300
Views
23
CrossRef citations to date
0
Altmetric
Original Articles

Information Systems Enacted Capabilities and Their Effects on SMEs' Information Systems Adoption Behavior

, &
Pages 332-364 | Published online: 18 Nov 2019

References

  • Agarwal, R., and E. Karahanna (2000). “Time Flies When You're Having Fun: Cognitive Absorption and Beliefs about Information Technology Usage,” MIS Quarterly 24(4), 665–694.
  • Al‐gahtani, S. S., and M. King (1999). “Attitudes, Satisfaction and Usage: Factors Contributing to Each in the Acceptance of Information Technology,” Behavior & Information Technology 18(4), 277–297.
  • Ajzen, I., and M. Fishbein (1985). “From Intention to Actions: A Theory of Planned Behavior,” in Action‐control: From Cognition to Behavior. Eds. J. Kuhl and J. Beckmann. Heidelberg: Springer, 11–39.
  • Armstrong, J. S., and T. S. Overton (1977). “Estimating Non‐Response Bias in Mail Surveys,” Journal of Marketing Research 14(3), 396–402.
  • Attewell, P. (1992). “Technology Diffusion and Organizational Learning: The Case of Business Computing,” Organization Science 3(1), 1–19.
  • Bagozzi, R. P., M., Gopinath, and P. U. Nyer (1999). “The Role of Emotions in Marketing,” Journal of the Academy of Marketing Science 27(2), 184–206.
  • Bagozzi, R. P., Y. Yi, and L. W. Phillips (1991). “Assessing Construct Validity in Organizational Research,” Administrative Science Quarterly 36(3), 421–458.
  • Bahmanziari, T., J. Pearson, and M. L. Crosby (2003). “Is Trust Important in Technology Adoption? A Policy Capturing Approach,” Journal of Computer Information Systems 43(4), 46–54.
  • Bandura, A., and E. Locke (2003). “Negative Self‐Efficacy and Goals Effects Revisited,” Journal of Applied Psychology 88(1), 87–99.
  • Barclay, D. W., C. A. Higgins, and R. L. Thompson (1995). “The Partial Least Square (PLS) Approach to Causal Modelling: Personal Computer Adaptation and Use as an Illustration,” Technology Studies 2(2), 285–309.
  • Barney, J. B. (1991). “Firm Resources and Sustainable Competitive Advantage,” Journal of Management 17(1), 99–120.
  • Barua, A., P. Konana, A. B. Whinston, and F. Yin (2004). “An Empirical Investigation of Net‐Enabled Business Value,” MIS Quarterly 28(4), 585–620.
  • Beard, J. W., and M. Sumner (2004). “Seeking Strategic Advantage in the Post‐Net Era: Viewing EERP Systems from the Resource‐Based Perspective,” Journal of Strategic Information Systems 13(2), 129–150.
  • Berkowitz, L. (1993). “Towards a General Theory of Anger and Emotion Aggression: Implications of the Cognitive‐Neo‐associationic Perspective for the Analysis of Anger and Other Emotions,” in Perspectives on Anger and Emotion. Eds. R. S. Wyer and T. K. Srull. Hillsdale, NJ: Lawrence Erlbaum, 1–46.
  • Bharadwaj, A. S. (2000). “A Resource‐Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation,” MIS Quarterly 24(1), 169–196.
  • Bhattacherjee, A., and G. Premkumar (2004). “Understanding Changes in Belief and Attitude toward Information Technology Usage: A Theoretical Model and Longitudinal Test,” MIS Quarterly 28(2), 229–254.
  • Bhimani, A. (1996). “Securing the Commercial Internet,” Communication of ACM 36(6), 29–35.
  • Blomqvist, K. (1997). “The Many Faces of Trust,” Scandinavian Journal of Management 13(3), 271–286.
  • Blomqvist, K. (2002). “Partnering in the Dynamic Environment: The Role of Trust in Asymmetric Technology Partnership Formation,” Acta Universitatis Lappeenrantaensis, 122.
  • Bollen, K., and R. Lennox (1991). “Conventional Wisdom on Measurement: A Structural Equation Perspective,” Psychological Bulletin 110(2), 305–314.
  • Boynton, A. C., R. W. Zmud, and G. C. Jacobs (1994). “The Influence of IT Management Practice on IT Use in Large Organizations,” MIS Quarterly 18(3), 299–318.
  • Caldeira, M. M., and J. M. Ward (2003). “Using Resource‐Based Theory to Interpret the Successful Adoption and Use of Information Systems and Technology in Manufacturing Small and Medium Sized Enterprises,” European Journal of Information Systems 12(2), 127–141.
  • Chan, J. K. Y., and M. K. O. Lee (2002). “SME E‐Procurement Adoption in HongKong: The Roles of Power, Trust and Value,” Proceeding of the 36th Hawaii International Conference on System Sciences. Hawaii: IEEE Computer Society.
  • Chang, K. C., J. Jackson, and V. Grover (2003). “E‐Commerce and Corporate Strategy: An Executive Perspective,” Information and Management 40(7), 663–675.
  • Chau, P. Y. K., and P. J. Hu (2002). “Examining a Model of Information Technology Acceptance by Individual Professionals: An Exploratory Study,” Journal of Management Information Systems 18(4), 191–229.
  • Chau, P. Y. K., and K. L. Hui (2001). “Determinants of Small Business EDI Adoption: An Empirical Investigation,” Journal of Organizational Computing and Electronic Commerce 11(4), 229–252.
  • Chau, P. Y. K., and C. C. F. Jim (2002). “Adoption of Electronic Data Interchange in Small and Medium Sized Enterprises,” Journal of Global Information Technology Management 10(4), 61–85.
  • Chen, Z., and A. J. Dubinsky (2003). “A Conceptual Model of Perceived Customer Value in E‐Commerce: A Preliminary Investigation,” Psychology & Marketing 20(4), 323–347.
  • Chin, W. W. (1998). “The Partial Least Squares Approach for Structural Equation Modelling,” in Modern Methods for Business Research. Ed. G. A. Marcoulides. Mahwah, NJ: Lawrence Erlbaum, 295–336.
  • Chin, W. W., and B. L. Marcolin (2001). “Special Issue on Adoption, Diffusion and Infusion of IT,” The Database Advances in Information Systems 32(3), 7–12.
  • Ciborra, C. U., and G. F. Lanzara (1994). “Formative Contexts and Information Technology: Understanding the Dynamics of Innovation in Organizations,” Accounting, Management and Information Technologies 4(2), 61–86.
  • Cohen, J. (1988). Statistical Power Analysis for the Behavioral Sciences, 2nd ed. Hillsdale, NJ: L. Erlbaum Associates.
  • Cohen, D., and L. Prusak (2001). In Good Company: How Social Capital Makes Organizations Work. Boston: Harvard Business Press.
  • CommerceDotCom Sdn. Bhd. Retrieved August 15, 2005, Available at: http://home.eperolehan.com.my/bm/enablement/enabledsup.aspx
  • Conner, K. (1991). “A Historical Comparison of Resource‐Based Theory and Five Schools of Thought within Industrial Organization Economics: Do We Have a New Theory of the Firm?,” Journal of Management 17(1), 121–154.
  • Covin, J. G., and D. P. Slevin (1991). “A Conceptual Model of Entrepreneurship as Firm Behavior,” Entrepreneurship Theory and Practice 16(1), 7–25.
  • Curry, A., and C. Moore (2003). “Assessing Information Culture: An Exploratory Model,” International Journal of Information Management 23(2), 91–110.
  • Damanpour, F., and M. Schneider (2006). “Phases of the Adoption of Innovation in Organizations: Effects of Environment, Organization and Top Managers,” British Journal of Management 17(3), 215–236.
  • Dandridge, T. C. (1979). “Children Are Not Little Grown Ups: Small Business Needs Its Own Organization Theory,” Journal of Small Business Management 17(2), 53–57.
  • Davila, A., G. Mahendra, and R. Palmer (2003). “Moving Procurement Systems to the Internet: The Adoption and Use of Electronic Procurement Technology Models,” European Management Journal 21(1), 11–23.
  • Davis, F. D. (1989). “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly 13(3), 319–339.
  • Delone, W. H., and E. R. Mclean (1992). “Information Systems Success: The Quest for the Dependent Variable,” Information Systems Research 3(1), 60–95.
  • Delone, W. H., and E. R. Mclean (2003). “The DeLone and McLean Model of Information Systems Success: A Ten‐Year Update,” Journal of Management Information Systems 19(4), 9–30.
  • Diamantopoulos, A., and H. M. Winklhofer 2001). “Index Construction with Formative Indicators: An Alternative to Scale Development,” Journal of Marketing Research 38(2), 269–277.
  • Dijk, J. A. G. M., O. Peters, and W. Ebbers (2008). “Explaining the Acceptance and Use of Government Internet Services: A Multivariate Analysis of 2006 Survey Data in the Netherlands,” Journal of Government Information Quarterly 25(3), 379–399.
  • Dvorak, R. E., E. Holen, D. Mark, and W. F. Meehan (1997). “Six Principles of High‐Performance IT,” McKinsey Quarterly 33(3), 164–177.
  • Ettlie, J. E. (1991). “What Makes a Manufacturing Firm Innovative?,” Academy Management Executive 4(4), 7–20.
  • Feeny, D. F., and L. P. Willcocks (1998). “Core IS Capabilities for Exploiting Information Technology,” Sloan Management Review 39(3), 9–21.
  • Fishbein, M., and I. Ajzen (1975). Belief, Attitude, Intention, and Behavior: Anintroduction to Theory and Research. Reading, MA: Addison Wesley.
  • Fornell, C., and D. F. Larcker (1985). “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research 18(1), 39–59.
  • Foss, N. J., C. Knudsen, and C. A. Montgomery (1995). “An Exploration of Common Ground: Integrating Evolutionary and Strategic Theories of the Firm,” in Resource‐Based and Evolutionary Theories of the Firm. Ed. C. A. Montgomery. Boston, MA: Kluwer, 1–18.
  • Grant, R. M. (1991). “The Resource‐Based Theory of Competitive Advantage: Implications for Strategy Formulation,” California Management Review 33(3), 114–135.
  • Guimaraes, T., and M. Igbaria (1994). “Exploring the Relationship between IC Success and Company Performance,” Information and Management 26(3), 133–141.
  • Guimaraes, T., and M. Igbaria (1997). “Client/Server System Success: Exploring the Human Side,” Decision Sciences 28(4), 851–876.
  • Hitt, M. A., R. D. Ireland, and R. E. Hoskisson (2003). Strategic Management: Competitiveness and Globalization, (5th ed.) Cincinnati, OH: South‐Western.
  • Hulland, J. (1999). “Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies,” Strategic Management Journal 20(2), 195–204.
  • Iacovou, C. L., I. Benbasat, and A. S. Dexter (1995). “Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly 19(4), 465–485.
  • Igbaria, M., N. Zinatelli, P. Cragg, and A. L. M. Cavage (1997). “Personal Computing Acceptance Factors in Small Firms: A Structural Equation Model,” MIS Quarterly 23(3), 279–305.
  • Jamieson, R. (1996). “Auditing and Electronic Commerce, EDI Forum,” Perth, Western Australia.
  • Jasperson, J., P. E. Carter, and R. W. Zmud (2005). “A Comprehensive Conceptualisation of Post‐Adoptive Behaviours Associated with Information Technology Enabled Work Systems,” MIS Quarterly 29(3), 525–557.
  • Jung, J., C. Schneider, and J. S. Valacich (2010). “Enhancing the Motivational Affordance of Information Systems,” Management Science 56(4), 724–742.
  • Kanungo, S., S. Sadavarti, and Y. Srinivas (2001). “Relating IT Strategy and Organizational Culture: An Empirical Study of Public Sector Units in India,” Journal of Strategic Information Systems 10(1), 29–57.
  • Karahanna, E., D. W. Straub, and N. L. Chervany (1999). “Information Technology Adoption Across Time: A Cross‐Sectional Comparison of Pre‐Adoption and Post‐Adoption Beliefs,” MIS Quarterly 23(2), 183–213.
  • Kendall, J. D., L. L. Tung, K. H. Chau, D. C. H. Ng, and S. M. Tan (2001). “Receptivity of Singapore's SMEs to Electronic Commerce Adoption,” Journal of Strategic Information Systems 10(3), 223–243.
  • Ketterlinus, R. D., F. L. Bookstein, P. D. Sampson, and M. E. Lamb (1989). “Partial Least Squares Analysis in Developmental Psychopathology,” Development and Psychopathology 1(2), 351–375.
  • Knol, W. H. C., and H. M. Stroeken (2001). “The Diffusion and Adoption of Information Technology in Small‐ and Medium‐sized Enterprises through IT scenarios,” Technology Analysis and Strategic Management 13(2), 227–246.
  • Krueger, N. F. (2000). “The Cognitive Infrastructure of Opportunity Emergence,” Entrepreneurship Theory and Practice 25(3), 5–23.
  • Krueger, N. F., and D. V. Brazeal (1994). “Entrepreneurial Potential and Potential Entrepreneurs,” Entrepreneurship Theory and Practice Journal 18(3), 91–104.
  • Kwon, T. H., and R. W. Zmud (1987). “Unifying the Fragmented Models of Information Systems Implementation,” in Critical Issues in Information Systems Research. Eds. J. R. Boland and R. Hirschheim. New York: John Wiley, 227–251.
  • Leach, M., M. Hennessy, and M. Fishbein (1994). “Perception of Easy‐difficult: Attitude or Self‐Efficacy?” Available at: http://search.epnet.com/login.aspx?direct=true&db=aph&authdb=epref&an=JASP.CA.A.LEACH.PEAS
  • Lee, J. (2004). “Discriminant Analysis of Technology Adoption Behavior: A Case of Internet Technologies in Small Business,” Journal of Computer Information Systems 4(4), 57–66.
  • Lee, J., and J. Runge (2001). “Adoption of Information Technology in Small Business: Testing Drivers of Adoption for Entrepreneurs,” The Journal of Computer Information Systems 42(1), 44–57.
  • Levy, M., and P. Powell (2003). “Exploring SMEs Internet Adoption: Towards Contingent Model,” Electronic Markets 13(2), 173–181.
  • Louho, R., M. Kallioja, and P. Oittinen (2006). “Factors Affecting the Use of Hybrid Media Applications,” Graphic Arts in Finland 35(3), 11–21.
  • Luftman, J. (2000). “Assessing Business Alignment Maturity,” Communications of the Association for Information Systems 4(14),1–50.
  • Mackenzie, S. B., P. M. Podsakoff, and C. B. Jarvis (2005). “The Problem of Measurement Model Mis‐Specification in Behavioural and Organizational Research and Some Recommended Solutions,” Journal of Applied Psychology 90(4), 710–730.
  • Marcella, A. J., L. Stone, and W. J. Sampias (1998). “Electronic Commerce: Control Issues for Securing Virtual Enterprises,” The Institute of Internal Auditors. Retrieved from http://www.aiiaweb.it/default.asp?liv0=6&liv1=30&liv2=17#10, accessed on October 27, 2003.
  • Mata, F., W. Fuerst, and J. Barney (1995). “Information Technology and Sustained Competitive Advantage: A Resource‐Based Analysis,” MIS Quarterly 19(4), 487–505.
  • Mattila, A., and J. Wirtz (2000). “The Role of Pre‐consumption Affect in Post‐purchase Evaluation of Services,” Psychology & Marketing 17(7), 587–605.
  • Mcgrath, R., J. Macmillan, and S. Venkataraman (1995). “Defining and Developing Competence: A Strategic Process Paradigm,” Strategic Management Journal 16(4), 251–275.
  • Mcguire, W. J. (1985). “Attitudes and Attitude Change,” in Handbook of Social Psychology, 3rd ed., Vol. 2. Eds. G. Lindzey and E. Aronson. New York: Random House.
  • Mcknight, D. H., V. Choudhury, and C. Kacmar (2002). “Developing and Validating Trust Measures for E‐Commerce: An Integrative Typology,” Information Systems Research 13(3), 334–359.
  • Mehrtens, J., P. B. Cragg, and A. M. Mills (2001). “A Model of Internet Adoption by SMEs,” Information and Management 39(1), 165–176.
  • Melville, N., K. Kraemer, and V. Gurbaxani (2004). “Information Technology and Organizational Performance: An Integrative Model of IT Business Value,” MIS Quarterly 28(2), 283–322.
  • Milgrom, P., and J. Roberts (1995). “Complementarities and Fit: Strategy, Structure, and Organizational Change in Manufacturing,” Journal of Accounting and Economics 19(2), 79–208.
  • Min, H., and W. P. Galle (2001). “Electronic Commerce‐Based Purchasing: A Survey on the Perceptual Differences between Large and Small Organizations,” International Journal of Logistics: Research and Applications 4(1), 79–95.
  • Mukhopadhyay, T., S. Rajiv, and K. Srinivasan (1997). “Information Technology Impact on Process Output and Quality,” Management Science 43(12), 1645–1659.
  • Nunnally, J. C. (1978). Psychometric Theory. New York: McGraw‐Hill.
  • Oshlyansky, L., P. Cairns, and H. Thimbleby (2007). “Validating the Unified Theory of Acceptance and Use of Technology (UTAUT) tool cross‐culturally,” Proceedings of the 21st British HCI Group Annual Conference on People and Computers. British Computer Society, 83–86.
  • Pavlou, P. A. (2002). “Institution‐Based Trust in Inter‐Organizational Exchange Relationships: The Role of Online B2B Marketplaces on Trust Formation,” Journal of Strategic Information Systems 11(3/4), 215–243.
  • Pavlou, P. A., T. J. Housel, W. Rodgers, and E. Jansen (2005). “Measuring the Return of Information Technology: A Knowledge‐Based Approach for Revenue Allocation at the Process and Firm Level,” Journal of the Association for Information Systems 6, 199–226.
  • Peppard, J., and J. M. Ward (2004). “Beyond Strategic Information Systems: Towards an IS Capability,” Journal of Strategic Information Systems 13(2), 167–194.
  • Podsakoff, P. M., S. B. Mackenzie, J.‐Y. Lee, and N. P. Podsakoff (2003). “Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies,” Journal of Applied Psychology 88, 879–903.
  • Pulos, S., and N. Rogness (1995). “Soft Modelling and Special Education,” Remedial and Special Education 16(3), 184–192.
  • Ratnasingham, P. (2003). “Inter‐Organizational Trust in Business‐to‐Business Electronic Commerce: A Case Study in Customs Clearance,” Journal of Global Information Management 11(1), 1–19.
  • Ratnasingham, P., and D. D. Phan (2003). “Trading Partner Trust in B2B E‐Commerce: A Case Study,” Information Systems Management 20(3), 39–50.
  • Raymond, L., and F. Bergeron (1996). “EDI Success in Small and Medium Sized Enterprises: A Field Study,” Journal of Organizational Computing and Electronic Commerce 6(2), 161–172.
  • Rogers, E. M. (1995). The Diffusion of Innovation, 4th ed. New York: Free Press.
  • Romijn, H. (2001). “Technology Support for Small‐scale Industry in Developing Countries: A Review of Concepts and Project Practices,” Oxford Development Studies 29(1), 57–76.
  • Ross, J. W., C. M. Beath, and D. L. Goodhue (1996). “Develop Long‐Term Competitiveness through IT Assets,” Sloan Management Review 38(1), 31–42.
  • Russell, J. A. (2003) “Core Affect and the Psychological Construction of Emotion,” Psychological Review 110(1), 145–172.
  • Saga, V., and R. W. Zmud (1994). “The Nature and Determination of Information Technology Acceptance, Routinisation and Infusion,” in Diffusion, Transfer, and Implementation of Information Technology. Ed. L. Linda. Amsterdam, New York: North‐Holland, 67–86.
  • Scandura, T. A., and E. A. Williams (2000). “Research Methodology in Management: Current Practices, Trends and Implications for Future Research,” Academy of Management Journal 43(6), 1248–1284.
  • Scupola, A. (2003). “The Adoption of Internet Commerce by SMEs in the South Italy: An Environmental, Technological and Organizational Perspective,” Journal of Global Information Technology Management 6(1), 52–71.
  • Senn, J. A., and V. R. Gibson (1981). “Risks of Investment in Microcomputers for Small Business Management,” Journal of Small Business Management 19(3), 24–32.
  • Shan, W. (1990). “An Empirical Analysis of Organizational Strategies by Entrepreneurial High‐Technology Firms,” Strategic Management Journal 11(2), 129–139.
  • Srinivasan, R., G. L. Lilien, and A. Rangaswamy (2002). “Technological Opportunism and Radical Technological Adoption: An Application to E‐Business,” Journal of Marketing 66(3), 47–60.
  • Stock, G. E., and C. M. Mcdermott (2000). “Implementing Advanced Manufacturing Technology: The Role of Organizational Culture,” Production and Inventory Management Journal 41(3), 66–71.
  • Straub, E. T. (2009). “Understanding Technology Adoption: Theory and Future Direction for Informal Learning,” Review of Educational Research 79(2), 625–664.
  • Tabachnick, B. G., and L. S. Fidell (2001). Using Multivariate Statistics, 4th ed. Boston, MA: Allyn and Bacon.
  • Teece, D. J., G. Pisano, and A. Shuen (1997). “Dynamic Capabilities and Strategic Management,” Strategic Management Journal 18(7), 509–533.
  • Teo, T. S. H., S. Lin, and K.‐H. Lai (2009). “Adopters and Non‐adopters of E‐Procurement in Singapore: An Empirical Study,” Omega 37, 972–987.
  • Thompson, R. L., C. A. Higgins, and J. M. Howell (1991). “Personal Computing: Towards a Conceptual Model of Utilization,” MIS Quarterly 15(1), 125–143.
  • Thong, J. Y. L. (1999). “An Integrated Model of Information Systems Adoption in Small Businesses,” Journal of Management Information Systems 15(4), 187–214.
  • Thong, J. Y. L. (2001). “Resource Constraints and Information Systems Implementation in Singaporean Small Businesses,” Omega: The International Journal of Management Science 29(2), 143–156.
  • Thong, J. Y. L., and C. S. Yap (1995). “CEO Characteristics, Organizational Characteristics and Information Technology Adoption in Small Business,” Omega: International Journal of Management Science 23(4), 429–442.
  • Thong, J. Y. L., C. S. Yap, and K. S. Raman (1996). “Top Management Support, External Expertise and Information Systems Implementation in Small Businesses,” Information Systems Research 7(2), 248–267.
  • Triandis, H. C. (1975). Attitude and Attitude Change, 2nd ed. Lincoln, NE: University of Nebraska Press.
  • Van Akkeren, J. K., and A. L. M. Cavage (1999). “Factors Affecting Entry‐Level Internet Technology Adoption by Small Business in Australia: An Empirical Study,” Proceeding of the 10th Australasian Conference on Information Systems, Wellington, New Zealand, 1071–1083.
  • Venkatesh, V., and F. D. Davis (2000). “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science 46(2), 186–204.
  • Venkatesh, V., and X. Zhang (2010). “Unified Theory of Acceptance and Use of Technology: U.S. vs. China,” Journal of Global Information Technology Management 13(1), 5–27.
  • Venkatesh, V., C. Speier, and M. G. Morris (2002). User Acceptance Enabler in Individual Decision Making About Technology: Toward an Integrated Model,” Decision Sciences 33(2), 297–316.
  • Venkatesh, V., J. Y. L. Thong, and X. Xu (2012). “Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology,” MIS Quarterly 36(1), 157–178.
  • Venkatesh, V., S. A. Brown, L. M. Maruping, and H. Bala (2008). “Predicting Different Conceptualizations of System Use: The Competing Roles of Behavioral Intention, Facilitating Conditions, and Behavioral Expectation,” MIS Quarterly 32(3), 438–502.
  • Venkatesh, V., M. G. Morris, G. B. Davis, and F. D. Davis (2003). “User Acceptance of Information Technology: Toward a Unified View,” MIS Quarterly, 27(3), 425–478.
  • Venkatraman, N. (1994). “IT‐Enabled Business Transformation: From Automation to Business Scope Redefinition,” Sloan Management Review 35(2), 73–87.
  • Wallach, E. J. (1983). “Individuals and Organizations: The Cultural Match,” Training and Development Journal 37(2), 29–36.
  • Yen, D. C., H. G. Chen, S. Lee, and S. Koh (2003). “Differences in Perception of IS Knowledge and Skills Between Academia and Industry: Findings from Taiwan,” International Journal Information Management 23(6), 507–522.
  • Yuen, Y. Y., P. H. P. Yeow, N. Lim, and N. Saylani (2010). “Internet Banking Adoption: Comparing Developed and Developing Countries,” Journal of Computer Information System 51(1), 52–61.
  • Zaheer, A., B. Mcevily, and V. Perrone (1998). “Does Trust Matter? Exploring the Effects of Interorganizational and Interpersonal Trust on Performance,” Organization Science 9, 141–159.
  • Zajonc, R. B. (1984). “On the Primacy of Affect,” American Psychologist 39(2), 117–123.
  • Zhouying, J. (2005). “Globalization, Technological Competitiveness, and the ‘Catch‐up’ Challenge for Developing Countries Some Lessons of Experience,” International Journal of Technology Management and Sustainable Development 4(1), 35–46.
  • Zinatelli, N., P. B. Cragg, and A. L. M. Cavaye (1996). “End User Computing Sophistication and Success in Small Firms,” European Journal of Information Systems 5(3), 181.
  • Zmud, R. W. (1984). “An Examination of ‘Push‐Pull’ Theory Applied to Process Innovation and Knowledge Work,” Management Science 30(6), 727–738.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.