{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:01Z","timestamp":1750220641594,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,7]]},"DOI":"10.1145\/3368308.3415402","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T02:32:51Z","timestamp":1602124371000},"page":"358-364","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ITEval"],"prefix":"10.1145","author":[{"given":"Xinli","family":"Wang","sequence":"first","affiliation":[{"name":"Grand Valley State University, Allendale, MI, USA"}]},{"given":"Mostafa","family":"El-Said","sequence":"additional","affiliation":[{"name":"Grand Valley State University, Allendale, MI, USA"}]},{"given":"Paul M.","family":"Leidig","sequence":"additional","affiliation":[{"name":"Grand Valley State University, Allendale, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2307\/249577"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2008.13"},{"key":"e_1_3_2_1_3_1","unstructured":"William Bowen. 1989. The Puny Payoff from Office Computers. MIT Press Cambridge MA USA 267--271.  William Bowen. 1989. The Puny Payoff from Office Computers. MIT Press Cambridge MA USA 267--271."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2000.11045645"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3147213.3147219"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174030"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/502269.502273"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1006\/imms.1993.1022"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"e_1_3_2_1_11_1","unstructured":"Brian Desmond Joe Richards Robbie Allen and Alistair G. Lowe-Norris. 2013. Active Directory: Designing Deploying and Running Active Directory (5th ed.). O'Reilly Media Sebastopol CA USA.  Brian Desmond Joe Richards Robbie Allen and Alistair G. Lowe-Norris. 2013. Active Directory: Designing Deploying and Running Active Directory (5th ed.). O'Reilly Media Sebastopol CA USA."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236112.3236175"},{"volume-title":"2017 International Conference on Computing, Networking and Communications (ICNC). IEEE","year":"2017","author":"Din G. M. U.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Mazen El-masri and Ali Tarhini. 2017. Factors affecting the adoption of e-learning systems in Qatar and USA: Extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2). Educational Technology Research and Development 65 3 (06 2017) 743--763. http:\/\/search.proquest.com.ezproxy.gvsu.edu\/docview\/ 1899721379?accountid=39473 Copyright - Educational Technology Research and Development is a copyright of Springer 2017; Last updated - 2017-05-18; SubjectsTermNotLitGenreText - United States--US; Qatar.  Mazen El-masri and Ali Tarhini. 2017. Factors affecting the adoption of e-learning systems in Qatar and USA: Extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2). Educational Technology Research and Development 65 3 (06 2017) 743--763. http:\/\/search.proquest.com.ezproxy.gvsu.edu\/docview\/ 1899721379?accountid=39473 Copyright - Educational Technology Research and Development is a copyright of Springer 2017; Last updated - 2017-05-18; SubjectsTermNotLitGenreText - United States--US; Qatar."},{"key":"e_1_3_2_1_15_1","first-page":"55","article-title":"Total cost of ownership: A key concept in strategic cost management decisions","volume":"19","author":"Ellram Lisa M.","year":"1998","journal-title":"Journal of Business Logistics"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2018.10.009"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-493X.2002.tb00132.x"},{"volume-title":"Preliminary Thoughts on Cost-based Investment Decisions in IT: A Problem Analysis. In 2011 Sixth International Conference on Availability, Reliability and Security. IEEE","year":"2011","author":"Gitzel R.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI.2018.8399183"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.495"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.113"},{"key":"e_1_3_2_1_22_1","first-page":"00","volume-title":"Energy Load Forecasting Using Deep Learning. In 2018 IEEE International Conference on Energy Internet (ICEI). IEEE","author":"Heghedus C.","year":"2018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00079-X"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Johan H\u00f6gberg Juho Hamari and Erik W\u00e4stlund. 2019. Gameful Experience Questionnaire (GAMEFULQUEST): an instrument for measuring the perceived gamefulness of system use. User Modeling and User-Adapted Interaction 29 (28 Feb 2019) 619--660. https:\/\/doi.org\/10.1007\/s11257-019-09223-w  Johan H\u00f6gberg Juho Hamari and Erik W\u00e4stlund. 2019. Gameful Experience Questionnaire (GAMEFULQUEST): an instrument for measuring the perceived gamefulness of system use. User Modeling and User-Adapted Interaction 29 (28 Feb 2019) 619--660. https:\/\/doi.org\/10.1007\/s11257-019-09223-w","DOI":"10.1007\/s11257-019-09223-w"},{"key":"e_1_3_2_1_25_1","first-page":"58","article-title":"Development and evaluation of a framework for creating web-based learning modules: a pedagogical and systems perspective","volume":"5","author":"Janicki Thomas","year":"2001","journal-title":"Journal of Asynchronous Learning Networks"},{"volume-title":"Consumer Acceptance and Use of Instagram. In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE","year":"2016","author":"J\u00e4rvinen J.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.013"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400181.1400186"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2007.19"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(00)00076-2"},{"key":"e_1_3_2_1_31_1","unstructured":"Kimfong Lei and Phillip T. Rawles. 2003. Strategic decisions on technology selections for facilitating a network\/systems laboratory using real options & total cost of ownership theories. In CITC4 '03: Proceedings of the 4th conference on Information technology curriculum. ACM New York NY USA 76--92. https: \/\/doi.org\/10.1145\/947121.947139  Kimfong Lei and Phillip T. Rawles. 2003. Strategic decisions on technology selections for facilitating a network\/systems laboratory using real options & total cost of ownership theories. In CITC4 '03: Proceedings of the 4th conference on Information technology curriculum. ACM New York NY USA 76--92. https: \/\/doi.org\/10.1145\/947121.947139"},{"volume-title":"Proceedings of the 4th Conference on Information Technology Curriculum (CITC4 '03)","author":"Lei Kimfong","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.213"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.75"},{"volume-title":"Costing of Cloud Computing Services: A Total Cost of Ownership Approach. In 2012 45th Hawaii International Conference on System Sciences. IEEE","year":"2012","author":"Martens B.","key":"e_1_3_2_1_35_1"},{"volume-title":"Proceedings of The 18th International Scientific Conference Business Logistics in Modern Management","year":"2018","author":"Milczarek Jaroslaw","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2008.10"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.resconrec.2008.01.004"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300698"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"William Panek. 2018. MCSA Windows Server 2016 Complete Study Guide (2nd ed.). Sybex Hoboken NJ USA.  William Panek. 2018. MCSA Windows Server 2016 Complete Study Guide (2nd ed.). Sybex Hoboken NJ USA.","DOI":"10.1002\/9781119549260"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCIoT.2015.7380514"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/gec3.12115"},{"volume-title":"Characterizing Input Methods for Human-to-Robot Demonstrations. In 2019 14th ACM\/IEEE International Conference on Human-Robot Interaction (HRI). IEEE","year":"2019","author":"Praveena P.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230713"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230713"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.12.013"},{"key":"e_1_3_2_1_47_1","first-page":"58","article-title":"Social media marketing: Comparative effect of advertisement sources","volume":"46","author":"Shareef Mahmud Akhter","year":"2019","journal-title":"International Journal of Information Management"},{"key":"e_1_3_2_1_48_1","first-page":"1","article-title":"Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2","volume":"21","author":"Tamilmani Kuttimani","year":"2020","journal-title":"Information Systems Frontiers"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.01.008"},{"key":"e_1_3_2_1_50_1","first-page":"2","article-title":"Creation of Favorable User Perceptions","volume":"23","author":"Venkatesh Viswanath","year":"1999","journal-title":"Exploring the Role of Intrinsic Motivation. MIS Q."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"e_1_3_2_1_52_1","first-page":"2","article-title":"A Theoretical Extension of the Technology Acceptance Model","volume":"46","author":"Venkatesh Viswanath","year":"2000","journal-title":"Four Longitudinal Field Studies. Manage. Sci."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208955.2208966"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.2307\/41410412"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1080548.1080555"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Y. Xiao R. Bhaumik Z. Yang M. Siekkinen P. Savolainen and A. Yla-Jaaski. 2010. A System-Level Model for Run-time Power Estimation on Mobile Devices. In 2010 IEEE\/ACM Int'l Conference on Green Computing and Communications Int'l Conference on Cyber Physical and Social Computing. IEEE New York NY USA 27--34. https:\/\/doi.org\/10.1109\/GreenCom-CPSCom.2010.114  Y. Xiao R. Bhaumik Z. Yang M. Siekkinen P. Savolainen and A. Yla-Jaaski. 2010. A System-Level Model for Run-time Power Estimation on Mobile Devices. In 2010 IEEE\/ACM Int'l Conference on Green Computing and Communications Int'l Conference on Cyber Physical and Social Computing. IEEE New York NY USA 27--34. https:\/\/doi.org\/10.1109\/GreenCom-CPSCom.2010.114","DOI":"10.1109\/GreenCom-CPSCom.2010.114"},{"volume-title":"An Enhanced Very Short-Term Load Forecasting Scheme Based on Activation Function. In 2019 International Conference on Computer and Information Sciences (ICCIS). IEEE","year":"2019","author":"Yahaya A. S.","key":"e_1_3_2_1_58_1"}],"event":{"name":"SIGITE '20: The 21st Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Virtual Event USA","acronym":"SIGITE '20"},"container-title":["Proceedings of the 21st Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368308.3415402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368308.3415402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:06Z","timestamp":1750197726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368308.3415402"}},"subtitle":["A Framework for Information Technology Evaluation"],"short-title":[],"issued":{"date-parts":[[2020,10,7]]},"references-count":58,"alternative-id":["10.1145\/3368308.3415402","10.1145\/3368308"],"URL":"https:\/\/doi.org\/10.1145\/3368308.3415402","relation":{},"subject":[],"published":{"date-parts":[[2020,10,7]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}