{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:30:00Z","timestamp":1735583400580},"reference-count":115,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T00:00:00Z","timestamp":1424736000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,7]]},"abstract":"Abstract<\/jats:title>Information technology use is typically assumed to have positive effects for users, yet information technology use may also lead to negative consequences with various degrees of gravity. In the current work, we build on dual\u2010systems theories to investigate negative consequences associated with mobile phones use (MPU), defined as the extent to which the use of mobile phones is perceived to create problems in managing one's personal and social life. According to dual\u2010system theories, human behaviour is guided by two systems: reflexive (automatic) and reflective (control), which most of the time work in harmony. But when the two systems come into conflict, they will both complete to exert their influences over behaviour. Thus, we view the negative consequences associated with MPU as an outcome of the tug\u2010of\u2010war between the two systems influencing our day\u2010to\u2010day behaviours, where reflexive system is represented in our study by MPU habits and reflective system is represented by self\u2010regulation. We hypothesise that the influence of habit and self\u2010regulation on these negative consequences will be mediated through MPU. A partial least square analysis of 266 responses was used to validate and test our model. The study results generally support our model. The theoretical and practical implications of our study are discussed.<\/jats:p>","DOI":"10.1111\/isj.12065","type":"journal-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T18:38:53Z","timestamp":1424803133000},"page":"403-427","source":"Crossref","is-referenced-by-count":148,"title":["Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual\u2010systems perspective"],"prefix":"10.1111","volume":"25","author":[{"given":"Amr A.","family":"Soror","sequence":"first","affiliation":[{"name":"Information Systems Department Sam M. Walton College of Business University of Arkansas Fayetteville AR USA"}]},{"given":"Bryan I.","family":"Hammer","sequence":"additional","affiliation":[{"name":"Management Science and Information Systems Spears School of Business Oklahoma State University Stillwater OK USA"}]},{"given":"Zachary R.","family":"Steelman","sequence":"additional","affiliation":[{"name":"Management Science and Information Systems Spears School of Business Oklahoma State University Stillwater OK USA"}]},{"given":"Fred D.","family":"Davis","sequence":"additional","affiliation":[{"name":"Information Systems Department Sam M. Walton College of Business University of Arkansas Fayetteville AR USA"}]},{"given":"Moez M.","family":"Limayem","sequence":"additional","affiliation":[{"name":"College of Business University of South Florida Tampa FL USA"}]}],"member":"311","published-online":{"date-parts":[[2015,2,24]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.78.1.53"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250951"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2010.08.004"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00122"},{"key":"e_1_2_10_6_1","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","author":"Bandura A.","year":"1986"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/08870449808407422"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.54.7.462"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1100.0573"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.2006.00428.x"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00126"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.03.001"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2005.8.39"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.2174\/157340012803520522"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1429"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1289"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1176\/appi.ajp.2007.07101556"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0444"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.012"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2003.08.001"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139174794"},{"key":"e_1_2_10_24_1","first-page":"3","volume-title":"Handbook of Self\u2010Regulation: Research, Theory, and Application","author":"Carver C.S.","year":"2011"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.67.2.319"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1348\/000712602760146242"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.07.002"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290903401978"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"e_1_2_10_30_1","first-page":"vii","article-title":"Commentary: issues and opinion on structural equation modeling","volume":"22","author":"Chin W.W.","year":"1998","journal-title":"MIS Quarterly"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/1910133"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2003.822468"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1992.tb00945.x"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045748"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.90.6.1096"},{"key":"e_1_2_10_38_1","doi-asserted-by":"crossref","unstructured":"Duckworth A.L.(2011)The significance of self\u2010control.Proceedings of the National Academy of Sciences 108 2639\u20132640.","DOI":"10.1073\/pnas.1019725108"},{"key":"e_1_2_10_39_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-32827-8","volume-title":"Handbook of Partial Least Squares","author":"Esposito V.V.","year":"2010"},{"key":"e_1_2_10_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2003.08.012"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1978.43.3f.1247"},{"key":"e_1_2_10_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_10_43_1","doi-asserted-by":"crossref","unstructured":"Ferster C.B.&Skinner B.F.(1957)Schedules of reinforcement. Appleton\u2010Century\u2010Crofts Connecticut.","DOI":"10.1037\/10627-000"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/23044042"},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01605"},{"key":"e_1_2_10_46_1","doi-asserted-by":"crossref","first-page":"219","DOI":"10.17705\/1jais.00125","article-title":"Comment on Benbasat and Barki's \u201cQuo vadis TAM\u201d article","volume":"8","author":"Goodhue D.L.","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.2307\/249689"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32827-8_30"},{"key":"e_1_2_10_49_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.29.051605.112851"},{"key":"e_1_2_10_50_1","volume-title":"Multivariate Data Analysis","author":"Hair J.F.","year":"2006"},{"key":"e_1_2_10_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6924.2009.01116.x"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1037\/10814-000"},{"key":"e_1_2_10_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/16066350701350247"},{"key":"e_1_2_10_54_1","doi-asserted-by":"crossref","first-page":"513","DOI":"10.2307\/20650307","article-title":"The integrative framework of technology use: an extension and test","volume":"33","author":"Kim S.S.","year":"2009","journal-title":"MIS Quarterly"},{"key":"e_1_2_10_55_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0326"},{"key":"e_1_2_10_56_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0070"},{"key":"e_1_2_10_57_1","doi-asserted-by":"publisher","DOI":"10.2147\/PRBM.S39476"},{"key":"e_1_2_10_58_1","doi-asserted-by":"publisher","DOI":"10.2174\/13816128113199990617"},{"key":"e_1_2_10_59_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2010.01360.x"},{"key":"e_1_2_10_60_1","doi-asserted-by":"publisher","DOI":"10.1207\/S1532785XMEP0503_01"},{"key":"e_1_2_10_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482790802078565"},{"key":"e_1_2_10_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10802-013-9761-9"},{"key":"e_1_2_10_63_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"e_1_2_10_64_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.58.110405.085654"},{"key":"e_1_2_10_65_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148817"},{"key":"e_1_2_10_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(01)00180-0"},{"key":"e_1_2_10_67_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0124-6"},{"key":"e_1_2_10_68_1","unstructured":"Meeker M.&Wu L.(2013)Internet trends 2013 presented at D11 conference California May 29 2013. Available from http:\/\/www.kpcb.com\/insights\/2013\u2010internet\u2010trends. [Accessed: 25th May 2014]"},{"key":"e_1_2_10_69_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.106.1.3"},{"key":"e_1_2_10_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2009.12.011"},{"key":"e_1_2_10_71_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.126.2.247"},{"key":"e_1_2_10_72_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.3.774"},{"key":"e_1_2_10_73_1","unstructured":"National Safety Council(2010)National Safety Council estimates that at least 1.6 million crashes each year involve drivers using cell phones and texting January 2010 [Online]. Washington DC: National Safety Council. Available from http:\/\/www.nsc.org\/Pages\/NSCestimates16millioncrashescausedbydriversusingcellphonesandtexting.aspx. [Accessed: 18th February 2011]"},{"key":"e_1_2_10_74_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420150303"},{"key":"e_1_2_10_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2009.01.006"},{"key":"e_1_2_10_76_1","volume-title":"Psychometric Theory","author":"Nunnally J.C.","year":"1994"},{"key":"e_1_2_10_77_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2001.tb02480.x"},{"key":"e_1_2_10_78_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650303"},{"key":"e_1_2_10_79_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.124.1.54"},{"key":"e_1_2_10_80_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148783"},{"key":"e_1_2_10_81_1","unstructured":"Pennay D.(2006)Community attitudes to road safetyDecember 2006 [Online]. Canberra City Australia: Australian Transport Safety Bureau. Available from https:\/\/www.infrastructure.gov.au\/roads\/safety\/publications\/2006\/pdf\/CR229_Commuity_Attit.pdf. [Accessed: 10th May 2012]"},{"key":"e_1_2_10_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/014920638601200408"},{"key":"e_1_2_10_83_1","doi-asserted-by":"publisher","DOI":"10.2307\/41410404"},{"key":"e_1_2_10_84_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167209360665"},{"key":"e_1_2_10_85_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(198201)38:1<119::AID-JCLP2270380118>3.0.CO;2-I"},{"key":"e_1_2_10_86_1","volume-title":"SmartPLS 2.0","author":"Ringle C.","year":"2005"},{"key":"e_1_2_10_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.003"},{"key":"e_1_2_10_88_1","doi-asserted-by":"publisher","DOI":"10.2307\/256690"},{"key":"e_1_2_10_89_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00123"},{"key":"e_1_2_10_90_1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.17705\/1jais.00121","article-title":"Post\u2010positivist review of technology acceptance model","volume":"8","author":"Silva L.","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_10_91_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0402_01"},{"key":"e_1_2_10_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2013.09.007"},{"key":"e_1_2_10_93_1","unstructured":"Steelman Z. Soror A. Limayem M.&Worrell D.(2012)Obsessive compulsive tendencies as predictors of dangerous mobile phone usage.Proceedings of the Eighteenth Americas Conference on Information Systems Seattle WA."},{"key":"e_1_2_10_94_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2014\/38.2.02"},{"key":"e_1_2_10_95_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0803_1"},{"key":"e_1_2_10_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.soscij.2013.09.003"},{"key":"e_1_2_10_97_1","first-page":"195","volume-title":"Nebraska Symposium on Motivation, 1979: Beliefs, Attitudes, and Values","author":"Triandis H.C.","year":"1980"},{"key":"e_1_2_10_98_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.19"},{"key":"e_1_2_10_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735237"},{"key":"e_1_2_10_100_1","unstructured":"Turel O.&Serenko A.(2011)Developing a (bad) habit: antecedents and adverse consequences of social networking.Proceedings of the Seventeenth Americas Conference on Information Systems Detroit MI."},{"key":"e_1_2_10_101_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.1"},{"key":"e_1_2_10_102_1","doi-asserted-by":"publisher","DOI":"10.2466\/18.PR0.115c31z8"},{"key":"e_1_2_10_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.01.004"},{"key":"e_1_2_10_104_1","doi-asserted-by":"publisher","DOI":"10.2307\/41409972"},{"key":"e_1_2_10_105_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148853"},{"key":"e_1_2_10_106_1","doi-asserted-by":"publisher","DOI":"10.2307\/41410412"},{"key":"e_1_2_10_107_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.92.3.526"},{"key":"e_1_2_10_108_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0992(199709\/10)27:5<539::AID-EJSP831>3.0.CO;2-A"},{"key":"e_1_2_10_109_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.25.1.90"},{"key":"e_1_2_10_110_1","volume-title":"Handbook of Self\u2010Regulation: Research, Theory, and Application","author":"Vohs K.D.","year":"2011"},{"key":"e_1_2_10_111_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327663jcp1603_3"},{"key":"e_1_2_10_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2007.04.004"},{"key":"e_1_2_10_113_1","doi-asserted-by":"publisher","DOI":"10.1348\/014466608X370591"},{"key":"e_1_2_10_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcps.2009.08.003"},{"key":"e_1_2_10_115_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.83.6.1281"},{"key":"e_1_2_10_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10879-009-9120-x"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:52:43Z","timestamp":1694501563000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,24]]},"references-count":115,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["10.1111\/isj.12065"],"URL":"https:\/\/doi.org\/10.1111\/isj.12065","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,24]]}}}