{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:50:26Z","timestamp":1762642226322,"version":"3.41.2"},"reference-count":71,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2019,4,29]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>Although the use of instant messaging (IM) at work has been studied in the IS field, its effective use and impact on performance have not been adequately addressed. The purpose of this paper is to explore the antecedents and consequences of the effective use of IM at work by adapting Burton-Jones and Grange\u2019s theory of effective use.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors introduce \u201cComprehensive IM policy\u201d as a facilitator of adaptation and learning actions to improve the effective use of IM, which will improve communication quality and productivity. The impact of IM competence on effective use is also discussed. Based on a survey of 215 managers, this study applies the partial least square technique to test the research model.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The results indicate that comprehensive IM policy encourages adaptation and learning actions, which improve the effective use of IM and thereafter improve communication quality and productivity. Meanwhile, IM competence has a substitutive interaction effect with IM reconfiguration and self-learning on effective use.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The results refine the general theory of effective use and provide managers with an approach to leverage IM use at work for performance gains.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-09-2018-0409","type":"journal-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T03:45:26Z","timestamp":1560138326000},"page":"180-197","source":"Crossref","is-referenced-by-count":7,"title":["The importance of policy to effective IM use and improved performance"],"prefix":"10.1108","volume":"33","author":[{"given":"Lin","family":"Jia","sequence":"first","affiliation":[]},{"given":"Lijuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhijun","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Dianne","family":"Hall","sequence":"additional","affiliation":[]},{"given":"Jiahe","family":"Song","sequence":"additional","affiliation":[]},{"given":"David","family":"Paradice","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"2","key":"key2020012908383915300_ref001","doi-asserted-by":"crossref","first-page":"381","DOI":"10.25300\/MISQ\/2018\/13157","article-title":"E-mail interruptions and individual performance: is there a silver lining?","volume":"42","year":"2018","journal-title":"MIS Quarterly"},{"issue":"7","key":"key2020012908383915300_ref002","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1080\/0144929X.2014.886722","article-title":"Continuance use intention of enterprise instant messaging: a knowledge management perspective","volume":"33","year":"2014","journal-title":"Behaviour & Information Technology"},{"issue":"2","key":"key2020012908383915300_ref003","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1177\/2329488415627273","article-title":"Team communication platforms and emergent social collaboration practices","volume":"53","year":"2016","journal-title":"International Journal of Business Communication"},{"issue":"4","key":"key2020012908383915300_ref004","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.25300\/MISQ\/2013\/37.4.06","article-title":"Changes in employees\u2019 job characteristics during an enterprise system implementation: a latent growth modeling perspective","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020012908383915300_ref005","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1287\/isre.1070.0122","article-title":"Information system use-related activity: an expanded conceptualization of information system use","volume":"18","year":"2007","journal-title":"Information Systems Research"},{"issue":"2","key":"key2020012908383915300_ref006","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1080\/07421222.2005.11045844","article-title":"Types of information technology capabilities and their role in competitive advantage: an empirical study","volume":"22","year":"2005","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2020012908383915300_ref007","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1177\/014920639402000301","article-title":"The role of human resources systems in job applicant decision processes","volume":"20","year":"1994","journal-title":"Journal of Management"},{"issue":"2","key":"key2020012908383915300_ref008","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2308\/isys-51664","article-title":"Professional virtue reinforcements: a necessary complement to technological and policy reforms","volume":"31","year":"2017","journal-title":"Journal of Information Systems"},{"issue":"3","key":"key2020012908383915300_ref009","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"21","key":"key2020012908383915300_ref010","article-title":"Using information systems effectively: a representational perspective","volume":"8","year":"2008","journal-title":"Sprouts: Working Papers on Information Systems"},{"issue":"3","key":"key2020012908383915300_ref011","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1287\/isre.1120.0444","article-title":"From use to effective use: a representation theory perspective","volume":"24","year":"2013","journal-title":"Information Systems Research"},{"issue":"1","key":"key2020012908383915300_ref012","first-page":"38","article-title":"Reconceptualizing system usage","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"3","key":"key2020012908383915300_ref013","doi-asserted-by":"crossref","first-page":"4","DOI":"10.6017\/ital.v31i3.2241","article-title":"Extending IM beyond the reference desk: a case study on the integration of chat reference and library-wide instant messaging network","volume":"31","year":"2012","journal-title":"Information Technology and Libraries"},{"issue":"4","key":"key2020012908383915300_ref014","first-page":"404","article-title":"The future of e-learning: a shift to knowledge networking and social software","volume":"3","year":"2007","journal-title":"International Journal of Knowledge and Learning"},{"issue":"1","key":"key2020012908383915300_ref015","first-page":"7","article-title":"Issues and opinion on structural equation modeling","volume":"22","year":"1998","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020012908383915300_ref016","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1177\/009102600803700103","article-title":"Policies for managing the training and development function: lessons from the federal government","volume":"37","year":"2008","journal-title":"Public Personnel Management"},{"issue":"4","key":"key2020012908383915300_ref017","doi-asserted-by":"crossref","first-page":"216","DOI":"10.17705\/1jais.00427","article-title":"Information systems control: a review and framework for emerging information systems processes","volume":"17","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"key2020012908383915300_ref018","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2753\/MIS0742-1222300103","article-title":"Information technology and productivity in developed and developing countries","volume":"30","year":"2013","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2020012908383915300_ref019","doi-asserted-by":"crossref","first-page":"1707","DOI":"10.1016\/j.dss.2006.09.002","article-title":"Does positive affect influence the effective usage of a decision support system?","volume":"43","year":"2007","journal-title":"Decision Support Systems"},{"issue":"2","key":"key2020012908383915300_ref020","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0378-7206(03)00048-X","article-title":"A process for post-implementation IT benchmarking","volume":"41","year":"2003","journal-title":"Information & Management"},{"issue":"10","key":"key2020012908383915300_ref021","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1287\/mnsc.43.10.1345","article-title":"The assimilation of software process innovations: an organizational learning perspective","volume":"43","year":"1997","journal-title":"Management Science"},{"issue":"2","key":"key2020012908383915300_ref022","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1111\/j.1467-8551.2009.00647.x","article-title":"Cooperation, trust and performance: empirical results from three countries","volume":"21","year":"2010","journal-title":"British Journal of Management"},{"issue":"1","key":"key2020012908383915300_ref023","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"key2020012908383915300_ref024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1jais.00387","article-title":"Interrupting the workplace: examining stressors in an information technology context","volume":"16","year":"2015","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"key2020012908383915300_ref025","first-page":"23","article-title":"IM=interruption management? Instant messaging and disruption in the workplace","volume":"13","year":"2008","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"key2020012908383915300_ref026","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1177\/002194369803500201","article-title":"Organizational rules on communicating: how employees are and are not learning the ropes","volume":"35","year":"1998","journal-title":"Journal of Business Communication"},{"issue":"4","key":"key2020012908383915300_ref027","doi-asserted-by":"crossref","first-page":"739","DOI":"10.2307\/255650","article-title":"The audit of organizational communication","volume":"17","year":"1974","journal-title":"Academy of Management Journal"},{"issue":"2","key":"key2020012908383915300_ref028","doi-asserted-by":"crossref","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-SEM: indeed a silver bullet","volume":"19","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"1","key":"key2020012908383915300_ref029","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.im.2007.09.004","article-title":"Analyzing the impact of a firm\u2019s capability on outsourcing success: a process perspective","volume":"45","year":"2008","journal-title":"Information & Management"},{"first-page":"236","article-title":"Controlling the use of collaboration tools in open source software development","year":"2010","key":"key2020012908383915300_ref030"},{"issue":"1","key":"key2020012908383915300_ref031","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1002\/asi.23161","article-title":"Theorizing on the take-up of social technologies, organizational policies and norms, and consultants\u2019 knowledge-sharing practices","volume":"66","year":"2015","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"2","key":"key2020012908383915300_ref032","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1057\/palgrave.jit.2000072","article-title":"An empirical investigation into the utilization-based information technology success model: integrating task-performance and social influence perspective","volume":"22","year":"2007","journal-title":"Journal of Information Technology"},{"issue":"1","key":"key2020012908383915300_ref033","doi-asserted-by":"crossref","first-page":"49","DOI":"10.2307\/20650278","article-title":"Out of dedication or constraints? A dual model of post-adoption phenomena and its empirical test in the context of online services","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2020012908383915300_ref034","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1111\/isj.12020","article-title":"Digitally enabling social networks: resolving IT-culture conflict","volume":"23","year":"2013","journal-title":"Information Systems Journal"},{"year":"2014","key":"key2020012908383915300_ref035","article-title":"What makes \u2018the system\u2019 tick? Explaining individuals\u2019 adaptation behavior towards effective use in enterprise system implementations"},{"issue":"3","key":"key2020012908383915300_ref036","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.ijinfomgt.2016.02.003","article-title":"Debunking the instant messaging myth?","volume":"36","year":"2016","journal-title":"International Journal of Information Management"},{"issue":"3","key":"key2020012908383915300_ref037","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1016\/j.cie.2011.11.034","article-title":"Function and service pattern analysis for facilitating the reconfiguration of collaboration systems","volume":"62","year":"2012","journal-title":"Computer & Industrial Engineering"},{"issue":"2","key":"key2020012908383915300_ref038","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1057\/ejis.2010.59","article-title":"Exploring the impact of instant messaging on subjective task complexity and user satisfaction","volume":"20","year":"2011","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"key2020012908383915300_ref039","doi-asserted-by":"crossref","first-page":"72","DOI":"10.17705\/1jais.00389","article-title":"Online recommendation systems in a B2C e-commerce context: a review and future directions","volume":"16","year":"2015","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"key2020012908383915300_ref040","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2020012908383915300_ref041","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1016\/j.compind.2005.02.008","article-title":"Going beyond \u2018misfit\u2019 as a reason for ERP package customization","volume":"56","year":"2005","journal-title":"Computers in Industry"},{"issue":"4","key":"key2020012908383915300_ref042","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1080\/01449290903353054","article-title":"Cyberloafing at the workplace: gain or drain on work?","volume":"31","year":"2012","journal-title":"Behaviour & Information Technology"},{"issue":"1","key":"key2020012908383915300_ref043","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","article-title":"Accounting for common method variance in cross-sectional research designs","volume":"86","year":"2001","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"key2020012908383915300_ref044","doi-asserted-by":"crossref","first-page":"163","DOI":"10.2753\/MIS0742-1222270406","article-title":"Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures","volume":"27","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"12","key":"key2020012908383915300_ref045","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1287\/mnsc.1060.0597","article-title":"Common method variance in IS research: a comparison of alternative approaches and a reanalysis of past research","volume":"52","year":"2006","journal-title":"Management Science"},{"key":"key2020012908383915300_ref046","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.sbspro.2012.03.231","article-title":"Organizational factors in learning and development initiatives","volume":"40","year":"2012","journal-title":"Procedia-Social and Behavioral Sciences"},{"issue":"3","key":"key2020012908383915300_ref047","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1108\/13563281011068096","article-title":"Promoting active communication behaviours through internal communication","volume":"15","year":"2010","journal-title":"Corporate Communications: An International Journal"},{"issue":"2","key":"key2020012908383915300_ref048","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1080\/09537320220133866","article-title":"Innovating SEMs and regions: the need for policy intelligence and interactive policies","volume":"14","year":"2002","journal-title":"Technology Analysis and Strategic Management"},{"issue":"1","key":"key2020012908383915300_ref049","doi-asserted-by":"crossref","first-page":"157","DOI":"10.25300\/MISQ\/2016\/40.1.07","article-title":"A temporally situated self-agency theory of information technology reinvention","volume":"40","year":"2016","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020012908383915300_ref050","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.dss.2011.05.004","article-title":"Interactive or interruptive? Instant messaging at work","volume":"52","year":"2011","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2020012908383915300_ref051","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1287\/isre.1100.0319","article-title":"The design, use, and consequences of virtual processes","volume":"21","year":"2010","journal-title":"Information Systems Research"},{"issue":"1","key":"key2020012908383915300_ref052","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","article-title":"Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020012908383915300_ref053","doi-asserted-by":"crossref","first-page":"601","DOI":"10.2307\/41703469","article-title":"IS employee attitudes and perceptions at varying levels of software process maturity","volume":"36","year":"2012","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2020012908383915300_ref054","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: a critical review of the literature and recommended remedies","volume":"88","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"key2020012908383915300_ref055","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.25300\/MISQ\/2013\/37.4.09","article-title":"Insiders\u2019 protection of organizational information assets: development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2020012908383915300_ref056","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1080\/0144929X.2010.517271","article-title":"Using insights from email users to inform organizational email management policy","volume":"31","year":"2012","journal-title":"Behaviour & Information Technology"},{"year":"2005","key":"key2020012908383915300_ref057","article-title":"SmartPLS 2.0 M3 (Beta)"},{"issue":"1","key":"key2020012908383915300_ref058","doi-asserted-by":"crossref","first-page":"171","DOI":"10.2753\/MIS0742-1222240105","article-title":"Postimplementation knowledge tranfers to users and information technology professionals","volume":"24","year":"2007","journal-title":"Journal of Management Information Systems"},{"key":"key2020012908383915300_ref059","doi-asserted-by":"crossref","unstructured":"Seddon, P., Shanks, G. and Willcocks, L. (2003), \u201cIntroduction: ERP\u2013the quiet revolution?\u201d, in Seddon, P., Shanks, G. and Willcocks, L. (Eds), Second-Wave Enterprise Resource Planning Systems, Cambridge University Press, Cambridge, pp. 1-19.","DOI":"10.1017\/CBO9780511815072.001"},{"issue":"5","key":"key2020012908383915300_ref060","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1080\/01449290500484450","article-title":"The role of presence awareness in organizational communication: an exploratory field experiment","volume":"26","year":"2007","journal-title":"Behaviour & Information Technology"},{"issue":"1","key":"key2020012908383915300_ref061","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.im.2016.04.001","article-title":"Mobile instant messaging use and social capital: direct and indirect associations with employee outcomes","volume":"54","year":"2017","journal-title":"Information & Management"},{"issue":"5","key":"key2020012908383915300_ref062","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1108\/00251741211227500","article-title":"The role of market and technological knowledge in recognizing entrepreneurial opportunities","volume":"50","year":"2012","journal-title":"Management Decision"},{"issue":"1","key":"key2020012908383915300_ref063","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1111\/ntwe.12079","article-title":"Workplace stress from actual and desired computer-mediated communication use: a multi-method study","volume":"32","year":"2017","journal-title":"New Technology Work & Employment"},{"issue":"4","key":"key2020012908383915300_ref064","doi-asserted-by":"crossref","first-page":"731","DOI":"10.2307\/25750703","article-title":"Understanding organization-enterprise system fit: a path to theorizing the information technology artifact","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020012908383915300_ref065","doi-asserted-by":"crossref","first-page":"351","DOI":"10.2753\/MIS0742-1222280111","article-title":"The influence of virtuality on social networks within and across work groups: a multilevel approach","volume":"28","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"key2020012908383915300_ref066","first-page":"473","article-title":"Support structures and their impacts on employee outcomes: a longitudinal field study of an enterprise system implementation","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2020012908383915300_ref067","doi-asserted-by":"crossref","first-page":"303","DOI":"10.2753\/MIS0742-1222270311","article-title":"Impact of technostress on end-user satisfaction and performance","volume":"27","year":"2010","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2020012908383915300_ref068","first-page":"4","article-title":"Design and execution of a collaborative business strategy","volume":"28","year":"2005","journal-title":"Journal for Quality and Participation"},{"first-page":"196","article-title":"Disruptions of the tripartite structure of system usage: exploring factors influencing the effective usage of information systems in German hospitals","year":"2015","key":"key2020012908383915300_ref069"},{"issue":"2","key":"key2020012908383915300_ref070","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1287\/isre.1090.0266","article-title":"Punishment, justice, and compliance in mandatory IT settings","volume":"22","year":"2011","journal-title":"Information Systems Research"},{"issue":"2","key":"key2020012908383915300_ref071","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1108\/09593841011052165","article-title":"Empowering employees through instant messaging","volume":"23","year":"2010","journal-title":"Information Technology & People"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-09-2018-0409\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-09-2018-0409\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:55:32Z","timestamp":1753394132000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/33\/1\/180-197\/181337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,29]]},"references-count":71,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,4,29]]}},"alternative-id":["10.1108\/ITP-09-2018-0409"],"URL":"https:\/\/doi.org\/10.1108\/itp-09-2018-0409","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2019,4,29]]}}}