{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T03:49:16Z","timestamp":1770522556383,"version":"3.49.0"},"reference-count":146,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMIS Database"],"published-print":{"date-parts":[[2020,11,2]]},"abstract":"<jats:p>The ubiquity of information, in part a consequence of the fast growth of Internet technologies, provides individuals with previously unknown opportunities to acquire and share information about new technology products. We witness numerous situations where potential adopters observe the decisions (but not the reasoning) of others and imitate their adoption behaviors. This implies that herd behavior can lead to en mass adoption. However, individuals possessing different characteristics exhibit different degrees of herd behavior. The characteristics of a given technology must also fit with the requirements of the task(s) that a technology adopter wants to fulfill. It is important to understand these phenomena in the herding context because they can influence a technology's staying power. We examine how several different user and technology characteristics interact with the antecedents of herd behavior, observed popularity of prior adoption and perceived uncertainty, to predict one's individual propensity for imitation in technology adoption. We test our research model via an online experiment with 260 respondents. One key finding is that while prior research has not found uncertainty to have the expected effect on propensity to imitate, it does in fact have a significant effect when various individual difference and technology moderators are taken into account.<\/jats:p>","DOI":"10.1145\/3433148.3433154","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:07:53Z","timestamp":1604351273000},"page":"93-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Why Is It Hard to Fight Herding?"],"prefix":"10.1145","volume":"51","author":[{"given":"Mehdi","family":"Darban","sequence":"first","affiliation":[{"name":"Louisiana State University - Shreveport, Shreveport, LA, USA"}]},{"given":"Greta L.","family":"Polites","sequence":"additional","affiliation":[{"name":"Kent State University, Kent, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1991.4279484"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1993.9309035148"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.204"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1999.tb01614.x"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03430"},{"key":"e_1_2_1_6_1","volume-title":"Multiple regression: Testing and interpreting interactions","author":"Aiken L. S.","year":"1991"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/02652320910928245"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of PICMET, 2758--2770","author":"Aldhaban F.","year":"2012"},{"issue":"4","key":"e_1_2_1_9_1","first-page":"379","article-title":"Mobile banking adoption: application of diffusion of innovation theory","volume":"13","author":"Al-Jabri I. M.","year":"2012","journal-title":"Journal of Electronic Commerce Research"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.10.023"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2010.11.002"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017507.2017509"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00075"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.06"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/2118364"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00065"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.06.002"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017219.2017224"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1086\/261849"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.12.3.151"},{"key":"e_1_2_1_23_1","volume-title":"IMF Working Paper, 1--32.","author":"Bikhchandani S.","year":"2000"},{"key":"e_1_2_1_24_1","volume-title":"This social network once challenged Facebook. Now it's trying to Make a comeback on mobile.","author":"Bluestein A.","year":"2015"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2001.tb00951.x"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/scan\/nss004"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.84.4.822"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.42.4.541"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0456"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.01.003"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of Pre-ICIS (International Conference on Information System) DIGIT workshop.","author":"Chen H.","year":"2015"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.48.2.238"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.01.002"},{"key":"e_1_2_1_34_1","volume-title":"Modern Methods for Business Research.","author":"Chin W. W.","year":"1998"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1220067"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017378.2017387"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0140"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18267\/j.pep.468"},{"key":"e_1_2_1_39_1","volume-title":"NJ.","author":"Cohen J.","year":"1988"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.02.049"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.17705\/1thci.00054"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2481626.2481633"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662241311313330"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.12.003"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00500.x"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017410.2017415"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.4.1149"},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","DOI":"10.1515\/9781503620766","volume-title":"Theory of Cognitive Dissonance","author":"Festinger L.","year":"1957"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2003.8925227"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2002.tb01655.x"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.023"},{"key":"e_1_2_1_55_1","volume-title":"Gaskination's Statistics","author":"Gaskin J.","year":"2012"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017507.2017508"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/249689"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1998.tb01346.x"},{"key":"e_1_2_1_59_1","volume-title":"Development and validation of a measure of cognitive and behavioural social self-efficacy. Personality and Individual differences, 59, 71--76","author":"Grieve R.","year":"2014"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.01"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330472.3330478"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1348\/014466604X16219"},{"issue":"3","key":"e_1_2_1_63_1","first-page":"207","volume":"5","author":"Hair J. F.","year":"2009","journal-title":"Multivariate Data Analysis"},{"key":"e_1_2_1_64_1","volume-title":"Handbook of mindfulness and self-regulation (pp. 107--120)","author":"Heppner W. L.","year":"2015"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.008"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-036X.00207"},{"issue":"2","key":"e_1_2_1_67_1","first-page":"164","article-title":"Exploring Social Influence on Hedonic Buying of Digital Goods-Online Games' Virtual Items","volume":"19","author":"Hsieh J. K.","year":"2018","journal-title":"Journal of Electronic Commerce Research"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"e_1_2_1_69_1","volume-title":"For many Facebook users, a 'last straw' that led them to quit.","author":"Hue T.","year":"2018"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2016.1171396"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/0021943605274726"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1440770"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusvent.2018.06.002"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017317.2017319"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.2307\/249751"},{"key":"e_1_2_1_76_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511974175","volume-title":"Multivariable analysis: A practical guide for clinical and public health researchers","author":"Katz M. H.","year":"2011"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184444.3184447"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.2016.44.11.1863"},{"key":"e_1_2_1_79_1","volume-title":"Mindfulness","author":"Langer E. J.","year":"1989"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.001"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.008"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017307.2017316"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20165"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1060.0197"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975824"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-013-0231-2"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2006.20208686"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.3.11"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2018.00448"},{"key":"e_1_2_1_90_1","volume-title":"Proceedings of International Conference on Information Systems, 1286--1305","author":"Magni M.","year":"2011"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12068"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0124-6"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusvent.2009.10.004"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0028085"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1987.4306502"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1177\/0092070303254408"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.5555\/1143297.1709384"},{"issue":"11","key":"e_1_2_1_99_1","first-page":"185","article-title":"Examining the effects of technology attributes on learning: A contingency perspective","volume":"7","author":"Nicholson J.","year":"2008","journal-title":"Journal of Information Technology Education"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1108\/03090561311324318"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11409-008-9030-4"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.2.208.9697"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03206553"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1348\/014466603763276162"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2005.00018.x"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1108\/02652321011064872"},{"key":"e_1_2_1_108_1","volume-title":"Diffusion of innovations","author":"Rogers E. M.","year":"2003","edition":"5"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.2307\/3094873"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tine.2016.01.001"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2011.04.003"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017496.2017503"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3051473.3051479"},{"issue":"1","key":"e_1_2_1_114_1","first-page":"321","article-title":"Consequences of causal ambiguity on motivation in lean production system adoption: The Role of Moderating Variables","volume":"4","author":"Shamsudin S.","year":"2016","journal-title":"Journal of Advanced Management Science"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2018.100823"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.10.001"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.830859"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0881"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1177\/106907270000800306"},{"issue":"1","key":"e_1_2_1_120_1","first-page":"380","article-title":"Validation guidelines for IS positivist research","volume":"13","author":"Straub D.","year":"2004","journal-title":"The Communications of the Association for Information Systems"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161345.1161358"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.02"},{"key":"e_1_2_1_123_1","volume-title":"Proceedings of the 32nd International Conference on Information Systems (ICIS)","author":"Sun H.","year":"2011"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.06.003"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00431"},{"key":"e_1_2_1_126_1","volume-title":"Proceedings of the 31st International Conference on Information Systems, 12--15","author":"Sun H.","year":"2010"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017236.2017239"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.90.4.692"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/11881"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.2307\/249443"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.1982.6447463"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0147-1767(01)00010-4"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.08.022"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(08)60019-2"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017197.2017202"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208955.2208966"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00181"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2015.02.016"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1108\/SCM-07-2016-0230"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.02.007"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.07.010"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41629-3_9"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2017.0518"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2017.04.001"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.5555\/2003213.2003217"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.01.013"}],"container-title":["ACM SIGMIS Database: the DATABASE for Advances in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433148.3433154","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433148.3433154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:10Z","timestamp":1750193290000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433148.3433154"}},"subtitle":["The Roles of User and Technology Attributes"],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":146,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,11,2]]}},"alternative-id":["10.1145\/3433148.3433154"],"URL":"https:\/\/doi.org\/10.1145\/3433148.3433154","relation":{},"ISSN":["0095-0033","1532-0936"],"issn-type":[{"value":"0095-0033","type":"print"},{"value":"1532-0936","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}