.","DOI":"10.1016\/S0378-7206(00)00057-4"},{"key":"key2022012620363027600_b24","doi-asserted-by":"crossref","unstructured":"Horton, R.P., Buck, P., Waterson, P.E. and Clegg, C.W. (2001), \u201cExplaining intranet use with the technology acceptance model\u201d, Journal of Information Technology, Vol. 16 No. 4, pp. 237\u201049.","DOI":"10.1080\/02683960110102407"},{"key":"key2022012620363027600_b25","unstructured":"Hussey, J. and Hussey, R. (1997), Business Research: A Practical Guide for Undergraduate and Postgraduate Student, Macmillan, London."},{"key":"key2022012620363027600_b26","doi-asserted-by":"crossref","unstructured":"Igbaria, M. (1990), \u201cEnd user computing effectiveness: a structural equation model\u201d, Omega International Journal of Management Science, Vol. 18 No. 6, pp. 637\u201052.","DOI":"10.1016\/0305-0483(90)90055-E"},{"key":"key2022012620363027600_b27","doi-asserted-by":"crossref","unstructured":"Iivari, J. (2005), \u201cAn empirical test of the DeLone\u2010McLane Model of information system success\u201d, The DATA BASE for Advances in Information Systems, Vol. 36 No. 2, pp. 8\u201024.","DOI":"10.1145\/1066149.1066152"},{"key":"key2022012620363027600_b28","doi-asserted-by":"crossref","unstructured":"Ioimo, R.E. and Aronson, J.E. (2003), \u201cThe benefits of police field mobile computing realised by non\u2010patrol sections of a police department\u201d, International Journal of Police Science and Management, Vol. 5 No. 3, pp. 195\u2010206.","DOI":"10.1350\/ijps.5.3.195.16066"},{"key":"key2022012620363027600_b29","doi-asserted-by":"crossref","unstructured":"Jarvenpaa, S.L. and Ives, B. (1991), \u201cExecutive involvement in managing information technology: a model and a field survey\u201d, MIS Quarterly, Vol. 15 No. 4, pp. 205\u201028.","DOI":"10.2307\/249382"},{"key":"key2022012620363027600_b30","doi-asserted-by":"crossref","unstructured":"Jen, H.W., Yi, C.C., Jack, C. and Binshan, L. (2007), \u201cClosing off the knowledge gaps in IS education\u201d, International Journal of Innovation and Learning, Vol. 4 No. 4, pp. 357\u201075.","DOI":"10.1504\/IJIL.2007.012576"},{"key":"key2022012620363027600_b31","doi-asserted-by":"crossref","unstructured":"Joshi, K. (1992), \u201cA causal path model of the overall user attitudes towards the MIS function: the case of user information satisfaction\u201d, Information & Management, Vol. 22 No. 2, pp. 77\u201088.","DOI":"10.1016\/0378-7206(92)90063-L"},{"key":"key2022012620363027600_b32","doi-asserted-by":"crossref","unstructured":"Joshi, K. (2005), \u201cUnderstanding user resistance and acceptance during the implementation of an order management system: a case study using the equity implementation model\u201d, Journal of Information Technology Cases and Application Research, Vol. 7 No. 1, pp. 6\u201020.","DOI":"10.1080\/15228053.2005.10856057"},{"key":"key2022012620363027600_b33","unstructured":"Klooping, I.M. and McKinney, E. (2004), \u201cExtending the technology acceptance model and the task\u2010technology fit model to consumer e\u2010commerce\u201d, Information Technology, Learning, and Performance Journal, Vol. 22 No. 1, pp. 35\u20108."},{"key":"key2022012620363027600_b54","doi-asserted-by":"crossref","unstructured":"Kumar, S. and Liu, D. (2005), \u201cImpact of globalisation on entrepreneurial enterprises in the world markets\u201d, International Journal of Management and Enterprise Development, Vol. 2 No. 1, pp. 46\u201064.","DOI":"10.1504\/IJMED.2005.006026"},{"key":"key2022012620363027600_b34","doi-asserted-by":"crossref","unstructured":"Lawrence, M. and Low, G. (1993), \u201cExploring individual user satisfaction within user\u2010led development\u201d, MIS Quarterly, Vol. 17 No. 2, pp. 195\u2010208.","DOI":"10.2307\/249801"},{"key":"key2022012620363027600_b35","doi-asserted-by":"crossref","unstructured":"Legris, P., Ingham, J. and Collerette, P. (2003), \u201cWhy do people use information technology? A critical review of the technology acceptance model\u201d, Information & Management, Vol. 40 No. 3, pp. 191\u2010204.","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"key2022012620363027600_b36","doi-asserted-by":"crossref","unstructured":"Leonard, B.D.A. and Deschamps, I. (1988), \u201cManagerial influences in the implementation of new technology\u201d, Management Science, Vol. 34 No. 10, pp. 1252\u201065.","DOI":"10.1287\/mnsc.34.10.1252"},{"key":"key2022012620363027600_b41","unstructured":"McCloskey, D. (2003), \u201cEvaluating electronic commerce acceptance with the technology acceptance model\u201d, Journal of Computer Information System, Vol. 44 No. 2, pp. 49\u201057."},{"key":"key2022012620363027600_b37","unstructured":"Malhotra, Y. and Galletta, D.F. (1999), \u201cExtending the technology acceptance model to account for social influence: theoretical bases and empirical validation\u201d, Proceedings of the 32nd Hawaii International Conference on System Sciences, IEEE Computer Society Press, Los Alamitos, CA, pp. 6\u201019."},{"key":"key2022012620363027600_b38","doi-asserted-by":"crossref","unstructured":"Martinko, M.J., Henry, J.W. and Zmud, R.W. (1996), \u201cAn attribute explanation of individual resistance to the introduction of information technologies in the workplace\u201d, Behaviour and Information Technology, Vol. 15 No. 5, pp. 313\u201030.","DOI":"10.1080\/014492996120085a"},{"key":"key2022012620363027600_b39","doi-asserted-by":"crossref","unstructured":"Mawhinney, C.H. and Lederer, A.L. (1990), \u201cA study of personal utilisation by managers\u201d, Information & Management, Vol. 18 No. 5, pp. 243\u201053.","DOI":"10.1016\/0378-7206(90)90026-E"},{"key":"key2022012620363027600_b40","doi-asserted-by":"crossref","unstructured":"Mazuki, J., Mohd Rizal, A.R. and Chong, S.C. (2007), \u201cEmployers' preference and assessment of the qualities of fresh business graduates: empirical evidence from Malaysia\u201d, International Journal of Management and Enterprise Development, Vol. 4 No. 3, pp. 316\u201036.","DOI":"10.1504\/IJMED.2007.012682"},{"key":"key2022012620363027600_b42","doi-asserted-by":"crossref","unstructured":"Miles, J.N.V. (2000), \u201cStatistical software for microcomputer: AMOS 4.0\u201d, British Journal of Mathematics and Statistical Psychology, Vol. 53 No. 1, pp. 141\u20104.","DOI":"10.1348\/000711000159141"},{"key":"key2022012620363027600_b43","doi-asserted-by":"crossref","unstructured":"Milman, Z. and Hartwick, J. (1987), \u201cThe impact of automated office systems on middle managers and their work\u201d, MIS Quarterly, Vol. 11 No. 3, pp. 479\u201091.","DOI":"10.2307\/248977"},{"key":"key2022012620363027600_b44","unstructured":"Moore, G.C. and Benbasat, I. (1992), \u201cAn empirical examination of a model of the factors affecting utilisation of information technology end users\u201d, working paper, University of British Columbia, Vancouver."},{"key":"key2022012620363027600_b45","doi-asserted-by":"crossref","unstructured":"Naveed, S. (1996), \u201cAn empirical test of the contingency approach to user participation in information systems development\u201d, Journal of Management Information Systems, Vol. 13 No. 1, pp. 145\u201066.","DOI":"10.1080\/07421222.1996.11518116"},{"key":"key2022012620363027600_b46","unstructured":"Neumann, S. and Segev, E. (1980), \u201cEvaluate your information system\u201d, Journal of Systems Management, Vol. 31, pp. 31\u201041."},{"key":"key2022012620363027600_b47","doi-asserted-by":"crossref","unstructured":"Newell, S., Scarbrough, H. and Swan, J. (2001), \u201cFrom global knowledge management to internal electronic fences: contradictory outcomes of intranet development\u201d, British Journal of Management, Vol. 12 No. 2, pp. 97\u2010111.","DOI":"10.1111\/1467-8551.00188"},{"key":"key2022012620363027600_b48","unstructured":"Norzaidi, M.D. and Intan Salwani, M. (2006), \u201cCorporate intranet implementation and middle manager's performance in port industry in Malaysia\u201d, paper presented at 3rd Seoul International Invention Fair (SIIF), Seoul."},{"key":"key2022012620363027600_b49","unstructured":"Norzaidi, M.D. and Intan Salwani, M. (2007a), Information Technology Management (IT) Models: An Introduction, University Publication Centre, Shah Alam."},{"key":"key2022012620363027600_b50","unstructured":"Norzaidi, M.D. and Intan Salwani, M. (2007b), Intranet and Electronic Data Interchange (EDI) Usage in Malaysia Port Industry, University Publication Centre, Shah Alam."},{"key":"key2022012620363027600_b51","unstructured":"Nunnally, J.C. (1978), Psychometric Theory, McGraw\u2010Hill, New York, NY."},{"key":"key2022012620363027600_b53","doi-asserted-by":"crossref","unstructured":"Perrons, R.K. and Platts, K. (2005), \u201cMake\u2010buy decision in the face of technological change: does industry clockspeed matter?\u201d, International Journal of Management and Enterprise Development, Vol. 2 No. 1, pp. 1\u201011.","DOI":"10.1504\/IJMED.2005.006020"},{"key":"key2022012620363027600_b52","doi-asserted-by":"crossref","unstructured":"Phelps, R. and Mok, M. (1999), \u201cManaging the risks of intranet implementation: an empirical study of user satisfaction\u201d, Journal of Information Technology, Vol. 14 No. 1, pp. 39\u201052.","DOI":"10.1177\/026839629901400104"},{"key":"key2022012620363027600_b55","unstructured":"Seddon, P. and Kiew, M. (1995), \u201cA partial test and development of the DeLone and McLean Model of IS success\u201d, Proceedings of the Fifteenth International Conference on Information Systems, Vancouver, pp. 99\u2010110."},{"key":"key2022012620363027600_b56","doi-asserted-by":"crossref","unstructured":"Segar, A.H. and Grover, V. (1993), \u201cRe\u2010examining perceived ease of use and usefulness: a confirmatory factor analysis\u201d, MIS Quarterly, Vol. 17 No. 4, pp. 517\u201025.","DOI":"10.2307\/249590"},{"key":"key2022012620363027600_b57","unstructured":"Sekaran, U. (2003), Research Methods for Business, Wiley, New York, NY."},{"key":"key2022012620363027600_b58","unstructured":"Sherwood, G. (2001), \u201cDigital denial: managing the human element of technology\u201d, Journal of Property Management, September\/October, pp. 71\u20103."},{"key":"key2022012620363027600_b59","doi-asserted-by":"crossref","unstructured":"Shi, M.H., Chun, W.W., Pao, T.Y. and Ta, Y.K. (2006), \u201cAn empirical investigation on learners' acceptance of e\u2010learning for public unemployment vocational training\u201d, International Journal of Innovation and Learning, Vol. 3 No. 2, pp. 174\u201085.","DOI":"10.1504\/IJIL.2006.008419"},{"key":"key2022012620363027600_b60","doi-asserted-by":"crossref","unstructured":"Staples, D.S. and Seddon, P. (2004), \u201cTesting the technology\u2010to\u2010performance chain model\u201d, Journal of Organisational and End User Computing, Vol. 16 No. 4, pp. 17\u201036.","DOI":"10.4018\/joeuc.2004100102"},{"key":"key2022012620363027600_b61","doi-asserted-by":"crossref","unstructured":"Straub, D.W. and Karahanna, E. (1998), \u201cKnowledge worker communications and recipient availability towards a task closure explanation of media choice\u201d, Organizational Science, Vol. 9 No. 2, pp. 160\u201075.","DOI":"10.1287\/orsc.9.2.160"},{"key":"key2022012620363027600_b62","doi-asserted-by":"crossref","unstructured":"Ta, T.C. and Kazuo, N. (2005), \u201cPerception of students towards cooperative in undergraduate management information systems: exploratory quantitative analyses\u201d, International Journal of Innovation and Learning, Vol. 2 No. 2, pp. 152\u201074.","DOI":"10.1504\/IJIL.2005.006296"},{"key":"key2022012620363027600_b63","doi-asserted-by":"crossref","unstructured":"Tang, S.M. (2000), \u201cAn impact factor model of intranet adoption: an exploratory and empirical research\u201d, The Journal of Systems and Software, Vol. 51 No. 3, pp. 157\u201073.","DOI":"10.1016\/S0164-1212(99)00121-1"},{"key":"key2022012620363027600_b64","doi-asserted-by":"crossref","unstructured":"Teo, T.S.H. (2001), \u201cDemographic and motivation variables associated with internet usage activities\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 11 No. 2, pp. 125\u201037.","DOI":"10.1108\/10662240110695089"},{"key":"key2022012620363027600_b65","unstructured":"Tjahjono, B., Fakun, D., Greenbough, R. and Kay, J. (2001), \u201cEvaluation of a manufacturing task support system using the task\u2010technology fit model\u201d, Proceedings of the Twelfth Annual Conference of the Production and Operations Management Society, POM\u20102001, Orlando, FL."},{"key":"key2022012620363027600_b66","doi-asserted-by":"crossref","unstructured":"Tu, C.H. (2002), \u201cThe measurement of social presence in an online learning environment\u201d, International Journal on E\u2010Learning, Vol. 1 No. 2, pp. 34\u201045.","DOI":"10.1080\/09523980010021235"},{"key":"key2022012620363027600_b67","doi-asserted-by":"crossref","unstructured":"Tzu, T.W. and Yin, T.L. (2005), \u201cKey factors for small and medium enterprises in Taiwan to successfully implement information systems\u201d, International Journal of Management and Enterprise Development, Vol. 2 No. 1, pp. 106\u201021.","DOI":"10.1504\/IJMED.2005.006033"},{"key":"key2022012620363027600_b68","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D. (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 425\u201078.","DOI":"10.2307\/30036540"},{"key":"key2022012620363027600_b69","unstructured":"Wareham, E. (2001), \u201cDesigning an intranet? Keep it simple and useful\u201d, Computing Canada, Vol. 25 No. 41, pp. 29\u201031."},{"key":"key2022012620363027600_b70","doi-asserted-by":"crossref","unstructured":"Waskul, D. and Douglass, M. (1997), \u201cCyberself: the emergence of self in online chat\u201d, The Information Society, Vol. 13 No. 4, pp. 375\u201097.","DOI":"10.1080\/019722497129070"},{"key":"key2022012620363027600_b71","doi-asserted-by":"crossref","unstructured":"Watson, I. (1999), \u201cInternet, intranet, extranet: managing the information bazaar\u201d, Aslib Proceedings, Vol. 51 No. 4, pp. 109\u201014.","DOI":"10.1108\/EUM0000000006969"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570710822831","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570710822831\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570710822831\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:56Z","timestamp":1753400276000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/107\/8\/1227-1250\/184883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,2]]},"references-count":71,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2007,10,2]]}},"alternative-id":["10.1108\/02635570710822831"],"URL":"https:\/\/doi.org\/10.1108\/02635570710822831","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2007,10,2]]}}}