{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T04:29:15Z","timestamp":1774326555333,"version":"3.50.1"},"reference-count":153,"publisher":"MIS Quarterly","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,1]]},"abstract":"<jats:p>Creative information technology usage by employees is the critical link between business technology investments and competitive advantage in a digital economy. However, to realize anticipated benefits, organizational leaders need a richer understanding of what drives individuals\u2019 innovation with incumbent organizational technologies. In support of that aim, this study theorized the processes by which a new concept in IS research, IT identity, motivates different forms of IT usage in the post-adoption context. We mapped these processes to two variance models and validated IT identity\u2019s influences for two different technologies. For theory, our results demonstrate IT identity\u2019s role as a key determinant of IT feature and exploratory usage, refine understanding of the nomological net of IT use, and create new opportunities to understand individuals\u2019 interactions with IT in the post-adoption context. For practice, this study offers actionable suggestions for how organizational leaders can encourage employees to leverage IT more effectively in their work. In doing so, this study opens the door for future investigations into the reciprocal relationship between individual IT usage and organizational and\/or societal outcomes.<\/jats:p>","DOI":"10.25300\/misq\/2020\/14607","type":"journal-article","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T15:24:21Z","timestamp":1610637861000},"page":"983-1022","source":"Crossref","is-referenced-by-count":99,"title":["Information Technology Identity: A Key Determinant of IT Feature and Exploratory Usage"],"prefix":"10.25300","volume":"44","author":[{"given":"Michelle","family":"Carter","sequence":"first","affiliation":[{"name":"Department of Management, Information Systems, and Entrepreneurship, Carson College of Business, Washington State University, Todd Hall 442, Pullman, WA 99164-4743 U.S.A."}]},{"given":"Stacie","family":"Petter","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Business Analytics, Hankamer School of Business, Baylor University, One Bear Place #98005, Waco, TX 76798-8005 U.S.A."}]},{"given":"Varun","family":"Grover","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Walton College of Business, University of Arkansas, Fayetteville, AR 72701 U.S.A."}]},{"given":"Jason Bennett","family":"Thatcher","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, Fox School of Business, Temple University, Speakman 210, 1810 N. 13th Street, Philadelphia, PA 19122 U.S.A."}]}],"member":"10933","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"2025082212214394100_b1-01_14607_ra_carterpetter","first-page":"696","article-title":"Photo Sharing in the Arab Gulf: Expressing the Collective and Autonomous Selves","author":"Abokhodair","year":"2017"},{"issue":"3","key":"2025082212214394100_b2-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"427","DOI":"10.2307\/25148691","article-title":"Moving Beyond Intentions and toward the Theory of Trying: Effects of Work Environment and Gender on Post-Adoption Information Technology Use","volume":"29","author":"Ahuja","year":"2005","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212214394100_b3-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1111\/j.1365-2575.2007.00286.x","article-title":"Examining Technology, Structure and Identity During an Enterprise System Implementation","volume":"18","author":"Alvarez","year":"2008","journal-title":"Information Systems Journal"},{"issue":"1","key":"2025082212214394100_b4-01_14607_ra_carterpetter","first-page":"72","article-title":"Distinguishing Perceptions of Control from Self-Efficacy: Predicting Low-Fat Diet Using the Theory of Planned Behavior","volume":"29","author":"Armitage","year":"1999","journal-title":"Journal of Applied Psychology"},{"issue":"7","key":"2025082212214394100_b5-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"361","DOI":"10.17705\/1jais.00367","article-title":"Enhanced Use of IT: A New Perspective on Post-Adoption","volume":"15","author":"Bagayogo","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"2025082212214394100_b6-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1086\/208543","article-title":"Trying to Consume","volume":"17","author":"Bagozzi","year":"1990","journal-title":"Journal of Consumer Research"},{"issue":"6","key":"2025082212214394100_b7-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1037\/0022-3514.51.6.1173","article-title":"The Moderator\u2013 Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations","volume":"51","author":"Baron","year":"1986","journal-title":"Journal of Personality and Social Psychology"},{"key":"2025082212214394100_b8-01_14607_ra_carterpetter","first-page":"1","article-title":"The Value and Impact of Mobile Information and Communication Technologies","author":"Basole","year":"2004"},{"issue":"2","key":"2025082212214394100_b9-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1086\/209154","article-title":"Possessions and the Extended Self","volume":"15","author":"Belk","year":"1988","journal-title":"Journal of Consumer Research"},{"issue":"1","key":"2025082212214394100_b10-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1080\/08874417.2008.11645302","article-title":"Information Technology Continuance: A Theoretic Extension and Empirical Test","volume":"49","author":"Bhattacherjee","year":"2008","journal-title":"The Journal of Computer Information Systems"},{"issue":"4","key":"2025082212214394100_b11-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"322","DOI":"10.2307\/2786817","article-title":"Norms, Preferences, Identities and Retention Decisions","volume":"50","author":"Biddle","year":"1987","journal-title":"Social Psychology Quarterly"},{"issue":"1","key":"2025082212214394100_b12-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infoandorg.2013.11.001","article-title":"IT-Driven Identity Work: Creating a Group Identity in a Digital Environment","volume":"24","author":"Boudreau","year":"2014","journal-title":"Information and Organization"},{"issue":"2","key":"2025082212214394100_b13-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1287\/isre.1110.0357","article-title":"Expectation Confirmation in Technology Use","volume":"23","author":"Brown","year":"2012","journal-title":"Information Systems Research"},{"issue":"8","key":"2025082212214394100_b14-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/280324.280332","article-title":"Beyond the Productivity Paradox","volume":"41","author":"Brynjolfsson","year":"1998","journal-title":"Communications of the ACM"},{"issue":"1","key":"2025082212214394100_b15-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1177\/019027250406700103","article-title":"Identities and Social Structure: The 2003 Cooley-Mead Award Address","volume":"67","author":"Burke","year":"2004","journal-title":"Social Psychology Quarterly"},{"issue":"2","key":"2025082212214394100_b16-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"83","DOI":"10.2307\/3033704","article-title":"The Link between Identity and Role Performance","volume":"44","author":"Burke","year":"1981","journal-title":"Social Psychology Quarterly"},{"issue":"4","key":"2025082212214394100_b17-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"347","DOI":"10.2307\/2695833","article-title":"Trust and Commitment through Self-Verification","volume":"62","author":"Burke","year":"1999","journal-title":"Social Psychology Quarterly"},{"key":"2025082212214394100_b18-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195388275.001.0001","volume-title":"Identity Theory","author":"Burke","year":"2009"},{"key":"2025082212214394100_b19-01_14607_ra_carterpetter","unstructured":"Burton-Jones, A., Stein, M.-K., and Mishra, A.\u20082017. \u201cIS Use,\u201d MIS Quarterly Research Curations (https:\/\/www.misqresearchcurations.org\/blog\/2017\/12\/1\/is-use)."},{"key":"2025082212214394100_b20-01_14607_ra_carterpetter","article-title":"The Paradox of the Active User","volume-title":"Interfacing Thought: Cognitive Aspects of Human\u2013Computer Interaction","author":"Caroll","year":"1987"},{"key":"2025082212214394100_b21-01_14607_ra_carterpetter","article-title":"IT Identity: Developing a Set of Constructs and Measures","author":"Carter","year":"2013"},{"issue":"4","key":"2025082212214394100_b22-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"931","DOI":"10.25300\/MISQ\/2015\/39.4.9","article-title":"Me, My Self, and I(T): Conceptualizing Information Technology Identity and its Implications","volume":"39","author":"Carter","year":"2015","journal-title":"MIS Quarterly"},{"key":"2025082212214394100_b23-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"150","DOI":"10.4018\/978-1-4666-1939-5.ch008","article-title":"Mobile Devices and the Self: Developing the Concept of Mobile Phone Identity","volume-title":"Strategy, Adoption, and Competitive Advantage of Mobile Services in the Global Economy","author":"Carter","year":"2013"},{"issue":"3","key":"2025082212214394100_b24-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1353\/sof.2002.0003","article-title":"A Theory of Self-Esteem","volume":"80","author":"Cast","year":"2002","journal-title":"Social Forces"},{"issue":"4","key":"2025082212214394100_b25-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"303","DOI":"10.2307\/2786758","article-title":"Role Identity and Reasoned Action in the Prediction of Repeated Behavior","volume":"51","author":"Charng","year":"1988","journal-title":"Social Psychology Quarterly"},{"issue":"2","key":"2025082212214394100_b26-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic-Mail Emotion\/Adoption Study","volume":"14","author":"Chin","year":"2003","journal-title":"Information Systems Research"},{"key":"2025082212214394100_b27-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"45","DOI":"10.7551\/mitpress\/3644.003.0005","article-title":"Environmental Identity: A Conceptual and an Operational Definition","volume-title":"Identity and the Natural Environment","author":"Clayton","year":"2003"},{"issue":"2","key":"2025082212214394100_b28-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"145","DOI":"10.2307\/249749","article-title":"Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study","volume":"23","author":"Compeau","year":"1999","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212214394100_b29-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.infoandorg.2008.02.001","article-title":"Performing Catharsis: The Use of Online Discussion Forums in Organizational Change","volume":"18","author":"Da Cunha","year":"2008","journal-title":"Information and Organization"},{"issue":"3","key":"2025082212214394100_b30-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"575","DOI":"10.2307\/25148857","article-title":"Media, Tasks, and Communication Processes: A Theory of Media Synchronicity","volume":"32","author":"Dennis","year":"2008","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212214394100_b31-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/3250928","article-title":"Understanding Fit and Appropriation Effects in Group Support Systems via Meta-Analysis","volume":"25","author":"Dennis","year":"2001","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212214394100_b32-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1111\/j.1365-277X.1995.tb00292.x","article-title":"Adolescent Food Choice: An Application of the Theory of Planned Behavior","volume":"8","author":"Dennison","year":"1995","journal-title":"Journal of Human Nutrition and Dietetics"},{"issue":"3","key":"2025082212214394100_b33-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1287\/mnsc.49.3.273.12736","article-title":"Performance Impacts of Information Technology: Is Actual Usage the Missing Link?","volume":"49","author":"Devaraj","year":"2003","journal-title":"Management Science"},{"key":"2025082212214394100_b34-01_14607_ra_carterpetter","volume-title":"The Social Psychology of Material Possessions","author":"Dittmar","year":"1992"},{"key":"2025082212214394100_b35-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/978-1-4419-7988-9_31","article-title":"Material and Consumer Identities","volume-title":"Handbook of Identity Theory and Research","author":"Dittmar","year":"2011"},{"key":"2025082212214394100_b36-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/00221325.1975.10533945","article-title":"The Distinction between Self and Not-Self in Children and Adolescents","volume":"127","author":"Dixon","year":"1957","journal-title":"The Journal of Genetic Psychology"},{"issue":"2","key":"2025082212214394100_b37-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"235","DOI":"10.2307\/258437","article-title":"Treating Progress Functions as a Managerial Opportunity","volume":"9","author":"Dutton","year":"1984","journal-title":"The Academy of Management Review"},{"key":"2025082212214394100_b38-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.1093\/actrade\/9780199551378.001.0001","volume-title":"Information: A Very Short Introduction","author":"Floridi","year":"2010"},{"issue":"1","key":"2025082212214394100_b39-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating Structural Equation Models with Unobservable Variables and Measurement Error","volume":"18","author":"Fornell","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"2025082212214394100_b40-01_14607_ra_carterpetter","first-page":"298","article-title":"Possessions: Toward a Theory of Their Meaning and Function Throughout the Life Cycle","volume-title":"Life-Span Development and Behavior","author":"Furby","year":"1978"},{"issue":"6","key":"2025082212214394100_b41-01_14607_ra_carterpetter","first-page":"457","article-title":"Understanding the Psychology of Possession and Ownership: A Personal Memoir and an Appraisal of Our Progress","volume":"6","author":"Furby","year":"1991","journal-title":"Journal of Social Behavior and Personality"},{"issue":"3","key":"2025082212214394100_b42-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"472","DOI":"10.2307\/258514","article-title":"Self-Efficacy: Implications for Organizational Behavior and Human Resource Management","volume":"12","author":"Gist","year":"1987","journal-title":"Academy of Management Review"},{"issue":"1","key":"2025082212214394100_b43-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1681-4835.2016.tb00543.x","article-title":"Vulnerability and Information Practices among (Undocumented) Latino Migrants","volume":"75","author":"Gomez","year":"2016","journal-title":"The Electronic Journal of Information Systems in Developing Countries"},{"issue":"1","key":"2025082212214394100_b44-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"44","DOI":"10.2307\/2786868","article-title":"The Intention-Behavior Relationship among U.S. and Swedish Voters","volume":"53","author":"Granberg","year":"1990","journal-title":"Social Psychology Quarterly"},{"issue":"1","key":"2025082212214394100_b45-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1177\/0190272511398020","article-title":"Now My \u2018Old Self\u2019 Is Thin: Stigma Exits after Weight Loss","volume":"74","author":"Granberg","year":"2011","journal-title":"Social Psychology Quarterly"},{"issue":"6","key":"2025082212214394100_b46-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"2340","DOI":"10.1016\/j.chb.2012.07.004","article-title":"Connected Scholars: Examining the Role of Social Media in Research Practices of Faculty Using the UTAUT Model","volume":"28","author":"Gruzd","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025082212214394100_b47-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","article-title":"PLS-SEM: Indeed a Silver Bullet","volume":"19","author":"Hair","year":"2011","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"2","key":"2025082212214394100_b48-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","article-title":"Partial Least Squares Structural Equation Modeling (PLS-SEM): An Emerging Tool in Business Research","volume":"26","author":"Hair","year":"2014","journal-title":"European Business Review"},{"key":"2025082212214394100_b49-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/S1474-7979(2009)0000020014","article-title":"The Use of Partial Least Squares Path Modeling in International Marketing","volume":"20","author":"Henseler","year":"2009","journal-title":"Advances in International Marketing"},{"issue":"3","key":"2025082212214394100_b50-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1287\/orsc.1050.0122","article-title":"Understanding Conflict in Geographically Distributed Teams: The Moderating Effects of Shared Identity, Shared Context, and Spontaneous Communication","volume":"16","author":"Hinds","year":"2005","journal-title":"Organization Science"},{"issue":"2","key":"2025082212214394100_b51-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"280","DOI":"10.5465\/amj.2009.37308035","article-title":"A Cross-Level Perspective on Employee Creativity: Goal Orientation, Team Learning Behavior, and Individual Creativity","volume":"52","author":"Hirst","year":"2009","journal-title":"Academy of Management Journal"},{"issue":"4","key":"2025082212214394100_b52-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"255","DOI":"10.2307\/2787127","article-title":"A Tale of Two Theories: A Critical Comparison of Identity Theory with Social Identity Theory","volume":"58","author":"Hogg","year":"1995","journal-title":"Social Psychology Quarterly"},{"issue":"1","key":"2025082212214394100_b53-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2307\/25148830","article-title":"Understanding Digital Inequality: Comparing Continued Use Behavioral Models of the Socio-Economically Advantaged and Disadvantaged","volume":"32","author":"Hsieh","year":"2008","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212214394100_b54-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S1057-7408(07)70020-7","article-title":"A Meditation on Mediation: Evidence That Structural Equations Models Perform Better Than Regressions","volume":"17","author":"Iacobucci","year":"2007","journal-title":"Journal of Consumer Psychology"},{"issue":"3","key":"2025082212214394100_b55-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/25148694","article-title":"A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems","volume":"29","author":"Jasperson","year":"2005","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212214394100_b56-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"127","DOI":"10.2307\/25148831","article-title":"Giddens\u2019s Structuration Theory and Information Systems Research","volume":"32","author":"Jones","year":"2008","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212214394100_b57-01_14607_ra_carterpetter","first-page":"121","article-title":"Individual Psychological Ownership: Concepts, Evidence, and Implications for Research in Marketing","volume":"23","author":"Jussila","year":"2015","journal-title":"Journal of Marketing Theory and Practice"},{"issue":"2","key":"2025082212214394100_b58-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/249751","article-title":"Information Technology Adoption across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs","volume":"23","author":"Karahanna","year":"1999","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212214394100_b59-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.1287\/isre.1110.0411","article-title":"What Motivates People to Purchase Digital Items on Virtual Community Websites? The Desire for Online Self-Presentation","volume":"23","author":"Kim","year":"2012","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212214394100_b60-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.chb.2009.04.011","article-title":"An Empirical Study of the Factors Affecting Social Network Service Use","volume":"26","author":"Kwon","year":"2010","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"2025082212214394100_b61-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01972240590895883","article-title":"Information and Communication Technology Challenges to Scientific Professional Identity","volume":"21","author":"Lamb","year":"2005","journal-title":"Information Society"},{"issue":"2","key":"2025082212214394100_b62-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"197","DOI":"10.2307\/30036529","article-title":"Reconceptualizing Users as Social Actors in Information Systems Research","volume":"27","author":"Lamb","year":"2003","journal-title":"MIS Quarterly"},{"key":"2025082212214394100_b63-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199256044.001.0001","volume-title":"Reassembling the Social: An Introduction to Actor\u2013Network Theory","author":"Latour","year":"2005"},{"issue":"2-3","key":"2025082212214394100_b64-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1161345.1161355","article-title":"Social Influence on Technology Acceptance Behavior: Self-Identity Theory Perspective","volume":"37","author":"Lee","year":"2006","journal-title":"The DATA BASE for Advances in Information Systems"},{"issue":"4","key":"2025082212214394100_b65-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.ijinfomgt.2009.03.004","article-title":"Information Technology Adoption Behavior Life Cycle: Toward a Technology Continuance Theory (TCT)","volume":"29","author":"Liao","year":"2009","journal-title":"International Journal of Information Management"},{"issue":"4","key":"2025082212214394100_b66-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"705","DOI":"10.2307\/25148817","article-title":"How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance","volume":"31","author":"Limayem","year":"2007","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212214394100_b67-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","article-title":"Accounting for Common Method Variance in Cross-Sectional Research Designs","volume":"86","author":"Lindell","year":"2001","journal-title":"Journal of Applied Psychology"},{"key":"2025082212214394100_b68-01_14607_ra_carterpetter","article-title":"Understanding the Influence of Social Identity on Social Support Seeking Behaviors in Virtual Healthcare Community","author":"Liu","year":"2010"},{"issue":"2","key":"2025082212214394100_b69-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1111\/j.1540-5915.1999.tb01611.x","article-title":"Technology Use and Performance: A Field Study of Broker Workstations","volume":"30","author":"Lucas","year":"1999","journal-title":"Decision Sciences"},{"issue":"2","key":"2025082212214394100_b70-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/23044045","article-title":"Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques","volume":"35","author":"MacKenzie","year":"2011","journal-title":"MIS Quarterly"},{"issue":"12","key":"2025082212214394100_b71-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1287\/mnsc.1060.0597","article-title":"Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research","volume":"52","author":"Malhotra","year":"2006","journal-title":"Management Science"},{"key":"2025082212214394100_b72-01_14607_ra_carterpetter","volume-title":"The Coming Productivity Boom: Transforming the Physical Economy with Information","author":"Mandel","year":"2017"},{"issue":"3","key":"2025082212214394100_b73-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1002\/asi.23699","article-title":"Going Beyond Intention: Integrating Behavioral Expectation into the Unified Theory of Acceptance and Use of Technology","volume":"68","author":"Maruping","year":"2017","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"2025082212214394100_b74-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1","DOI":"10.25300\/MISQ\/2015\/39.1.01","article-title":"Motivating Employees to Explore Collaboration Technology in Team Contexts","volume":"39","author":"Maruping","year":"2015","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212214394100_b75-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/249630","article-title":"Information Technology and Sustained Competitive Advantage: A Resource-Based Analysis","volume":"19","author":"Mata","year":"1995","journal-title":"MIS Quarterly"},{"key":"2025082212214394100_b76-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-1-4419-9188-1_2","article-title":"The Me and the Not-Me: Positive and Negative Poles of Identity","volume-title":"Advances in Identity Theory and Research","author":"McCall","year":"2003"},{"key":"2025082212214394100_b77-01_14607_ra_carterpetter","volume-title":"Identities and Interactions","author":"McCall","year":"1978"},{"key":"2025082212214394100_b78-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.1037\/10790-000","volume-title":"Personality","author":"McClelland","year":"1951"},{"key":"2025082212214394100_b79-01_14607_ra_carterpetter","volume-title":"Mind, Self, and Society","author":"Mead","year":"1934"},{"issue":"3","key":"2025082212214394100_b80-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1287\/isre.1110.0407","article-title":"Electronic Health Records Assimilation and Physician Identity Evolution: An Identity Theory Perspective","volume":"23","author":"Mishra","year":"2012","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212214394100_b81-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation","volume":"2","author":"Moore","year":"1991","journal-title":"Information Systems Research"},{"issue":"1","key":"2025082212214394100_b82-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1086\/513048","article-title":"Explaining Cognitive LockIn: The Role of Skill-Based Habits of Use in Consumer Choice","volume":"34","author":"Murray","year":"2007","journal-title":"Journal of Consumer Research"},{"issue":"3","key":"2025082212214394100_b83-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"365","DOI":"10.2307\/249468","article-title":"Organizational Mechanisms for Enhancing User Innovation in Information Technology","volume":"23","author":"Nambisan","year":"1999","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212214394100_b84-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"157","DOI":"10.25300\/MISQ\/2016\/40.1.07","article-title":"A Temporally Situated Self-Agency Theory of Information Technology Reinvention","volume":"40","author":"Nevo","year":"2016","journal-title":"MIS Quarterly"},{"key":"2025082212214394100_b85-01_14607_ra_carterpetter","volume-title":"Psychometric Theory","author":"Nunnally","year":"1994","edition":"3rd"},{"issue":"2","key":"2025082212214394100_b86-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"146","DOI":"10.2307\/2786932","article-title":"Identity Salience and Motherhood: A Test of Stryker\u2019s Theory","volume":"54","author":"Nuttbrock","year":"1991","journal-title":"Social Psychology Quarterly"},{"issue":"3","key":"2025082212214394100_b87-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"433","DOI":"10.2307\/20650303","article-title":"Why Break the Habit of a Lifetime? Rethinking the Roles of Intention, Habit, and Emotion in Continuing Information Technology Use","volume":"33","author":"Ortiz De Guinea","year":"2009","journal-title":"MIS Quarterly"},{"key":"2025082212214394100_b88-01_14607_ra_carterpetter","first-page":"205","article-title":"Self and Identity","volume-title":"Handbook of Social Psychology","author":"Owens","year":"2003"},{"key":"2025082212214394100_b89-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.jretconser.2017.04.006","article-title":"Streaming Apps: What Consumers Value","volume":"41","author":"Oyedele","year":"2017","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"1","key":"2025082212214394100_b90-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1080\/07421222.2017.1296747","article-title":"Who Do You Think You Are? Common and Differential Effects of Social Self-Identity on Social Media Usage","volume":"34","author":"Pan","year":"2017","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"2025082212214394100_b91-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"298","DOI":"10.2307\/259124","article-title":"Toward a Theory of Psychological Ownership in Organizations","volume":"26","author":"Pierce","year":"2001","journal-title":"Academy of Management Review"},{"issue":"1","key":"2025082212214394100_b92-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1037\/1089-2680.7.1.84","article-title":"The State of Psychological Ownership: Integrating and Extending a Century of Research","volume":"7","author":"Pierce","year":"2003","journal-title":"Review of General Psychology"},{"issue":"4","key":"2025082212214394100_b93-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1002\/job.2153","article-title":"Boundary Control and Controlled Boundaries: Organizational Expectations for Technology Use at the Work\u2013Family Interface","volume":"38","author":"Piszczek","year":"2017","journal-title":"Journal of Organizational Behavior"},{"key":"2025082212214394100_b94-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.3389\/fpsyg.2016.02009","article-title":"The Information and Communication Technology User Role: Implications for the Work Role and Inter-Role Spillover","volume":"7","author":"Piszczek","year":"2016","journal-title":"Frontiers in Psychology"},{"issue":"5","key":"2025082212214394100_b95-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies","volume":"88","author":"Podsakoff","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"2025082212214394100_b96-01_14607_ra_carterpetter","article-title":"How Information Gives You Competitive Advantage","author":"Porter","year":"1985","journal-title":"Harvard Business Review"},{"issue":"1","key":"2025082212214394100_b97-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1080\/00223980.1959.9916303","article-title":"Extension and Structure of the Self","volume":"47","author":"Prelinger","year":"1959","journal-title":"The Journal of Psychology"},{"issue":"1","key":"2025082212214394100_b98-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S0272-4944(83)80021-8","article-title":"Place-Identity: Physical World Socialization of the Self","volume":"3","author":"Proshansky","year":"1983","journal-title":"Journal of Environmental Psychology"},{"issue":"1","key":"2025082212214394100_b99-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1016\/j.chb.2010.10.005","article-title":"Predicting Secondary School Teachers\u2019 Accepance and Use of a Digital Learning Environment: A Cross-Sectional Study","volume":"27","author":"Pynoo","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"2025082212214394100_b100-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1287\/isre.13.1.50.96","article-title":"Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis","volume":"13","author":"Rai","year":"2002","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212214394100_b101-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"841","DOI":"10.2307\/41703483","article-title":"Building Member Attachment in Online Communities: Applying Theories of Group Identity and Interpersonal Bonds","volume":"36","author":"Ren","year":"2012","journal-title":"MIS Quarterly"},{"key":"2025082212214394100_b102-01_14607_ra_carterpetter","unstructured":"Ringle, C. M., Wende, S., and Becker, J.-M.\u20082015. Smart PLS 3, SmartPLS GmbH, B\u00f6enningstedt (https:\/\/www.smartpls.com\/)."},{"issue":"1","key":"2025082212214394100_b103-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1287\/isre.2016.0666","article-title":"Extending the Concept of Control Beliefs: Integrating the Role of Advice Networks","volume":"28","author":"Robert","year":"2017","journal-title":"Information Systems Research"},{"key":"2025082212214394100_b104-01_14607_ra_carterpetter","first-page":"67","article-title":"The Nature and Determinants of IT Acceptance, Routinization and Infusion","volume-title":"Diffusion, Transfer, and Implementation of Information Technology","author":"Saga","year":"1994"},{"issue":"3","key":"2025082212214394100_b105-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"663","DOI":"10.25300\/MISQ\/2016\/40.3.07","article-title":"Capturing the Complexity of Malleable IT Use: Adaptive Structuration Theory for Individuals","volume":"40","author":"Schmitz","year":"2016","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212214394100_b106-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1177\/1059601104267622","article-title":"The Influence of Perceptions of Social Identity on Information Technology-Enabled Change","volume":"30","author":"Schwarz","year":"2005","journal-title":"Group & Organization Management"},{"issue":"2","key":"2025082212214394100_b107-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.1145\/2827857","article-title":"Self-Conscious or Self-Confident? A Diary Study Conceptualizing the Social Accessibility of Assistive Technology","volume":"8","author":"Shinohara","year":"2016","journal-title":"ACM Transactions on Accessible Computing"},{"key":"2025082212214394100_b108-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"290","DOI":"10.2307\/270723","article-title":"Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models","volume":"13","author":"Sobel","year":"1982","journal-title":"Sociological Methodology"},{"issue":"1","key":"2025082212214394100_b109-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1287\/isre.2014.0539","article-title":"Research Note\u2014Perceived Firm Attributes and Intrinsic Motivation in Sponsored Open Source Software Projects","volume":"26","author":"Spaeth","year":"2014","journal-title":"Information Systems Research"},{"issue":"15","key":"2025082212214394100_b110-01_14607_ra_carterpetter","first-page":"1393","article-title":"Self-Identity and the Theory of Planned Behavior: A Useful Addition or an Unhelpful Artifice?","volume":"28","author":"Sparks","year":"1998","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"2025082212214394100_b111-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/S0195-6663(95)99787-3","article-title":"Perceived Behavioral Control, Unrealistic Optimism, and Dietary Change: An Exploratory Study","volume":"24","author":"Sparks","year":"1995","journal-title":"Appetite"},{"issue":"2","key":"2025082212214394100_b112-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1080\/01449290512331321910","article-title":"Mobile Phones and the Evolution of Social Behaviour","volume":"24","author":"Srivastava","year":"2005","journal-title":"Behaviour & Information Technology"},{"issue":"3","key":"2025082212214394100_b113-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1057\/jit.2012.32","article-title":"Towards an Understanding of Identity and Technology in the Workplace","volume":"28","author":"Stein","year":"2013","journal-title":"Journal of Information Technology"},{"key":"2025082212214394100_b114-01_14607_ra_carterpetter","unstructured":"Stephan, A., Kamen, M., and Bannister, C.\u20082017. \u201cTech Fluency: A Foundation of Future Careers,\u201d Deloitte Review, Issue 21 (https:\/\/www2.deloitte.com\/insights\/us\/en\/deloitte-review\/issue-21\/tech-fluency-mastering-the-language-of-technology.html)."},{"issue":"4","key":"2025082212214394100_b115-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1046\/j.1467-9558.2003.00196.x","article-title":"Bringing Identity Theory into Environmental Sociology","volume":"21","author":"Stets","year":"2003","journal-title":"Sociological Theory"},{"issue":"2","key":"2025082212214394100_b116-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1177\/019027250506800204","article-title":"Identity Theory and Social Identity Theory","volume":"63","author":"Stets","year":"2000","journal-title":"Social Psychology Quarterly"},{"key":"2025082212214394100_b117-01_14607_ra_carterpetter","first-page":"128","article-title":"A Sociological Approach to Self and Identity","volume-title":"Handbook of Self and Identity","author":"Stets","year":"2005"},{"key":"2025082212214394100_b118-01_14607_ra_carterpetter","unstructured":"StreetInsider.com\n            \n          . 2019. \u201cGartner, Inc. (IT): Global Information Technology Spending to Increase 3.2% in 2019, Reach $3.76T\u201d (https:\/\/www.streetinsider.com\/Corporate+News\/Gartner%20Inc.%20(IT)%20Global+Information+Technology+Spending+to+Increase+3.2%25+in+2019%2C+Reaching+%243.76T\/15045317.html)."},{"key":"2025082212214394100_b119-01_14607_ra_carterpetter","volume-title":"Symbolic Interactionism: A Social Structural Version","author":"Stryker","year":"1980"},{"issue":"4","key":"2025082212214394100_b120-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"284","DOI":"10.2307\/2695840","article-title":"The Past, Present, and Future of an Identity Theory","volume":"63","author":"Stryker","year":"2000","journal-title":"Social Psychology Quarterly"},{"issue":"1","key":"2025082212214394100_b121-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"16","DOI":"10.2307\/2786972","article-title":"Commitment, Identity Salience, and Psychological Centrality: Equivalent, Overlapping, or Complementary Concepts","volume":"57","author":"Stryker","year":"1994","journal-title":"Social Psychology Quarterly"},{"key":"2025082212214394100_b122-01_14607_ra_carterpetter","first-page":"367","article-title":"Self-Verification: The Search for Coherence","volume-title":"Handbook of Self and Identity","author":"Swann","year":"2003"},{"key":"2025082212214394100_b123-01_14607_ra_carterpetter","volume-title":"Using Multivariate Statistics","author":"Tabachnick","year":"2007","edition":"5th"},{"key":"2025082212214394100_b124-01_14607_ra_carterpetter","article-title":"The Social Identity Theory of Intergroup Behaviour","volume-title":"Social Identity and Intergroup Relations","author":"Tajfal","year":"1986"},{"issue":"3","key":"2025082212214394100_b125-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1348\/014466699164149","article-title":"The Theory of Planned Behaviour: Self-Identity, Social Identity and Group Norms","volume":"38","author":"Terry","year":"1999","journal-title":"British Journal of Social Psychology"},{"key":"2025082212214394100_b126-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.24251\/HICSS.2017.096","article-title":"Virtual) Identity Communication: Motivations and Contextual Factors","author":"Thatcher","year":"2017"},{"issue":"1","key":"2025082212214394100_b127-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1123\/tsp.8.2.149","article-title":"Planned Behavior, Attitude Strength, Role Identity, and the Prediction of Exercise Behavior","volume":"8","author":"Theodorakis","year":"1994","journal-title":"The Sport Psychologist"},{"key":"2025082212214394100_b128-01_14607_ra_carterpetter","doi-asserted-by":"crossref","DOI":"10.1037\/10976-000","volume-title":"The Fundamentals of Learning","author":"Thorndike","year":"1932"},{"issue":"2","key":"2025082212214394100_b129-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1108\/09593840210430552","article-title":"Odd Girl Out: An Individual Differences Perspective on Women in the IT Profession","volume":"15","author":"Trauth","year":"2002","journal-title":"Information Technology & People"},{"key":"2025082212214394100_b130-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.4018\/978-1-59140-815-4.ch182","article-title":"Theorizing Gender and Information Technology Research","volume-title":"Encyclopedia of Gender and Information Technology","author":"Trauth","year":"2006"},{"issue":"5","key":"2025082212214394100_b131-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1057\/ejis.2009.31","article-title":"Retaining Women in the US IT Workforce: Theorizing the Influence of Organizational Factors","volume":"18","author":"Trauth","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"2025082212214394100_b132-01_14607_ra_carterpetter","volume-title":"Attitude and Attitude Change","author":"Triandis","year":"1971"},{"key":"2025082212214394100_b133-01_14607_ra_carterpetter","first-page":"195","article-title":"Values, Attitudes, and Interpersonal Behavior","volume-title":"Nebraska Symposium on Motivation: Beliefs, Attitudes, and Values","author":"Triandis","year":"1979"},{"issue":"5","key":"2025082212214394100_b134-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1111\/isj.12047","article-title":"The Deep Structure of Organizational Online Networking\u2013An Actor Oriented Case Study","volume":"25","author":"Trier","year":"2015","journal-title":"Information Systems Journal"},{"issue":"1","key":"2025082212214394100_b135-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"143","DOI":"10.25300\/MISQ\/2014\/38.1.07","article-title":"Contribution Behavior in Virtual Communities: Cogntiive, Emotional, and Social Influences","volume":"38","author":"Tsai","year":"2014","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025082212214394100_b136-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1016\/j.chb.2011.01.012","article-title":"The Lies We Tell and What They Say About Us: Using Behavioural Characteristics to Explain Facebook Activity","volume":"27","author":"Underwood","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025082212214394100_b137-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.infoandorg.2015.02.001","article-title":"Speaking as One, but Not Speaking Up: Dealing with New Moral Taint in an Occupational Online Community","volume":"25","author":"Vaast","year":"2015","journal-title":"Information and Organization"},{"issue":"6","key":"2025082212214394100_b138-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1057\/palgrave.ejis.3000715","article-title":"An Epidemic of Pain in an Australian Radiology Practice","volume":"16","author":"Van Akkeren","year":"2007","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"2025082212214394100_b139-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1177\/0163443712468605","article-title":"You Have One Identity\u2019: Performing the Self on Facebook and LinkedIn","volume":"35","author":"Van Dijck","year":"2013","journal-title":"Media, Culture & Society"},{"issue":"3","key":"2025082212214394100_b140-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"483","DOI":"10.2307\/25148853","article-title":"Predicting Different Conceptualizations of System Use: The Competing Roles of Behavioral Intention, Facilitating Conditions, and Behavioral Expectation","volume":"32","author":"Venkatesh","year":"2008","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212214394100_b141-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"281","DOI":"10.2307\/20721428","article-title":"Expectation Disconfirmation and Technology Adoption: Polynomial Modeling and Response Surface Analysis","volume":"34","author":"Venkatesh","year":"2010","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212214394100_b142-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User Acceptance of Information Technology: Toward a Unified View","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"6","key":"2025082212214394100_b143-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1111\/j.1365-2575.2011.00373.x","article-title":"Extending the Two Stage Information Systems Continuance Model: Incorporating UTAUT Predictors and the Role of Context","volume":"21","author":"Venkatesh","year":"2011","journal-title":"Information Systems Journal"},{"issue":"1","key":"2025082212214394100_b144-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology","volume":"36","author":"Venkatesh","year":"2012","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025082212214394100_b145-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"328","DOI":"10.17705\/1jais.00428","article-title":"Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead","volume":"17","author":"Venkatesh","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"key":"2025082212214394100_b146-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4419-7988-9_1","article-title":"Introduction: Toward an Integrative View of Identity","volume-title":"Handbook of Identity Theory and Research: Vol. 1\u2014Structures and Processes","author":"Vignoles","year":"2011"},{"key":"2025082212214394100_b147-01_14607_ra_carterpetter","article-title":"Investigating the Cultural Dimension of IT-Usage: IT-Acculturation, an Essential Construct in IS Research","author":"Walsh","year":"2010"},{"issue":"2","key":"2025082212214394100_b148-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.jsis.2013.06.001","article-title":"A Strategic Path to Study IT Use through Users\u2019 IT Culture and IT Needs: A Mixed-Method Grounded Theory","volume":"23","author":"Walsh","year":"2014","journal-title":"Journal of Strategic Information Systems"},{"issue":"4","key":"2025082212214394100_b149-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.jsis.2010.09.002","article-title":"Managing Culture Creep: Toward a Strategic Model of User IT Culture","volume":"19","author":"Walsh","year":"2010","journal-title":"Journal of Strategic Information Systems"},{"issue":"1","key":"2025082212214394100_b150-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1057\/ejis.2013.34","article-title":"Who Do You Think You Are? A Review of the Complex Interplay between Information Systems, Identification and Identity","volume":"23","author":"Whitley","year":"2014","journal-title":"European Journal of Information Systems"},{"key":"2025082212214394100_b151-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.chb.2013.10.008","article-title":"New Media and the Changing Face of Information Technology Use: The Importance of Task Pursuit, Social Influence, and Experience","volume":"31","author":"Workman","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"2025082212214394100_b152-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"377","DOI":"10.17705\/1jais.00496","article-title":"Emotional Attachment, Performance, and Viability in Teams Collaborating with Embodied Physical Action (EPA) Robots","volume":"19","author":"You","year":"2018","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"2025082212214394100_b153-01_14607_ra_carterpetter","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1086\/651257","article-title":"Reconsidering Baron and Kenny: Myths and Truths About Mediation Analysis","volume":"37","author":"Zhao","year":"2010","journal-title":"Journal of Consumer Research"}],"container-title":["MIS Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/44\/3\/983\/6577\/01_14607_ra_carterpetter.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/44\/3\/983\/6577\/01_14607_ra_carterpetter.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:22:58Z","timestamp":1755879778000},"score":1,"resource":{"primary":{"URL":"https:\/\/misq.umn.edu\/misq\/article\/44\/3\/983\/1817\/Information-Technology-Identity-A-Key-Determinant"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":153,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,9,1]]},"published-print":{"date-parts":[[2020,9,1]]}},"URL":"https:\/\/doi.org\/10.25300\/misq\/2020\/14607","relation":{},"ISSN":["0276-7783","2162-9730"],"issn-type":[{"value":"0276-7783","type":"print"},{"value":"2162-9730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,1]]}}}