{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:33:14Z","timestamp":1775071994433,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T00:00:00Z","timestamp":1296518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1109\/tem.2009.2028320","type":"journal-article","created":{"date-parts":[[2010,5,21]],"date-time":"2010-05-21T20:57:16Z","timestamp":1274475436000},"page":"56-70","source":"Crossref","is-referenced-by-count":147,"title":["The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems"],"prefix":"10.1109","volume":"58","author":[{"given":"Jason Bennett","family":"Thatcher","sequence":"first","affiliation":[]},{"given":"D. Harrison","family":"McKnight","sequence":"additional","affiliation":[]},{"given":"Elizabeth White","family":"Baker","sequence":"additional","affiliation":[]},{"given":"Riza Ergun","family":"Arsal","sequence":"additional","affiliation":[]},{"given":"Nicholas H.","family":"Roberts","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00017-3"},{"key":"ref38","first-page":"41","author":"petty","year":"1999","journal-title":"Dual-Process Theories in Social Psychology"},{"key":"ref33","first-page":"697","article-title":"how buyer experience in online auctions affects the dimensionality of trust in sellers: an unexpected finding","author":"chong","year":"0","journal-title":"Proc of ICISIP-2004"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"623","DOI":"10.2307\/25148814","article-title":"specifying formative constructs in information system research","volume":"31","author":"petter","year":"2007","journal-title":"MIS Q"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1086\/376806"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.110.2.305"},{"key":"ref37","author":"petty","year":"1986","journal-title":"Communication and Persuasion Central and Peripheral Routes to Attitude Change"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/07421222.1995.11518061","article-title":"testing the determinants of microcomputer usage via a structural equation model","volume":"11","author":"igbaria","year":"1995","journal-title":"J Manage Inf Syst"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2307\/249454"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","article-title":"consumer acceptance and electronic commerce: integrating trust and risk with the technology acceptance model","volume":"7","author":"pavlou","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.05.001"},{"key":"ref62","year":"0"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/25148694","article-title":"a comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems","volume":"29","author":"jasperson","year":"2005","journal-title":"MIS Q"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1080\/07421222.2001.11045661","article-title":"impact of information technology management practices on customer service","volume":"17","author":"karimi","year":"2001","journal-title":"J Manage Inf Syst"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1108\/02635570210419636","article-title":"customer relationship management: key components for it success","volume":"102","author":"bose","year":"2002","journal-title":"Ind Manage Data Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2003.817277"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.839967"},{"key":"ref1","first-page":"85","author":"agarwal","year":"2000","journal-title":"Framing the Domains of IT Management Projecting the Future Through the Past"},{"key":"ref20","article-title":"user motivation to explore enterprise system features: an exploratory study of its organizational antecedents and consequences","author":"ke","year":"2008","journal-title":"Proc ICIS"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","article-title":"trust and tam in online shopping: an integrated model","volume":"27","author":"gefen","year":"2003","journal-title":"MIS Q"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1080\/07421222.2004.11045785","article-title":"interpersonal traits, complementarity, and trust in virtual collaboration","volume":"20","author":"brown","year":"2004","journal-title":"J Manage Inf Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355120"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4018\/jeco.2003010102"},{"key":"ref26","first-page":"72","article-title":"integrating tam and trust to explain online recommendation agent adoptions","volume":"6","author":"wang","year":"2005","journal-title":"J Assoc Inf Syst"},{"key":"ref25","first-page":"529","article-title":"A theoretical model of different social attributions toward computing technology: When the metaphor becomes a model","volume":"45","author":"marakas","year":"2000","journal-title":"Int J HumanComput Stud"},{"key":"ref50","first-page":"76","author":"hoyle","year":"1995","journal-title":"Structural Equation Modeling"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/217278.217285","article-title":"adoption intention in gss: relative importance of beliefs","volume":"26","author":"chin","year":"1995","journal-title":"Database Adv Inf Syst"},{"key":"ref59","first-page":"1","article-title":"the relative importance of perceived ease of use in is adoptoin: a study of e-commerce adoption","volume":"1","author":"gefen","year":"2000","journal-title":"J Assoc Inf Syst"},{"key":"ref58","first-page":"733","article-title":"beyond routine: symbolic adoption, extended use, and emergent use of complex information systems in the mandatory organizational context","author":"wang","year":"2006","journal-title":"Proc Int Conf Inf Syst"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1177\/014920638501100106"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0597"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1037\/\/1082-989X.7.1.83"},{"key":"ref53","author":"ringle","year":"2008","journal-title":"SmartPLS"},{"key":"ref52","first-page":"295","author":"chin","year":"1998","journal-title":"Modern Methods for Business Research"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.1.95"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.1.1.9720"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0042"},{"key":"ref12","article-title":"understanding post-adoptive usage behaviors: a two-dimensional view","author":"hsieh","year":"2006","journal-title":"DIGIT Workshop"},{"key":"ref13","first-page":"67","author":"saga","year":"1994","journal-title":"Diffusion Transfer and Implementation of Information Technology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000663"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"427","DOI":"10.2307\/25148691","article-title":"moving beyond intentions and toward the theory of trying: effects of work environment and gender on post-adoption information technology use","volume":"29","author":"ahuja","year":"2005","journal-title":"MIS Q"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.36.2.123"},{"key":"ref17","article-title":"what's the weather like? the effect of team climate and individual attributes on individual intention to explore a new technology","author":"maruping","year":"2008","journal-title":"Proc 14th Amer Conf Inf Syst"},{"key":"ref18","first-page":"162","article-title":"technology adoption in complex systems","author":"gupta","year":"2004","journal-title":"Proc Southern AIS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/25148694","article-title":"a comprehensive conceptualization of the post-adoptive behaviors associated with it-enable work systems","volume":"29","author":"jasperson","year":"2005","journal-title":"MIS Q"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.839956"},{"key":"ref6","first-page":"31","article-title":"organizational mechanisms for enhacing user innovatin with information technology","volume":"80","author":"nambisan","year":"1999","journal-title":"MIS Q"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2007.900792"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0096"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/259137"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1070.0286"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc1901_8"},{"key":"ref45","article-title":"understanding exploratory use of erp systems","author":"sousa","year":"2003","journal-title":"Amer Conf Inform Syst"},{"key":"ref48","author":"harman","year":"1967","journal-title":"Modern Factor Analysis"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"179","DOI":"10.2307\/25148833","article-title":"the relative advantage of electronic channels: a multidimensional view","volume":"33","author":"choudhury","year":"2008","journal-title":"MIS Q"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.204"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"user acceptance of information technology: toward a unified view","volume":"27","author":"venkatesh","year":"2003","journal-title":"MIS Q"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(02)00039-3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2008.927825"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/17\/5688715\/05462835.pdf?arnumber=5462835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:59:35Z","timestamp":1633910375000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5462835\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":64,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tem.2009.2028320","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2]]}}}