{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:37:05Z","timestamp":1769913425435,"version":"3.49.0"},"reference-count":39,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1,1]]},"abstract":"<p>Due to its extensive use for the study of information technology adoption and use, the Technology Acceptance Model (TAM) serves as an ideal base model for the study of post-acceptance IT diffusion outcomes. The research presented in this paper incrementally builds on TAM-based research to gain meaningful insights into the potential differences individuals\u2019 exhibit in three types of diffusion outcomes in a post-acceptance context. The authors model and test the effects of perceived usefulness and perceived ease of use on intentions to use, intentions to explore, and trying to innovate \u2013 IT diffusion outcomes proposed as vital in a post-acceptance context. In addition to TAM predictive variables, the authors investigate how autonomy, a personal control factor, and subjective norms, a social factor, influence individuals\u2019 intentions toward and behaviors associated with technology use. The findings suggest cognitive intention outcomes are more likely to be influenced by technology-related factors, while behavioral outcomes are more likely to be influenced by social and personal control factors in post-acceptance contexts. Implications of the study for practice and future research are also discussed.<\/p>","DOI":"10.4018\/joeuc.2012010101","type":"journal-article","created":{"date-parts":[[2012,1,13]],"date-time":"2012-01-13T15:27:56Z","timestamp":1326468476000},"page":"1-20","source":"Crossref","is-referenced-by-count":9,"title":["Post-Acceptance Intentions and Behaviors"],"prefix":"10.4018","volume":"24","author":[{"given":"Pamela E.","family":"Carter","sequence":"first","affiliation":[{"name":"North Carolina A&T State University, USA"}]},{"given":"Jason Bennett","family":"Thatcher","sequence":"additional","affiliation":[{"name":"Clemson University, USA"}]},{"given":"Katherine M.","family":"Chudoba","sequence":"additional","affiliation":[{"name":"Utah State University, USA"}]},{"given":"Kent","family":"Marett","sequence":"additional","affiliation":[{"name":"Mississippi State University, USA"}]}],"member":"2432","reference":[{"key":"joeuc.2012010101-0","first-page":"65","article-title":"Individual acceptance of information technologies","author":"R.Agarwal","year":"2000","journal-title":"Framing the Domains of IT Management: Projecting the Future ... Through the Past"},{"key":"joeuc.2012010101-1","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"joeuc.2012010101-2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.204"},{"key":"joeuc.2012010101-3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1999.tb01614.x"},{"issue":"3","key":"joeuc.2012010101-4","doi-asserted-by":"crossref","first-page":"427","DOI":"10.2307\/25148691","article-title":"Moving Beyond Intentions and Toward the Theory of Trying: Effects of Work Environment and Gender on Post-Adoption Information Technology Use.","volume":"29","author":"M. K.Ahuja","year":"2005","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2012010101-5","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00026-3"},{"key":"joeuc.2012010101-6","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"issue":"2","key":"joeuc.2012010101-7","doi-asserted-by":"crossref","first-page":"229","DOI":"10.2307\/25148634","article-title":"Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test.","volume":"28","author":"A.Bhattacherjee","year":"2004","journal-title":"Management Information Systems Quarterly"},{"issue":"2","key":"joeuc.2012010101-8","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/1066149.1066155","article-title":"Individual Differences and Usage Behavior: Revisiting a Technology Acceptance Assumption.","volume":"36","author":"A.Burton-Jones","year":"2005","journal-title":"The Data Base for Advances in Information Systems"},{"key":"joeuc.2012010101-9","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","author":"W. W.Chin","year":"1998","journal-title":"Modern Methods for Business Research"},{"key":"joeuc.2012010101-10","unstructured":"Chin, W. W. (2007). Frequently Asked Questions - Partial Least Squares and PLS-Graph. Retrieved from http:\/\/disc-nt.cba.uh.edu\/chin\/plsfaq.htm"},{"key":"joeuc.2012010101-11","author":"W. W.Chin","year":"1996","journal-title":"PLS Graph (Version 2.91.03.04)"},{"key":"joeuc.2012010101-12","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.36.2.123"},{"key":"joeuc.2012010101-13","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"joeuc.2012010101-14","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"joeuc.2012010101-15","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00048-X"},{"key":"joeuc.2012010101-16","author":"M.Fishbein","year":"1975","journal-title":"Beliefs, attitude, intention and behavior: An introduction to theory and research"},{"issue":"5","key":"joeuc.2012010101-17","first-page":"91","article-title":"A Practical Guide to Factorial Validity Using PLS-Graph: Tutorial and Annotated Example.","volume":"16","author":"D.Gefen","year":"2005","journal-title":"Communications of the Association for Information Systems"},{"key":"joeuc.2012010101-18","doi-asserted-by":"publisher","DOI":"10.2307\/249658"},{"key":"joeuc.2012010101-19","author":"J.Hackman","year":"1975","journal-title":"Work redesign"},{"key":"joeuc.2012010101-20","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.40.4.440"},{"key":"joeuc.2012010101-21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1979.tb02154.x"},{"issue":"3","key":"joeuc.2012010101-22","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/25148694","article-title":"A Comprehensive Conceptualization of Post-Adoptive Behaviors Associated with Information Technology Enabled Work Systems.","volume":"29","author":"J.Jasperson","year":"2005","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2012010101-23","doi-asserted-by":"publisher","DOI":"10.2307\/249751"},{"key":"joeuc.2012010101-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.05.003"},{"key":"joeuc.2012010101-25","doi-asserted-by":"publisher","DOI":"10.1145\/2135.358307"},{"key":"joeuc.2012010101-26","first-page":"227","article-title":"Unifying fragmented models of information systems","author":"T. H.Kwon","year":"1986","journal-title":"Critical issues in information systems research"},{"key":"joeuc.2012010101-27","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(01)00143-4"},{"key":"joeuc.2012010101-28","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.34.10.1252"},{"key":"joeuc.2012010101-29","first-page":"257","article-title":"Information systems failures - a survey and classification of the empirical literature","volume":"Vol. 4","author":"K. L.Lyytinen","year":"1987","journal-title":"Oxford Surveys in Information Technology"},{"key":"joeuc.2012010101-30","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.173"},{"key":"joeuc.2012010101-31","doi-asserted-by":"publisher","DOI":"10.2307\/249468"},{"issue":"3","key":"joeuc.2012010101-32","doi-asserted-by":"crossref","first-page":"365","DOI":"10.2307\/30036538","article-title":"Trust and Unintended Effects of Behavioral Control in Virtual Teams.","volume":"27","author":"G.Piccoli","year":"2003","journal-title":"Management Information Systems Quarterly"},{"key":"joeuc.2012010101-33","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(03)00023-5"},{"key":"joeuc.2012010101-34","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.42.1.85"},{"key":"joeuc.2012010101-35","author":"B. G.Tabachnick","year":"1996","journal-title":"Using Multivariate Statistics"},{"key":"joeuc.2012010101-36","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.144"},{"key":"joeuc.2012010101-37","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"issue":"3","key":"joeuc.2012010101-38","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User Acceptance of Information Technology: Towards a Unified View.","volume":"27","author":"V.Venkatesh","year":"2003","journal-title":"Management Information Systems Quarterly"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=61410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:23:06Z","timestamp":1654118586000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/joeuc.2012010101"}},"subtitle":["An Empirical Investigation of Information Technology Use and Innovation"],"short-title":[],"issued":{"date-parts":[[2012,1,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2012010101","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"value":"1546-2234","type":"print"},{"value":"1546-5012","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,1]]}}}