{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:06:21Z","timestamp":1771265181075,"version":"3.50.1"},"reference-count":33,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2011,11,15]],"date-time":"2011-11-15T00:00:00Z","timestamp":1321315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J of Systems and Info Tech"],"published-print":{"date-parts":[[2011,11,15]]},"DOI":"10.1108\/13287261111183988","type":"journal-article","created":{"date-parts":[[2011,11,12]],"date-time":"2011-11-12T07:02:11Z","timestamp":1321081331000},"page":"389-407","source":"Crossref","is-referenced-by-count":40,"title":["Adapted technology acceptance model for mobile policing"],"prefix":"10.1108","volume":"13","author":[{"given":"Rachael","family":"Lindsay","sequence":"first","affiliation":[]},{"given":"Thomas W.","family":"Jackson","sequence":"additional","affiliation":[]},{"given":"Louise","family":"Cooke","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"p_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1302_1"},{"key":"p_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9671.2005.00205.x"},{"key":"p_3","doi-asserted-by":"crossref","first-page":"244","DOI":"10.17705\/1jais.00122","volume":"8","author":"Bagozzi R.P.","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"p_4","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.36"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1111\/1540-6210.00262"},{"key":"p_6","doi-asserted-by":"publisher","DOI":"10.1177\/1466802501001002001"},{"issue":"4","key":"p_7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1080\/07421222.2002.11045699","volume":"18","author":"Chau P.Y.K.","year":"2002","journal-title":"Journal of Management Information Systems"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1080\/14697010600694259"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2004.10.009"},{"key":"p_10","volume-title":"Brighton: [Internal] Draft report","author":"Conspicuity Innovate Ltd","year":"2005"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"p_12","volume-title":"Attitude, Intention and Behaviour: An Introduction to Theory and Research","author":"Fishbein M.","year":"1975"},{"key":"p_13","volume-title":"The Policing Green Paper - from the neighbourhood to the national: policing our communities together","author":"Home Office","year":"2008"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1108\/02640470710829569"},{"key":"p_15","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2008.100"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"p_17","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2003.003992"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1177\/0894439303259881"},{"key":"p_19","volume-title":"Proceedings of the 2002 Annual National Conference on Digital Government Research","author":"Lin C.","year":"2002"},{"key":"p_20","doi-asserted-by":"publisher","DOI":"10.1177\/016555150102700502"},{"key":"p_21","doi-asserted-by":"publisher","DOI":"10.1086\/449197"},{"key":"p_22","volume-title":"The Technology of Policing: Crime Mapping, Information Technology and the Rationality of Crime Control","author":"Manning P.K.","year":"2008"},{"key":"p_23","first-page":"38","volume":"23","author":"Mills R.","year":"2008","journal-title":"Daily Express"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265573"},{"key":"p_25","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-31166-1_15"},{"key":"p_26","volume-title":"Police get \u00a325 million for handhelds","author":"Savvas A.","year":"2009"},{"key":"p_27","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(99)00052-7"},{"key":"p_28","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-009-9102-2"},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2006.09.001"},{"key":"p_30","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"p_31","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"key":"p_32","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"issue":"3","key":"p_33","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"Venkatesh V.","year":"2003","journal-title":"MIS Quarterly"}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/13287261111183988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/13287261111183988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:24:23Z","timestamp":1753403063000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/13\/4\/389-407\/254810"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,15]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,11,15]]}},"alternative-id":["10.1108\/13287261111183988"],"URL":"https:\/\/doi.org\/10.1108\/13287261111183988","relation":{},"ISSN":["1328-7265"],"issn-type":[{"value":"1328-7265","type":"print"}],"subject":[],"published":{"date-parts":[[2011,11,15]]}}}