{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:29:54Z","timestamp":1761197394012,"version":"3.41.2"},"reference-count":92,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T00:00:00Z","timestamp":1467590400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7,4]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 By studying the drivers of social collaboration the purpose of this paper is to describe how, and for what job-related purposes, social software is employed in the digital workplace. Focussing on consultants, who are considered to be part of a knowledge-intensive and innovative industry, factors that may influence the adoption of professional social software are explored. In addition, insights about socio-demographic differences as well as distinct consulting segments and use categories are provided. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 The Unified Theory of Acceptance and Use of Technologies (UTAUT) is the theoretical backbone of this research. The UTAUT model is expanded to fit the research goals, and the results from a quantitative study (<jats:italic>n<\/jats:italic>=341) are used to test the model. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The results suggest that the adoption of social software is associated with the expectation that one\u2019s work performance will improve. There are significant differences regarding age and gender in the use of social software for job-related purposes. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 Using the results of the study, social software suites can be tailored to users\u2019 needs and preferences, which, in turn, may lead to higher levels of acceptance and intensity of use. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 Social software is already widely adopted for private purposes, and it is being used more and more within the digital workplace, too. However, little research has been conducted into how, and for what job-related purposes, social software is employed, or into the potential drivers for its adoption. The stakeholders in the research include scholars and practitioners alike.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/bpmj-06-2015-0093","type":"journal-article","created":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T09:50:09Z","timestamp":1469613009000},"page":"693-711","source":"Crossref","is-referenced-by-count":7,"title":["Collaboration in the consulting industry"],"prefix":"10.1108","volume":"22","author":[{"given":"Malte","family":"Martensen","sequence":"first","affiliation":[]},{"given":"Stephanie","family":"Ryschka","sequence":"additional","affiliation":[]},{"given":"Till","family":"Blesik","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Bick","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020121422324429400_b2","doi-asserted-by":"crossref","unstructured":"Back, A.\n                and \n                  Koch, M.\n                (2011), \u201cBroadening participation in knowledge management in enterprise 2.0\u201d, \n                  It \u2013 Information Technology\n               , Vol. 53 No. 3, pp. 135-141.","DOI":"10.1524\/itit.2011.0635"},{"key":"key2020121422324429400_b1","unstructured":"Back, A.\n               , \n                  Gronau, N.\n                and \n                  Tochtermann, K.\n                (Eds) (2012), \n                  Web 2.0 und Social Media in der Unternehmenspraxis: Grundlagen, Anwendungen und Methoden mit zahlreichen Fallstudien\n               , 3rd ed., Oldenbourg, M\u00fcnchen."},{"key":"key2020121422324429400_b3","doi-asserted-by":"crossref","unstructured":"Bagozzi, R.P.\n                (2007), \u201cThe legacy of the technology acceptance model and a proposal for a paradigm shift\u201d, \n                  Journal of the Association for Information Systems\n               , Vol. 8 No. 4, pp. 244-254.","DOI":"10.17705\/1jais.00122"},{"key":"key2020121422324429400_b4","doi-asserted-by":"crossref","unstructured":"Barjis, J.\n               , \n                  Verbraeck, A.\n               , \n                  Georgantzas, N.C.\n                and \n                  Katsamakas, E.G.\n                (2010), \u201cPerformance effects of information systems integration: a system dynamics study in a media firm\u201d, \n                  Business Process Management Journal\n               , Vol. 16 No. 5, pp. 822-846.","DOI":"10.1108\/14637151011076494"},{"key":"key2020121422324429400_b5","doi-asserted-by":"crossref","unstructured":"Benbasat, I.\n                and \n                  Barki, H.\n                (2007), \u201cQuo vadis, TAM?\u201d, \n                  Journal of the Association for Information Systems\n               , Vol. 8 No. 4, pp. 211-218.","DOI":"10.17705\/1jais.00126"},{"key":"key2020121422324429400_b6","doi-asserted-by":"crossref","unstructured":"Benson, J.\n                and \n                  Brown, M.\n                (2011), \u201cGenerations at work: are there differences and do they matter?\u201d, \n                  The International Journal of Human Resource Management\n               , Vol. 22 No. 9, pp. 1843-1865.","DOI":"10.1080\/09585192.2011.573966"},{"key":"key2020121422324429400_b7","doi-asserted-by":"crossref","unstructured":"Bock, G.-W.\n               , \n                  Zmud, R.W.\n               , \n                  Kim, Y.-G.\n                and \n                  Lee, J.-N.\n                (2005), \u201cBehavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate\u201d, \n                  MIS Quarterly\n               , Vol. 29 No. 1, pp. 87-111.","DOI":"10.2307\/25148669"},{"key":"key2020121422324429400_b8","doi-asserted-by":"crossref","unstructured":"B\u00f6gel, S.\n               , \n                  Stieglitz, S.\n                and \n                  Meske, C.\n                (2014), \u201cA role model-based approach for modelling collaborative processes\u201d, \n                  Business Process Management Journal\n               , Vol. 20 No. 4, pp. 598-614.","DOI":"10.1108\/BPMJ-07-2013-0094"},{"key":"key2020121422324429400_b9","doi-asserted-by":"crossref","unstructured":"Bradley, J.\n                (2012), \u201cIf we build it they will come? The technology acceptance model\u201d, in \n                  Dwivedi, Y.K.\n               , \n                  Wade, M.R.\n                and \n                  Schneberger, S.L.\n                (Eds), \n                  Information Systems Theory: Explaining and Predicting our Digital Society\n               , Vol. 1, Springer, New York, NY, Dordrecht, Heidelberg and London, pp. 19-36.","DOI":"10.1007\/978-1-4419-6108-2_2"},{"key":"key2020121422324429400_b10","doi-asserted-by":"crossref","unstructured":"Brambilla, M.\n               , \n                  Fraternali, P.\n                and \n                  Vaca Ruiz, C.K.\n                (2012), \u201cCombining social web and BPM for improving enterprise performances\u201d, in \n                  Mille, A.\n               , \n                  Gandon, F.\n                and \n                  Misselis, J.\n                (Eds), \n                  Proceedings of the 21st International Conference on World Wide Web 16-20.4.2012, Lyon, ACM, New York, NY\n               , pp. 223-226.","DOI":"10.1145\/2187980.2188014"},{"key":"key2020121422324429400_b11","doi-asserted-by":"crossref","unstructured":"Brenner, W.\n               , \n                  Karagiannis, D.\n               , \n                  Kolbe, L.\n               , \n                  Kr\u00fcger, J.\n               , \n                  Leifer, L.\n               , \n                  Lamberti, H.-J.\n               , \n                  Leimeister, J.M.\n               , \n                  \u00d6sterle, H.\n               , \n                  Petrie, C.\n               , \n                  Plattner, H.\n               , \n                  Schwabe, G.\n               , \n                  Uebernickel, F.\n               , \n                  Winter, R.\n                and \n                  Zarnekow, R.\n                (2014), \u201cUser, use and utility research\u201d, \n                  Business & Information Systems Engineering\n               , Vol. 6 No. 1, pp. 55-61.","DOI":"10.1007\/s12599-013-0302-4"},{"key":"key2020121422324429400_b12","unstructured":"Bughin, J.\n                and \n                  Manyika, J.\n                (2007), \u201cHow businesses are using web 2.0. A McKinsey global survey\u201d, McKinsey Quarterly, March, pp. 2-16."},{"key":"key2020121422324429400_b13","unstructured":"Cannell, L.\n                (2011), \u201cThe post-2.0 era: social in the context of my work\u201d, available at: www.gartner.com\/doc\/1883914\/post-era-social-context-work (accessed June 23, 2014)."},{"key":"key2020121422324429400_b14","doi-asserted-by":"crossref","unstructured":"Chang, I.-C.\n               , \n                  Hwang, H.-G.\n               , \n                  Hung, W.-F.\n                and \n                  Li, Y.-C.\n                (2007), \u201cPhysicians\u2019 acceptance of pharmacokinetics-based clinical decision support systems\u201d, \n                  Expert Systems with Applications\n               , Vol. 33 No. 2, pp. 296-303.","DOI":"10.1016\/j.eswa.2006.05.001"},{"key":"key2020121422324429400_b15","doi-asserted-by":"crossref","unstructured":"Chang, Y.P.\n                and \n                  Zhu, D.H.\n                (2011), \u201cUnderstanding social networking sites adoption in China: a comparison of pre-adoption and post-adoption\u201d, \n                  Computers in Human Behavior\n               , Vol. 27 No. 5, pp. 1840-1848.","DOI":"10.1016\/j.chb.2011.04.006"},{"key":"key2020121422324429400_b16","doi-asserted-by":"crossref","unstructured":"Chen, S.-C.\n               , \n                  Yen, D.C.\n                and \n                  Hwang, M.I.\n                (2012), \u201cFactors influencing the continuance intention to the usage of web 2.0: an empirical study\u201d, \n                  Computers in Human Behavior\n               , Vol. 28 No. 3, pp. 933-941.","DOI":"10.1016\/j.chb.2011.12.014"},{"key":"key2020121422324429400_b17","unstructured":"Chui, M.\n               , \n                  Manyika, J.\n               , \n                  Bughin, J.\n               , \n                  Dobbs, R.\n               , \n                  Roxburgh, C.\n               , \n                  Sarrazin, H.\n               , \n                  Sands, G.\n                and \n                  Westergren, M.\n                (2012), \u201cThe social economy: unlocking value and productivity through social technologies\u201d, available at: www.mckinsey.com\/insights\/high_tech_telecoms_internet\/the_social_economy (accessed November 5, 2015)."},{"key":"key2020121422324429400_b18","unstructured":"Davenport, T.H.\n                (2011), \u201cRethinking knowledge work: a strategic approach\u201d, McKinsey Quarterly, February, pp. 88-99."},{"key":"key2020121422324429400_b19","unstructured":"Drucker, P.F.\n                (1973), \n                  Management: Tasks, Responsibilities, Practices\n               , Harper and Row, New York, NY."},{"key":"key2020121422324429400_b20","unstructured":"Drucker, P.F.\n                (Ed.) (1998), \n                  Harvard Business Review on Knowledge Management\n               , Harvard Business School Press, Harvard, MA."},{"key":"key2020121422324429400_b21","unstructured":"Ebersbach, A.\n               , \n                  Glaser, M.\n                and \n                  Heigl, R.\n                (2011), \n                  Social Web\n               , 2nd ed., UVK Verlagsgesellschaft, Konstanz."},{"key":"key2020121422324429400_b22","unstructured":"Ellison, N.\n               , \n                  Steinfield, C.\n                and \n                  Lampe, C.\n                (2006), \u201cSpatially bounded online social networks and social capital: the role of Facebook\u201d, Presented at the Annual Conference of the International Communication Association, Dresden, June 19-23, available at: www.ucalgary.ca\/files\/stas341\/Facebook_ICA_2006.pdf (accessed November 5, 2015)."},{"key":"key2020121422324429400_b23","doi-asserted-by":"crossref","unstructured":"Fassott, G.\n                (2006), \u201cOperationalisierung latenter Variablen in Strukturgleichungsmodellen: Eine Standortbestimmung\u201d, \n                  Zeitschrift f\u00fcr betriebswirtschaftliche Forschung\n               , Vol. 58 No. 2, pp. 67-88.","DOI":"10.1007\/BF03371644"},{"key":"key2020121422324429400_b24","doi-asserted-by":"crossref","unstructured":"Fetchenhauer, D.\n                (2011), \n                  Psychologie\n               , Vahlen, M\u00fcnchen.","DOI":"10.15358\/9783800639403"},{"key":"key2020121422324429400_b25","unstructured":"G\u00f6rtz, M.\n                (2011), \n                  Social Software as a Source of Information in the Workplace\n               , Verlag Werner H\u00fclsbusch, Boizenburg."},{"key":"key2020121422324429400_b26","doi-asserted-by":"crossref","unstructured":"G\u00f6tz, O.\n               , \n                  Liehr-Gobbers, K.\n                and \n                  Krafft, M.\n                (2010), \u201cEvaluation of structural equation models using the partial least squares (PLS) approach\u201d, in \n                  Vinzi, V.E.\n               , \n                  Chin, W.W.\n               , \n                  Henseler, J.\n                and \n                  Wang, H.\n                (Eds), \n                  Handbook of Partial Least Squares: Concepts, Methods and Applications\n               , Springer, Berlin and Heidelberg, pp. 691-711.","DOI":"10.1007\/978-3-540-32827-8_30"},{"key":"key2020121422324429400_b27","unstructured":"Gronau, N.\n                (2013), \u201cSoziale software\u201d, in \n                  Kurbel, K.\n               , \n                  Becker, J.\n               , \n                  Gronau, N.\n               , \n                  Sinz, E.\n                and \n                  Suhl, L.\n                (Eds), \n                  Enzyklop\u00e4die der Wirtschaftsinformatik \u2013 Online Lexikon\n               , Oldenburg Verlag, M\u00fcnchen."},{"key":"key2020121422324429400_b28","doi-asserted-by":"crossref","unstructured":"Gupta, B.\n               , \n                  Dasgupta, S.\n                and \n                  Gupta, A.\n                (2008), \u201cAdoption of ICT in a government organization in a developing country: an empirical study\u201d, \n                  Journal of Strategic Information Systems\n               , Vol. 17 No. 2, pp. 140-154.","DOI":"10.1016\/j.jsis.2007.12.004"},{"key":"key2020121422324429400_b29","unstructured":"Herzberg, F.\n               , \n                  Mausner, B.\n                and \n                  Bloch Snyderman, B.\n                (2010), \n                  The Motivation to Work\n               , 12th ed., Transaction Publishers, New Brunswick, NJ."},{"key":"key2020121422324429400_b30","doi-asserted-by":"crossref","unstructured":"Hevner, A.R.\n               , \n                  Ram, S.\n               , \n                  March, S.T.\n                and \n                  Park, J.\n                (2004), \u201cDesign science in information systems research\u201d, \n                  MIS Quarterly\n               , Vol. 28 No. 1, pp. 75-105.","DOI":"10.2307\/25148625"},{"key":"key2020121422324429400_b31","unstructured":"Hippner, H.\n                (2006), \u201cBedeutung, Anwendungen und Einsatzpotenziale von Social Software\u201d, \n                  HMD Praxis der Wirtschaftsinformatik\n               , No. 252, pp. 6-16."},{"key":"key2020121422324429400_b32","unstructured":"Houy, C.\n               , \n                  Fettke, P.\n                and \n                  Loos, P.\n                (2010), \u201cEinsatzpotentiale von Enterprise-2.0-Anwendungen: Darstellung des State-of-the-Art auf Basis eines Literaturreviews\u201d, Working Paper IWi-Heft Nr. 192, Institut f\u00fcr Wirtschaftsinformatik im Deutschen Forschungszentrum f\u00fcr K\u00fcnstliche Intelligenz, Saarbr\u00fccken, November."},{"key":"key2020121422324429400_b33","doi-asserted-by":"crossref","unstructured":"Hsu, C.-L.\n                and \n                  Lin, J.C.-C.\n                (2008), \u201cAcceptance of blog usage: the roles of technology acceptance, social influence and knowledge sharing motivation\u201d, \n                  Information and Management\n               , Vol. 45 No. 1, pp. 65-74.","DOI":"10.1016\/j.im.2007.11.001"},{"key":"key2020121422324429400_b34","unstructured":"Hu, M.\n                and \n                  Schlagwein, D.\n                (2013), \u201cWhy firms use social media: an absorptive capacity perspective\u201d, ECIS 2013 Completed Research, ECIS 2013 Proceedings, Utrecht, June 5-8, Paper 108."},{"key":"key2020121422324429400_b35","unstructured":"Huang, K.-Y.\n               , \n                  Choi, N.\n                and \n                  Horowitz, L.\n                (2010), \u201cWeb 2.0 use and organizational innovation: a knowledge transfer enabling perspective\u201d, Proceedings of AMCIS 2010, Peru, August 12-15, Lima, Paper 189."},{"key":"key2020121422324429400_b36","doi-asserted-by":"crossref","unstructured":"Jackson, P.\n                (2010), \u201cCapturing, structuring and maintaining knowledge: a social software approach\u201d, \n                  Industrial Management and Data Systems\n               , Vol. 110 No. 6, pp. 908-929.","DOI":"10.1108\/02635571011055117"},{"key":"key2020121422324429400_b37","doi-asserted-by":"crossref","unstructured":"Jarvis, C.B.\n               , \n                  Mackenzie, S.B.\n                and \n                  Podsakoff, P.M.\n                (2003), \u201cA critical review of construct indicators and measurement model misspecification in marketing and consumer research\u201d, \n                  Journal of Consumer Research\n               , Vol. 30 No. 2, pp. 199-218.","DOI":"10.1086\/376806"},{"key":"key2020121422324429400_b38","doi-asserted-by":"crossref","unstructured":"Jenkins, J.\n                (2008), \u201cStrategies for managing talent in a multigenerational workforce\u201d, \n                  Employment Relations Today\n               , Vol. 34 No. 4, pp. 19-26.","DOI":"10.1002\/ert.20172"},{"key":"key2020121422324429400_b39","doi-asserted-by":"crossref","unstructured":"Jung, T.\n               , \n                  Youn, H.\n                and \n                  McClung, S.\n                (2007), \u201cMotivations and self-presentation strategies on Korean-based \u2018Cyworld\u2019 weblog format personal homepages\u201d, \n                  CyberPsychology and Behavior\n               , Vol. 10 No. 1, pp. 24-31.","DOI":"10.1089\/cpb.2006.9996"},{"key":"key2020121422324429400_b40","doi-asserted-by":"crossref","unstructured":"Kaplan, A.M.\n                and \n                  Haenlein, M.\n                (2010), \u201cUsers of the world, unite! The challenges and opportunities of social media\u201d, \n                  Business Horizons\n               , Vol. 53 No. 1, pp. 59-68.","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"key2020121422324429400_b41","doi-asserted-by":"crossref","unstructured":"K\u00e4rkk\u00e4inen, H.\n               , \n                  Jussila, J.\n                and \n                  V\u00e4is\u00e4nen, J.\n                (2010), \u201cSocial media use and potential in business-to-business companies\u2019 innovation\u201d, in \n                  Lugmayr, A.\n               , \n                  Franssila, H.\n               , \n                  Sotamaa, O.\n               , \n                  Safran, C.\n                and \n                  Aaltonen, T.\n                (Eds), \n                  Proceedings of the 14th International Academic MindTrek Conference, Tampere, October 6-8\n               , ACM, New York, NY, pp. 228-236.","DOI":"10.1145\/1930488.1930536"},{"key":"key2020121422324429400_b42","doi-asserted-by":"crossref","unstructured":"Kim, J.\n               , \n                  Song, J.\n                and \n                  Jones, D.R.\n                (2010), \u201cThe cognitive selection framework of knowledge acquisition strategy in virtual communities\u201d, Proceedings of 43rd Hawaii International Conference on System Sciences, Koloa, HI, January 5-8, pp. 1-10.","DOI":"10.1109\/HICSS.2010.368"},{"key":"key2020121422324429400_b43","doi-asserted-by":"crossref","unstructured":"Kim, Y.\n               , \n                  Sohn, D.\n                and \n                  Choi, S.M.\n                (2011), \u201cCultural difference in motivations for using social network sites: a comparative study of American and Korean college students\u201d, \n                  Computers in Human Behavior\n               , Vol. 27 No. 1, pp. 365-372.","DOI":"10.1016\/j.chb.2010.08.015"},{"key":"key2020121422324429400_b44","unstructured":"Kite, M.E.\n                (2001), \u201cChanging times, changing gender roles: who do we want women and men to be?\u201d, in \n                  Unger, R.K.\n                (Ed.), \n                  Handbook of the Psychology of Women and Gender\n               , Wiley, Hoboken, NJ, pp. 215-227."},{"key":"key2020121422324429400_b45","doi-asserted-by":"crossref","unstructured":"Ko, H.\n               , \n                  Cho, C.-H.\n                and \n                  Roberts, M.S.\n                (2005), \u201cInternet uses and gratifications: a structural equation model of interactive advertising\u201d, \n                  Journal of Advertising\n               , Vol. 34 No. 2, pp. 57-70.","DOI":"10.1080\/00913367.2005.10639191"},{"key":"key2020121422324429400_b46","doi-asserted-by":"crossref","unstructured":"Koch, M.\n                and \n                  Richter, A.\n                (2009), \n                  Enterprise 2.0: Planung, Einf\u00fchrung und erfolgreicher Einsatz von Social Software in Unternehmen\n               , 2nd ed., Oldenbourg, M\u00fcnchen.","DOI":"10.1524\/9783486593648"},{"key":"key2020121422324429400_b47","unstructured":"Krasnova, H.\n               , \n                  Kolesnikova, E.\n                and \n                  G\u00fcnther, O.\n                (2011), \u201cOne size fits all? Managing trust and privacy on social networking sites in Russia and Germany\u201d, ECIS 2011 Proceedings, Helsinki, June 9-11, Paper 71."},{"key":"key2020121422324429400_b48","unstructured":"Krisanic, K.\n                (2008), \u201cMotivations and impression management: predictors of social networking site use and user behavior\u201d, Master\u2019s thesis, University of Missouri, Columbia."},{"key":"key2020121422324429400_b49","doi-asserted-by":"crossref","unstructured":"Krogh, G.von\n                (2012), \u201cHow does social software change knowledge management? Toward a strategic research agenda\u201d, \n                  Journal of Strategic Information Systems\n               , Vol. 21 No. 2, pp. 154-164.","DOI":"10.1016\/j.jsis.2012.04.003"},{"key":"key2020121422324429400_b50","doi-asserted-by":"crossref","unstructured":"Lee, J.-N.\n                (2001), \u201cThe impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success\u201d, \n                  Information and Management\n               , Vol. 38 No. 5, pp. 323-335.","DOI":"10.1016\/S0378-7206(00)00074-4"},{"key":"key2020121422324429400_b51","unstructured":"Lee, P.\n               , \n                  Stewart, D.\n                and \n                  Calugar-Pop, C.\n                (2013), \u201cTechnology, media and telecommunications predictions\u201d, available at: www2.deloitte.com\/content\/dam\/Deloitte\/global\/Documents\/About-Deloitte\/dttl-tmt-predictions2013-final.pdf (accessed November 5, 2007)."},{"key":"key2020121422324429400_b52","doi-asserted-by":"crossref","unstructured":"Lee, Y.\n               , \n                  Kozar, K.A.\n                and \n                  Larsen, K.R.\n                (2003), \u201cThe technology acceptance model: past, present, and future\u201d, \n                  Communications of the Association for Information Systems\n               , Vol. 50 No. 12, pp. 752-780.","DOI":"10.17705\/1CAIS.01250"},{"key":"key2020121422324429400_b55","doi-asserted-by":"crossref","unstructured":"McAfee, A.\n                (2006), \u201cEnterprise 2.0: the dawn of emergent collaboration\u201d, \n                  MIT Sloan Management Review\n               , Vol. 47 No. 3, pp. 21-28.","DOI":"10.1109\/EMR.2006.261380"},{"key":"key2020121422324429400_b53","doi-asserted-by":"crossref","unstructured":"Martensen, M.\n               , \n                  Ryschka, S.\n                and \n                  Bick, M.\n                (2016), \u201cStudying social software adoption by management consultants: use and application categories for knowledge management\u201d, in \n                  Razmerita, L.\n               , \n                  Phillips-Wren, G.\n                and \n                  Jain, L.C.\n                (Eds), \n                  Innovations in Knowledge Management\n               , Springer, New York, NY, pp. 101-126.","DOI":"10.1007\/978-3-662-47827-1_5"},{"key":"key2020121422324429400_b54","unstructured":"Martensen, M.\n               , \n                  Kahl, H.\n               , \n                  Franke, M.R.\n                and \n                  Bick, M.\n                (2014), \u201cGestaltungsdimensionen des Wissensmanagements im Enterprise 2.0 \u2013 Eine inhaltsanalytische Betrachtung der Fallstudiensammlung www.e20cases.org\n               \u201d, Multikonferenz Wirtschaftsinformatik, MKWI 2014, Paderborn, February 26-28, pp. 2285-2297."},{"key":"key2020121422324429400_b56","doi-asserted-by":"crossref","unstructured":"Morris, M.G.\n                and \n                  Venkatesh, V.\n                (2000), \u201cAge differences in technology adoption decisions: implications for a changing work force\u201d, \n                  Personnel Psychology\n               , Vol. 53 No. 2, pp. 375-403.","DOI":"10.1111\/j.1744-6570.2000.tb00206.x"},{"key":"key2020121422324429400_b57","unstructured":"O\u2019Reilly, T.\n                (2005), \u201cWhat is web 2.0? Design patterns and business models for the next generation of software\u201d, available at: http:\/\/oreilly.com\/web2\/archive\/what-is-web-20.html (accessed June 23, 2014)."},{"key":"key2020121422324429400_b58","doi-asserted-by":"crossref","unstructured":"Papacharissi, Z.\n                and \n                  Rubin, A.M.\n                (2000), \u201cPredictors of internet use\u201d, \n                  Journal of Broadcasting and Electronic Media\n               , Vol. 44 No. 2, pp. 175-196.","DOI":"10.1207\/s15506878jobem4402_2"},{"key":"key2020121422324429400_b59","doi-asserted-by":"crossref","unstructured":"Pasupathi, M.\n                (1999), \u201cAge differences in response to conformity pressure for emotional and non-emotional material\u201d, \n                  Psychology and Aging\n               , Vol. 14 No. 1, pp. 170-174.","DOI":"10.1037\/0882-7974.14.1.170"},{"key":"key2020121422324429400_b60","doi-asserted-by":"crossref","unstructured":"Prensky, M.\n                (2001), \u201cDigital natives, digital immigrants\u201d, \n                  On the Horizon\n               , Vol. 9 No. 5, pp. 1-6.","DOI":"10.1108\/10748120110424816"},{"key":"key2020121422324429400_b61","doi-asserted-by":"crossref","unstructured":"Richter, A.\n                (2010), \n                  Der Einsatz von Social Networking Services in Unternehmen: Eine explorative Analyse m\u00f6glicher soziotechnischer Gestaltungsparameter und ihrer Implikationen\n               , Gabler, Wiesbaden.","DOI":"10.1007\/978-3-8349-6027-6_7"},{"key":"key2020121422324429400_b63","unstructured":"Richter, A.\n               , \n                  M\u00f6rl, S.\n               , \n                  Koch, M.\n                and \n                  Trier, M.\n                (2011a), \u201cAnwendungsszenarien als Werkzeug zur (V)Ermittlung des Nutzens von corporate social software\u201d, Wirtschaftsinformatik Proceedings, Z\u00fcrich, February 16-18, Paper 5."},{"key":"key2020121422324429400_b64","unstructured":"Richter, D.\n               , \n                  Riemer, K.\n                and \n                  vom Brocke, J.\n                (2010), \u201cSocial transactions on social network sites: can transaction cost theory contribute to a better understanding of internet social networking?\u201d, BLED 2010 Proceedings, Bled, June 20-23, Paper 39."},{"key":"key2020121422324429400_b65","doi-asserted-by":"crossref","unstructured":"Richter, D.\n               , \n                  Riemer, K.\n                and \n                  vom Brocke, J.\n                (2011b), \u201cInternet social networking\u201d, \n                  Wirtschaftsinformatik\n               , Vol. 53 No. 2, pp. 89-103.","DOI":"10.1007\/s11576-011-0265-3"},{"key":"key2020121422324429400_b62","unstructured":"Richter, A.\n               , \n                  Koch, M.\n               , \n                  Behrendt, S.\n               , \n                  Nestler, S.\n               , \n                  M\u00fcller, S.\n                and \n                  Herrlich, S.\n                (2012), \n                  aperto \u2013 Ein Rahmenwerk zur Auswahl, Einf\u00fchrung und Optimierung von Corporate Social Software, Schriften zur soziotechnischen Integration\n               , Universit\u00e4t der Bundeswehr M\u00fcnchen, M\u00fcnchen."},{"key":"key2020121422324429400_b66","doi-asserted-by":"crossref","unstructured":"Ridings, C.M.\n                and \n                  Gefen, D.\n                (2004), \u201cVirtual community attraction: why people hang out online\u201d, \n                  Journal of Computer-Mediated Communication\n               , Vol. 10 No. 1.","DOI":"10.1111\/j.1083-6101.2004.tb00229.x"},{"key":"key2020121422324429400_b67","unstructured":"Riemer, K.\n               , \n                  Altenhofen, A.\n                and \n                  Richter, A.\n                (2011), \u201cWhat are you doing? \u2013 enterprise microblogging as context building\u201d, ECIS 2011 Proceedings, Helsinki, June 9-11, Paper 252."},{"key":"key2020121422324429400_b68","unstructured":"Ringle, C.M.\n               , \n                  Wende, S.\n                and \n                  Will, A.\n                (2005), \u201cSmartPLS\u201d, available at: www.smartpls.de\/ (accessed November 5, 2015)."},{"key":"key2020121422324429400_b69","doi-asserted-by":"crossref","unstructured":"Rodgers, S.\n               , \n                  Wang, Y.\n               , \n                  Rettie, R.\n                and \n                  Alpert, F.\n                (2007), \u201cThe web motivation inventory. Replication, extension and application to internet advertising\u201d, \n                  International Journal of Advertising\n               , Vol. 26 No. 4, pp. 447-476.","DOI":"10.1080\/02650487.2007.11073028"},{"key":"key2020121422324429400_b70","unstructured":"Schaefer, C.\n                (2008), \u201cMotivations and usage patterns on social network sites\u201d, ECIS 2008 Proceedings, Galway, June 9-11, Paper 143."},{"key":"key2020121422324429400_b71","doi-asserted-by":"crossref","unstructured":"Schlagwein, D.\n                and \n                  Prasarnphanich, P.\n                (2011), \u201cCultural determinants of organizational social media adoption\u201d, ECIS 2011 Proceedings, Helsinki, June 9-11, Paper 206.","DOI":"10.1109\/DASC.2011.154"},{"key":"key2020121422324429400_b72","unstructured":"Sch\u00f6ndienst, V.\n               , \n                  Krasnova, H.\n               , \n                  Guenther, O.\n                and \n                  Riehle, D.\n                (2011), \u201cMicro-blogging adoption in the enterprise: an empirical analysis\u201d, 10th International Conference on Wirtschaftsinformatik, Z\u00fcrich, February 16-18."},{"key":"key2020121422324429400_b73","doi-asserted-by":"crossref","unstructured":"Silva, L.\n                (2007), \u201cPost-positivist review of technology acceptance model\u201d, \n                  Journal of the Association for Information Systems\n               , Vol. 8 No. 4, pp. 255-266.","DOI":"10.17705\/1jais.00121"},{"key":"key2020121422324429400_b74","doi-asserted-by":"crossref","unstructured":"Smoliar, S.W.\n                (2003), \u201cInteraction management: the next (and necessary) step beyond knowledge management\u201d, \n                  Business Process Management Journal\n               , Vol. 9 No. 3, pp. 337-353.","DOI":"10.1108\/14637150310477920"},{"key":"key2020121422324429400_b75","unstructured":"Smolnik, S.\n               , \n                  Riempp, G.\n               , \n                  Hildebrand, K.\n                and \n                  Hofmann, J.\n                (2006), \u201cNutzenpotenziale Erfolgsfaktoren und Leistungsindikatoren von Social Software f\u00fcr das organisationale Wissensmanagement\u201d, \n                  HMD Praxis der Wirtschaftsinformatik\n               , No. 252, pp. 17-26."},{"key":"key2020121422324429400_b76","unstructured":"Stenmark, D.\n                (2008), \u201cWeb 2.0 in the business environment: the new intranet or passing hype?\u201d, ECIS 2008 Proceedings, 09.-11.06.2008, Galway, Paper 35."},{"key":"key2020121422324429400_b77","doi-asserted-by":"crossref","unstructured":"Stocker, A.\n                and \n                  Tochtermann, K.\n                (2010), \n                  Wissenstransfer mit Wikis und Weblogs: Fallstudien zum erfolgreichen Einsatz von Web 2.0 in Unternehmen\n               , Gabler, Wiesbaden.","DOI":"10.1007\/978-3-8349-8948-2"},{"key":"key2020121422324429400_b78","doi-asserted-by":"crossref","unstructured":"Straub, D.W.\n                and \n                  Burton-Jones, A.\n                (2007), \u201cVeni, vidi, vici: breaking the TAM logjam\u201d, \n                  Journal of the Association for Information Systems\n               , Vol. 8 No. 4, pp. 223-229.","DOI":"10.17705\/1jais.00124"},{"key":"key2020121422324429400_b79","doi-asserted-by":"crossref","unstructured":"Subramanian, G.H.\n                (1994), \u201cA replication of perceived usefulness and perceived ease of use measurement\u201d, \n                  Decision Sciences\n               , Vol. 25 Nos 5-6, pp. 863-874.","DOI":"10.1111\/j.1540-5915.1994.tb01873.x"},{"key":"key2020121422324429400_b80","unstructured":"Teufel, S.\n               , \n                  Sauter, C.\n               , \n                  M\u00fchlherr, T.\n                and \n                  Bauknecht, K.\n                (1995), \n                  Computerunterst\u00fctzung f\u00fcr die Gruppenarbeit\n               , Addison-Wesley, Bonn."},{"key":"key2020121422324429400_b81","doi-asserted-by":"crossref","unstructured":"Thelwall, M.\n                (2011), \u201cPrivacy and gender in the social web\u201d, in \n                  Trepte, S.\n                and \n                  Reinecke, L.\n                (Eds), \n                  Perspectives on Privacy and Self-Disclosure in the Social Web\n               , Springer, New York, NY, pp. 255-269.","DOI":"10.1007\/978-3-642-21521-6_18"},{"key":"key2020121422324429400_b82","unstructured":"Tufekc, Z.\n                (2008), \u201cGroomin, gossip, facebook and MySpace\u201d, \n                  Information, Communication and Society\n               , Vol. 11 No. 4, pp. 544-564."},{"key":"key2020121422324429400_b83","doi-asserted-by":"crossref","unstructured":"Twenge, J.M.\n               , \n                  Campbell, S.M.\n               , \n                  Hoffmann, B.J.\n                and \n                  Lance, C.E.\n                (2010), \u201cGenerational differences in work values: leisure and extrinsic values increasing, social and intrinsic values decreasing\u201d, \n                  Journal of Management\n               , Vol. 36 No. 5, pp. 1117-1142.","DOI":"10.1177\/0149206309352246"},{"key":"key2020121422324429400_b84","doi-asserted-by":"crossref","unstructured":"Venkatesh, V.\n               , \n                  Morris, M.G.\n               , \n                  Davis, G.B.\n                and \n                  Davis, F.D.\n                (2003), \u201cUser acceptance of information technology: toward a unified view\u201d, \n                  MIS Quarterly\n               , Vol. 27 No. 3, pp. 425-478.","DOI":"10.2307\/30036540"},{"key":"key2020121422324429400_b85","doi-asserted-by":"crossref","unstructured":"Wasko, M.M.\n                and \n                  Faraj, S.\n                (2005), \u201cWhy should I share? Examining social capital and knowledge contribution in electronic networks of practice\u201d, \n                  MIS Quarterly\n               , Vol. 29 No. 1, pp. 35-57.","DOI":"10.2307\/25148667"},{"key":"key2020121422324429400_b86","unstructured":"Weber, S.\n               , \n                  Beck, R.\n                and \n                  Pahlke, I.\n                (2011), \u201cMeasuring the perceived usefulness of corporate communication technologies \u2013 an empirical study from a bank in Singapore\u201d, AMCIS 2011 Proceedings, Detroit, MI, August 4-8, Paper 92."},{"key":"key2020121422324429400_b87","unstructured":"Webster, J.\n                and \n                  Watson, R.T.\n                (2002), \u201cAnalyzing the past to prepare for the future: writing a literature review\u201d, \n                  MIS Quarterly\n               , Vol. 26 No. 2, pp. xiii-xxiii."},{"key":"key2020121422324429400_b88","unstructured":"Wilde, T.\n               , \n                  Hess, T.\n                and \n                  Hilbers, K.\n                (2008), \u201cAkzeptanzforschung bei nicht marktreifen Technologien: typische methodische Probleme und deren Auswirkungen\u201d, Multikonferenz Wirtschaftsinformatik, MKWI 2008, M\u00fcnchen, February 26-28, pp. 1031-1042."},{"key":"key2020121422324429400_b89","doi-asserted-by":"crossref","unstructured":"Williams, M.D.\n               , \n                  Rana, N.P.\n                and \n                  Dwivedi, Y.K.\n                (2012), \u201cA bibliometric analysis of articles citing the unified theory of acceptance and use of technology\u201d, in \n                  Dwivedi, Y.K.\n               , \n                  Wade, M.R.\n                and \n                  Schneberger, S.L.\n                (Eds), \n                  Information Systems Theory: Explaining and Predicting our Digital Society\n               , Vol. 1, Springer, New York, NY, Dordrecht, Heidelberg and London, pp. 37-62.","DOI":"10.1007\/978-1-4419-6108-2_3"},{"key":"key2020121422324429400_b90","unstructured":"Williams, S.P.\n                and \n                  Schubert, P.\n                (2011), \u201cAn empirical study of enterprise 2.0 in context\u201d, 24th Bled eConference eFuture: Creating Solutions for the Individual, Organisations and Society, Bled, June 12-15."},{"key":"key2020121422324429400_b91","unstructured":"Willke, H.\n                (1998), \n                  Systemisches Wissensmanagment\n               , UTB, Stuttgart."},{"key":"key2020121422324429400_b92","doi-asserted-by":"crossref","unstructured":"Zhang, Z.\n                (2011), \u201cCustomer knowledge management and the strategies of social software\u201d, \n                  Business Process Management Journal\n               , Vol. 17 No. 1, pp. 82-106.","DOI":"10.1108\/14637151111105599"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/BPMJ-06-2015-0093","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/BPMJ-06-2015-0093\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/BPMJ-06-2015-0093\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:15:15Z","timestamp":1753398915000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/22\/4\/693-711\/257569"}},"subtitle":["Analyzing differences in the professional use of social software"],"short-title":[],"issued":{"date-parts":[[2016,7,4]]},"references-count":92,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,7,4]]}},"alternative-id":["10.1108\/BPMJ-06-2015-0093"],"URL":"https:\/\/doi.org\/10.1108\/bpmj-06-2015-0093","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2016,7,4]]}}}