{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:02:51Z","timestamp":1775692971203,"version":"3.50.1"},"reference-count":100,"publisher":"MIS Quarterly","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,1]]},"abstract":"<jats:p>In this paper, we confront a paradox in the IS literature that even though our field focuses on the rapid pace of technological change and the dramatic scale of technology-enabled organizational and societal changes, we sometimes find ourselves studying these changes using\u2014largely without question\u2014constructs that were developed in a vastly different IT, user, and organizational environment. We provide guidelines to help assess whether an existing construct warrants updating and to structure the updating task if it is undertaken. Our three-step process provides for a theoretically grounded and comprehensive method that ensures we balance the need for construct updating against the need to sustain our cumulative tradition. We illustrate our guidelines using computer self-efficacy (CSE) as a case study. We document each of the steps involved in analyzing, reconceptualizing, and testing the revised construct information technology self-efficacy (ITSE). Our analyses show that the new construct better explains both traditional and contemporary constructs with a traditional (postal survey) and contemporary (online panel) sample. We discuss the implications of our work both for research on self-efficacy and more broadly for future updating of other important constructs.<\/jats:p>","DOI":"10.25300\/misq\/2022\/15516","type":"journal-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T15:07:26Z","timestamp":1666019246000},"page":"679-711","source":"Crossref","is-referenced-by-count":27,"title":["When Constructs Become Obsolete: A Systematic Approach to Evaluating and Updating Constructs for Information Systems Research"],"prefix":"10.25300","volume":"46","author":[{"given":"Deborah","family":"Compeau","sequence":"first","affiliation":[{"name":"Carson College of Business, Todd Hall, Room 570B, PO Box 644750, Washington State University, Pullman, WA 99164-2315 U.S.A."}]},{"given":"John","family":"Correia","sequence":"additional","affiliation":[{"name":"School of Business Adminstration, Gonzaga University, 502 East Boon Avenue, Spokane, WA 99258-0102 U.S.A."}]},{"given":"Jason Bennett","family":"Thatcher","sequence":"additional","affiliation":[{"name":"Fox School of Business and Management, Temple University, Speakman 210, 1810 N. 13th Street, Philadelphia, PA 18122 U.S.A."}]}],"member":"10933","published-online":{"date-parts":[[2022,6,1]]},"reference":[{"issue":"2","key":"2025082212280271100_b1-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1287\/isre.9.2.204","article-title":"A conceptual and operational definition of personal innovativeness in the domain of information technology","volume":"9","author":"Agarwal","year":"1998","journal-title":"Information Systems Research"},{"issue":"4","key":"2025082212280271100_b2-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1287\/isre.11.4.418.11876","article-title":"Research report: The evolving relationship between general and specific computer self\u2013efficacy? An empirical assessment","volume":"11","author":"Agarwal","year":"2000","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212280271100_b3-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"427","DOI":"10.2307\/25148691","article-title":"Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post\u2013adoption information technology use","volume":"29","author":"Ahuja","year":"2005","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212280271100_b4-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"2","key":"2025082212280271100_b5-01_15516_ma_compeaucorreia","first-page":"247","article-title":"Generating research questions through problematization","volume":"36","author":"Alvesson","year":"2011","journal-title":"Academy of Management Review"},{"issue":"4","key":"2025082212280271100_b6-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"831","DOI":"10.2307\/41409963","article-title":"Technostress: technological antecedents and implications","volume":"35","author":"Ayyagari","year":"2011","journal-title":"MIS Quarterly"},{"key":"2025082212280271100_b7-01_15516_ma_compeaucorreia","first-page":"11","article-title":"A prospectus for theory construction in marketing","volume-title":"Journal of Marketing","author":"Bagozzi","year":"1984"},{"issue":"2","key":"2025082212280271100_b8-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"261","DOI":"10.2307\/23044044","article-title":"Measurement and meaning in information systems and organizational research","volume":"35","author":"Bagozzi","year":"2011","journal-title":"MIS Quarterly"},{"key":"2025082212280271100_b9-01_15516_ma_compeaucorreia","volume-title":"Self-efficacy: The exercise of control","author":"Bandura","year":"1997"},{"issue":"3","key":"2025082212280271100_b10-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1111\/1467-8721.00064","article-title":"Exercise of human agency through collective efficacy","volume":"9","author":"Bandura","year":"2000","journal-title":"Current Directions in Psychological Science"},{"key":"2025082212280271100_b11-01_15516_ma_compeaucorreia","first-page":"307","article-title":"Guide for constructing self\u2013efficacy scales","volume-title":"Self-efficacy beliefs of adolescents","author":"Bandura","year":"2006"},{"issue":"3","key":"2025082212280271100_b12-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1177\/1056492606291201","article-title":"The interdisciplinary career of a popular construct used in management: Empowerment in the late 20th century","volume":"15","author":"Bartunek","year":"2006","journal-title":"Journal of Management Inquiry"},{"issue":"4","key":"2025082212280271100_b13-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"689","DOI":"10.2307\/25750701","article-title":"The other side of acceptance: Studying the direct and indirect effects of emotions on information technology use","volume":"34","author":"Beaudry","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212280271100_b14-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/30036527","article-title":"The identity crisis within the is discipline: Defining and communicating the discipline\u2019s core properties","volume":"27","author":"Benbasat","year":"2003","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212280271100_b15-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/3250956","article-title":"Validation in Information Systems Research: A State\u2013of\u2013the\u2013art Assessment","volume":"25","author":"Boudreau","year":"2001","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212280271100_b16-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"9","DOI":"10.2753\/MIS0742-1222270201","article-title":"Predicting collaboration technology use: Integrating technology adoption and collaboration research","volume":"27","author":"Brown","year":"2010","journal-title":"Journal of Management Information Systems"},{"key":"2025082212280271100_b17-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195388275.001.0001","volume-title":"Identity theory","author":"Burke","year":"2009"},{"issue":"2","key":"2025082212280271100_b18-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.hrmr.2006.03.006","article-title":"The changing nature of work and organizations: Implications for human resource management","volume":"16","author":"Burke","year":"2006","journal-title":"Human Resource Management Review"},{"issue":"3","key":"2025082212280271100_b19-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1287\/isre.2017.0704","article-title":"Thinking about measures and measurement in positivist research: A proposal for refocusing on fundamentals","volume":"28","author":"Burton-Jones","year":"2017","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212280271100_b20-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"809","DOI":"10.25300\/MISQ\/2020\/14818","article-title":"The bright and dark sides of technostress: a mixed\u2013methods study involving healthcare IT","volume":"44","author":"Califf","year":"2020","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212280271100_b21-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"931","DOI":"10.25300\/MISQ\/2015\/39.4.9","article-title":"Me, my self, and I(T): Conceptualizing information technology identity and its implications","volume":"39","author":"Carter","year":"2015","journal-title":"MIS Quarterly"},{"key":"2025082212280271100_b22-01_15516_ma_compeaucorreia","article-title":"Identifying with IT in a digital world","author":"Carter"},{"issue":"5","key":"2025082212280271100_b23-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1313","DOI":"10.17705\/1jais.00638","article-title":"IT identity: A Measure and Empirical Investigation of its Utility to IS research","volume":"21","author":"Carter","year":"2020","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"2025082212280271100_b24-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"233","DOI":"10.2307\/20721426","article-title":"Information systems strategy: Reconceptualization, measurement, and implications","volume":"34","author":"Chen","year":"2010","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212280271100_b25-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.infoandorg.2004.02.001","article-title":"Pushing the contextual envelope: Developing and diffusing IS theory for health information systems research","volume":"14","author":"Chiasson","year":"2004","journal-title":"Information and Organization"},{"key":"2025082212280271100_b26-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","unstructured":"Chin, W. W.\n           (2010). How to write up and report PLS analyses. In V. Esposito\u2008Vinzi, W.\u2008Chin, J.\u2008Henseler, & H.\u2008Wang (Eds.), Handbook of partial least squares (pp. 655\u2013690). Springer.","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"2025082212280271100_b27-01_15516_ma_compeaucorreia","unstructured":"Compeau, D.\n           (1992). Individual reactions to computing technology: A social cognitive theory perspective. Unpublished Ph.D. dissertation, The University of Western Ontario."},{"issue":"2","key":"2025082212280271100_b28-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1287\/isre.6.2.118","article-title":"Application of social cognitive theory to training for computer skills","volume":"6","author":"Compeau","year":"1995","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212280271100_b29-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"189","DOI":"10.2307\/249688","article-title":"Computer self-efficacy: Development of a measure and initial test","volume":"19","author":"Compeau","year":"1995","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212280271100_b30-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"145","DOI":"10.2307\/249749","article-title":"Social cognitive theory and individual reactions to computing technology: A longitudinal study","volume":"23","author":"Compeau","year":"1999","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212280271100_b31-01_15516_ma_compeaucorreia","article-title":"A replication manifesto","volume":"1","author":"Dennis","year":"2014","journal-title":"AIS Transactions on Replication Research"},{"key":"2025082212280271100_b32-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","DOI":"10.1002\/9781394260645","volume-title":"Internet, phone, mail, and mixed\u2013mode surveys: The tailored design method","author":"Dillman","year":"2014"},{"issue":"4","key":"2025082212280271100_b33-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1080\/07421222.2003.11045747","article-title":"Relating collaborative technology use to teamwork quality and performance: An empirical analysis","volume":"19","author":"Easley","year":"2003","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"2025082212280271100_b34-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1111\/j.1083-6101.2000.tb00110.x","article-title":"Internet self-efficacy and the psychology of the digital divide","volume":"6","author":"Eastin","year":"2006","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"2025082212280271100_b35-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1177\/1094428110378369","article-title":"The fallacy of formative measurement","volume":"14","author":"Edwards","year":"2011","journal-title":"Organizational Research Methods"},{"key":"2025082212280271100_b36-01_15516_ma_compeaucorreia","volume-title":"Belief, attitude, intention and behavior: An introduction to theory and research","author":"Fishbein","year":"1975"},{"issue":"2","key":"2025082212280271100_b37-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/23044042","article-title":"An update and extension to SEM guidelines for administrative and social science research","volume":"35","author":"Gefen","year":"2011","journal-title":"MIS Quarterly"},{"issue":"6","key":"2025082212280271100_b38-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1037\/0021-9010.74.6.884","article-title":"Effects of alternative training methods on self-efficacy and performance in computer software training","volume":"74","author":"Gist","year":"1989","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"2025082212280271100_b39-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"213","DOI":"10.2307\/249689","article-title":"Task\u2013technology fit and individual performance","volume":"19","author":"Goodhue","year":"1995","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212280271100_b40-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"404","DOI":"10.17705\/1CAIS.04323","article-title":"Information systems research themes: A seventeen-year data-driven temporal analysis","volume":"43","author":"Goyal","year":"2018","journal-title":"Communications of the Association for Information Systems"},{"issue":"4","key":"2025082212280271100_b41-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1177\/1094428109356114","article-title":"Pursuing failure","volume":"13","author":"Gray","year":"2010","journal-title":"Organizational Research Methods"},{"issue":"5","key":"2025082212280271100_b42-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"270","DOI":"10.17705\/1jais.00089","article-title":"A citation analysis of the evolution and state of IS","volume":"7","author":"Grover","year":"2006","journal-title":"Journal of the Association for Information Systems"},{"key":"2025082212280271100_b43-01_15516_ma_compeaucorreia","author":"Hair","year":"2016","journal-title":"A primer on partial least squares structural equation modeling (PLS\u2013SEM)"},{"issue":"9","key":"2025082212280271100_b44-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"519","DOI":"10.17705\/1jais.00170","article-title":"Formative versus reflective measurement: Comment on Marakas, Johnson, & Clay","volume":"9","author":"Hardin","year":"2008","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"2025082212280271100_b45-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/0747-5632(87)90010-0","article-title":"Assessing computer anxiety: Development and validation of the computer anxiety rating scale","volume":"3","author":"Heinssen","year":"1987","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"2025082212280271100_b46-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1037\/a0015315","article-title":"Effects of organizational and professional identification on the relationship between administrators\u2019 social influence and professional employees\u2019 adoption of new work behavior","volume":"94","author":"Hekman","year":"2009","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"2025082212280271100_b47-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","article-title":"A new criterion for assessing discriminant validity in variance-based structural equation modeling","volume":"43","author":"Henseler","year":"2014","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"1","key":"2025082212280271100_b48-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1","DOI":"10.25300\/MISQ\/2017\/41.1.01","article-title":"How is your user feeling? Inferring emotion through human\u2013computer interaction devices","volume":"41","author":"Hibbeln","year":"2017","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212280271100_b49-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"188","DOI":"10.17705\/1jais.00294","article-title":"A glorious and not-so-short history of the information systems field","volume":"13","author":"Hirschheim","year":"2012","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"2025082212280271100_b50-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1287\/isre.2013.0501","article-title":"A framework and guidelines for contextspecific theorizing in information systems research","volume":"25","author":"Hong","year":"2014","journal-title":"Information Systems Research"},{"issue":"1","key":"2025082212280271100_b51-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"275","DOI":"10.25300\/MISQ\/2013\/37.1.12","article-title":"Internet privacy concerns: An integrated conceptualization and four empirical studies","volume":"37","author":"Hong","year":"2013","journal-title":"MIS Quarterly"},{"issue":"10","key":"2025082212280271100_b52-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1089\/cyber.2014.0255","article-title":"Creation of a computer self-efficacy measure: Analysis of internal consistency, psychometric properties, and validity","volume":"17","author":"Howard","year":"2014","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"10","key":"2025082212280271100_b53-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1145\/358413.358430","article-title":"The measurement of user information satisfaction","volume":"26","author":"Ives","year":"1983","journal-title":"Communications of the ACM"},{"issue":"3","key":"2025082212280271100_b54-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/25148694","article-title":"A comprehensive conceptualization of post-adoptive behaviors associated with information technology enabled work systems","volume":"29","author":"Jasperson","year":"2005","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212280271100_b55-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1287\/isre.11.4.402.11869","article-title":"The role of behavioral modeling in computer skills acquisition: Toward refinement of the model","volume":"11","author":"Johnson","year":"2000","journal-title":"Information Systems Research"},{"issue":"4","key":"2025082212280271100_b56-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1111\/j.1559-1816.2008.00336.x","article-title":"Relations among ethnicity, gender, beliefs, attitudes, and intention to pursue a career in information technology","volume":"38","author":"Johnson","year":"2008","journal-title":"Journal of Applied Social Psychology"},{"key":"2025082212280271100_b57-01_15516_ma_compeaucorreia","first-page":"13982","article-title":"A meta-analytic review of computer self-efficacy and agenda for future research","volume-title":"Academy of management proceedings","author":"Johnson","year":"2017"},{"issue":"3","key":"2025082212280271100_b58-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"737","DOI":"10.25300\/MISQ\/2018\/11492","article-title":"The needs\u2013affordances\u2013features perspective for the use of social media","volume":"42","author":"Karahanna","year":"2018","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212280271100_b59-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"54","DOI":"10.4018\/joeuc.2012100104","article-title":"Computer self-efficacy: A meta-analysis","volume":"24","author":"Karsten","year":"2012","journal-title":"Journal of Organizational and End User Computing"},{"key":"2025082212280271100_b60-01_15516_ma_compeaucorreia","first-page":"9","article-title":"MIS research: Reference disciplines and acCumulative tradition","author":"Keen"},{"issue":"2","key":"2025082212280271100_b61-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"299","DOI":"10.2307\/3250940","article-title":"A cross-cultural study on escalation of commitment behavior in software projects","volume":"24","author":"Keil","year":"2000","journal-title":"MIS Quarterly"},{"issue":"5-6","key":"2025082212280271100_b62-01_15516_ma_compeaucorreia","first-page":"737","article-title":"Perceived service quality and user satisfaction with the information services function","volume":"25","author":"Kettinger","year":"1994","journal-title":"Decision Sciences"},{"issue":"1","key":"2025082212280271100_b63-01_15516_ma_compeaucorreia","first-page":"130","article-title":"Reconceptualizing workplace commitment to redress a stretched construct: Revisiting assumptions and removing confounds","volume":"37","author":"Klein","year":"2012","journal-title":"Academy of Management Review"},{"issue":"6","key":"2025082212280271100_b64-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1057\/palgrave.ejis.3000719","article-title":"An empirical examination of patient\u2013physician portal acceptance","volume":"16","author":"Klein","year":"2007","journal-title":"European Journal of Information Systems"},{"key":"2025082212280271100_b65-01_15516_ma_compeaucorreia","volume-title":"Principles and practice of structural equation modeling","author":"Kline","year":"2016","edition":"4th ed"},{"issue":"4","key":"2025082212280271100_b66-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijec.2015100101","article-title":"Common method bias in PLS\u2013SEM: A full collinearity assessment approach","volume":"11","author":"Kock","year":"2015","journal-title":"International Journal of e-Collaboration"},{"issue":"4","key":"2025082212280271100_b67-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"177","DOI":"10.2753\/MIS0742-1222220407","article-title":"Digital inclusiveness\u2014 Longitudinal study of internet adoption by older adults","volume":"22","author":"Lam","year":"2006","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"2025082212280271100_b68-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"529","DOI":"10.25300\/MISQ\/2016\/40.3.01","article-title":"A tool for addressing construct identity in literature reviews and meta-analyses","volume":"40","author":"Larsen","year":"2016","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212280271100_b69-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1080\/07421222.2015.1029402","article-title":"Employees\u2019 exploration of complex systems: An integrative view","volume":"32","author":"Liang","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"2025082212280271100_b70-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1111\/j.1540-5915.2006.00122.x","article-title":"Paradoxes of online investing: Testing the influence of technology on user expectancies","volume":"37","author":"Looney","year":"2006","journal-title":"Decision Sciences"},{"issue":"1","key":"2025082212280271100_b71-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1108\/02683941111099628","article-title":"Got image? Examining organizational image in web recruitment","volume":"26","author":"Lyons","year":"2011","journal-title":"Journal of Managerial Psychology"},{"issue":"2","key":"2025082212280271100_b72-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/23044045","article-title":"Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques","volume":"35","author":"MacKenzie","year":"2011","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212280271100_b73-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"15","DOI":"10.17705\/1jais.00112","article-title":"The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time","volume":"8","author":"Marakas","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"2025082212280271100_b74-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1287\/isre.9.2.126","article-title":"The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research","volume":"9","author":"Marakas","year":"1998","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212280271100_b75-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1111\/isj.12108","article-title":"Characteristics of IT artifacts: A systems thinking based framework for delineating and theorizing IT artifacts","volume":"27","author":"Matook","year":"2017","journal-title":"Information Systems Journal"},{"issue":"4","key":"2025082212280271100_b76-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"909","DOI":"10.2307\/41409966","article-title":"A multilevel model for measuring fit between a firm\u2019s competitive strategies and information systems capabilities","volume":"35","author":"McLaren","year":"2011","journal-title":"MIS Quarterly"},{"key":"2025082212280271100_b77-01_15516_ma_compeaucorreia","unstructured":"MISQ\n            \n          . (2015). About MIS Quarterly: Editorial Objective (https:\/\/www.misq.org\/about\/; accessed January 10, 2021)."},{"issue":"2","key":"2025082212280271100_b78-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1111\/j.1744-6570.2000.tb00206.x","article-title":"Age differences in technology adoption decisions: Implications for a changing work force","volume":"53","author":"Morris","year":"2000","journal-title":"Personnel Psychology"},{"issue":"1","key":"2025082212280271100_b79-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0378-7206(97)00035-9","article-title":"Understanding and measuring user competence","volume":"33","author":"Munro","year":"1997","journal-title":"Information & Management"},{"issue":"4","key":"2025082212280271100_b80-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"579","DOI":"10.2307\/258560","article-title":"Concept fallibility in organizational science","volume":"14","author":"Osigweh","year":"1989","journal-title":"Academy of Management Review"},{"issue":"4","key":"2025082212280271100_b81-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"623","DOI":"10.2307\/25148814","article-title":"Specifying formative constructs in information systems research","volume":"31","author":"Petter","year":"2007","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212280271100_b82-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1177\/1094428115624965","article-title":"Recommendations for creating better concept definitions in the organizational, behavioral, and social sciences","volume":"19","author":"Podsakoff","year":"2016","journal-title":"Organizational Research Methods"},{"issue":"5","key":"2025082212280271100_b83-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1108\/10748120110424816","article-title":"Digital natives, digital immigrants","volume":"9","author":"Prensky","year":"2001","journal-title":"On the Horizon"},{"issue":"4","key":"2025082212280271100_b84-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1287\/isre.1070.0165","article-title":"The consequences of technostress for end users in organizations: Conceptual development and empirical validation","volume":"19","author":"Ragu-Nathan","year":"2008","journal-title":"Information Systems Research"},{"issue":"1","key":"2025082212280271100_b85-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","DOI":"10.25300\/MISQ\/2018\/421E0","article-title":"Editor\u2019s Comments: Beyond outdated labels: The blending of IS research traditions","volume":"42","author":"Rai","year":"2018","journal-title":"MIS Quarterly"},{"key":"2025082212280271100_b86-01_15516_ma_compeaucorreia","volume-title":"SmartPLS","author":"Ringle","year":"2015"},{"issue":"4","key":"2025082212280271100_b87-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1037\/0022-3514.53.4.805","article-title":"A taxonomic study of the vocabulary of emotions","volume":"53","author":"Storm","year":"1987","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"2025082212280271100_b88-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/248922","article-title":"Validating Instruments in MIS research","volume":"13","author":"Straub","year":"1989","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212280271100_b89-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","DOI":"10.17705\/1jais.00353","article-title":"A theory of organization\u2013EHR affordance actualization","volume":"15","author":"Strong","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"2025082212280271100_b90-01_15516_ma_compeaucorreia","first-page":"346","article-title":"Editor\u2019s Comments: Construct clarity in theories of management and organization","volume":"35","author":"Suddaby","year":"2010","journal-title":"Academy of Management Review"},{"issue":"3","key":"2025082212280271100_b91-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"485","DOI":"10.5465\/amp.2018.0153","article-title":"The dark side of construct convergence: Navigating consensus, evolution, and practical relevance in theory building","volume":"35","author":"Sumpter","year":"2021","journal-title":"Academy of Management Perspectives"},{"issue":"4","key":"2025082212280271100_b92-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.jsis.2014.10.001","article-title":"Modern information technology in an old workforce: Toward a strategic research agenda","volume":"23","author":"Tams","year":"2014","journal-title":"Journal of Strategic Information Systems"},{"issue":"1","key":"2025082212280271100_b93-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1111\/isj.12169","article-title":"The technostress trifecta\u2014Techno eustress, techno distress and design: Theoretical directions and an agenda for research","volume":"29","author":"Tarafdar","year":"2019","journal-title":"Information Systems Journal"},{"issue":"1","key":"2025082212280271100_b94-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"301","DOI":"10.2753\/MIS0742-1222240109","article-title":"The impact of technostress on role stress and productivity","volume":"24","author":"Tarafdar","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"2025082212280271100_b95-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.im.2006.11.007","article-title":"Internet anxiety: An empirical study of the effects of personality, beliefs, and social support","volume":"44","author":"Thatcher","year":"2007","journal-title":"Information and Management"},{"issue":"4","key":"2025082212280271100_b96-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"381","DOI":"10.2307\/4132314","article-title":"An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy","volume":"26","author":"Thatcher","year":"2002","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212280271100_b97-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1080\/01449290110050293","article-title":"Development and validation of an internet self-efficacy scale","volume":"20","author":"Torkzadeh","year":"2001","journal-title":"Behaviour & Information Technology"},{"issue":"3","key":"2025082212280271100_b98-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212280271100_b99-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology","volume":"36","author":"Venkatesh","year":"2012","journal-title":"MIS Quarterly"},{"issue":"11","key":"2025082212280271100_b100-01_15516_ma_compeaucorreia","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1080\/0144929X.2011.566940","article-title":"The contingent effect of personal IT innovativeness and IT self-efficacy on innovative use of complex IT","volume":"32","author":"Wang","year":"2013","journal-title":"Behaviour and Information Technology"}],"container-title":["MIS Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/46\/2\/679\/7663\/01_15516_ma_compeaucorreia.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/46\/2\/679\/7663\/01_15516_ma_compeaucorreia.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:28:22Z","timestamp":1755880102000},"score":1,"resource":{"primary":{"URL":"https:\/\/misq.umn.edu\/misq\/article\/46\/2\/679\/1945\/When-Constructs-Become-Obsolete-A-Systematic"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":100,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,6,1]]},"published-print":{"date-parts":[[2022,6,1]]}},"URL":"https:\/\/doi.org\/10.25300\/misq\/2022\/15516","relation":{},"ISSN":["0276-7783","2162-9730"],"issn-type":[{"value":"0276-7783","type":"print"},{"value":"2162-9730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,1]]}}}