{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:13:01Z","timestamp":1773144781157,"version":"3.50.1"},"reference-count":109,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>The COVID-19 pandemic lockdown lead to the rapid adoption and use of various groupware applications (\"apps'') for remote connection with colleagues, friends, and family. Different factors such as user experiences, trust, and social influences (\"user-situational motivations'') were instrumental in determining how and what apps people adopted and used, especially at the onset of the COVID-19 pandemic. In this empirical study, we examine how these factors and four predominant user-situational motivations (i.e., the mandated use of an app by an employer\/institution, recommended use of an app by an employer\/institution, recommended use of an app by a peer(s), and self-selection of an app) influenced the rapid adoption and use of groupware applications. Specifically, we develop an \"emergency adoption model\" of groupware applications using 195 valid survey responses to highlight the factors that motivated these apps' use at the onset of COVID-19 pandemic lockdown. We leverage the Technology Adoption Model (TAM) and integrate it with the users' past use of the application before the COVID-19 lockdown, user-situational motivation, and their privacy-related trust in the application provider to develop a more comprehensive model. Using confirmatory factor analysis (CFA) and structural equation modeling (SEM), we find that the users who used a groupware app in the past continued to use it, and in line with TAM, users' intention to adopt and use a groupware application was largely driven by the ease-of-use and usefulness of the app. Furthermore, while not a part of the traditional TAM model, we find that privacy-related trust in the application provider plays an important role in emergency adoption. However, unlike typical adoption models, the nature of all these effects---most prominently those related to privacy-related trust---depend on the underlying situational motivation. We discuss the implications of these findings and suggest ways to improve the adoption and use of groupware applications, especially during crises like the COVID-19 pandemic.<\/jats:p>","DOI":"10.1145\/3479549","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:39:17Z","timestamp":1634611157000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["The Differential Effect of Privacy-Related Trust on Groupware Application Adoption and Use during the COVID-19 pandemic"],"prefix":"10.1145","volume":"5","author":[{"given":"Moses","family":"Namara","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.014"},{"key":"e_1_2_1_2_1","volume-title":"Action control","author":"Ajzen Icek","unstructured":"Icek Ajzen. 1985. From intentions to actions: A theory of planned behavior. In Action control. Springer, 11--39."},{"key":"e_1_2_1_3_1","volume-title":"Aboul Ella Hassanien, and Khaled Shaalan","author":"Al-Maroof Rana Saeed","year":"2020","unstructured":"Rana Saeed Al-Maroof, Said A Salloum, Aboul Ella Hassanien, and Khaled Shaalan. 2020. Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic. Interactive Learning Environments (2020), 1--16."},{"key":"e_1_2_1_4_1","volume-title":"Vogels","author":"Anderson Monica","year":"2020","unstructured":"Monica Anderson and Emily A. Vogels. 2020. Americans turn to technology during COVID-19 outbreak, say an outage would be a problem. https:\/\/www.pewresearch.org\/fact-tank\/2020\/03\/31\/americans-turn-to-technology-during-covid-19-outbreak-say-an-outage-would-be-a-problem\/"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418323"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406919874596"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00122"},{"key":"e_1_2_1_8_1","unstructured":"Kathy Baxter Catherine Courage and Kelly Caine. 2015. Understanding your users: a practical guide to user research methods .Morgan Kaufmann."},{"key":"e_1_2_1_9_1","volume-title":"Significance tests and goodness of fit in the analysis of covariance structures. Psychological bulletin","author":"Bentler Peter M","year":"1980","unstructured":"Peter M Bentler and Douglas G Bonett. 1980. Significance tests and goodness of fit in the analysis of covariance structures. Psychological bulletin, Vol. 88, 3 (1980), 588."},{"key":"e_1_2_1_10_1","volume-title":"Communication, collaboration and contagion:?Virtualisation\" of anatomy during COVID-19. Clinical Anatomy","author":"Byrnes Kevin G","year":"2020","unstructured":"Kevin G Byrnes, Patrick A Kiely, Colum P Dunne, Kieran W McDermott, and John Calvin Coffey. 2020. Communication, collaboration and contagion:?Virtualisation\" of anatomy during COVID-19. Clinical Anatomy (2020)."},{"key":"e_1_2_1_11_1","unstructured":"Brian X. Chen. 2020. The Virus Revealed Our Essential Tech (and Weeded Out the Excess). https:\/\/www.nytimes.com\/2020\/04\/15\/technology\/personaltech\/virus-essential-tech.html"},{"key":"e_1_2_1_12_1","volume-title":"AMCIS 2000 Proceedings","author":"Chircu Alina M","year":"2000","unstructured":"Alina M Chircu, Gordon B Davis, and Robert J Kauffman. 2000. Trust, expertise, and e-commerce intermediary adoption. AMCIS 2000 Proceedings (2000), 405."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3416465.3416472"},{"key":"e_1_2_1_14_1","unstructured":"Fred D Davis. 1985. A technology acceptance model for empirically testing new end-user information systems: Theory and results. Ph.D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_2_1_15_1","volume-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly","author":"Davis Fred D","year":"1989","unstructured":"Fred D Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly (1989), 319--340."},{"key":"e_1_2_1_16_1","volume-title":"User acceptance of computer technology: a comparison of two theoretical models. Management science","author":"Davis Fred D","year":"1989","unstructured":"Fred D Davis, Richard P Bagozzi, and Paul R Warshaw. 1989. User acceptance of computer technology: a comparison of two theoretical models. Management science, Vol. 35, 8 (1989), 982--1003."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428502.3428534"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0308-5961(82)90014-3"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102211"},{"key":"e_1_2_1_20_1","unstructured":"Yogesh Kumar Dwivedi Navonil Mustafee Lemuria D Carter and Michael D Williams. 2010. A Bibliometric Comparision of the Usage of Two Theories of IS\/IT Acceptance (TAM and UTAUT).. In AMCIS. 183."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/62266.62268"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/99977.99987"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376435"},{"key":"e_1_2_1_24_1","volume-title":"Trust and COVID-19: Implications for interpersonal, workplace, institutional, and information-based trust","author":"Fell Lauren","year":"2020","unstructured":"Lauren Fell. 2020. Trust and COVID-19: Implications for interpersonal, workplace, institutional, and information-based trust. Digital Government: Research and Practice (2020)."},{"key":"e_1_2_1_25_1","volume-title":"Intention and Behavior: An Introduction to Theory and Research","author":"Fishbein Martin","year":"1975","unstructured":"Martin Fishbein and Icek Ajzen. 1975. Belief. Attitude, Intention and Behavior: An Introduction to Theory and Research, Vol. 578 (1975)."},{"key":"e_1_2_1_26_1","volume-title":"A social influence model of technology use. Organizations and communication technology","author":"Fulk Janet","year":"1990","unstructured":"Janet Fulk, Joseph Schmitz, and Charles W Steinfield. 1990. A social influence model of technology use. Organizations and communication technology, Vol. 117 (1990), 140."},{"key":"e_1_2_1_27_1","volume-title":"Trust and TAM in online shopping: An integrated model. MIS quarterly","author":"Gefen David","year":"2003","unstructured":"David Gefen, Elena Karahanna, and Detmar W Straub. 2003. Trust and TAM in online shopping: An integrated model. MIS quarterly, Vol. 27, 1 (2003), 51--90."},{"key":"e_1_2_1_28_1","unstructured":"Sarah Glover. 2020. Free Tech Tools Have Kept Communities Connected During Coronavirus. https:\/\/www.nbcnewyork.com\/news\/coronavirus\/free-tech-tools-have-kept-communities-con-nected-during-coronavirus\/2336787\/"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175230"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-0349-7_17"},{"key":"e_1_2_1_31_1","volume-title":"Christian Ringle, and Marko Sarstedt.","author":"Hair Joseph F","year":"2016","unstructured":"Joseph F Hair Jr, G Tomas M Hult, Christian Ringle, and Marko Sarstedt. 2016. A primer on partial least squares structural equation modeling (PLS-SEM) .Sage publications."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. 1--9.","author":"Jonna","year":"2020","unstructured":"Jonna H\"akkil\"a, Mari Karhu, Matilda Kalving, and Ashley Colley. 2020. Practical Family Challenges of Remote Schooling during COVID-19 Pandemic in Finland. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. 1--9."},{"key":"e_1_2_1_33_1","volume-title":"Explaining the role of user participation in information system use. Management science","author":"Hartwick Jon","year":"1994","unstructured":"Jon Hartwick and Henri Barki. 1994. Explaining the role of user participation in information system use. Management science, Vol. 40, 4 (1994), 440--465."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299175"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127358"},{"key":"e_1_2_1_36_1","volume-title":"Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal","author":"Bentler Hu","year":"1999","unstructured":"Li-tze Hu and Peter M Bentler. 1999. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural equation modeling: a multidisciplinary journal, Vol. 6, 1 (1999), 1--55."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.21"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20982"},{"key":"e_1_2_1_39_1","volume-title":"Technological change and professional control in the professoriate. Science, technology, & human values","author":"Johnson David R","year":"2013","unstructured":"David R Johnson. 2013. Technological change and professional control in the professoriate. Science, technology, & human values, Vol. 38, 1 (2013), 126--149."},{"key":"e_1_2_1_40_1","volume-title":"Giddens's structuration theory and information systems research. MIS quarterly","author":"Jones Matthew R","year":"2008","unstructured":"Matthew R Jones and Helena Karsten. 2008. Giddens's structuration theory and information systems research. MIS quarterly, Vol. 32, 1 (2008), 127--157."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 11th Asia Pacific conference on computer human interaction. 28--38","author":"Joshi Anirudha","year":"2013","unstructured":"Anirudha Joshi. 2013. Technology adoption by'emergent'users: the user-usage model. In Proceedings of the 11th Asia Pacific conference on computer human interaction. 28--38."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.215"},{"key":"e_1_2_1_43_1","volume-title":"Galit Fuhrmann Alpert, and Michael Fire","author":"Kagan Dima","year":"2020","unstructured":"Dima Kagan, Galit Fuhrmann Alpert, and Michael Fire. 2020. Zooming Into Video Conferencing Privacy and Security Threats. arXiv preprint arXiv:2007.01059 (2020)."},{"key":"e_1_2_1_44_1","volume-title":"Little jiffy, mark IV. Educational and psychological measurement","author":"Kaiser Henry F","year":"1974","unstructured":"Henry F Kaiser and John Rice. 1974. Little jiffy, mark IV. Educational and psychological measurement, Vol. 34, 1 (1974), 111--117."},{"key":"e_1_2_1_45_1","unstructured":"Jacob Kastrenakes. 2020. Zoom saw a huge increase in subscribers - and revenue - thanks to the pandemic. https:\/\/www.theverge.com\/2020\/6\/2\/21277006\/zoom-q1--2021-earnings-coronavirus-pandemic-work-from-home"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITECHN.2016.7860192"},{"key":"e_1_2_1_47_1","volume-title":"A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems","author":"Kim Dan J","year":"2008","unstructured":"Dan J Kim, Donald L Ferrin, and H Raghav Rao. 2008. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision support systems, Vol. 44, 2 (2008), 544--564."},{"key":"e_1_2_1_48_1","volume-title":"A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena. Management science","author":"Kim Sung S","year":"2005","unstructured":"Sung S Kim and Naresh K Malhotra. 2005. A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena. Management science, Vol. 51, 5 (2005), 741--755."},{"key":"e_1_2_1_49_1","volume-title":"Principles and practice of structural equation modeling","author":"Kline Rex B","unstructured":"Rex B Kline. 2015. Principles and practice of structural equation modeling .Guilford publications."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499670"},{"key":"e_1_2_1_51_1","volume-title":"Recommender Systems Handbook","author":"Knijnenburg Bart P","unstructured":"Bart P Knijnenburg and Martijn C Willemsen. 2015. Evaluating recommender systems with user experiments. In Recommender Systems Handbook. Springer, 309--352."},{"key":"e_1_2_1_52_1","unstructured":"Ella Koeze and Nathaniel Popper. 2020. The Virus Changed the Way We Internet. https:\/\/www.nytimes.com\/interactive\/2020\/04\/07\/technology\/coronavirus-internet-use.html"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/apps.12108"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0611"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410886.3410906"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-015-0277-4"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411170.3411240"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025742"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460644"},{"key":"e_1_2_1_60_1","volume-title":"Understanding academics' adoption of learning technologies: A systematic review. Computers & Education","author":"Liu Qian","year":"2020","unstructured":"Qian Liu, Susan Geertshuis, and Rebecca Grainger. 2020. Understanding academics' adoption of learning technologies: A systematic review. Computers & Education (2020), 103857."},{"key":"e_1_2_1_61_1","volume-title":"Perceived critical mass effect on groupware acceptance. European journal of information systems","author":"Lou H","year":"2000","unstructured":"H Lou, Wenhong Luo, and Diane Strong. 2000. Perceived critical mass effect on groupware acceptance. European journal of information systems, Vol. 9, 2 (2000), 91--103."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/99332.99368"},{"key":"e_1_2_1_63_1","volume-title":"Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research","author":"Malhotra Naresh K","year":"2004","unstructured":"Naresh K Malhotra, Sung S Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, Vol. 15, 4 (2004), 336--355."},{"key":"e_1_2_1_64_1","volume-title":"Technology acceptance model: a literature review from 1986 to","author":"Maranguni\u0107 Nikola","year":"2013","unstructured":"Nikola Maranguni\u0107 and Andrina Grani\u0107. 2015. Technology acceptance model: a literature review from 1986 to 2013. Universal access in the information society, Vol. 14, 1 (2015), 81--95."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518808"},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1726--1737","author":"Marlow Jennifer","year":"2016","unstructured":"Jennifer Marlow, Eveline Van Everdingen, and Daniel Avrahami. 2016. Taking notes or playing games? Understanding multitasking in video communication. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1726--1737."},{"key":"e_1_2_1_67_1","unstructured":"Chris Matyszczyk. 2021. I looked at all the ways Microsoft Teams tracks users and my head is spinning. https:\/\/www.zdnet.com\/article\/i-looked-at-all-the-ways-microsoft-teams-tracks-users-and-my-head-is-spinning\/"},{"key":"e_1_2_1_68_1","volume-title":"Trust in information technology","author":"McKnight D Harrison","year":"2005","unstructured":"D Harrison McKnight. 2005. Trust in information technology. The Blackwell encyclopedia of management, Vol. 7 (2005), 329--331."},{"key":"e_1_2_1_69_1","volume-title":"Jason Bennett Thatcher, and Paul F Clay","author":"Mcknight D Harrison","year":"2011","unstructured":"D Harrison Mcknight, Michelle Carter, Jason Bennett Thatcher, and Paul F Clay. 2011. Trust in a specific technology: An investigation of its components and measures. ACM Transactions on management information systems (TMIS), Vol. 2, 2 (2011), 1--25."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.2307\/259290"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrmicro.2017.174"},{"key":"e_1_2_1_72_1","article-title":"Privacy, trust, and disclosure: Exploring barriers to electronic commerce","volume":"9","author":"Metzger Miriam J","year":"2004","unstructured":"Miriam J Metzger. 2004. Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of computer-mediated communication, Vol. 9, 4 (2004), JCMC942.","journal-title":"Journal of computer-mediated communication"},{"key":"e_1_2_1_73_1","unstructured":"MicrosoftHeidi. [n.d.]. Microsoft Teams Privacy - Microsoft Teams. https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/teams-privacy"},{"key":"e_1_2_1_74_1","volume-title":"Lei Zou, Zheye Wang, and Kejin Wang.","author":"Mihunov Volodymyr V","year":"2020","unstructured":"Volodymyr V Mihunov, Nina SN Lam, Lei Zou, Zheye Wang, and Kejin Wang. 2020. Use of Twitter in disaster rescue: lessons learned from Hurricane Harvey. International Journal of Digital Earth (2020), 1--13."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1086\/511989"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2855508"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sjme.2016.12.001"},{"key":"e_1_2_1_78_1","volume-title":"How to improve trust toward electronic banking. Online Information Review","author":"Leiva Francisco Mu","year":"2010","unstructured":"Francisco Mu noz-Leiva, Teodoro Luque-Mart'inez, and Juan S\u00e1nchez-Fern\u00e1ndez. 2010. How to improve trust toward electronic banking. Online Information Review (2010)."},{"key":"e_1_2_1_79_1","volume-title":"Thi Thuong Thuong Nguyen, and Thu-Giang Tran","author":"Ngo Thanh Thuy","year":"2020","unstructured":"Thanh Thuy Ngo, Thi Thuong Thuong Nguyen, and Thu-Giang Tran. 2020. Influence of Learning by Using Video Conferencing Tools on Perceptions and Attitude of Vietnamese Female Students in COVID-19 Pandemic. Available at SSRN 3697029 (2020)."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.2190\/EC.39.3.c"},{"key":"e_1_2_1_81_1","volume-title":"Helen Donelan","author":"Olson Gary M","year":"2010","unstructured":"Gary M Olson and Judith S Olson. 2010. Groupware and computer-supported cooperative work. Online Communication and Collaboration: A reader, Helen Donelan, Karen Kear, and Magnus Ramage (Eds.) (2010), 39--57."},{"key":"e_1_2_1_82_1","unstructured":"World Health Organization et al. 2018. A checklist for pandemic influenza risk and impact management: building capacity for pandemic response. (2018)."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.302982"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460583"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120212.1120257"},{"key":"e_1_2_1_86_1","volume-title":"Juliana Menasce Horowitz, and Rachel Minkin","author":"Parker Kim","year":"2021","unstructured":"Kim Parker, Juliana Menasce Horowitz, and Rachel Minkin. 2021. How Coronavirus Has Changed the Way Americans Work. https:\/\/www.pewresearch.org\/social-trends\/2020\/12\/09\/how-the-coronavirus-outbreak-has-and-hasnt-changed-the-way-americans-work\/"},{"key":"e_1_2_1_87_1","volume-title":"International journal of electronic commerce","author":"Pavlou Paul A","year":"2003","unstructured":"Paul A Pavlou. 2003. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International journal of electronic commerce, Vol. 7, 3 (2003), 101--134."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm14040162"},{"key":"e_1_2_1_89_1","unstructured":"Qualtrics. [n.d.]. Qualtrics: The Leading Research & Experience Software. https:\/\/www.qualtrics.com\/ Accessed: 2020-04--1."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531698"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441949"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.103732"},{"key":"e_1_2_1_93_1","volume-title":"Technology acceptance model (TAM) and social media usage: an empirical study on Facebook. Journal of Enterprise Information Management","author":"Rauniar Rupak","year":"2014","unstructured":"Rupak Rauniar, Greg Rawski, Jei Yang, and Ben Johnson. 2014. Technology acceptance model (TAM) and social media usage: an empirical study on Facebook. Journal of Enterprise Information Management (2014)."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_2_1_95_1","volume-title":"Not so different after all: A cross-discipline view of trust","author":"Rousseau Denise M","year":"1998","unstructured":"Denise M Rousseau, Sim B Sitkin, Ronald S Burt, and Colin Camerer. 1998. Not so different after all: A cross-discipline view of trust. Academy of management review, Vol. 23, 3 (1998), 393--404."},{"key":"e_1_2_1_96_1","volume-title":"Proceedings of European Research Seminar in Advanced Distributed Systems (ERSADS'97)","author":"Rowley Andrew","year":"1997","unstructured":"Andrew Rowley and Jean Dollimore. 1997. Secure group communication for groupware applications. In Proceedings of European Research Seminar in Advanced Distributed Systems (ERSADS'97). Citeseer, 222--227."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/249170.249185"},{"key":"e_1_2_1_98_1","unstructured":"Kavita Saxena. 2020. Coronavirus Accelerates Pace of Digital Education in India. (2020)."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998202"},{"key":"e_1_2_1_100_1","volume-title":"Factors influencing adoption of online teaching by school teachers: A study during COVID-19 pandemic. Journal of Public Affairs","author":"Tandon Urvashi","year":"2020","unstructured":"Urvashi Tandon. 2020. Factors influencing adoption of online teaching by school teachers: A study during COVID-19 pandemic. Journal of Public Affairs (2020), e2503."},{"key":"e_1_2_1_101_1","volume-title":"A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science","author":"Venkatesh Viswanath","year":"2000","unstructured":"Viswanath Venkatesh and Fred D Davis. 2000. A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science, Vol. 46, 2 (2000), 186--204."},{"key":"e_1_2_1_102_1","volume-title":"User acceptance of information technology: Toward a unified view. MIS quarterly","author":"Venkatesh Viswanath","year":"2003","unstructured":"Viswanath Venkatesh, Michael G Morris, Gordon B Davis, and Fred D Davis. 2003. User acceptance of information technology: Toward a unified view. MIS quarterly (2003), 425--478."},{"key":"e_1_2_1_103_1","volume-title":"James YL Thong, and Xin Xu","author":"Venkatesh Viswanath","year":"2012","unstructured":"Viswanath Venkatesh, James YL Thong, and Xin Xu. 2012. Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly (2012), 157--178."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-006-9018-1"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.30"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145234"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376862"},{"key":"e_1_2_1_108_1","volume-title":"What factors determining customer continuingly using food delivery apps during 2019 novel coronavirus pandemic period? International journal of hospitality management","author":"Zhao Yuyang","year":"2020","unstructured":"Yuyang Zhao and Fernando Bacao. 2020. What factors determining customer continuingly using food delivery apps during 2019 novel coronavirus pandemic period? International journal of hospitality management, Vol. 91 (2020), 102683."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.03.021"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:55:18Z","timestamp":1752468918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":109,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3479549"],"URL":"https:\/\/doi.org\/10.1145\/3479549","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}