{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:58:49Z","timestamp":1775066329448,"version":"3.50.1"},"reference-count":107,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2010,3,23]],"date-time":"2010-03-23T00:00:00Z","timestamp":1269302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to predict e\u2010procurement adoption through integrating the constructs of the technology acceptance model and the theory of planned behaviour.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A structural equation modelling is conducted through the analysis of 316 usable questionnaires.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results show that the proposed model has good explanatory power and confirms its robustness, with a reasonably strong empirical support, in predicting users' intentions to use e\u2010procurement technology. Behavioural intention toward e\u2010procurement technology is mainly determined by user's attitude and additionally influenced by perceived usefulness and subjective norm.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The paper provides procurement system developers and managers with a useful adoption model that demonstrates the significance of perceived usefulness of e\u2010procurement system in influencing the adoption decision. This highlights the importance of maximizing the benefits of e\u2010procurement system for potential users to facilitate the adoption process.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Social implications<\/jats:title><jats:p>System developers and procurement managers should also consider the role of social influences, such as these from supply chain partners, in the adoption process and how such influences may facilitate or inhibit e\u2010procurement adoption process.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper is the first study that examines e\u2010procurement adoption in the United Arab Emirates. Also, the findings allow us to understand the importance of both technology\u2010related aspects and social influence in e\u2010procurement adoption.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571011030042","type":"journal-article","created":{"date-parts":[[2010,3,20]],"date-time":"2010-03-20T08:01:52Z","timestamp":1269072112000},"page":"392-414","source":"Crossref","is-referenced-by-count":155,"title":["Predicting e\u2010procurement adoption in a developing country"],"prefix":"10.1108","volume":"110","author":[{"given":"Mohamed","family":"Gamal Aboelmaged","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022020720345082700_b1","unstructured":"Aberdeen Group (2001), Best Practices in E\u2010procurement: The Abridged Report, Aberdeen Group, Boston, MA."},{"key":"key2022020720345082700_b2","doi-asserted-by":"crossref","unstructured":"Adams, D., Nelson, R. and Todd, P. (1992), \u201cPerceived usefulness, ease of use, and usage of information technology: a replication\u201d, MIS Quarterly, Vol. 16 No. 2, pp. 227\u201047.","DOI":"10.2307\/249577"},{"key":"key2022020720345082700_b4","doi-asserted-by":"crossref","unstructured":"Agarwal, R. and Prasad, J. (1998), \u201cA conceptual and operational definition of personal innovativeness in the domain of information technology\u201d, Information Systems Research, Vol. 9 No. 2, pp. 204\u201015.","DOI":"10.1287\/isre.9.2.204"},{"key":"key2022020720345082700_b3","doi-asserted-by":"crossref","unstructured":"Agarwal, R. and Prasad, J. (1999), \u201cAre individual differences germane to the acceptance of new information technologies?\u201d, Decision Sciences, Vol. 30 No. 2, pp. 361\u201091.","DOI":"10.1111\/j.1540-5915.1999.tb01614.x"},{"key":"key2022020720345082700_b5","doi-asserted-by":"crossref","unstructured":"Ahire, S., Golhar, D. and Waller, M. (1996), \u201cDevelopment and validation of TQM implementation constructs\u201d, Decision Sciences, Vol. 27 No. 1, pp. 23\u201056.","DOI":"10.1111\/j.1540-5915.1996.tb00842.x"},{"key":"key2022020720345082700_b6","doi-asserted-by":"crossref","unstructured":"Ajzen, I. (1987), \u201cAttitudes, traits, and actions: dispositional prediction of behavior in social psychology\u201d, Advances in Experimental Social Psychology, Vol. 20, pp. 1\u201063.","DOI":"10.1016\/S0065-2601(08)60411-6"},{"key":"key2022020720345082700_b7","doi-asserted-by":"crossref","unstructured":"Ajzen, I. (1991), \u201cThe theory of planned behavior\u201d, Organizational Behavior and Human Decision Process, Vol. 50, pp. 179\u2010211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2022020720345082700_b8","unstructured":"Ajzen, I. and Fishbein, M. (1980), Understanding Attitudes and Predicting Social Behavior, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020720345082700_b9","doi-asserted-by":"crossref","unstructured":"Ajzen, I. and Madden, T.J. (1986), \u201cPrediction of goal directed behavior: attitudes, intentions and perceived behavioral control\u201d, Journal of Experimental Social Psychology, Vol. 22, pp. 453\u201074.","DOI":"10.1016\/0022-1031(86)90045-4"},{"key":"key2022020720345082700_b10","unstructured":"Alaniz, R. and Roberts, R. (1999), E\u2010procurement: A Guide to Buy\u2010side Applications, Industry Report, Stephens, Little Rock, AR."},{"key":"key2022020720345082700_b11","doi-asserted-by":"crossref","unstructured":"Amoako\u2010Gyampah, K. and Salam, A. (2004), \u201cAn extension of the technology acceptance model in an ERP implementation environment\u201d, Information & Management, Vol. 41 No. 6, pp. 731\u201045.","DOI":"10.1016\/j.im.2003.08.010"},{"key":"key2022020720345082700_b95","unstructured":"(The) Arab World Competitiveness Report (2007), World Economic Forum, Geneva."},{"key":"key2022020720345082700_b12","doi-asserted-by":"crossref","unstructured":"Armitage, C.J. and Conner, M. (2001), \u201cEfficacy of the theory of planned behavior: a meta\u2010analytic review\u201d, British Journal of Social Psychology, Vol. 40 No. 3, pp. 471\u201099.","DOI":"10.1348\/014466601164939"},{"key":"key2022020720345082700_b13","doi-asserted-by":"crossref","unstructured":"Batenburg, R. (2007), \u201cE\u2010procurement adoption by European firms: a quantitative analysis\u201d, Journal of Purchasing & Supply Management, Vol. 13, pp. 182\u201092.","DOI":"10.1016\/j.pursup.2007.09.014"},{"key":"key2022020720345082700_b14","doi-asserted-by":"crossref","unstructured":"Bhattacherjee, A. (2000), \u201cAcceptance of e\u2010commerce services: the case of electronic brokerages\u201d, IEEE Transactions on System, Man, and Cybernetics \u2013 Part A: Systems and Humans, Vol. 20 No. 4, pp. 411\u201020.","DOI":"10.1109\/3468.852435"},{"key":"key2022020720345082700_b15","unstructured":"Bouwman, H., van den Hooff, B., van den Wijngaert, L. and van Dijk, J. (2005), Information and Communication Technology in Organizations, Sage, London."},{"key":"key2022020720345082700_b16","doi-asserted-by":"crossref","unstructured":"Carayannis, E. and Popescu, D. (2005), \u201cProfiling a methodology for economic growth and convergence: learning from the EU e\u2010procurement experience for Central and Eastern European countries\u201d, Technovation, Vol. 25, pp. 1\u201014.","DOI":"10.1016\/S0166-4972(03)00071-3"},{"key":"key2022020720345082700_b17","doi-asserted-by":"crossref","unstructured":"Chan, S. and Lu, M. (2004), \u201cUnderstanding internet banking adoption and use behavior: a Hong Kong perspective\u201d, Journal of Global Information Management, Vol. 12, pp. 21\u201043.","DOI":"10.4018\/jgim.2004070102"},{"key":"key2022020720345082700_b18","doi-asserted-by":"crossref","unstructured":"Chapman, L. (2000), \u201cDistance learning for post\u2010registered nursing: the facts\u201d, Nursing Standard, Vol. 14 No. 18, pp. 33\u20106.","DOI":"10.7748\/ns2000.01.14.18.33.c2746"},{"key":"key2022020720345082700_b19","doi-asserted-by":"crossref","unstructured":"Chau, P. and Hu, P. (2002), \u201cInvestigating healthcare professionals' decisions to accept telemedicine technology: an empirical test of competing theories\u201d, Information & Management, Vol. 39, pp. 297\u2010311.","DOI":"10.1016\/S0378-7206(01)00098-2"},{"key":"key2022020720345082700_b20","doi-asserted-by":"crossref","unstructured":"Chau, Y.K. (1996), \u201cAn empirical assessment of a modified technology acceptance model\u201d, Journal of Management Information Systems, Vol. 13 No. 2, pp. 185\u2010204.","DOI":"10.1080\/07421222.1996.11518128"},{"key":"key2022020720345082700_b21","doi-asserted-by":"crossref","unstructured":"Chen, C., Fan, Y. and Farn, C. (2007), \u201cPredicting electronic toll collection service adoption: an integration of the technology acceptance model and the theory of planned behavior\u201d, Transportation Research Part C, Vol. 15, pp. 300\u201011.","DOI":"10.1016\/j.trc.2007.04.004"},{"key":"key2022020720345082700_b22","unstructured":"Chen, I.\u2010C. and Ching, R. (2002), \u201cA proposed framework for transitioning to an e\u2010business model\u201d, Quarterly Journal of Electronic Commerce, Vol. 3 No. 4, pp. 375\u201089."},{"key":"key2022020720345082700_b23","doi-asserted-by":"crossref","unstructured":"Chen, L., Gillenson, M. and Sherrell, D. (2002), \u201cEnticing online consumers: an extended technology acceptance perspective\u201d, Information & Management, Vol. 39, pp. 705\u201019.","DOI":"10.1016\/S0378-7206(01)00127-6"},{"key":"key2022020720345082700_b24","doi-asserted-by":"crossref","unstructured":"Cheng, T., Lam, D. and Yeung, A. (2006), \u201cAdoption of internet banking: an empirical study in Hong Kong\u201d, Decision Support Systems, Vol. 42 No. 3, pp. 1558\u201072.","DOI":"10.1016\/j.dss.2006.01.002"},{"key":"key2022020720345082700_b25","doi-asserted-by":"crossref","unstructured":"Cheung, M. and Liao, Z. (2003), \u201cSupply\u2010side hurdles in internet B2C e\u2010commerce: an empirical investigation\u201d, IEEE Transactions on Engineering Management, Vol. 50 No. 4, pp. 458\u201069.","DOI":"10.1109\/TEM.2003.819649"},{"key":"key2022020720345082700_b26","doi-asserted-by":"crossref","unstructured":"Childers, T., Carr, C., Peckc, J. and Carson, S. (2001), \u201cHedonic and utilitarian motivations for online retail shopping behavior\u201d, Journal of Retailing, Vol. 77 No. 4, pp. 511\u201035.","DOI":"10.1016\/S0022-4359(01)00056-2"},{"key":"key2022020720345082700_b27","doi-asserted-by":"crossref","unstructured":"Choi, J. and Geistfeld, L.V. (2004), \u201cA cross\u2010cultural investigation of consumer e\u2010shopping\u201d, Journal of Economic Psychology, Vol. 25 No. 6, pp. 821\u201038.","DOI":"10.1016\/j.joep.2003.08.006"},{"key":"key2022020720345082700_b28","unstructured":"Cooper, D. and Schindler, A. (2003), Business Research Methods, Irwin, Boston, MA."},{"key":"key2022020720345082700_b29","doi-asserted-by":"crossref","unstructured":"Davila, A., Gupta, M. and Palmer, R. (2003), \u201cMoving procurement systems to the internet: the adoption and use of e\u2010procurement technology models\u201d, European Management Journal, Vol. 21 No. 1, pp. 11\u201023.","DOI":"10.1016\/S0263-2373(02)00155-X"},{"key":"key2022020720345082700_b30","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13, pp. 319\u201039.","DOI":"10.2307\/249008"},{"key":"key2022020720345082700_b31","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1993), \u201cUser acceptance of information technology: system characteristics, user perceptions and behavioral impacts\u201d, International Journal of Man Machine Studies, Vol. 38 No. 3, pp. 475\u201087.","DOI":"10.1006\/imms.1993.1022"},{"key":"key2022020720345082700_b32","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35, pp. 982\u20101003.","DOI":"10.1287\/mnsc.35.8.982"},{"key":"key2022020720345082700_b33","doi-asserted-by":"crossref","unstructured":"de Boer, L., Harink, J. and Heijboer, G. (2002), \u201cA conceptual model for assessing the impact of electronic procurement\u201d, European Journal of Purchasing & Supply Management, Vol. 8 No. 1, pp. 25\u201033.","DOI":"10.1016\/S0969-7012(01)00015-6"},{"key":"key2022020720345082700_b34","unstructured":"ESCWA Report (2006), National Profile of the Information Society in the United Arab Emirates, Economic and Social Commission for Western Asia, Beirut, available at: www.escwa.un.org\/wsis\/reports\/docs\/uae\u201007\u2010e.pdf."},{"key":"key2022020720345082700_b35","doi-asserted-by":"crossref","unstructured":"Featherman, M. and Pavlov, P. (2003), \u201cPredicting e\u2010services adoption: a perceived risk facets perspective\u201d, International Journal of Human Computer Studies, Vol. 59 No. 4, pp. 451\u201074.","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"key2022020720345082700_b36","unstructured":"Fishbein, I. and Ajzen, J. (1975), Beliefs, Attitude, Intention and Behaviour: An Introduction to Theory and Research, Addison\u2010Wesley, Reading, MA."},{"key":"key2022020720345082700_b37","doi-asserted-by":"crossref","unstructured":"Fornell, C. and Larcker, D. (1981), \u201cEvaluating structural equation models with unobservable variables and measurement error\u201d, Journal of Marketing Research, Vol. 18 No. 1, pp. 39\u201050.","DOI":"10.1177\/002224378101800104"},{"key":"key2022020720345082700_b38","unstructured":"Garver, M.S. and Mentzer, J.T. (1999), \u201cLogistics research methods: employing structural equation modelling to test for construct validity\u201d, Journal of Business Logistics, Vol. 20 No. 1, pp. 33\u201058."},{"key":"key2022020720345082700_b39","unstructured":"Gebauer, J., Beam, C. and Segev, A. (1998), \u201cImpact of the internet on procurement\u201d, Acquisition Review Quarterly, Vol. 14 No. 2, pp. 167\u201081."},{"key":"key2022020720345082700_b40","doi-asserted-by":"crossref","unstructured":"Gefen, D. and Straub, D. (2003), \u201cManaging user trust in B2C e\u2010services\u201d, E\u2010Service Journal, Vol. 2 No. 2, pp. 7\u201024.","DOI":"10.2979\/esj.2003.2.2.7"},{"key":"key2022020720345082700_b41","doi-asserted-by":"crossref","unstructured":"Gefen, D., Karahanna, E. and Straub, D. (2003), \u201cTrust and TAM in online shopping: an integrated model\u201d, MIS Quarterly, Vol. 27 No. 1, pp. 51\u201090.","DOI":"10.2307\/30036519"},{"key":"key2022020720345082700_b42","doi-asserted-by":"crossref","unstructured":"George, J. (2002), \u201cInfluences on the intent to make internet purchases\u201d, Internet Research, Vol. 12 No. 2, pp. 165\u201080.","DOI":"10.1108\/10662240210422521"},{"key":"key2022020720345082700_b43","unstructured":"Gribbins, M., Shaw, M. and Gebauer, J. (2003), \u201cAn investigation into employees' acceptance of integrating mobile commerce into organizational processes\u201d, Proceedings of the 9th Americas Conference on Information Systems, Tampa, FL, pp. 77\u201087."},{"key":"key2022020720345082700_b44","doi-asserted-by":"crossref","unstructured":"Guriting, P. and Ndubisi, A. (2006), \u201cBorneo online banking: evaluating customer perceptions and behavioral intention\u201d, Management Research News, Vol. 29 Nos 1\/2, pp. 6\u201015.","DOI":"10.1108\/01409170610645402"},{"key":"key2022020720345082700_b45","unstructured":"Hair, J.F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1998), Multivariate Data Analysis, 5th ed., Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020720345082700_b46","doi-asserted-by":"crossref","unstructured":"Hamner, M. and Qazi, R. (2009), \u201cExpanding the technology acceptance model to examine personal computing technology utilization in government agencies in developing countries\u201d, Government Information Quarterly, Vol. 26, pp. 128\u201036.","DOI":"10.1016\/j.giq.2007.12.003"},{"key":"key2022020720345082700_b47","doi-asserted-by":"crossref","unstructured":"Hawking, P., Stein, A., Wyld, D. and Foster, S. (2004), \u201cE\u2010procurement: is the ugly duckling actually a swan down under?\u201d, Asia Pacific Journal of Marketing and Logistics, Vol. 16 No. 1, pp. 3\u201026.","DOI":"10.1108\/13555850410765140"},{"key":"key2022020720345082700_b48","doi-asserted-by":"crossref","unstructured":"Heijden, H. (2003), \u201cFactors influencing the usage of websites: the case of a generic portal in The Netherlands\u201d, Information Management, Vol. 40 No. 2, pp. 541\u20109.","DOI":"10.1016\/S0378-7206(02)00079-4"},{"key":"key2022020720345082700_b49","doi-asserted-by":"crossref","unstructured":"Heijden, H., Verhagen, T. and Creemers, M. (2003), \u201cUnderstanding online purchase intentions: contributions from technology and trust perspectives\u201d, European Journal of Information Systems, Vol. 12, pp. 41\u20108.","DOI":"10.1057\/palgrave.ejis.3000445"},{"key":"key2022020720345082700_b106","doi-asserted-by":"crossref","unstructured":"Hsu, M.\u2010H and Chiu, C.\u2010M. (2004), \u201cInternet self\u2010efficacy and electronic service acceptance\u201d, Decision Support Systems, Vol. 38 No. 3, pp. 369\u201081.","DOI":"10.1016\/j.dss.2003.08.001"},{"key":"key2022020720345082700_b52","doi-asserted-by":"crossref","unstructured":"Hu, L.T. and Bentler, P.M. (1999), \u201cCutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives\u201d, Structural Equation Modeling, Vol. 6 No. 1, pp. 1\u201031.","DOI":"10.1080\/10705519909540118"},{"key":"key2022020720345082700_b53","doi-asserted-by":"crossref","unstructured":"Hu, P., Chau, P., Liu Sheng, O. and Tam, K. (1999), \u201cExamining the technology acceptance model using physician acceptance of telemedicine technology\u201d, Journal of Management Information Systems, Vol. 16 No. 2, pp. 91\u2010112.","DOI":"10.1080\/07421222.1999.11518247"},{"key":"key2022020720345082700_b54","doi-asserted-by":"crossref","unstructured":"Hung, S., Chang, C. and Yu, T. (2006), \u201cDeterminants of user acceptance of the e\u2010government services: the case of online tax filing and payment system\u201d, Government Information Quarterly, Vol. 23, pp. 97\u2010122.","DOI":"10.1016\/j.giq.2005.11.005"},{"key":"key2022020720345082700_b55","doi-asserted-by":"crossref","unstructured":"Igbaria, M., Parasuraman, S. and Baroudi, J. (1996), \u201cA motivational model of microcomputer usage\u201d, Journal of Management Information Systems, Vol. 13 No. 1, pp. 127\u201043.","DOI":"10.1080\/07421222.1996.11518115"},{"key":"key2022020720345082700_b56","doi-asserted-by":"crossref","unstructured":"Karahanna, E., Straub, D.W. and Chervany, N.L. (1999), \u201cInformation technology adoption across time: a cross\u2010sectional comparison of pre\u2010adoption and post\u2010adoption beliefs\u201d, MIS Quarterly, Vol. 23 No. 2, pp. 183\u2010213.","DOI":"10.2307\/249751"},{"key":"key2022020720345082700_b57","doi-asserted-by":"crossref","unstructured":"Khalifa, M. and Shen, K. (2008), \u201cExplaining the adoption of transactional B2C mobile commerce\u201d, Journal of Enterprise Information Management, Vol. 21 No. 2, pp. 110\u201024.","DOI":"10.1108\/17410390810851372"},{"key":"key2022020720345082700_b58","doi-asserted-by":"crossref","unstructured":"Kim, T., Lee, J. and Law, R. (2008), \u201cAn empirical examination of the acceptance behaviour of hotel front office systems: an extended technology acceptance model\u201d, Tourism Management, Vol. 29, pp. 500\u201013.","DOI":"10.1016\/j.tourman.2007.05.016"},{"key":"key2022020720345082700_b59","doi-asserted-by":"crossref","unstructured":"Kima, J. and Shunk, D. (2004), \u201cMatching indirect procurement process with different B2B e\u2010procurement systems\u201d, Computers in Industry, Vol. 53, pp. 153\u201064.","DOI":"10.1016\/j.compind.2003.07.002"},{"key":"key2022020720345082700_b60","doi-asserted-by":"crossref","unstructured":"Klein, L. and Ford, G. (2003), \u201cConsumer search for information in the digital age: an empirical study of pre\u2010purchase search for automobiles\u201d, Journal of Interactive Marketing, Vol. 13 No. 3, pp. 29\u201049.","DOI":"10.1002\/dir.10058"},{"key":"key2022020720345082700_b62","doi-asserted-by":"crossref","unstructured":"Kothari, T., Hu, C. and Roehl, W. (2005), \u201cE\u2010procurement: an emerging tool for the hotel supply chain management\u201d, Hospitality Management, Vol. 24, pp. 369\u201089.","DOI":"10.1016\/j.ijhm.2004.09.004"},{"key":"key2022020720345082700_b61","doi-asserted-by":"crossref","unstructured":"Koufteros, X. (1999), \u201cTesting a model of pull production: a paradigm for manufacturing research using structural equation modelling\u201d, Journal of Operations Management, Vol. 17 No. 4, pp. 467\u201088.","DOI":"10.1016\/S0272-6963(99)00002-9"},{"key":"key2022020720345082700_b63","doi-asserted-by":"crossref","unstructured":"Lai, J. and Yang, C. (2009), \u201cEffects of employees' perceived dependability on success of enterprise applications in e\u2010business\u201d, Industrial Marketing Management, Vol. 38, pp. 263\u201074.","DOI":"10.1016\/j.indmarman.2008.01.002"},{"key":"key2022020720345082700_b64","doi-asserted-by":"crossref","unstructured":"Lai, V. and Li, H. (2005), \u201cTechnology acceptance model for internet banking: an invariance analysis\u201d, Information Management, Vol. 42 No. 2, pp. 373\u201086.","DOI":"10.1016\/j.im.2004.01.007"},{"key":"key2022020720345082700_b65","doi-asserted-by":"crossref","unstructured":"Lassar, W.M., Manolis, C. and Lassar, S.S. (2005), \u201cThe relationship between consumer innovativeness, personal characteristics and online banking adoption\u201d, International Journal of Bank Marketing, Vol. 23 No. 2, pp. 176\u201099.","DOI":"10.1108\/02652320510584403"},{"key":"key2022020720345082700_b66","doi-asserted-by":"crossref","unstructured":"Lederer, A., Maupin, D., Senza, M. and Zhuang, Y. (2000), \u201cThe technology acceptance model and the world wide web\u201d, Decision Support Systems, Vol. 29 No. 3, pp. 269\u201082.","DOI":"10.1016\/S0167-9236(00)00076-2"},{"key":"key2022020720345082700_b67","doi-asserted-by":"crossref","unstructured":"Lee, M.\u2010C. (2009), \u201cFactors influencing the adoption of internet banking: an integration of TAM and TPB with perceived risk and perceived benefit\u201d, Electronic Commerce Research and Applications, Vol. 8 No. 3, pp. 130\u201041.","DOI":"10.1016\/j.elerap.2008.11.006"},{"key":"key2022020720345082700_b68","doi-asserted-by":"crossref","unstructured":"Liao, C., Chen, J.\u2010L. and Yen, D. (2007), \u201cTheory of planning behavior (TPB) and customer satisfaction in the continued use of e\u2010service: an integrated model\u201d, Computers in Human Behavior, Vol. 23 No. 6, pp. 2804\u201022.","DOI":"10.1016\/j.chb.2006.05.006"},{"key":"key2022020720345082700_b69","doi-asserted-by":"crossref","unstructured":"Liao, Z. and Cheung, M.T. (2001), \u201cInternet\u2010based e\u2010shopping and consumer attitudes: an empirical study\u201d, Information & Management, Vol. 38 No. 5, pp. 299\u2010306.","DOI":"10.1016\/S0378-7206(00)00072-0"},{"key":"key2022020720345082700_b70","doi-asserted-by":"crossref","unstructured":"Liaw, S. (2002), \u201cUnderstanding user perceptions of world wide web environments\u201d, Journal of Computer Assisted Learning, Vol. 18, pp. 137\u201048.","DOI":"10.1046\/j.0266-4909.2001.00221.x"},{"key":"key2022020720345082700_b71","unstructured":"Lin, H. and Wang, Y. (2005), \u201cPredicting consumer intention to use mobile commerce in Taiwan\u201d, Proceedings of the International Conferences on Mobile Business (ICMB'05), Sydney, Australia."},{"key":"key2022020720345082700_b72","doi-asserted-by":"crossref","unstructured":"Lu, Y., Zhou, T. and Wang, B. (2009), \u201cExploring Chinese users' acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory\u201d, Computers in Human Behavior, Vol. 25, pp. 29\u201039.","DOI":"10.1016\/j.chb.2008.06.002"},{"key":"key2022020720345082700_b73","doi-asserted-by":"crossref","unstructured":"Luarn, P. and Lin, H. (2005), \u201cToward an understanding of the behavioral intention to use mobile banking\u201d, Computer Human Behavior, Vol. 21, pp. 873\u201091.","DOI":"10.1016\/j.chb.2004.03.003"},{"key":"key2022020720345082700_b76","doi-asserted-by":"crossref","unstructured":"McCloskey, D.W. (2006), \u201cThe importance of ease of use, usefulness, and trust to online consumers: an examination of the technology acceptance model with older consumers\u201d, Journal of Organizational and End User Computing, Vol. 18 No. 3, pp. 47\u201065.","DOI":"10.4018\/joeuc.2006070103"},{"key":"key2022020720345082700_b77","doi-asserted-by":"crossref","unstructured":"McKechnie, S., Winklhofer, H. and Ennew, C. (2006), \u201cApplying the technology acceptance model to the online retailing of financial services\u201d, International Journal of Retail & Distribution Management, Vol. 34 Nos 4\/5, pp. 388\u2010410.","DOI":"10.1108\/09590550610660297"},{"key":"key2022020720345082700_b74","doi-asserted-by":"crossref","unstructured":"Mathieson, K. (1991), \u201cPredicting user intentions: comparing the technology acceptance model with the theory of planned behavior\u201d, Information Systems Research, Vol. 2 No. 3, pp. 173\u201091.","DOI":"10.1287\/isre.2.3.173"},{"key":"key2022020720345082700_b75","doi-asserted-by":"crossref","unstructured":"Mathieson, K., Peacock, E. and Chin, W. (2001), \u201cExtending the technology acceptance model: the influence of perceived user\u201d, The Data Base for Advances in Information Systems, Vol. 32 No. 3, pp. 86\u2010113.","DOI":"10.1145\/506724.506730"},{"key":"key2022020720345082700_b78","doi-asserted-by":"crossref","unstructured":"Moon, J.\u2010W. and Kim, Y.\u2010G. (2001), \u201cExtending the TAM for a world wide web context\u201d, Information & Management, Vol. 38, pp. 217\u201030.","DOI":"10.1016\/S0378-7206(00)00061-6"},{"key":"key2022020720345082700_b79","doi-asserted-by":"crossref","unstructured":"Moore, G. and Benbasat, I. (1991), \u201cDevelopment of an instrument to measure the perception of adopting an information technology innovation\u201d, Information System Research, Vol. 2 No. 3, pp. 192\u2010222.","DOI":"10.1287\/isre.2.3.192"},{"key":"key2022020720345082700_b80","doi-asserted-by":"crossref","unstructured":"Morosan, C. and Jeong, M. (2008), \u201cUsers' perceptions of two types of hotel reservation web sites\u201d, International Journal of Hospitality Management, Vol. 27 No. 2, pp. 284\u201092.","DOI":"10.1016\/j.ijhm.2007.07.023"},{"key":"key2022020720345082700_b81","unstructured":"Morris, A., Stahl, A. and Herbert, R. (2000), E\u2010procurement: Streamlining Processes to Maximize Effectiveness, Luminant Worldwide Corporation, Houston, TX."},{"key":"key2022020720345082700_b82","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, T. and Kekre, S. (2002), \u201cStrategic and operational benefits of electronic integration in B2B procurement processes\u201d, Management Science, Vol. 48 No. 10, pp. 1301\u201022.","DOI":"10.1287\/mnsc.48.10.1301.273"},{"key":"key2022020720345082700_b83","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A. (2003), \u201cConsumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model\u201d, International Journal of Electronic Commerce, Vol. 7 No. 3, pp. 101\u201034.","DOI":"10.1080\/10864415.2003.11044275"},{"key":"key2022020720345082700_b84","doi-asserted-by":"crossref","unstructured":"Pikkarainen, T. (2004), \u201cCustomer acceptance of online banking: an extension of the technology acceptance model\u201d, Internet Research, Vol. 3, pp. 224\u201035.","DOI":"10.1108\/10662240410542652"},{"key":"key2022020720345082700_b85","doi-asserted-by":"crossref","unstructured":"Presutti, W. (2003), \u201cSupply management and e\u2010procurement: creating value added in the supply chain\u201d, Industrial Marketing Management, Vol. 32, pp. 219\u201026.","DOI":"10.1016\/S0019-8501(02)00265-1"},{"key":"key2022020720345082700_b86","doi-asserted-by":"crossref","unstructured":"Puschmann, T. and Alt, R. (2005), \u201cSuccessful use of e\u2010procurement in supply chains\u201d, Supply Chain Management: An International Journal, Vol. 10 No. 2, pp. 122\u201033.","DOI":"10.1108\/13598540510589197"},{"key":"key2022020720345082700_b87","unstructured":"Roche, J. (2001), \u201cAre you ready for e\u2010procurement?\u201d, Strategic Finance, Vol. 83 No. 1, pp. 56\u20109."},{"key":"key2022020720345082700_b107","unstructured":"Rogers, E.M. (1995), Diffusion of innovations, The Free press, 4th ed., New York, NY."},{"key":"key2022020720345082700_b88","unstructured":"Roth, R.T. (2001), \u201cE\u2010procurement: cutting cost, adding value\u201d, Financial Executive, Vol. 17, pp. 62\u20103."},{"key":"key2022020720345082700_b89","doi-asserted-by":"crossref","unstructured":"Shalhoub, K. (2006), \u201cTrust, privacy and security in e\u2010business: the case of the GCC\u201d, Information Management & Computer Security, Vol. 14 No. 3, pp. 270\u201083.","DOI":"10.1108\/09685220610670413"},{"key":"key2022020720345082700_b90","doi-asserted-by":"crossref","unstructured":"Shim, S., Eastlick, M., Lotz, S. and Warrington, P. (2001), \u201cAn online prepurchase intentions model: the role of intention to search\u201d, Journal of Retailing, Vol. 77, pp. 397\u2010416.","DOI":"10.1016\/S0022-4359(01)00051-3"},{"key":"key2022020720345082700_b91","doi-asserted-by":"crossref","unstructured":"Straub, D. (1989), \u201cValidating instruments in MIS research\u201d, MIS Quarterly, Vol. 13 No. 2, pp. 147\u201069.","DOI":"10.2307\/248922"},{"key":"key2022020720345082700_b92","doi-asserted-by":"crossref","unstructured":"Szajna, B. (1996), \u201cEmpirical evaluation of the revised technology acceptance model\u201d, Management Science, Vol. 42 No. 1, pp. 85\u201092.","DOI":"10.1287\/mnsc.42.1.85"},{"key":"key2022020720345082700_b93","doi-asserted-by":"crossref","unstructured":"Tatsis, V., Mena, C., van Wassenhove, L. and Whicker, L. (2006), \u201cE\u2010procurement in the Greek food and drink industry: drivers and impediments\u201d, Journal of Purchasing & Supply Management, Vol. 12, pp. 63\u201074.","DOI":"10.1016\/j.pursup.2006.04.003"},{"key":"key2022020720345082700_b94","doi-asserted-by":"crossref","unstructured":"Taylor, S. and Todd, P.A. (1995), \u201cUnderstanding information technology usage: a test of competing models\u201d, Information System Research, Vol. 6 No. 2, pp. 144\u201074.","DOI":"10.1287\/isre.6.2.144"},{"key":"key2022020720345082700_b96","unstructured":"Turban, E., King, D., Lee, J. and Viehland, D. (2006), Electronic Commerce: A Managerial Perspective, Pearson\/Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020720345082700_b97","doi-asserted-by":"crossref","unstructured":"Venkatesh, M., Morris, G. and Davis, F.D. (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, MIS Quarterly, Vol. 27 No. 3, pp. 425\u201078.","DOI":"10.2307\/30036540"},{"key":"key2022020720345082700_b98","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. (2000), \u201cDeterminants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model\u201d, Information Systems Research, Vol. 11 No. 4, pp. 342\u201065.","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"key2022020720345082700_b99","doi-asserted-by":"crossref","unstructured":"Venkatesh, V. and Davis, F.D. (2000), \u201cA theoretical extension of the technology acceptance model: four longitudinal field studies\u201d, Management Science, Vol. 46 No. 2, pp. 186\u2010204.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"key2022020720345082700_b100","doi-asserted-by":"crossref","unstructured":"Wei, T., Marthandan, G., Chong, A., Ooi, K. and Arumugam, S. (2009), \u201cWhat drives Malaysian m\u2010commerce adoption? An empirical analysis\u201d, Industrial Management & Data Systems, Vol. 109 No. 3, pp. 370\u201088.","DOI":"10.1108\/02635570910939399"},{"key":"key2022020720345082700_b101","doi-asserted-by":"crossref","unstructured":"Wu, I. and Chen, J. (2005), \u201cAn extension of trust and TAM model with TPB in the initial adoption of on\u2010line tax: an empirical study\u201d, International Journal of Human\u2010Computer Studies, Vol. 62, pp. 784\u2010808.","DOI":"10.1016\/j.ijhcs.2005.03.003"},{"key":"key2022020720345082700_b102","doi-asserted-by":"crossref","unstructured":"Wu, J., Wang, S. and Lin, L. (2007), \u201cMobile computing acceptance factors in the healthcare industry: a structural equation model\u201d, International Journal of Medical Informatics, Vol. 76, pp. 66\u201077.","DOI":"10.1016\/j.ijmedinf.2006.06.006"},{"key":"key2022020720345082700_b103","doi-asserted-by":"crossref","unstructured":"Yi, M. and Hwang, Y. (2003), \u201cSystems: self\u2010efficacy, enjoyment, learning goal orientation, and the technology acceptance model\u201d, International Journal of Human\u2010Computer Studies, Vol. 59, pp. 431\u201049.","DOI":"10.1016\/S1071-5819(03)00114-9"},{"key":"key2022020720345082700_b104","doi-asserted-by":"crossref","unstructured":"Yu, J., Ha, I., Choi, M. and Rho, J. (2005), \u201cExtending the TAM for a t\u2010commerce\u201d, Information & Management, Vol. 42 No. 7, pp. 965\u201076.","DOI":"10.1016\/j.im.2004.11.001"},{"key":"key2022020720345082700_b105","doi-asserted-by":"crossref","unstructured":"Yu, Y., Yu, H., Itoga, H. and Lin, T. (2008), \u201cDecision\u2010making factors for effective industrial e\u2010procurement\u201d, Technology in Society, Vol. 30, pp. 163\u20109.","DOI":"10.1016\/j.techsoc.2007.12.004"},{"key":"key2022020720345082700_frd1","doi-asserted-by":"crossref","unstructured":"Henry, J.W. and Stone, R.W. (1994), \u201cA structural equation model of end\u2010user satisfaction with a computer based medical information systems\u201d, Information Resources Management Journal, Vol. 7 No. 3, pp. 21\u201033.","DOI":"10.4018\/irmj.1994070102"},{"key":"key2022020720345082700_frd2","doi-asserted-by":"crossref","unstructured":"Hsu, C. and Lu, H. (2004), \u201cWhy do people play on\u2010line games? An extended TAM with social influences and flow experience\u201d, Information & Management, Vol. 41 No. 7, pp. 853\u201068.","DOI":"10.1016\/j.im.2003.08.014"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571011030042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011030042\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011030042\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:19Z","timestamp":1753400299000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/110\/3\/392-414\/179177"}},"subtitle":["An empirical integration of technology acceptance model and theory of planned behaviour"],"short-title":[],"issued":{"date-parts":[[2010,3,23]]},"references-count":107,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,3,23]]}},"alternative-id":["10.1108\/02635571011030042"],"URL":"https:\/\/doi.org\/10.1108\/02635571011030042","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2010,3,23]]}}}