{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:40:35Z","timestamp":1761766835933,"version":"3.41.0"},"reference-count":70,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMIS Database"],"published-print":{"date-parts":[[2020,11,2]]},"abstract":"<jats:p>Employees have to adapt to newly implemented information systems (IS) because they are often perceived as radical changes or disruptions. To understand such adaptation behavior, IS research suggests that employees first appraise the new IS and second perform technology adaptive behaviors. However, while the psychology literature indicates that adaptation is a continuous process unfolding over time, previous IS literature treats adaptation towards IS implementation as a rather singular, noniterative process. As firms continue to implement IS, an understanding of reappraisal and the influence of technology adaptation behavior is vital to ensure successful implementations. Therefore, the present paper investigates reappraisal and the influences of four different technology adaptation behaviors. We conducted a longitudinal study and used hierarchical linear modeling (HLM) to validate our research model. The findings reveal that employees reappraise the newly implemented IS over time regarding perceived opportunity, threat, and controllability and demonstrate that technology adaption behaviors influence such reappraisal. One specific finding is that employees might get into positive or negative reappraisal loops. We thereby contribute to research by extending the adaptation behavior literature and add a new piece of the puzzle to understand how employees adapt towards newly implemented IS over time.<\/jats:p>","DOI":"10.1145\/3433148.3433151","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:07:53Z","timestamp":1604351273000},"page":"11-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["IS Reappraisal and Technology Adaptation Behaviors"],"prefix":"10.1145","volume":"51","author":[{"given":"Christoph","family":"Weinert","sequence":"first","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]},{"given":"Christian","family":"Maier","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]},{"given":"Sven","family":"Laumer","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg, N\u00fcrnberg, Germany"}]},{"given":"Tim","family":"Weitzel","sequence":"additional","affiliation":[{"name":"University of Bamberg, Bamberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330472.3330477"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017264.2017269"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1243947"},{"volume-title":"What is ECM enterprise content management","year":"2018","author":"Association for Information and Image Management","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.06"},{"issue":"1","key":"e_1_2_1_6_1","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1287\/mnsc.2014.2111","article-title":"Adaptation to information technology: A holistic nomological network from implementation to job outcomes","volume":"62","author":"Bala H.","year":"2015","journal-title":"Management Science"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0122"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184444.3184448"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017264.2017271"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017496.2017499"},{"issue":"2","key":"e_1_2_1_11_1","first-page":"204","article-title":"User response to mandatory IT use: a coping theory perspective","volume":"9","author":"Bhattacherjee A.","year":"2017","journal-title":"European Journal of Information Systems"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/561899"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0096"},{"volume-title":"Reliability and validity assessment. Newbury Park","year":"2008","author":"Carmines E. G.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.56.2.267"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2691517.2691521"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.23"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.4030030108"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.50.3.571"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"volume-title":"Information technology (IT) implementation spending worldwide from 2014 to 2019 (in billion U.S. dollars), https:\/\/www.statista.com\/statistics\/505171\/worldwide-it-implementation-spending\/. Accessed","year":"2019","author":"Gartner","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0029810"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMR-09-2014-0304"},{"volume-title":"IBM SPSS Statistics for Windows: Version 21.0","year":"2016","author":"IBM Corp. Released","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017264.2017272"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0314"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2621906.2621910"},{"volume-title":"Multilevel theory, research, and methods in organizations: Foundations, extensions, and new directions","year":"2000","author":"Klein K. J.","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0247"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017264.2017270"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-013-0291-3"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.17"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2016.1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-016-0029-7"},{"volume-title":"Stress, appraisal, and coping","year":"1984","author":"Lazarus R. S.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0456"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017327.2017332"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017410.2017417"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00232"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017356.2017361"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12068"},{"issue":"1","key":"e_1_2_1_42_1","first-page":"1","article-title":"Technostress and the hierarchical levels of personality: A two-wave study with multiple data samples","volume":"62","author":"Maier C.","year":"2019","journal-title":"European Journal of Information Systems"},{"key":"e_1_2_1_43_1","article-title":"Social Networking Site Use Resumption: A Model of Return Migration. Forthcoming","author":"Maier C.","year":"2020","journal-title":"Journal of the Association for Information Systems"},{"volume-title":"Generalized linear models","year":"1999","author":"McCullagh P.","key":"e_1_2_1_44_1"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017447.2017455"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02545"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208955.2208958"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.10"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2361545"},{"volume-title":"Calif.: Sage Publ.","year":"2002","author":"Raudenbush S. W.","key":"e_1_2_1_51_1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2016\/40.3.07"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3051473.3051479"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195152968.001.0001","volume-title":"Applied longitudinal data analysis: Modeling change and event occurrence","author":"Singer J. D.","year":"2003"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2481639.2481646"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/2871313.2871323"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.11"},{"volume-title":"The Oxford Handbook of Health Psychology.","year":"2011","author":"Taylor S. E.","key":"e_1_2_1_58_1"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2009.2028320"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.19"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1267529"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/14124"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210530.3210534"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-5956.2010.01148.x"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208955.2208966"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017197.2017202"},{"volume-title":"Proceedings of the 26st European Conference of Information Systems - ECIS 2018.","year":"2018","author":"Weinert C.","key":"e_1_2_1_67_1"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.613"},{"volume-title":"Introductory econometrics: A modern approach","year":"2002","author":"Wooldridge J. M.","key":"e_1_2_1_69_1"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0538"}],"container-title":["ACM SIGMIS Database: the DATABASE for Advances in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433148.3433151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433148.3433151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:10Z","timestamp":1750193290000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433148.3433151"}},"subtitle":["A Longitudinal Study During an IS Implementation"],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":70,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,11,2]]}},"alternative-id":["10.1145\/3433148.3433151"],"URL":"https:\/\/doi.org\/10.1145\/3433148.3433151","relation":{},"ISSN":["0095-0033","1532-0936"],"issn-type":[{"type":"print","value":"0095-0033"},{"type":"electronic","value":"1532-0936"}],"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}