{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:50:27Z","timestamp":1754157027075,"version":"3.41.2"},"reference-count":88,"publisher":"Emerald","issue":"1\/2","license":[{"start":{"date-parts":[[2011,3,15]],"date-time":"2011-03-15T00:00:00Z","timestamp":1300147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3,15]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to investigate whether intranet functionalities predict perceived usefulness, which in turn influences intranet usage and whether such usage affects job performance of managers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>About 150 of 357 managers engaged by numerous organizations in the port industry in Malaysia, namely port authority, terminal operator, marine department, immigration department, and royal customs and excise department which utilized intranet were sampled using a set of self\u2010reporting questionnaires.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results of structural equation modeling indicate that intranet functionalities influence perceived usefulness, usage, and indirectly predict port managers' performance.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The paper focuses only on the perspective of intranet usage among middle managers working in the port industry in Malaysia.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Suggestions are provided on how the maritime industry in particular and other industries in general can improve their intranet adoption to achieve organizational goals.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper draws attention to the imperative of having proper intranet functionalities in place in light of its indirect impact on job performance improvements.<\/jats:p><\/jats:sec>","DOI":"10.1108\/03684921111117988","type":"journal-article","created":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T08:21:07Z","timestamp":1305966067000},"page":"166-181","source":"Crossref","is-referenced-by-count":4,"title":["The indirect effects of intranet functionalities on middle managers' performance"],"prefix":"10.1108","volume":"40","author":[{"given":"Mohd","family":"Daud Norzaidi","sequence":"first","affiliation":[]},{"given":"Siong","family":"Choy Chong","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Intan Salwani","sequence":"additional","affiliation":[]},{"given":"Binshan","family":"Lin","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"crossref","unstructured":"Abdul Hamid, S. (2001), \u201cNational ocean policy \u2013 new opportunity for Malaysian ocean development\u201d, Marine Policy, Vol. 25 No. 6, pp. 427\u201036.","key":"key2022032220205583100_b1","DOI":"10.1016\/S0308-597X(01)00027-6"},{"doi-asserted-by":"crossref","unstructured":"Ahmed, A. (2009), \u201cManaging knowledge and technology for sustainable development in Africa\u201d, International Journal of Technology Management, Vol. 45 Nos 1\/2, pp. 1\u20109.","key":"key2022032220205583100_b2","DOI":"10.1504\/IJTM.2009.021762"},{"doi-asserted-by":"crossref","unstructured":"Amin, H. (2007), \u201cAn analysis of mobile credit card usage intention\u201d, Information Management & Computer Security, Vol. 15, pp. 260\u20109.","key":"key2022032220205583100_b54","DOI":"10.1108\/09685220710817789"},{"unstructured":"Barbera, J. (2006), \u201cThe internet: a new concept for corporate information handling\u201d, Online Information 96 Proceedings, pp. 187\u201093.","key":"key2022032220205583100_b55"},{"doi-asserted-by":"crossref","unstructured":"Baroudi, J.J., Olson, M.H. and Ives, D. (1986), \u201cAn empirical study of the impact of user involvement on system usage and information satisfaction\u201d, Communications of the ACM, Vol. 29 No. 3, pp. 232\u20108.","key":"key2022032220205583100_b3","DOI":"10.1145\/5666.5669"},{"unstructured":"Brown, M.W. and Cudek, R. (1993), \u201cAlternative ways of assessing model fit\u201d, in Bollen, K.A. and Long, J.S. (Eds), Testing Structural Equation Models, Sage, Newbury Park, CA.","key":"key2022032220205583100_b5"},{"doi-asserted-by":"crossref","unstructured":"Chong, S.C. and Lin, B. (2008), \u201cExploring knowledge management (KM) issues and KM performance outcomes: empirical evidence from Malaysian multimedia super corridor companies\u201d, International Journal of Technology Management, Vol. 43 No. 4, pp. 285\u2010303.","key":"key2022032220205583100_b6","DOI":"10.1504\/IJTM.2008.020552"},{"doi-asserted-by":"crossref","unstructured":"Chou, D.C. (1998), \u201cDeveloping an intranet: tool selection and management issues\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 8 No. 2, pp. 142\u20108.","key":"key2022032220205583100_b56","DOI":"10.1108\/10662249810211601"},{"doi-asserted-by":"crossref","unstructured":"Cumming, M. and Cuthbertson, L. (2001), \u201cWired in Whitehall: a survey of internet and intranet use in government\u201d, Aslib Proceedings, Vol. 53 No. 1, pp. 32\u20108.","key":"key2022032220205583100_b8","DOI":"10.1108\/EUM0000000007035"},{"doi-asserted-by":"crossref","unstructured":"Cunningham, R.B. and Sarayrah, Y.K. (1994), \u201cThe human factor in technology transfer\u201d, International Journal of Public Administration, Vol. 17, pp. 1419\u201036.","key":"key2022032220205583100_b9","DOI":"10.1080\/01900699408524948"},{"unstructured":"Dan, S. (2002), \u201cThe technophobes\u201d, Forbes, Vol. 170 No. 13, pp. 114\u201016.","key":"key2022032220205583100_b57"},{"doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 319\u201042.","key":"key2022032220205583100_b58","DOI":"10.2307\/249008"},{"doi-asserted-by":"crossref","unstructured":"Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), \u201cUser acceptance of computer technology: a comparison of two theoretical models\u201d, Management Science, Vol. 35 No. 8, pp. 982\u20101003.","key":"key2022032220205583100_b12","DOI":"10.1287\/mnsc.35.8.982"},{"doi-asserted-by":"crossref","unstructured":"Drennan, J. (1999), \u201cThe introduction of intranets into the newspaper industry\u201d, Aslib Proceedings, Vol. 51 No. 8, pp. 269\u201074.","key":"key2022032220205583100_b59","DOI":"10.1108\/EUM0000000006986"},{"doi-asserted-by":"crossref","unstructured":"Duane, A. and Finnegan, P. (2003), \u201cManaging empowerment and control in an intranet environment\u201d, Information Systems Journal, Vol. 13 No. 2, pp. 133\u201058.","key":"key2022032220205583100_b13","DOI":"10.1046\/j.1365-2575.2003.00148.x"},{"doi-asserted-by":"crossref","unstructured":"Dubravka, C.K., Moodie, D., Busuttil, A. and Plesman, F. (1999), \u201cOrganizational change mediated by e\u2010mail and intranet: an ethnographic study\u201d, Information Technology & People, Vol. 12 No. 1, pp. 9\u201026.","key":"key2022032220205583100_b14","DOI":"10.1108\/09593849910250484"},{"unstructured":"Emory, C.W. and Cooper, D.R. (1991), Business Research Methods, Irwin, Boston, MA.","key":"key2022032220205583100_b15"},{"doi-asserted-by":"crossref","unstructured":"Erikksson, K., Karem, K. and Nilsson, D. (2004), \u201cCustomer acceptance of internet banking in Estonia\u201d, International Journal of Bank Marketing, Vol. 23, pp. 200\u201016.","key":"key2022032220205583100_b60","DOI":"10.1108\/02652320510584412"},{"unstructured":"Foster, W. and Flynn, D.M. (1994), \u201cManagement information technology: it's effect on organizational form and function\u201d, MIS Quarterly, Vol. 18 No. 2, pp. 229\u201036.","key":"key2022032220205583100_b16"},{"doi-asserted-by":"crossref","unstructured":"Gebauer, J. and Shaw, J.M. (2004), \u201cSuccess factors an impact of mobile business applications: results from a mobile e\u2010procurement study\u201d, International Journal of Electronic Commerce, Vol. 8 No. 3, pp. 19\u201041.","key":"key2022032220205583100_b17","DOI":"10.1080\/10864415.2004.11044304"},{"doi-asserted-by":"crossref","unstructured":"Gil\u2010Saura, I., Deltoro, M.F. and Cervera\u2010Taulet, A. (2009), \u201cThe value of B2B relationships\u201d, Industrial Management & Data Systems, Vol. 109 No. 5, pp. 593\u2010609.","key":"key2022032220205583100_b18","DOI":"10.1108\/02635570910957605"},{"doi-asserted-by":"crossref","unstructured":"Goodhue, D.L. (1995), \u201cUnderstanding user evaluations of information systems\u201d, Management Science, Vol. 41 No. 12, pp. 1827\u201044.","key":"key2022032220205583100_b19","DOI":"10.1287\/mnsc.41.12.1827"},{"doi-asserted-by":"crossref","unstructured":"Goodhue, D.L. and Thompson, R.L. (1995), \u201cTask\u2010technology fit and individual performance\u201d, MIS Quarterly, Vol. 19 No. 2, pp. 213\u201036.","key":"key2022032220205583100_b20","DOI":"10.2307\/249689"},{"doi-asserted-by":"crossref","unstructured":"Han, M. and McKelvey, B. (2008), \u201cTowards a social capital theory of technology\u2010based new ventures as complex adaptive systems\u201d, International Journal of Accounting and Information Management, Vol. 16 No. 1, pp. 36\u201061.","key":"key2022032220205583100_b22","DOI":"10.1108\/18347640810887753"},{"doi-asserted-by":"crossref","unstructured":"Hartwick, J. and Barki, H. (1995), \u201cExplaining the role of user participation in information system use\u201d, Management Science, Vol. 40 No. 4, pp. 440\u201065.","key":"key2022032220205583100_b23","DOI":"10.1287\/mnsc.40.4.440"},{"doi-asserted-by":"crossref","unstructured":"Horton, R.P., Buck, T., Waterson, P.E. and Clegg, C.W. (2001), \u201cExplaining intranet use with the technology acceptance model\u201d, Journal of Information Technology, Vol. 16, pp. 237\u201049.","key":"key2022032220205583100_b61","DOI":"10.1080\/02683960110102407"},{"doi-asserted-by":"crossref","unstructured":"Hsu, L.L., Lai, R.S.Q. and Weng, Y.T. (2008), \u201cUnderstanding the critical factors effects user satisfaction and impact of ERP through innovation of diffusion theory\u201d, International Journal of Technology Management, Vol. 43 Nos 1\u20103, pp. 30\u201047.","key":"key2022032220205583100_b24","DOI":"10.1504\/IJTM.2008.019405"},{"unstructured":"Huang, E.Y. and Lin, S.W. (2009), \u201cDo knowledge workers use e\u2010mail wisely?\u201d, Journal of Computer Information Systems, Vol. 50 No. 1, pp. 65\u201073.","key":"key2022032220205583100_b25"},{"doi-asserted-by":"crossref","unstructured":"Humphreys, P., Huang, G. and Cadden, T. (2005), \u201cWeb\u2010based supplier evaluation tool for the product development process\u201d, Industrial Management & Data Systems, Vol. 105, pp. 147\u201063.","key":"key2022032220205583100_b62","DOI":"10.1108\/02635570510583299"},{"unstructured":"Hussey, J. and Hussey, R. (1997), Business Research: A Practical Guide for Undergraduate and Postgraduate Student, Macmillan Press, London.","key":"key2022032220205583100_b63"},{"doi-asserted-by":"crossref","unstructured":"Ioimo, R.E. and Aronson, J.E. (2003), \u201cThe benefits of police field mobile computing realized by non\u2010patrol sections of a police department\u201d, International Journal of Police Science and Management, Vol. 5 No. 3, pp. 195\u2010206.","key":"key2022032220205583100_b26","DOI":"10.1350\/ijps.5.3.195.16066"},{"doi-asserted-by":"crossref","unstructured":"Ives, B. and Olson, M. (1984), \u201cUser involvement and MIS success: a review of research\u201d, Management Science, Vol. 30 No. 5, pp. 586\u2010603.","key":"key2022032220205583100_b27","DOI":"10.1287\/mnsc.30.5.586"},{"doi-asserted-by":"crossref","unstructured":"Iyer, L.S., Gupta, B. and Johri, N. (2005), \u201cPerformance, stability and reliability issues in web applications\u201d, Industrial Management & Data Systems, Vol. 105, pp. 561\u201076.","key":"key2022032220205583100_b64","DOI":"10.1108\/02635570510599959"},{"doi-asserted-by":"crossref","unstructured":"Jamshed, J.M. (2006), \u201cDifferential impacts of information technology on cost and revenue driver relationships in banking\u201d, Industrial Management & Data Systems, Vol. 106, pp. 327\u201044.","key":"key2022032220205583100_b65","DOI":"10.1108\/02635570610653489"},{"doi-asserted-by":"crossref","unstructured":"Jen, H.W., Yi, C.C. and Binshan, L. (2007), \u201cClosing off the knowledge gaps in IS education\u201d, International Journal of Innovation and Learning, Vol. 4, pp. 357\u201075.","key":"key2022032220205583100_b66","DOI":"10.1504\/IJIL.2007.012576"},{"doi-asserted-by":"crossref","unstructured":"John, F.K., Mauro, F. and Nadler, S.S. (2006), \u201cImpact of just\u2010in\u2010time inventory systems on OEM supplier\u201d, Industrial Management & Data Systems, Vol. 106, pp. 224\u201041.","key":"key2022032220205583100_b67","DOI":"10.1108\/02635570610649871"},{"doi-asserted-by":"crossref","unstructured":"Kostakis, H., Sarigiannidas, C., Boutsinas, B., Varvakis, K. and Tampakas, V. (2008), \u201cIntegrating activity\u2010based costing with simulation and data mining\u201d, International Journal of Accounting and Information Management, Vol. 16 No. 1, pp. 25\u201035.","key":"key2022032220205583100_b28","DOI":"10.1108\/18347640810887744"},{"doi-asserted-by":"crossref","unstructured":"Legris, P., Ingham, J. and Collerette, P. (2002), \u201cWhy do people use information technology? A critical review of the technology acceptance model\u201d, Information and Management, Vol. 40, pp. 191\u2010204.","key":"key2022032220205583100_b68","DOI":"10.1016\/S0378-7206(01)00143-4"},{"doi-asserted-by":"crossref","unstructured":"Lu, H.P., Hsu, C.L. and Hsu, H.Y. (2005), \u201cAn empirical study of the effect of perceived risk upon intention to use online applications\u201d, Information Management & Computer Security, Vol. 13, pp. 106\u201020.","key":"key2022032220205583100_b69","DOI":"10.1108\/09685220510589299"},{"unstructured":"McCloskey, D. (2003), \u201cEvaluating electronic commerce acceptance with the technology acceptance model\u201d, Journal of Computer Information System, Vol. 40, pp. 49\u201057.","key":"key2022032220205583100_b71"},{"doi-asserted-by":"crossref","unstructured":"Mahmood, M.A. and Swanberg, D.L. (2000), \u201cFactors affecting information technology usage: a meta\u2010analysis of empirical literature\u201d, Journal of Organizational Computing and Electronic Commerce, Vol. 11 No. 2, pp. 1107\u201030.","key":"key2022032220205583100_b29","DOI":"10.1207\/S15327744JOCE1102_02"},{"doi-asserted-by":"crossref","unstructured":"Martin, M. and Stefan, S. (2007), \u201cReducing information technology\u2010based transaction costs in supply chains\u201d, Industrial Management & Data Systems, Vol. 107, pp. 484\u2010500.","key":"key2022032220205583100_b70","DOI":"10.1108\/02635570710740652"},{"doi-asserted-by":"crossref","unstructured":"Miles, J.N.V. (2000), \u201cStatistical software for microcomputer: AMOS 4.0\u201d, British Journal of Mathematics and Statistical Psychology, Vol. 53 No. 1, pp. 141\u20104.","key":"key2022032220205583100_b30","DOI":"10.1348\/000711000159141"},{"doi-asserted-by":"crossref","unstructured":"Ming, H.Y., Chen, H.L. and Shang, C.L. (2007), \u201cApplying internet\u2010based information systems to facilitate business alliance activities\u201d, Industrial Management & Data Systems, Vol. 107, pp. 125\u201040.","key":"key2022032220205583100_b72","DOI":"10.1108\/02635570710719098"},{"doi-asserted-by":"crossref","unstructured":"Mohamad Noorman, M., Nor Shahriza, A.K. and Ramlah, H. (2007), \u201cInvestigating corporate intranet effectiveness: a conceptual framework\u201d, Information Management & Computer Security, Vol. 15 No. 3, pp. 168\u201083.","key":"key2022032220205583100_b73","DOI":"10.1108\/09685220710759522"},{"doi-asserted-by":"crossref","unstructured":"Mulauzi, F. and Albright, K.S. (2009), \u201cInformation and communication technologies (ICTs) and development information for professional women in Zambia\u201d, International Journal of Technology Management, Vol. 45 Nos 1\/2, pp. 177\u201095.","key":"key2022032220205583100_b31","DOI":"10.1504\/IJTM.2009.021527"},{"doi-asserted-by":"crossref","unstructured":"Ndubisi, N.O. and Jantan, M. (2003), \u201cEvaluating IS usage in Malaysian small and medium\u2010sized firms using the technology acceptance model\u201d, Logistics Information Management, Vol. 6, pp. 440\u201050.","key":"key2022032220205583100_b74","DOI":"10.1108\/09576050310503411"},{"doi-asserted-by":"crossref","unstructured":"Newell, S.N., Scarbrough, H. and Swan, J. (2001), \u201cFrom global knowledge management to internal electronic fences: contradictory outcomes of intranet development\u201d, British Journal of Management, Vol. 12, pp. 97\u2010111.","key":"key2022032220205583100_b75","DOI":"10.1111\/1467-8551.00188"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, T.D. (2007), \u201cFactor affecting the utilization of the internet by internationalizing firms in transition markets: evidence from Vietnam\u201d, Marketing Intelligence & Planning, Vol. 25, pp. 360\u201076.","key":"key2022032220205583100_b76","DOI":"10.1108\/02634500710754592"},{"unstructured":"Norzaidi, M.D. and Intan Salwani, M. (2008), Information Technology Management Model: An Introduction, University Publication Centre, Shah Alam.","key":"key2022032220205583100_b32"},{"doi-asserted-by":"crossref","unstructured":"Norzaidi, M.D., Chong, S.C. and Intan Salwani, M. (2008a), \u201cPerceived resistance, user resistance and managers' performance in the Malaysian port industry\u201d, Aslib Proceedings, Vol. 60 No. 3, pp. 242\u201064.","key":"key2022032220205583100_b35","DOI":"10.1108\/00012530810879114"},{"doi-asserted-by":"crossref","unstructured":"Norzaidi, M.D., Chong, S.C., Intan Salwani, M. and Rafidah, K. (2008b), \u201cA study of intranet usage and resistance in Malaysia's port industry\u201d, Journal of Computer Information Systems, Vol. 49 No. 1, pp. 37\u201047.","key":"key2022032220205583100_b34","DOI":"10.1080\/08874417.2008.11645304"},{"doi-asserted-by":"crossref","unstructured":"Norzaidi, M.D., Chong, S.C., Murali, R. and Intan Salwani, M. (2007), \u201cIntranet usage and managers' performance in the port industry\u201d, Industrial Management & Data Systems, Vol. 107 No. 8, pp. 1227\u201050.","key":"key2022032220205583100_b33","DOI":"10.1108\/02635570710822831"},{"unstructured":"Nunnally, J.C. (1978), Psychometric Theory, McGraw\u2010Hill, New York, NY.","key":"key2022032220205583100_b36"},{"doi-asserted-by":"crossref","unstructured":"Olson, M.H. and Ives, B. (1982), \u201cChargeback systems and user involvement in systems: an empirical investigation\u201d, MIS Quarterly, Vol. 6 No. 2, pp. 47\u201060.","key":"key2022032220205583100_b37","DOI":"10.2307\/249282"},{"doi-asserted-by":"crossref","unstructured":"Petri, H. and Bulcsu, S. (2005), \u201cLogistics information systems: An analysis of software solutions for supply chain co\u2010ordination\u201d, Industrial Management & Data Systems, Vol. 105, pp. 5\u201018.","key":"key2022032220205583100_b77","DOI":"10.1108\/02635570510575153"},{"doi-asserted-by":"crossref","unstructured":"Phelps, R. and Mok, M. (1999), \u201cManaging the risks of implementation: An empirical study of user satisfaction\u201d, Journal of Information Technology, Vol. 14, pp. 39\u201052.","key":"key2022032220205583100_b78","DOI":"10.1177\/026839629901400104"},{"doi-asserted-by":"crossref","unstructured":"Robert, K.P. and Ken, P. (2005), \u201cMake\u2010buy decision on entrepreneurial enterprises in the world markets\u201d, International Journal of Management and Enterprise Development, Vol. 2, pp. 46\u201064.","key":"key2022032220205583100_b79","DOI":"10.1504\/IJMED.2005.006026"},{"unstructured":"Roscoe, J.T. (1975), Fundamental Research Statistics for the Behavioural Sciences, Hotl, Rinehart and Wilson, New York, NY.","key":"key2022032220205583100_b80"},{"doi-asserted-by":"crossref","unstructured":"Rowe, J. (2006), \u201cNom\u2010defining leadership\u201d, Kybernetes, Vol. 35 No. 10, pp. 1528\u201037.","key":"key2022032220205583100_b40","DOI":"10.1108\/03684920610688568"},{"doi-asserted-by":"crossref","unstructured":"Rowe, J. (2007), \u201cCybernetics of culture\u201d, Kybernetes, Vol. 36 Nos 5\/6, pp. 596\u2010606.","key":"key2022032220205583100_b39","DOI":"10.1108\/03684920710749695"},{"doi-asserted-by":"crossref","unstructured":"Sameer, K. and Dan, L. (2005), \u201cImpact of globalization on entrepreneurial enterprises in the world markets\u201d, International Journal of Management and Enterprise Development, Vol. 2, pp. 46\u201064.","key":"key2022032220205583100_b81","DOI":"10.1504\/IJMED.2005.006026"},{"doi-asserted-by":"crossref","unstructured":"Segar, A.H. and Grover, V. (1993), \u201cRe\u2010examining perceived ease of use and usefulness: a confirmatory factor analysis\u201d, MIS Quarterly, Vol. 17 No. 4, pp. 517\u201025.","key":"key2022032220205583100_b41","DOI":"10.2307\/249590"},{"unstructured":"Sekaran, U. (2003), Research Methods for Business: A Skill Building Approach, Wiley, New York, NY.","key":"key2022032220205583100_b82"},{"unstructured":"Sherwood, G. (2001), \u201cDenial managing the human element of technology\u201d, Journal of Property Management, Vol. 12, pp. 71\u20103.","key":"key2022032220205583100_b83"},{"doi-asserted-by":"crossref","unstructured":"Straub, D.W. and Karahanna, E. (1998), \u201cKnowledge worker communications and recipient availability towards a task closure explanation of media choice\u201d, Organizational Science, Vol. 9 No. 2, pp. 160\u201075.","key":"key2022032220205583100_b42","DOI":"10.1287\/orsc.9.2.160"},{"doi-asserted-by":"crossref","unstructured":"Szajna, B. (1997), \u201cDetermining information system usage. Some issues and examples\u201d, Information and Management, Vol. 25, pp. 147\u201054.","key":"key2022032220205583100_b84","DOI":"10.1016\/0378-7206(93)90037-T"},{"doi-asserted-by":"crossref","unstructured":"Ta, T.C. and Kazuo, N. (2005), \u201cPerceptions of students towards cooperative learning in undergraduate management information systems: exploratory quantitative analyses\u201d, International Journal of Innovation and Learning, Vol. 2, pp. 152\u201074.","key":"key2022032220205583100_b85","DOI":"10.1504\/IJIL.2005.006296"},{"doi-asserted-by":"crossref","unstructured":"Tan, K.S., Chong, S.C., Lin, B. and Eze, U.C. (2009), \u201cInternet\u2010based ICT adoption: evidence from Malaysian SMEs\u201d, Industrial Management & Data Systems, Vol. 109 No. 2, pp. 224\u201044.","key":"key2022032220205583100_b43","DOI":"10.1108\/02635570910930118"},{"doi-asserted-by":"crossref","unstructured":"Tang, S.M. (2000), \u201cAn impact factor model of intranet adoption: an exploratory and empirical research\u201d, The Journal of Systems and Software, Vol. 51 No. 3, pp. 157\u201073.","key":"key2022032220205583100_b44","DOI":"10.1016\/S0164-1212(99)00121-1"},{"doi-asserted-by":"crossref","unstructured":"Taticchi, P. and Balachandran, K.R. (2008), \u201cForward performance measure and management integrated framework\u201d, International Journal of Accounting and Information Management, Vol. 16 No. 2, pp. 140\u201054.","key":"key2022032220205583100_b45","DOI":"10.1108\/18347640810913807"},{"doi-asserted-by":"crossref","unstructured":"Teo, T.S.H. (2001), \u201cDemographic and motivation variables associated with internet usage activities\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 11 No. 2, pp. 125\u201037.","key":"key2022032220205583100_b86","DOI":"10.1108\/10662240110695089"},{"doi-asserted-by":"crossref","unstructured":"Trice, A.W. and Treacy, M.E. (1988), \u201cUsage as dependent variable in MIS research\u201d, Data Base, Vol. 19 Nos 3\/4, pp. 33\u201041.","key":"key2022032220205583100_b46","DOI":"10.1145\/65766.65771"},{"doi-asserted-by":"crossref","unstructured":"Tu, C.H. (2002), \u201cThe measurement of social presence in an online learning environment\u201d, International Journal on E\u2010Learning, Vol. 1 No. 2, pp. 34\u201045.","key":"key2022032220205583100_b47","DOI":"10.1080\/09523980010021235"},{"doi-asserted-by":"crossref","unstructured":"Wagner, W.P., Chung, Q.B. and Baratz, T. (2002), \u201cImplementing corporate intranets: lessons learned from two high\u2010tech firms\u201d, Industrial Management and Data Systems, Vol. 105, pp. 140\u20105.","key":"key2022032220205583100_b87","DOI":"10.1108\/02635570210421327"},{"doi-asserted-by":"crossref","unstructured":"Wang, C.L. and Ahmed, P.K. (2003), \u201cEmotion: the missing part of systems methodologies\u201d, Kybernetes, Vol. 32 Nos 9\/10, pp. 1283\u201096.","key":"key2022032220205583100_b48","DOI":"10.1108\/03684920310493251"},{"doi-asserted-by":"crossref","unstructured":"Waskul, D. and Douglass, M. (1997), \u201cCyberself: the emergence of self in online chat\u201d, The Information Society, Vol. 13 No. 4, pp. 375\u201097.","key":"key2022032220205583100_b49","DOI":"10.1080\/019722497129070"},{"doi-asserted-by":"crossref","unstructured":"Watson, I. (1999), \u201cInternet, intranet, extranet: managing the information bazaar\u201d, Aslib Proceedings, Vol. 51 No. 4, pp. 109\u201014.","key":"key2022032220205583100_b50","DOI":"10.1108\/EUM0000000006969"},{"unstructured":"Wei, J., Van Der Ende, L. and Lin, B. (2009), \u201cCustomer\u2010focused e\u2010business model for the oil industry\u201d, Journal of Computer Information Systems, Vol. 49 No. 3, pp. 11\u201021.","key":"key2022032220205583100_b51"},{"doi-asserted-by":"crossref","unstructured":"Wen, H.J. and Anandarajan, A. (1998), \u201cIntranet: a cost reduction tool for corporate publication\u201d, Industrial Management & Data Systems, Vol. 98 No. 5, pp. 200\u20104.","key":"key2022032220205583100_b52","DOI":"10.1108\/02635579810227715"},{"unstructured":"Young, T.R. (1984), \u201cThe lonely micro\u201d, Datamation, Vol. 30 No. 4, pp. 100\u201014.","key":"key2022032220205583100_b53"},{"doi-asserted-by":"crossref","unstructured":"Zhang, P. and Dran, G.V. (2001), \u201cUser expectations and ranks of quality factors in different websites domains\u201d, International Journal of Electronic Commerce, Vol. 6 No. 3, pp. 9\u201034.","key":"key2022032220205583100_b88","DOI":"10.1080\/10864415.2001.11044237"},{"doi-asserted-by":"crossref","unstructured":"Benbasat, I., Dexter, A.S. and Todd, P. (1996), \u201cExperimental program investing colour\u2010enhanced and graphical information presentation: an integration of the findings\u201d, Communications of the ACM, Vol. 29 No. 11, pp. 1094\u2010105.","key":"key2022032220205583100_frd1","DOI":"10.1145\/7538.7545"},{"doi-asserted-by":"crossref","unstructured":"Cooper, R. and Zmud, R. (1990), \u201cInformation technology implementation research: a technological diffusion approach\u201d, Management Science, Vol. 36 No. 2, pp. 123\u201039.","key":"key2022032220205583100_frd2","DOI":"10.1287\/mnsc.36.2.123"},{"doi-asserted-by":"crossref","unstructured":"Daft, R.L. and Macintosh, N.B. (1981), \u201cA tentative exploration into the amount and equivocality of information processing in organizational work units\u201d, Administrative Science Quarterly, Vol. 26 No. 2, pp. 207\u201024.","key":"key2022032220205583100_frd4","DOI":"10.2307\/2392469"},{"doi-asserted-by":"crossref","unstructured":"D'Ambra, J. and Wilson, C.S. (2004), \u201cUse of the world wide web for international travel: integrating the construct of uncertainty in information seeking and the task\u2010technology fit (TTF) model\u201d, Journal of the American Society for Information Science and Technology, Vol. 55 No. 8, pp. 731\u201042.","key":"key2022032220205583100_frd3","DOI":"10.1002\/asi.20017"},{"doi-asserted-by":"crossref","unstructured":"Goodhue, D.L., Klein, B.D. and March, S.T. (2000), \u201cUser evaluations of IS as surrogates for objective performance\u201d, Information & Management, Vol. 38 No. 2, pp. 87\u2010101.","key":"key2022032220205583100_frd5","DOI":"10.1016\/S0378-7206(00)00057-4"},{"doi-asserted-by":"crossref","unstructured":"Oukil, M.\u2010S. (2009), \u201cEnhancing innovation for sustainable growth and competitiveness in North African countries\u201d, International Journal of Technology Management, Vol. 45 Nos 1\/2, pp. 114\u201022.","key":"key2022032220205583100_frd6","DOI":"10.1504\/IJTM.2009.021523"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/03684921111117988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684921111117988\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684921111117988\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:27:09Z","timestamp":1753399629000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/40\/1-2\/166-181\/273452"}},"subtitle":["Evidence from the maritime industry"],"editor":[{"given":"Martin","family":"Smith","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2011,3,15]]},"references-count":88,"journal-issue":{"issue":"1\/2","published-print":{"date-parts":[[2011,3,15]]}},"alternative-id":["10.1108\/03684921111117988"],"URL":"https:\/\/doi.org\/10.1108\/03684921111117988","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2011,3,15]]}}}