Making the most of information technology & systems usage: A literature review, framework and future research agenda
Shaikh, A. A., & Karjaluoto, H. (2015). Making the most of information technology & systems usage: A literature review, framework and future research agenda. Computers in Human Behavior, 49, 541-566. https://doi.org/10.1016/j.chb.2015.03.059
Published inComputers in Human Behavior
© 2015 Elsevier Ltd. This is a final draft version of an article whose final and definitive form has been published by Elsevier. Published in this repository with the kind permission of the publisher.
This detailed literature review has considered a relatively large quantity (152 total) of scholarly empirical publications, conference proceedings, books and popular market reports published over the last 15 years, i.e., from January 2000 to December 2014, in the field of human continuous usage behavior and in the context of information technology/systems. Based on the search results, the literature was synthesized, segregated into four major domains according to the purpose, nature and usage of the information technology/systems. The authors believe that this segregation within the information technology & systems continuous usage literature provides greater scalability, flexibility and space for future research. Moreover, this proposed segregation allows for future research to include more ‘systems’ in each category depending on the usage, relevance and nature of the ‘systems’ that will evolve over the period of time. Scalability will provide more insights and ideas that will help future research investigate and propose domain-specific conceptual or business models that will help facilitate an understanding of information technology/systems continuous usage according to the nature of the ‘system.’ Conclusions and recommendations are drawn and priorities are proposed for continuing research. ...
Publication in research information system
MetadataShow full item record
- Kauppakorkeakoulu 
Showing items with similar title or keywords.
Yang, Yaping (2018)The author searched reports about enterprises information security prepared by consulting companies in order to understand organizations' security practices. The author then summarized the reports by year, identified topics ...
Nwachukwu, Uchechukwu; Vidgren, Jiri; Niemimaa, Marko; Järveläinen, Jonna (University of Hawaiʻi at Mānoa, 2023)Information security education, training, and awareness (SETA) are approaches to changing end-users’ security behavior. Research into SETA has conducted interventions to study the effects of SETA on security behavior. ...
Hearing gestures : vocalisations as embodied projections of intentionality in designing non-speech sounds for communicative functions Tuuri, Kai (University of Jyväskylä, 2011)
Oulasvirta, Antti (University of Jyväskylä, Agora Center, 2005)Mobile and ubiquitous technologies can potentially change the role of information and communication technology in human lives. Empirical, human-centered approaches are emerging as an alternative to technology-driven ...
Reflections on the human role in AI policy formulations : how do national AI strategies view people? Salo-Pöntinen, Henrikki; Saariluoma, Pertti (Springer Science and Business Media LLC, 2022)Purpose There is no artificial intelligence (AI) without people. People design and develop AI; they modify and use it and they have to reorganize the ways they have carried out tasks in their work and everyday life. ...