{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T14:53:35Z","timestamp":1724511215647},"reference-count":98,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T00:00:00Z","timestamp":1512691200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2018,9]]},"abstract":"Abstract<\/jats:title>This article aims to offer an alternative method to analyse technology acceptance models, namely a segment\u2010wise analysis. The empirical illustration of this method involves data that were collected during a company\u2010wide implementation of a Sales Force Automation technology in Europe. The data comprise a variety of commonly used technology\u2010related, context\u2010related, and person\u2010related variables. The segmentation procedure, which involved a finite mixture partial least squares estimation, provides more insight into the different ways in which people come to accept new technologies. Unlike other segmentation studies published in IS journals, the resulting segments are based on similarities and differences in the structure of the underlying theoretical models rather than (a collection of) individual variables. Further research or a re\u2010analysis of existing data should help establish robust \u201ctechnology acceptance model\u201d\u2010based segments as well as comprehensive profiles of the individuals in each segment.<\/jats:p>","DOI":"10.1111\/isj.12172","type":"journal-article","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T05:15:02Z","timestamp":1512710102000},"page":"879-904","source":"Crossref","is-referenced-by-count":23,"title":["Using structural technology acceptance models to segment intended users of a new technology: Propositions and an empirical illustration"],"prefix":"10.1111","volume":"28","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1532-6858","authenticated-orcid":false,"given":"Niek","family":"Althuizen","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"e_1_2_8_2_1","first-page":"85","volume-title":"Framing the Domains of IT Management","author":"Agarwal R.","year":"2000"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.2.204"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1999.tb01614.x"},{"key":"e_1_2_8_5_1","first-page":"297","article-title":"Effect of technology on sales performance: Progressing from technology acceptance to technology usage and consequence","volume":"24","author":"Ahearne M.","year":"2004","journal-title":"Journal of Personal Selling and Sales Management"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148691"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/019251"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.08.016"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872679304600601"},{"key":"e_1_2_8_10_1","volume-title":"Marketing: An Introduction","author":"Armstrong G.","year":"2015"},{"key":"e_1_2_8_11_1","unstructured":"Bagayogo F. Beaudry A.&Lapointe L.(2013).Impacts of IT acceptance and resistance behaviors: A novel framework. In: Proceeding of the 34th International Conference on Information Systems Baskerville R.&Chau M.(eds.) pp.1\u201019.Milan Italy."},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0277"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.10"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"e_1_2_8_15_1","first-page":"1","article-title":"User response to mandatory IT use: A coping theory perspective","author":"Bhattacherjee A.","year":"2017","journal-title":"European Journal of Information Systems"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.36"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148634"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2004.09.017"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148815"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2004.09.016"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2370.2006.00128.x"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2009.12.010"},{"key":"e_1_2_8_23_1","first-page":"295","volume-title":"Modern Methods for Business Research","author":"Chin W. W.","year":"1998"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/09590551011045357"},{"key":"e_1_2_8_25_1","volume-title":"NEO\u2010PI\u2010R Professional Manual","author":"Costa P. T.","year":"1992"},{"key":"e_1_2_8_26_1","unstructured":"Davis F. D.(1986).A technology acceptance model for empirically testing new end\u2010user information systems: Theory and results.Doctoral Dissertation MIT."},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"e_1_2_8_29_1","first-page":"1111","article-title":"Extrinsic and intrinsic motivation to use computers in the workplace","volume":"13","author":"Davis F. D.","year":"1992","journal-title":"MIS Quarterly"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0153"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.3.273.12736"},{"key":"e_1_2_8_32_1","volume-title":"My Life and Work","author":"Ford H.","year":"1922"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1257\/089533005775196732"},{"key":"e_1_2_8_35_1","first-page":"316","volume-title":"Handbook of Consumer Behaviour","author":"Gatignon H. A.","year":"1991"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(03)00046-1"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03396655"},{"key":"e_1_2_8_38_1","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS\u2010SEM)","author":"Hair J. F.","year":"2014"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/0747-5632(87)90010-0"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-009-0157-x"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.3.4.424"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.29.5.567"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsc.2012.10.001"},{"key":"e_1_2_8_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7"},{"key":"e_1_2_8_45_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148694"},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.2307\/249384"},{"key":"e_1_2_8_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00096-2"},{"key":"e_1_2_8_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/249751"},{"key":"e_1_2_8_49_1","volume-title":"Psychology","author":"Kassin S.","year":"2003"},{"key":"e_1_2_8_50_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0326"},{"key":"e_1_2_8_51_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0070"},{"key":"e_1_2_8_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036529"},{"key":"e_1_2_8_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148692"},{"key":"e_1_2_8_54_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.17"},{"key":"e_1_2_8_55_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148735"},{"key":"e_1_2_8_56_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.34.10.1252"},{"key":"e_1_2_8_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.005"},{"key":"e_1_2_8_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/358141.358148"},{"key":"e_1_2_8_59_1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1080\/014492996120085a","article-title":"An attributional explanation of individual resistance to the introduction of information technologies in the workplace","volume":"15","author":"Martinko M. J.","year":"1996","journal-title":"Behaviour & Information Technology"},{"key":"e_1_2_8_60_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.2.528"},{"key":"e_1_2_8_61_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.1.81"},{"key":"e_1_2_8_62_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148821"},{"key":"e_1_2_8_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471721182"},{"key":"e_1_2_8_64_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.35"},{"key":"e_1_2_8_65_1","first-page":"45","article-title":"Handling non\u2010response issues","volume":"54","author":"Miller L. E.","year":"1983","journal-title":"Journal of Extension"},{"key":"e_1_2_8_66_1","volume-title":"Crossing the Chasm: Marketing and Selling Technology Products to Mainstream Customers","author":"Moore G.","year":"2002"},{"key":"e_1_2_8_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-8501(99)00115-7"},{"key":"e_1_2_8_68_1","volume-title":"Psychometric Theory","author":"Nunnally J.C.","year":"1994"},{"key":"e_1_2_8_69_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650303"},{"key":"e_1_2_8_70_1","doi-asserted-by":"publisher","DOI":"10.1108\/08858629710188036"},{"key":"e_1_2_8_71_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.10"},{"key":"e_1_2_8_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2006.02.001"},{"key":"e_1_2_8_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1280-0_2"},{"key":"e_1_2_8_74_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.29.5.580"},{"key":"e_1_2_8_75_1","volume-title":"Diffusion of Innovations","author":"Rogers E.","year":"1962"},{"key":"e_1_2_8_76_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0583"},{"key":"e_1_2_8_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518116"},{"key":"e_1_2_8_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2004.09.013"},{"key":"e_1_2_8_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/009365091018004003"},{"key":"e_1_2_8_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018396.2018416"},{"key":"e_1_2_8_81_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.66.3.98.18510"},{"key":"e_1_2_8_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8116(02)00076-9"},{"key":"e_1_2_8_83_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.05"},{"key":"e_1_2_8_84_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.41.8.1328"},{"key":"e_1_2_8_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/0148-2963(94)90079-5"},{"key":"e_1_2_8_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.11.005"},{"key":"e_1_2_8_87_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21029"},{"key":"e_1_2_8_88_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.44.5.645"},{"key":"e_1_2_8_89_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.29"},{"key":"e_1_2_8_90_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"e_1_2_8_91_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"key":"e_1_2_8_92_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148853"},{"key":"e_1_2_8_93_1","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"e_1_2_8_94_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12008"},{"key":"e_1_2_8_95_1","doi-asserted-by":"publisher","DOI":"10.2307\/41410412"},{"key":"e_1_2_8_96_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.13"},{"key":"e_1_2_8_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4651-1"},{"key":"e_1_2_8_98_1","first-page":"222","volume-title":"The Marketing Book","author":"Wind Y.","year":"2007"},{"key":"e_1_2_8_99_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.25.10.966"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12172","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T19:32:59Z","timestamp":1694979179000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,8]]},"references-count":98,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["10.1111\/isj.12172"],"URL":"https:\/\/doi.org\/10.1111\/isj.12172","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,8]]}}}