{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:19Z","timestamp":1754157199237,"version":"3.41.2"},"reference-count":48,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,2,1]]},"abstract":"<jats:p>Mobile devices are generally designed for use in low\u2010bandwidth environments and therefore have limited ability to handle e\u2010mail attachments. As such, these devices often have to be complemented by using a type of electronic agents, known as attachment handling agents (AHAs), which convert the contents of the attachments to a bandwidth\u2010conserving text\u2010form that is then sent to the mobile device for viewing. The purpose of this study is to assess whether AHA usage would improve an individual employee\u2019s perceived work\u2010performance, measured by a multidimensional set of factors. The participants in the survey are employees at an F1000 Canadian company, all of whom have adopted a mobile communication device. Results indicate that AHA usage has a positive impact on productivity and customer satisfaction.<\/jats:p>","DOI":"10.1108\/10662240410516282","type":"journal-article","created":{"date-parts":[[2004,3,3]],"date-time":"2004-03-03T18:50:21Z","timestamp":1078339821000},"page":"6-18","source":"Crossref","is-referenced-by-count":3,"title":["Impact of using attachment handling electronic agents on an individual\u2019s perceived work\u2010performance"],"prefix":"10.1108","volume":"14","author":[{"given":"R.P.","family":"Sundarraj","sequence":"first","affiliation":[]},{"given":"Thanh","family":"Vuong","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031320411106900_B1","unstructured":"Activenet (2001), \u201cActivenet home page\u201d, available at: www.equin.com (accessed 13 May)."},{"key":"key2022031320411106900_B2","doi-asserted-by":"crossref","unstructured":"Armstrong, J. and Overton, T. (1977), \u201cEstimating nonresponse bias in mail surveys\u201d, Journal of Marketing Research, Vol. 14, pp. 396\u2010402.","DOI":"10.1177\/002224377701400320"},{"key":"key2022031320411106900_B3","unstructured":"Astata (2001), \u201cAstataview home page\u201d, available at: www.astataview.com (accessed 13 May)."},{"key":"key2022031320411106900_B4","doi-asserted-by":"crossref","unstructured":"Attewell, P. and Rule, J. (1984), \u201cComputing and organizations: what we know and we don\u2019t know\u201d, Communications of the ACM, Vol. 27 No. 12, pp. 1184\u201092.","DOI":"10.1145\/2135.2136"},{"key":"key2022031320411106900_B5","doi-asserted-by":"crossref","unstructured":"Barczak G., Ellen, P.S. and Pilling, B.K. (1997), \u201cDeveloping typologies of consumer motives for use of technologically based banking services\u201d, Journal of Business Research, Vol. 38, pp. 131\u20109.","DOI":"10.1016\/S0148-2963(96)00032-X"},{"key":"key2022031320411106900_B6","doi-asserted-by":"crossref","unstructured":"Barki, H. and Huff, S. (1985), \u201cChange, attitude to change and decision support system success\u201d, Information and Management, Vol. 9, pp. 261\u20108.","DOI":"10.1016\/0378-7206(85)90050-3"},{"key":"key2022031320411106900_B7","doi-asserted-by":"crossref","unstructured":"Bitner, M., Brown, S. and Meuter, M. (2000), \u201cTechnology infusion in service encounters\u201d, Journal of the Academy of Marketing Science, Vol. 28 No. 1, pp. 138\u201049.","DOI":"10.1177\/0092070300281013"},{"key":"key2022031320411106900_B8","unstructured":"BlackBerry (2001), \u201cBlackBerry home page\u201d, available at: www.blackberry.net (accessed 13 May)."},{"key":"key2022031320411106900_B9","unstructured":"Bradshaw, J. (1997), Software Agents, MIT Press, Cambridge, MA."},{"key":"key2022031320411106900_B10","doi-asserted-by":"crossref","unstructured":"DeLone, W. and McLean, E. (1992), \u201cInformation systems success: the quest for the dependent variable\u201d, Information Systems Research, Vol. 3 No. 1, pp. 60\u201095.","DOI":"10.1287\/isre.3.1.60"},{"key":"key2022031320411106900_B11","doi-asserted-by":"crossref","unstructured":"Downing, C. (1999), \u201cSystem usage as a proxy for user satisfaction: an empirical investigation\u201d, Information and Management, Vol. 35, pp. 203\u201016.","DOI":"10.1016\/S0378-7206(98)00090-1"},{"key":"key2022031320411106900_B12","doi-asserted-by":"crossref","unstructured":"Ein Dor, P. and Segev, E. (1978), \u201cOrganizational context and the success of management information systems\u201d, Management Science, Vol. 24 No. 10, pp. 1064\u201077.","DOI":"10.1287\/mnsc.24.10.1064"},{"key":"key2022031320411106900_B13","unstructured":"Etzioni, O. et al. (1999), Autonomous Agents, ACM Press, New York, NY."},{"key":"key2022031320411106900_B14","unstructured":"Fishbein, M. and Ajzen, A. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison\u2010Wesley, Boston, MA."},{"key":"key2022031320411106900_B15","unstructured":"Hair, J.F., Andersin, R.E., Tatham, R.L. and Black, W.C. (1992), Multivariate Data Analysis with Readings, Macmillan, New York, NY."},{"key":"key2022031320411106900_B16","doi-asserted-by":"crossref","unstructured":"Harvey, J. (1990), \u201cOperations management in professional service organizations: a typology\u201d, International Journal of Operations & Production Management,  Vol. 10 No. 4, pp. 5\u201015.","DOI":"10.1108\/01443579010144458"},{"key":"key2022031320411106900_B17","doi-asserted-by":"crossref","unstructured":"Harvey, J. and Filiatraut, P. (1991), \u201cService delivery process: new technology and design\u201d, International Journal of Bank Marketing, Vol. 9 No. 1, pp. 25\u201031.","DOI":"10.1108\/02652329110144460"},{"key":"key2022031320411106900_B18","unstructured":"Hopkins, W., Lusher, C. and Manasco, B. (1999), \u201cCan technology strengthen customer loyalty\u201d, Harvard Business Review, Vol. 77 No. 6, p. S4."},{"key":"key2022031320411106900_B19","doi-asserted-by":"crossref","unstructured":"Igbaria, M. and Tan, M. (1997), \u201cThe consequences of information technology acceptance on subsequent individual performance\u201d, Information and Management, Vol. 32, pp. 113\u201021.","DOI":"10.1016\/S0378-7206(97)00006-2"},{"key":"key2022031320411106900_B20","unstructured":"Itrezzo (2001), \u201cItrezzo home page\u201d, available at: www.itrezzo.com (accessed 13 May)."},{"key":"key2022031320411106900_B21","doi-asserted-by":"crossref","unstructured":"Karahanna, E. and Straub, D. (1999), \u201cThe psychological origins of perceived usefulness and ease of use\u201d, Information & Management, Vol. 35, pp. 237\u201050.","DOI":"10.1016\/S0378-7206(98)00096-2"},{"key":"key2022031320411106900_B22","unstructured":"Knapik, M. and Johnson, J. (1998), Developing Intelligent Agents for Distributed Systems, McGraw\u2010Hill,  New York, NY."},{"key":"key2022031320411106900_B23","doi-asserted-by":"crossref","unstructured":"Kraut, R., Dumais, S. and Kock, S. (1989), \u201cComputerization, productivity and quality of work life\u201d, Communications of the ACM, Vol. 32 No. 3, pp. 220\u201038.","DOI":"10.1145\/63342.63347"},{"key":"key2022031320411106900_B24","doi-asserted-by":"crossref","unstructured":"Lim, D. and Palvia, P. (2001), \u201cEDI in strategic supply chain: impact on customer service\u201d, International Journal of Information Management, Vol. 21, pp. 193\u2010211.","DOI":"10.1016\/S0268-4012(01)00010-X"},{"key":"key2022031320411106900_B25","doi-asserted-by":"crossref","unstructured":"Long, R. (1993), \u201cThe impact of new office information technology on job quality of female and male employees\u201d, Human Relations, Vol. 46 No. 8, pp. 939\u201061.","DOI":"10.1177\/001872679304600803"},{"key":"key2022031320411106900_B26","doi-asserted-by":"crossref","unstructured":"Lucas, H. (1978), \u201cEmpirical evidence for a descriptive model of implementation\u201d, MIS Quarterly, June, pp. 27\u201041.","DOI":"10.2307\/248939"},{"key":"key2022031320411106900_B27","unstructured":"McMillan, J. and Schumacher, S. (1989), Research Education: A Conceptual Introduction, Scott Foresman, Glenview, IL."},{"key":"key2022031320411106900_B28","unstructured":"MetaMessage (2001), \u201cMetamessage home page\u201d, available at: www.metamessage.com (accessed 13 May)."},{"key":"key2022031320411106900_B29","unstructured":"MetaMessage (2003), available at: www.onsettechnology. com\/download\/METAmessage%20white%20paper. pdf (accessed 11 September)."},{"key":"key2022031320411106900_B30","doi-asserted-by":"crossref","unstructured":"Millman, Z. and Hartwick, J. (1987), \u201cThe impact of automated office systems on middle managers and their work\u201d, MIS Quarterly, Vol. 11 No. 4, pp. 479\u201091.","DOI":"10.2307\/248977"},{"key":"key2022031320411106900_B31","unstructured":"Norusis, M.J. (1994), SPSS Advanced Statistics 6.1, SPSS Inc., Chicago, IL."},{"key":"key2022031320411106900_B32","unstructured":"Palmquist, R. (1992), \u201cThe impact of information technology on the individual\u201d, in Williams, M. (Ed.), Annual Review of Information Science and Technology, Vol. 27, Learned Information, Inc., Medford, NJ,  pp. 3\u201042."},{"key":"key2022031320411106900_B33","doi-asserted-by":"crossref","unstructured":"Picco, G, (2001), \u201cMobile agents: an introduction\u201d, Microprocessors and Microsystems, Vol. 25, pp. 65\u201074.","DOI":"10.1016\/S0141-9331(01)00099-0"},{"key":"key2022031320411106900_B34","doi-asserted-by":"crossref","unstructured":"Piccoli, G., Spalding, B. and Ives, B. (2001), \u201cThe customer\u2010service life cycle: a framework for improving customer service through information technology\u201d, Cornell Hotel and Restaurant Administration Quarterly, Vol. 42 No. 3, p. 38.","DOI":"10.1177\/0010880401423004"},{"key":"key2022031320411106900_B35","doi-asserted-by":"crossref","unstructured":"Premkumar, G. and Roberts, M. (1999), \u201cAdoption of new information technologies in rural small businesses\u201d, International Journal of Management Sciences, Vol. 27, pp. 467\u201084.","DOI":"10.1016\/S0305-0483(98)00071-1"},{"key":"key2022031320411106900_B36","unstructured":"Rogers, E. (1995), Diffusion of Innovation, Free Press, New York, NY."},{"key":"key2022031320411106900_B37","doi-asserted-by":"crossref","unstructured":"Swanson, E. (1994), \u201cInformation systems innovation among organization\u2019\u2019, Management Science, Vol. 40 No. 9, pp. 1069\u201092.","DOI":"10.1287\/mnsc.40.9.1069"},{"key":"key2022031320411106900_B38","doi-asserted-by":"crossref","unstructured":"Torkzadeh, G. and Doll, W.J. (1999), \u201cThe development of a tool for measuring the perceived impact of information technology on work\u201d, The International Journal of Management Science, Vol. 27, pp. 327\u201039.","DOI":"10.1016\/S0305-0483(98)00049-8"},{"key":"key2022031320411106900_B39","unstructured":"Turban, E. and Aronson, J. (1998), Decision Support Systems, Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022031320411106900_B40","doi-asserted-by":"crossref","unstructured":"Venkatesh, V., Speier, C. and Morris, M. (2002), \u201cUser acceptance enablers in individual decision making about technology: toward an integrated model\u201d, Decision Sciences, Vol. 33 No. 2, pp. 297\u2010316.","DOI":"10.1111\/j.1540-5915.2002.tb01646.x"},{"key":"key2022031320411106900_B41","unstructured":"Zuboff, S. (1988), In the Age of the Smart Machine: The Future of Work and Power, Basic Books, New York, NY."},{"key":"key2022031320411106900_B42","doi-asserted-by":"crossref","unstructured":"Bailey, J. and Pearson, S. (1983), \u201cDevelopment of a tool for measuring and analyzing computer user satisfaction\u201d, Management Science, Vol. 29 No. 5, pp. 530\u201045.","DOI":"10.1287\/mnsc.29.5.530"},{"key":"key2022031320411106900_B43","doi-asserted-by":"crossref","unstructured":"Belcher, L. and Watson, H. (1993), \u201cAssessing the value of Conoco\u2019s EIS\u201d, MIS Quarterly, pp. 238\u201053.","DOI":"10.2307\/249770"},{"key":"key2022031320411106900_B44","unstructured":"Brusic, I. et al. (2001), \u201cMobile agents in the mobile telephone network management\u201d, Telecommunication Systems, Vol. 18, pp. 243\u201054."},{"key":"key2022031320411106900_B45","doi-asserted-by":"crossref","unstructured":"Igbaria, M. et al. (1995), \u201cWhy do individuals use computer technology? A Finnish case study\u201d, Information & Management, Vol. 29, pp. 227\u201038.","DOI":"10.1016\/0378-7206(95)00031-0"},{"key":"key2022031320411106900_B46","unstructured":"Marrow, P. and Ghanea\u2010Hercock, R. (2000), \u201cMobile software agents \u2013 insect\u2010inspired computing\u201d, BT Technology, Vol. 18 No. 4, October, pp. 129\u201038."},{"key":"key2022031320411106900_B47","unstructured":"Mears, R. and Salzetti, J. (2000), \u201cThe new wireless enterprise\u201d, InformationWeek.com, 18 September, available at: www.informationweek.com\/804\/wireless.htm (accessed 25 September 2001)."},{"key":"key2022031320411106900_B48","doi-asserted-by":"crossref","unstructured":"Ruppel, C. and Howard, G. (1998), \u201cThe effect of environmental factors on the adoption and diffusion of telework\u201d, Journal of End User Computing, Vol. 10 No. 4, pp. 5\u201014.","DOI":"10.4018\/joeuc.1998100101"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240410516282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410516282\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410516282\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:39:57Z","timestamp":1753400397000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/14\/1\/6-18\/185160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2,1]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2,1]]}},"alternative-id":["10.1108\/10662240410516282"],"URL":"https:\/\/doi.org\/10.1108\/10662240410516282","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2004,2,1]]}}}