{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:47:26Z","timestamp":1776786446217,"version":"3.51.2"},"reference-count":124,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T00:00:00Z","timestamp":1594857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2021,5,10]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this study is to make an attempt to identify the factors responsible for the adoption of an artificial intelligence (AI)-integrated customer relationship management (CRM) system in Indian organizations with a special focus on security and privacy issues.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This study was conducted for the identification of factors responsible for the adoption of the AI-integrated CRM system in Indian organizations focusing attention on security and privacy perspective. For this, the adoption theories and models have been studied. The literature available in this context has also been studied with a focus on security and privacy issues. After the initial study, few hypotheses have been formulated and a conceptual model has been developed. These hypotheses were validated with the help of statistical tools by conducting sample survey with 324 usable responses against 36 questionnaires.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The results of this study highlight that of the eight hypotheses conceptually formulated, one hypothesis was not supported as is evident from the application of statistical analysis. This is the influence of perceived ease of use on attitude of the stakeholders intending to use the AI-integrated CRM system in Indian organizations. The results also transpire that the model so provided has achieved 87% explanative power.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The model so provided has taken the help of the technological acceptance model. It has also used the issues circumscribing menace of security and privacy vulnerabilities. Consideration of the technological acceptance model and aspects of issues of security and privacy has enriched the model rendering its explanative power to 87%.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The model is simple. Practitioners can execute this model without having any complexity. The policymakers could also get inputs from the model, as it has focused specially on security and privacy issues that could help to enhance the trust of the potential users.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Not many studies are found covering the adoption of the AI-integrated CRM system by Indian organizations with a special focus on security and privacy aspects. In this light, this study is a novel attempt.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-02-2019-0029","type":"journal-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T07:09:18Z","timestamp":1594796958000},"page":"1-24","source":"Crossref","is-referenced-by-count":80,"title":["Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective"],"prefix":"10.1108","volume":"29","author":[{"given":"Sheshadri","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Soumya Kanti","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Ranjan","family":"Chaudhuri","sequence":"additional","affiliation":[]},{"given":"Sumana","family":"Chaudhuri","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,7,16]]},"reference":[{"issue":"1","key":"key2021050810165512800_ref001","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/wics.51","article-title":"Partial least squares regression and projection on latent structure regression (PLS regression)","volume":"2","year":"2010","journal-title":"Wires Computational Statistics"},{"issue":"3","key":"key2021050810165512800_ref002","first-page":"235","article-title":"Internet banking in Jordon: an Arabian instrument validation process","volume":"6","year":"2009","journal-title":"The International Arab Journal of Information Technology"},{"issue":"4","key":"key2021050810165512800_ref003","doi-asserted-by":"crossref","first-page":"665","DOI":"10.2307\/3250951","article-title":"Time flies when you\u2019re having fun: cognitive absorption and beliefs about information technology usage","volume":"24","year":"2000","journal-title":"MIS Quarterly"},{"key":"key2021050810165512800_ref004","first-page":"11","article-title":"From intentions to action: a theory of planned behavior","volume-title":"Will; Performance; Control (Psychology); Motivation (Psychology)","year":"1985"},{"issue":"2","key":"key2021050810165512800_ref005","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"key2021050810165512800_ref006","volume-title":"Understanding Attitudes and Predicting Social Behavior","year":"1980"},{"issue":"3","key":"key2021050810165512800_ref007","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4018\/irmj.2001070104","article-title":"The applicability of TAM outside North America: an empirical test in the United Kingdom","volume":"14","year":"2001","journal-title":"Information Resources Management Journal"},{"issue":"1","key":"key2021050810165512800_ref008","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.aci.2009.04.001","article-title":"Modeling the electronic transactions acceptance using an extended technology acceptance model","volume":"9","year":"2011","journal-title":"Applied Computing and Informatics"},{"issue":"1","key":"key2021050810165512800_ref009","first-page":"571","article-title":"Predicting student-perceived learning outcomes and satisfaction in ERP courses: an empirical investigation","volume":"28","year":"2011","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"key2021050810165512800_ref010","first-page":"17","article-title":"Customer perceived value in social commerce: an exploration of its antecedents and consequences","volume":"7","year":"2015","journal-title":"Journal of Management Research"},{"issue":"4","key":"key2021050810165512800_ref011","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1348\/014466601164939","article-title":"Efficacy of the theory of planned behavior: a meta-analytic review","volume":"40","year":"2001","journal-title":"British Journal of Social Psychology"},{"issue":"1","key":"key2021050810165512800_ref012","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/13032917.2014.933707","article-title":"Online reviews as a feedback mechanism for hotel CRM systems","volume":"26","year":"2015","journal-title":"Anatolia"},{"key":"key2021050810165512800_ref013","article-title":"Security and privacy in your smart city","year":"2011"},{"key":"key2021050810165512800_ref014","volume-title":"The Startup Owner's Manual: The Step-by-Step Guide for Building a Great Company","year":"2012"},{"key":"key2021050810165512800_ref015","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/978-3-540-32827-8_20","article-title":"Applying maximum likelihood and PLS on different sample sizes: studies on SERVQUAL model and employee behavior model","volume-title":"Handbook of Partial Least Squares: Concepts, Methods and Applications","year":"2010"},{"issue":"4","key":"key2021050810165512800_ref016","first-page":"57","article-title":"People-often the weakest link in security, but one of the best places to start","volume":"6","year":"2004","journal-title":"Journal of Health Care Compliance"},{"issue":"2","key":"key2021050810165512800_ref017","doi-asserted-by":"crossref","first-page":"9","DOI":"10.2753\/MIS0742-1222270201","article-title":"Predicting collaboration technology use: integrating technology adoption and collaboration research","volume":"27","year":"2010","journal-title":"Journal of Management Information Systems"},{"key":"key2021050810165512800_ref018","article-title":"Information technology for customer relationship management","volume-title":"Customer Relationship Management","year":"2009"},{"issue":"1","key":"key2021050810165512800_ref019","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1080\/19312458.2017.1396583","article-title":"Ten steps in scale development and reporting: a guide for researchers","volume":"12","year":"2018","journal-title":"Communication Methods and Measures"},{"issue":"5","key":"key2021050810165512800_ref020","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1108\/14684520710832315","article-title":"The role of security, privacy, usability and reputation in the development of online banking","volume":"31","year":"2007","journal-title":"Online Information Review"},{"issue":"4","key":"key2021050810165512800_ref021","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1057\/palgrave.dbm.3240232","article-title":"Exploring the success factors of eCRM strategies in practice","volume":"11","year":"2004","journal-title":"Journal of Database Marketing and Customer Strategy Management"},{"issue":"1","key":"key2021050810165512800_ref022","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1177\/109442810141004","article-title":"Validation of a new general self-efficiency scale","volume":"4","year":"2001","journal-title":"Organizational Research Methods"},{"issue":"2","key":"key2021050810165512800_ref023","doi-asserted-by":"crossref","first-page":"237","DOI":"10.2307\/249690","article-title":"On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution","volume":"19","year":"1995","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2021050810165512800_ref024","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1016\/j.eswa.2012.07.068","article-title":"Predicting m-commerce adoption determinants: a neural network approach","volume":"40","year":"2013","journal-title":"Expert Systems with Applications"},{"issue":"8","key":"key2021050810165512800_ref025","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.cose.2011.08.004","article-title":"The cyber threat landscape: challenges and future research directions","volume":"30","year":"2011","journal-title":"Computers and Security"},{"issue":"3","key":"key2021050810165512800_ref026","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1057\/jit.2010.39","article-title":"Customer relationship management and firm performance","volume":"26","year":"2011","journal-title":"Journal of Information Technology"},{"issue":"2","key":"key2021050810165512800_ref027","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1287\/isre.6.2.118","article-title":"Application of social cognitive theory to training for computer skills","volume":"6","year":"1995","journal-title":"Information Systems Research"},{"issue":"5","key":"key2021050810165512800_ref028","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1016\/j.chb.2012.05.003","article-title":"Information system users security: a structured model of the knowing-doing gap","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"key2021050810165512800_ref029","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","year":"1989","journal-title":"MIS Quarterly"},{"issue":"8","key":"key2021050810165512800_ref030","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","article-title":"User acceptance of computer technology: a comparison of two theoretical models","volume":"35","year":"1989","journal-title":"Management Science"},{"issue":"4","key":"key2021050810165512800_ref031","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1108\/MIP-07-2013-0119","article-title":"An empirical examination of customers\u2019 adoption of m-banking in India","volume":"32","year":"2014","journal-title":"Marketing Intelligence and Planning"},{"key":"key2021050810165512800_ref032","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/S0019-8501(98)00019-4","article-title":"When salespeople fail: assessing blame","volume":"28","year":"1999","journal-title":"Industrial Marketing Management"},{"issue":"1","key":"key2021050810165512800_ref033","doi-asserted-by":"crossref","first-page":"67","DOI":"10.2307\/41166154","article-title":"Management's role in information security in a cyber economy","volume":"45","year":"2002","journal-title":"California Management Review"},{"issue":"2","key":"key2021050810165512800_ref034","first-page":"200","article-title":"Customer acceptance of internet banking in Estonia","volume":"23","year":"2004","journal-title":"International Journal of Bank Marketing"},{"key":"key2021050810165512800_ref035","unstructured":"Ernst and Young (2008), \u201cErnst and young 2008 global information security survey\u201d, available at: https:\/\/faisaldanka.wordpress.com\/2008\/10\/20\/ernst-young-2008-global-information-security-survey\/ (accessed 16 August 2018)."},{"issue":"2","key":"key2021050810165512800_ref036","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.emj.2009.04.010","article-title":"A multi-layered approach to CRM implementation: an integration perspective","volume":"28","year":"2010","journal-title":"European Management Journal"},{"key":"key2021050810165512800_ref037","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","year":"1975"},{"issue":"1","key":"key2021050810165512800_ref038","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"9","key":"key2021050810165512800_ref039","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1361-3723(06)70419-5","article-title":"Malicious or misinformed? Exploring a contributor to the insider threat","volume":"2006","year":"2006","journal-title":"Computer Fraud and Security"},{"key":"key2021050810165512800_ref040","doi-asserted-by":"crossref","first-page":"3806","DOI":"10.1016\/j.proeng.2012.06.436","article-title":"Security issues of media sharing in social cloud","volume":"38","year":"2012","journal-title":"Procedia Engineering"},{"issue":"6","key":"key2021050810165512800_ref041","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1016\/S0305-0483(00)00021-9","article-title":"E-commerce: the role of familiarity and trust","volume":"28","year":"2000","journal-title":"Omega"},{"issue":"8","key":"key2021050810165512800_ref042","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1177\/0146167204264788","article-title":"Context and cognition: environmental risk, social influence, and adolescent substance use","volume":"30","year":"2004","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"2","key":"key2021050810165512800_ref043","doi-asserted-by":"crossref","first-page":"87","DOI":"10.4278\/0890-1171-11.2.87","article-title":"The theory of planned behavior: a review of its applications to health-related behaviors","volume":"11","year":"1996","journal-title":"American Journal of Health Promotion"},{"issue":"7","key":"key2021050810165512800_ref044","first-page":"167","article-title":"A study of ethical and social issues in e-commerce","volume":"2","year":"2012","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"key2021050810165512800_ref045","first-page":"1","article-title":"Challenges of e-government in developing countries: actor-network analysis of Thailand\u2019s smart ID card project","volume-title":"Proceedings of the 4th ACM\/IEEE International Conference on Information and Communication Technologies and Development","year":"2010"},{"issue":"2","key":"key2021050810165512800_ref046","doi-asserted-by":"crossref","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-SEM: indeed, a silver bullet","volume":"19","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"key":"key2021050810165512800_ref047","volume-title":"Multivariate Data Analysis with Readings","year":"1998"},{"key":"key2021050810165512800_ref048","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2014"},{"key":"key2021050810165512800_ref049","first-page":"1","article-title":"Discriminant validity assessment: use of Fornell and Larcker criterion versus HTMT criterion","volume":"890","year":"2017","journal-title":"Journal of Physics"},{"key":"key2021050810165512800_ref050","volume-title":"Modern Factor Analysis","year":"1976","edition":"3rd ed. revised"},{"issue":"1","key":"key2021050810165512800_ref051","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.ausmj.2014.11.001","article-title":"Modelling CRM in a social media age","volume":"23","year":"2015","journal-title":"Australasian Marketing Journal (AMJ)"},{"key":"key2021050810165512800_ref052","volume-title":"Culture and Organizations: Software of the Mind","year":"1997","edition":"3rd edition"},{"issue":"1","key":"key2021050810165512800_ref053","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1108\/02634509610106197","article-title":"Do small businesses have to practice marketing to survive and grow?","volume":"14","year":"1996","journal-title":"Marketing Intelligence and Planning"},{"issue":"5","key":"key2021050810165512800_ref054","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/S0167-4048(02)00504-7","article-title":"Information security policy \u2013 what do international security standards say","volume":"21","year":"2002","journal-title":"Computers and Security"},{"issue":"2","key":"key2021050810165512800_ref055","first-page":"337","article-title":"Trust: the connection link between organizational theory and philosophical ethics","volume":"20","year":"1995","journal-title":"Academy of Management Review"},{"key":"key2021050810165512800_ref056","volume-title":"The Structural Equation Modeling Approach: Basic Concepts and Fundamental Issues","year":"1995"},{"issue":"1","key":"key2021050810165512800_ref057","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10705519909540118","article-title":"Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives","volume":"6","year":"1999","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"issue":"2","key":"key2021050810165512800_ref058","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.giq.2008.07.003","article-title":"User acceptance of intergovernmental services: an example of electronic document management system","volume":"26","year":"2009","journal-title":"Government Information Quarterly"},{"key":"key2021050810165512800_ref059","volume-title":"An Introduction to Statistical Learningv","year":"2017"},{"issue":"1","key":"key2021050810165512800_ref060","first-page":"19","article-title":"Analysis of security measure implemented on G 2 C on line payment systems in India","volume":"1","year":"2011","journal-title":"International Journal of Computer Science and Information Technology"},{"key":"key2021050810165512800_ref061","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.ijhm.2013.08.005","article-title":"CRM and the bottom line: do all CRM dimensions affect firm performance?","volume":"36","year":"2014","journal-title":"International Journal of Hospitality Management"},{"key":"key2021050810165512800_ref062","first-page":"1","article-title":"Smart cards in healthcare information systems: Benefits and limitations","year":"2013"},{"issue":"5","key":"key2021050810165512800_ref063","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1177\/0095399705278596","article-title":"The role of trust in the modern administrative state: an integrative model","volume":"37","year":"2005","journal-title":"Administration and Society"},{"issue":"2","key":"key2021050810165512800_ref064","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1108\/08876041211215248","article-title":"Frequency of CRM implementation activities: a customer-centric view","volume":"26","year":"2012","journal-title":"Journal of Services Marketing"},{"issue":"1","key":"key2021050810165512800_ref065","first-page":"65","article-title":"Organizational characteristics and the CRM adoption process","volume":"61","year":"2007","journal-title":"Journal of Business Research"},{"issue":"7","key":"key2021050810165512800_ref066","doi-asserted-by":"crossref","first-page":"546","DOI":"10.17705\/1jais.00302","article-title":"Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations","volume":"13","year":"2012","journal-title":"Journal of the Association for Information Systems"},{"key":"key2021050810165512800_ref067","first-page":"177","article-title":"A model for mandatory use of software technologies: an integrative approach by applying multiple levels of abstraction of informing science","volume":"13","year":"2010","journal-title":"The International Journal of an Emerging Trans Discipline"},{"issue":"2","key":"key2021050810165512800_ref068","first-page":"103","article-title":"Developing an information security awareness program for a non-profit organization","volume":"5","year":"2009","journal-title":"International Management Review"},{"issue":"5","key":"key2021050810165512800_ref069","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1108\/09685221011095236","article-title":"A vocabulary test to assess information security awareness","volume":"18","year":"2010","journal-title":"Information Management and Computer Security"},{"key":"key2021050810165512800_ref070","first-page":"27","article-title":"Taking customer lifetime value analysis to the next level","year":"2003","journal-title":"Journal of Integrated Communications"},{"issue":"1","key":"key2021050810165512800_ref071","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1509\/jimk.19.1.23","article-title":"Analyzing the diffusion of global customer relationship management: a cross-regional modeling framework","volume":"19","year":"2011","journal-title":"Journal of International Marketing"},{"key":"key2021050810165512800_ref072","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.cose.2014.05.006","article-title":"A multi-level approach to understanding the impact of cybercrime on the financial sector","volume":"45","year":"2014","journal-title":"Computers and Security"},{"issue":"8","key":"key2021050810165512800_ref073","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1108\/IJCHM-04-2013-0166","article-title":"The role of relationship marketing investments in customer reciprocity","volume":"26","year":"2014","journal-title":"International Journal of Contemporary Hospitality Management"},{"issue":"4","key":"key2021050810165512800_ref074","doi-asserted-by":"crossref","first-page":"967","DOI":"10.2307\/2578601","article-title":"Trust as a social reality","volume":"63","year":"1985","journal-title":"Social Forces"},{"issue":"2","key":"key2021050810165512800_ref075","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1111\/j.1365-2575.2007.00265.x","article-title":"Extending technology usage models to interactive hedonic technologies: a theoretical model and empirical test","volume":"20","year":"2010","journal-title":"Information Systems Journal"},{"issue":"2","key":"key2021050810165512800_ref076","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1037\/0033-2909.127.2.267","article-title":"Risk as feelings","volume":"127","year":"2001","journal-title":"Psychological Bulletin"},{"key":"key2021050810165512800_ref077","first-page":"49","article-title":"Setting up an effective information security awareness program","volume-title":"ISSE\/SECURE 2007 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe\/SECURE 2007 Conference","year":"2007"},{"key":"key2021050810165512800_ref078","first-page":"203","article-title":"Information security culture","volume-title":"Security in the Information Society","year":"2002"},{"issue":"3","key":"key2021050810165512800_ref079","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an instrument to measure the perceptions of adopting an information technology innovation","volume":"2","year":"1991","journal-title":"Information Systems Research"},{"issue":"1","key":"key2021050810165512800_ref080","first-page":"6","article-title":"An empirical study of user acceptance of online social networks marketing","volume":"50","year":"2013","journal-title":"South African Computer Journal"},{"issue":"2","key":"key2021050810165512800_ref081","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1108\/09685220710748001","article-title":"Strategies for successful CRM implementation","volume":"15","year":"2007","journal-title":"Information Management and Computer Security"},{"issue":"9","key":"key2021050810165512800_ref082","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/1081992.1082022","article-title":"RFID privacy issues and technical challenges","volume":"48","year":"2005","journal-title":"Communications of the Acm"},{"issue":"4","key":"key2021050810165512800_ref083","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1111\/j.1559-1816.2000.tb02823.x","article-title":"Motivational and volitional processes in action initiation: a field study of the role of implementation intentions","volume":"30","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"1","key":"key2021050810165512800_ref084","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/S0167-4048(97)80248-9","article-title":"Auditing the IT security function","volume":"17","year":"1998","journal-title":"Computers and Security"},{"issue":"2","key":"key2021050810165512800_ref085","first-page":"23","article-title":"How to build a comprehensive security awareness program","volume":"16","year":"2002","journal-title":"Computer Security Journal"},{"issue":"5","key":"key2021050810165512800_ref086","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"key2021050810165512800_ref087","first-page":"59","article-title":"Internet usage among Malaysian students: the role of demographic and motivational variables","volume":"7","year":"2004","journal-title":"The Journal of Management Awareness"},{"key":"key2021050810165512800_ref088","first-page":"131","article-title":"PC usage among students in a private institution of higher learning: the moderating role of prior experience","volume":"20","year":"2005","journal-title":"Educators and Education Journal"},{"key":"key2021050810165512800_ref089","first-page":"130","volume-title":"Organizational Behavior \u2013 Global and Southern African Perspectives","year":"2003"},{"key":"key2021050810165512800_ref090","volume-title":"Diffusion of Innovations","year":"1962","edition":"1st ed."},{"key":"key2021050810165512800_ref091","volume-title":"Diffusion of Innovations","year":"1995","edition":"4th Edition"},{"issue":"1","key":"key2021050810165512800_ref092","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.cose.2006.10.009","article-title":"Phishing for user security awareness","volume":"26","year":"2007","journal-title":"Computers and Security"},{"issue":"1","key":"key2021050810165512800_ref093","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1177\/0894439307307687","article-title":"Between extreme rejection and cautious acceptance: consumers\u2019 reactions to RFID-based is in retail","volume":"26","year":"2008","journal-title":"Social Science Computer Review"},{"issue":"3","key":"key2021050810165512800_ref094","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jegr.2007070101","article-title":"Users\u2019 acceptance of e-government: a study of Indian Central Excise","volume":"3","year":"2007","journal-title":"International Journal of Electronic Government Research"},{"issue":"2","key":"key2021050810165512800_ref095","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.tourman.2011.04.003","article-title":"Influence of the user's psychological factors on the online purchase intention in rural tourism: integrating innovativeness to the UTAUT framework","volume":"33","year":"2012","journal-title":"Tourism Management"},{"issue":"1","key":"key2021050810165512800_ref096","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.reimke.2015.07.001","article-title":"The firms benefit of mobile CRM from the relationship marketing approach and the TOE model","volume":"20","year":"2016","journal-title":"Spanish Journal of Marketing - ESIC"},{"key":"key2021050810165512800_ref097","first-page":"4","volume-title":"Institutions and Organizations","year":"2001"},{"key":"key2021050810165512800_ref098","first-page":"164","volume-title":"The Institutional Construction of Organizations: International and Longitudinal Studies","year":"1995"},{"issue":"3","key":"key2021050810165512800_ref099","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1287\/isre.8.3.240","article-title":"A re specification of the DeLeon and McLean model of is success","volume":"8","year":"1997","journal-title":"Information Systems Research"},{"issue":"4","key":"key2021050810165512800_ref0100","doi-asserted-by":"crossref","first-page":"517","DOI":"10.2307\/249590","article-title":"Re-examining perceived ease of use and usefulness: a confirmatory factor analysis","volume":"17","year":"1993","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2021050810165512800_ref0101","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.cose.2004.05.002","article-title":"The ten deadly sins of information security management","volume":"23","year":"2004","journal-title":"Computers and Security"},{"key":"key2021050810165512800_ref0102","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1016\/j.chb.2016.03.008","article-title":"Customer relationship management mechanisms: a systematic review of the state-of-the-art literature and recommendations for future research","volume":"61","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2021050810165512800_ref0103","first-page":"238","article-title":"E-commerce online security and trust marks","volume":"3","year":"2012","journal-title":"International Journal of. Computer Engineering and Technology"},{"issue":"4","key":"key2021050810165512800_ref0104","doi-asserted-by":"crossref","first-page":"441","DOI":"10.2307\/249551","article-title":"Coping with systems risk: security planning models for management decision making","volume":"22","year":"1998","journal-title":"MIS Quarterly"},{"key":"key2021050810165512800_ref0105","first-page":"17","article-title":"An empirical study of virtual learning environment adoption using UTAUT","volume-title":"Second International Conference on Mobile, Hybrid, and On-Line Learning, St Maarten","year":"2010"},{"key":"key2021050810165512800_ref0106","first-page":"75","volume-title":"User Acceptance of SMS-Based e-Government Services","year":"2011"},{"issue":"2","key":"key2021050810165512800_ref0107","doi-asserted-by":"crossref","first-page":"371","DOI":"10.2307\/20650296","article-title":"Model of acceptance with peer support: a social network perspective to understand employees' system use","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021050810165512800_ref0108","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1287\/mnsc.42.1.85","article-title":"Empirical evaluation of the revised technology acceptance model","volume":"42","year":"1996","journal-title":"Management Science"},{"key":"key2021050810165512800_ref0109","first-page":"999","article-title":"The role of key factors in e- banking for new enterprises (concepts and applications)","volume":"3","year":"2011","journal-title":"Interdisciplinary Journal of Contemporary Research in Business"},{"issue":"1","key":"key2021050810165512800_ref0110","first-page":"22","article-title":"Factors influencing the adoption of internet banking","volume":"1","year":"2000","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"key2021050810165512800_ref0111","doi-asserted-by":"crossref","first-page":"561","DOI":"10.2307\/249633","article-title":"Assessing IT usage: the role of prior experience","volume":"19","year":"1995","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2021050810165512800_ref0112","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2307\/249443","article-title":"Personal computing: toward a conceptual model of utilization","volume":"15","year":"1991","journal-title":"MIS Quarterly"},{"key":"key2021050810165512800_ref0113","volume-title":"The Process of Technology Innovation","year":"1990"},{"issue":"1","key":"key2021050810165512800_ref0114","first-page":"77","article-title":"Internet shopping behavior of turkish customers: comparison of two competing models","volume":"7","year":"2012","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"issue":"2","key":"key2021050810165512800_ref0115","first-page":"5","article-title":"Structural equation modeling in information system research using partial least squares","volume":"11","year":"2010","journal-title":"Journal of Information Technology Theory and Application"},{"issue":"2","key":"key2021050810165512800_ref0116","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","article-title":"A framework and assessment instrument for information security culture","volume":"29","year":"2010","journal-title":"Computers and Security"},{"issue":"2","key":"key2021050810165512800_ref0117","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","article-title":"A theoretical extension of the technology acceptance model: four longitudinal field studies","volume":"46","year":"2000","journal-title":"Management Science"},{"issue":"3","key":"key2021050810165512800_ref0118","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: toward a unified view","volume":"27","year":"2003","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2021050810165512800_ref0119","first-page":"1696","article-title":"Managing customer relationships through mobile CRM in organized retail outlets","volume":"4","year":"2013","journal-title":"International Journal of Engineering Trends and Technology"},{"issue":"1","key":"key2021050810165512800_ref0120","first-page":"112","article-title":"Customer relationship management capabilities: measurement, antecedents and consequences","volume":"50","year":"2012","journal-title":"Management Decision"},{"issue":"1","key":"key2021050810165512800_ref0121","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1504\/IJEB.2010.030717","article-title":"E-business value creation in small and medium enterprises: a US study using the TOE framework","volume":"8","year":"2010","journal-title":"International Journal of Electronic Business"},{"issue":"2","key":"key2021050810165512800_ref0122","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0169-7439(01)00152-6","article-title":"Personal memories of the early PLS development","volume":"58","year":"2001","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"issue":"5","key":"key2021050810165512800_ref0123","first-page":"719","article-title":"What drives mobile commerce? An empirical evaluation of the revised technology acceptance model","volume":"42","year":"2005","journal-title":"Information and Management"},{"issue":"4","key":"key2021050810165512800_ref0124","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s10796-008-9099-y","article-title":"Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values","volume":"10","year":"2008","journal-title":"Information Systems Frontiers"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2019-0029\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2019-0029\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:41Z","timestamp":1753406561000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/29\/1\/1-24\/103752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,16]]},"references-count":124,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,7,16]]},"published-print":{"date-parts":[[2021,5,10]]}},"alternative-id":["10.1108\/ICS-02-2019-0029"],"URL":"https:\/\/doi.org\/10.1108\/ics-02-2019-0029","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2020,7,16]]}}}