306
Views
1
CrossRef citations to date
0
Altmetric
Original Research

A Preliminary Validation of the Chinese Version of the Information Technology Identity Scale

ORCID Icon, ORCID Icon, , ORCID Icon, , , ORCID Icon & show all
Pages 751-762 | Published online: 25 Mar 2022

References

  • Carter M. IT identity: developing valid measures through CFA-based MTMM analysis. Thirty Fourth International Conference on Information Systems, Milan. 2013:11.
  • Carter M. Information Technology (IT) Identity: A Conceptualization, Proposed Measures, and Research Agenda. Clemson University; 2012. Available from: https://tigerprints.clemson.edu/all_dissertations/901. Accessed March 22, 2022.
  • Hongqiang H, Zhipeng W. Study on information technology service classification and definition. Info Technol Standard. 2013;2013(4):28–31.
  • Nach H, Lejeune A. Coping with Information Technology Challenges to Identity: A Theoretical Framework. Vol. 26. Social Science Electronic Publishing; 2021:618–629.
  • Larson RW, Wilson S, Brown BB, et al. Changes in adolescents’ interpersonal experiences: are they being prepared for adult relationships in the 20th century? J Res Adolesc. 2002;12(1):31–68. doi:10.1111/1532-7795.00024
  • Carter M, Grover V. Me, my self, and I(T): conceptualizing information technology identity and its implications. Mis Quart. 2015;39(4):931–958. doi:10.25300/MISQ/2015/39.4.9
  • Burke R, Peter J. Identities and self-verification in the small group. Soc Psychol Quart. 1995;58:61–73.
  • Kokswijk JV. Granting personality to a virtual identity. Int J Human Soc Sci. 2008;2(4):207–215.
  • Shotter J. The social construction of our inner selves. J Constr Psychol. 1997;10(1):7–24. doi:10.1080/10720539708404609
  • Thoits PA, Virshup LK. Me’s and We’s: Forms and Functions of Social Identities. Oxford University Press; 1997.
  • MacKinnon NJ. Symbolic interactionism as affect control. Social Forces. 1994;75(4):1489–1490.
  • Stryker S, Burke PJ. The past, present, and future of an identity theory. Soc Psychol Quart. 2000;63(4):284. doi:10.2307/2695840
  • Tajfel H. The social identity theory of intergroup behavior. Psychol Intergroup Relations. 1986;13(3):7–24.
  • Turner ME, Pratkanis AR, Probasco P, Leve C. Threat, cohesion, and group effectiveness: testing a social identity maintenance perspective on groupthink. J Pers Soc Psychol. 1992;63(5):781.
  • Terry DJ, Hogg MA, White KM. The theory of planned behaviour: self-identity, social identity and group norms. Br J Soc Psychol. 1999;38(Pt 3):225–244. doi:10.1348/014466699164149
  • Smith-Lovin L, Heise DR. Analyzing Social Interaction: Advances in Affect Control Theory. Gordon and Breach Science Publishers; 1988.
  • Swann WB. Identity negotiation: where two roads meet. J Pers Soc Psychol. 1987;53(6):1038–1051. doi:10.1037/0022-3514.53.6.1038
  • Meyrowitz J. No Sense of Place: The Impact of Electronic Media on Social Behavior. Oxford University Press; 1985.
  • Altheide DL. An ecology of communication. Sociol Quart. 1994;35(4):665–683. doi:10.1111/j.1533-8525.1994.tb00422.x
  • Baldwin M. Dictionary of Philosophy and Psychology. Macmillan Co.; 1998.
  • Alahmad R, Carter M, Pierce C, Robert L. The impact of enterprise social media identity on job performance and job satisfaction. 24th Americas Conference on Information Systems; 2018.
  • Reychav I, Beeri R, Balapour A, et al. How reliable are self-assessments using mobile technology in healthcare? The effects of technology identity and self-efficacy. Comput Human Behav. 2018;91:52–61. doi:10.1016/j.chb.2018.09.024
  • Esmaeilzadeh P. How does IT identity affect individuals’ use behaviors associated with personal health devices (PHDs)? An empirical study - ScienceDirect. Info Manag. 2020;58(1):103313.
  • Huang TL. Psychological mechanisms of brand love and information technology identity in virtual retail environments. J Retail Consum Services. 2019;47:251–264. doi:10.1016/j.jretconser.2018.11.016
  • Cheng Z, Wang S. Review on user’s active behavior in virtual community based on role identity theory. J Beijing Univ Aeronaut Astronaut. 2017;30(02):78–81.
  • Kramer GM. Identity theory. Lambda book report. 2003.
  • Wang W, Xu J. Information Technology Identity: People’s Self-Perception in the Digital Age. Entrepreneur Scholar Program of Jinan University; 2019.
  • Kim HW, Chan HC, Kankanhalli A. What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation. Info Syst Res. 2012;23(4):1232–1245. doi:10.1287/isre.1110.0411
  • Brand M, Young K, Laier C, Lfling W, Potenza MN. Integrating psychological and neurobiological considerations regarding the development and maintenance of specific Internet-use disorders: an Interaction of Person-Affect-Cognition-Execution (I-PACE) model. Neurosci Biobehav Rev. 2016;71:252–266.
  • Dincher M, Wagner V. Teaching in times of COVID-19: determinants of teachers’ educational technology use. Educ Econ. 2021;29:461–470. doi:10.1080/09645292.2021.1920000
  • Shi JH. Teachers’Role in online public English teaching for graduate students in the context of COVID-19 epidemic. J North China Univ Water Resources Electric Power. 2020;36(6):100.
  • Baccon LA, Chiarovano E, Macdougall HG. Virtual reality for teletherapy: avatars may combine the benefits of face-to-face communication with the anonymity of online text-based communication. Cyberpsychol Behav Soc Netw. 2018;22:158–165.
  • Valkenburg Patti M, Jochen P. Who visits online dating sites? Exploring some characteristics of online daters. Cyberpsychol Behav. 2007;10(6):849–852.
  • Valkenburg PM, Peter J. Adolescents’ identity experiments on the internet consequences for social competence and self-concept unity. Communic Res. 2008;35(2):208–231. doi:10.1177/0093650207313164
  • Gauntlett D, Horsley R. Web.studies. 2004.
  • Parcel TL. Differentiation between social groups: studies in the social psychology of intergroup relations. Am J Sociol. 1978;86(5):1193–1194. doi:10.1086/227378
  • Abrams D, Hogg MA. Social Identity Theory: Constructive and Critical Advances. Pearson Education Limited; 1990.
  • Zhou J, Mao Z. User identity construction in online community: a case study of Douban. Contemp Commun. 2012;2012(01):74–76.
  • McMillan SJ, Morrison M. Coming of Age with the Internet: A Qualitative Exploration of How the Internet Has Become an Integral Part of young People’s Lives. New Media & Society; 2006.
  • Moon JP, Sanders GL. The role of virtual social identity through blog use in social life. Connecting the Americas Americas Conference on Information Systems DBLP, 2006.
  • Carter M, Grover V, Thatcher JB. Mobile Devices and the Self: Developing the Concept of Mobile Phone Identity. IGI Global; 2013.
  • baike.baidu.com. Douban; 2021. Available from: https://www.douban.com/. Accessed October 31, 2021.
  • Li C. Improvement of opac based on web2.0 from the experience of douban. Res Library Sci. 2010;15:16.
  • Hao LI, Wang P. The Cultural Identity in the Network Era——A Study of Tianjin Wei Group on Douban Webpage. Journal of Xinjiang University; 2015.
  • Ling R. Hyper-coordination via mobile phones in Norway. Perpetual contact mobile communication private talk public performance. 2002.
  • Carter M, Petter S, Grover V, Thatcher JB. IT identity: a measure and empirical investigation of its utility to IS research. J Assoc Info Syst. 2020;21(5):1313–1342. doi:10.17705/1jais.00638
  • Yu T, Si Y, Meng W, Bian Y, Gao F. Mediating factors of the association between shyness and generalized pathological internet use in Chinese university students. Int J Ment Health Addict. 2018;17(3):555–572.
  • Wang P, Yan Y, Gao F, Zhang R, Tian Y. The effect of shyness on adolescent network problem behavior: the role of gender and loneliness. Front Psychol. 2020;11:803.
  • Zhang S, Tian Y, Sui Y, et al.Relationships between social support, loneliness, and internet addiction in Chinese postsecondary students: a longitudinal cross-lagged analysis. Front Psychol. 2018;9:1707.
  • Wang R, Yang S, Yan Y, Tian Y, Wang P. Internet gaming disorder in early adolescents: gender and depression differences in a latent growth model. Healthcare. 2021;9:1188. doi:10.3390/healthcare9091188
  • Shuttleworth M, Cowie M. Dictionary of Translation Studies. Shanghai Foreign Language Education Press; 2004.
  • Han C. Analysis on Impact on College Computer Application Teaching by Domestic Office Software.Electronic Technology & Software Engineering. 2017;1(1).
  • CFi.CN Text of the first quarter report of Jinshan Office in 2020; 2020. Available from: http://www.zszk_quote.cfi.net.cn/. Accessed October 31, 2021.
  • Bai Y, Di M, Huo Y, Wang J, Zhao M. The structure of self-esteem: a bifactor modeling approach of the self-liking/self-competence scale-revised (slcs-r) in Chinese preadolescents. Curr Psychol. 2021;2:1–9.
  • Kato T. Examination of the coping flexibility hypothesis using the coping flexibility scale-revised. Front Psychol. 2020;11. doi:10.3389/fpsyg.2020.561731
  • Hang Z, Jiangping Z, Zhijin H. The Chinese version of the appreciation questionnaire in the relationship is revised. Chin J Clin Psychol. 2020;28(4):718–723.
  • Wenzel S. App’ification of Enterprise Software: A Multiple-Case Study of Big Data Business Applications. Springer International Publishing Springer International Publish-ing; 2014.
  • Burke RPJ. Identities and self-verification in the small group. Soc Psychol Q. 1995;58(2):61–73.