{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:05:56Z","timestamp":1769630756633,"version":"3.49.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T00:00:00Z","timestamp":1185926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2007,8]]},"abstract":"<jats:p>The technology acceptance model (TAM) is very widely used for studying technology acceptance. The model states that an individual's behavioral intention (BI) to use an information system is determined by his perceived usefulness (PU) and perceived ease of use (PEOU) of it. While many studies have applied the TAM, none has examined the model's behavior over its entire value range. We conducted two surveys to examine the values of BI over the two-dimensional boundary space formed by PU and PEOU. Contrary to current understanding, we find that the effects of PU and PEOU vary over the boundary space.<\/jats:p>","DOI":"10.1145\/1275511.1275515","type":"journal-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T13:44:55Z","timestamp":1189777495000},"page":"9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Evaluating the boundary conditions of the technology acceptance model"],"prefix":"10.1145","volume":"14","author":[{"given":"Hock Chuan","family":"Chan","sequence":"first","affiliation":[{"name":"National University of Singapore, Republic of Singapore"}]},{"given":"Hock-Hai","family":"Teo","sequence":"additional","affiliation":[{"name":"National University of Singapore, Republic of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2007,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2307\/249577"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1999.tb01614.x"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017197.2017203"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518128"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00098-2"},{"key":"e_1_2_1_7_1","first-page":"138","article-title":"Distribution of radial error in the bivariate elliptical normal distribution","volume":"4","author":"Chew V.","year":"1962","unstructured":"Chew , V. and Boyce , R. 1962 . Distribution of radial error in the bivariate elliptical normal distribution , Technometrics 4 , 1, 138 -- 140 . Chew, V. and Boyce, R. 1962. Distribution of radial error in the bivariate elliptical normal distribution, Technometrics 4, 1, 138--140.","journal-title":"Technometrics"},{"key":"e_1_2_1_8_1","first-page":"245","article-title":"Neuroticism: Moderator or mediator in the relation between locus of control and depression.Personality Indivi","volume":"37","author":"Clarke D.","year":"2004","unstructured":"Clarke , D. 2004 . Neuroticism: Moderator or mediator in the relation between locus of control and depression.Personality Indivi . Differen. 37 , 245 -- 258 . Clarke, D. 2004. Neuroticism: Moderator or mediator in the relation between locus of control and depression.Personality Indivi. Differen. 37, 245--258.","journal-title":"Differen."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1348\/014466699164121"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1006\/imms.1993.1022"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(01)00034-0"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00101-3"},{"key":"e_1_2_1_15_1","unstructured":"Dix A. Finlay J. Abowd G. D. and Beale R. 2004. Human-Computer Interaction 3rd ed. Prentice-Hall Hertfordshire UK.   Dix A. Finlay J. Abowd G. D. and Beale R. 2004. Human-Computer Interaction 3rd ed. Prentice-Hall Hertfordshire UK."},{"key":"e_1_2_1_16_1","volume-title":"Social Research Methods","author":"Dooley D.","unstructured":"Dooley , D. 1995. Social Research Methods , 3 rd ed., Prentice-Hall , Upper Saddle River, NJ. Dooley, D. 1995. Social Research Methods, 3rd ed., Prentice-Hall, Upper Saddle River, NJ.","edition":"3"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)00012-H"},{"key":"e_1_2_1_18_1","unstructured":"Fishbein M. and Ajzen I. 1975. Beliefs Attitudes Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley Reading MA.  Fishbein M. and Ajzen I. 1975. Beliefs Attitudes Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley Reading MA."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00008"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/249720"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/298752.298757"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00079-X"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(98)00037-X"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the Pacific Asia Conference on Information Systems. 1267--1280","author":"Hong S.-J.","unstructured":"Hong , S.-J. , Thong , J. Y. L. , and Tam , K. Y . 2005. Understanding continued IT usage: An extension to the expectation-confirmation model in IT domain . In Proceedings of the Pacific Asia Conference on Information Systems. 1267--1280 . Hong, S.-J., Thong, J. Y. L., and Tam, K. Y. 2005. Understanding continued IT usage: An extension to the expectation-confirmation model in IT domain. In Proceedings of the Pacific Asia Conference on Information Systems. 1267--1280."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518247"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1995.11518061"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(95)00031-0"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/249498"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1890\/0012-9658(2001)082[2696:RSEDFI]2.0.CO;2"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1997.tb01315.x"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-4319(00)00041-4"},{"key":"e_1_2_1_32_1","first-page":"40","article-title":"E-mail and v-mail usage: Generalizing across technologies","volume":"10","author":"Karahanna E.","year":"2000","unstructured":"Karahanna , E. and Limayem , M. 2000 . E-mail and v-mail usage: Generalizing across technologies , J. Organiz. Comput. Electron. Commerce 10 , 1, 40 -- 66 . Karahanna, E. and Limayem, M. 2000. E-mail and v-mail usage: Generalizing across technologies, J. Organiz. Comput. Electron. Commerce 10, 1, 40--66.","journal-title":"J. Organiz. Comput. Electron. Commerce"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00096-2"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2307\/249751"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)E0032-M"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(00)00076-2"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01250"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(00)00005-0"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/0268-4012(94)90070-1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(00)00107-7"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00059-8"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.110.3.571"},{"key":"e_1_2_1_44_1","volume-title":"Design and Analysis of Experiments","author":"Montgomery D. C.","unstructured":"Montgomery , D. C. 1997. Design and Analysis of Experiments , 4 th ed., John Wiley , New York . Montgomery, D. C. 1997. Design and Analysis of Experiments, 4th ed., John Wiley, New York.","edition":"4"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.2307\/1268813"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.2.208.9697"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.110.3.574"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(97)00026-8"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the Association of Information Systems Americas Conference. 1094--1096","author":"Tan W. P.","unstructured":"Tan W. P. and Chan , H. C . 1998. A TAM-based assessment of videoconferencing for remote tutoring . In Proceedings of the Association of Information Systems Americas Conference. 1094--1096 . Tan W. P. and Chan, H. C. 1998. A TAM-based assessment of videoconferencing for remote tutoring. In Proceedings of the Association of Information Systems Americas Conference. 1094--1096."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.2307\/249633"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/249753"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1275511.1275515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1275511.1275515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:00:30Z","timestamp":1750276830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1275511.1275515"}},"subtitle":["An exploratory investigation"],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,8]]}},"alternative-id":["10.1145\/1275511.1275515"],"URL":"https:\/\/doi.org\/10.1145\/1275511.1275515","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"value":"1073-0516","type":"print"},{"value":"1557-7325","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,8]]},"assertion":[{"value":"2007-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}