de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Dokument suchen
Klesel, Michael: Individual information systems : an empirical investigation of emerging concepts and new methodological approaches. 2019
Inhalt
Titelblatt
Foreword
Acknowledgements
Table of Contents
List of Figures
List of Tables
Abbreviations
Part A
1 Introduction
1.1 The Commoditization of Mobile Technologies
1.2 Research Questions
1.3 Thesis Structure
2 Research Background
3 Research Design
3.1 Overview
3.2 Literature Reviews
3.3 Qualitative Studies
3.4 Quantitative Studies
3.4.1 Survey Data
3.4.2 Monte Carlo Simulation
4 Results
4.1 Overview
4.2 Conceptual Foundations
4.2.1 The Relationship between Structure and Agency
4.2.2 A new Conceptualization of Technology Use
4.3 Technology-Related Effects of Individualization
4.3.1 Instrument Autonomy
4.3.2 IT Choice-Self Efficacy
4.3.3 Psychological Ownership of IT
4.3.4 IT Mind Wandering
4.4 Boundary Management with Individual IS
4.4.1 Boundary Strategies
4.4.2 IT Resilience
4.4.3 How to Design Information Technology
4.5 Assessing Group-Wise Differences
4.5.1 Motivation
4.5.2 A Test to Assess Group-Wise Differences
4.5.3 Design of a Monte Carlo Simulation Study
4.5.4 Results
5 Discussion and Conclusion
5.1 Contribution to Theory and Practice
5.2 Limitations and Future Research
6 References
Part B
7 Structuration Theory in Information Systems Research
7.1 Introduction
7.2 Structuration Theory and IS Research
7.2.1 Structuration Theory as devised by Giddens
7.2.2 Duality of Technology
7.2.3 Adaptive Structuration Theory
7.3 Research Method
7.4 Findings
7.5 Discussion
7.6 Conclusion
7.7 References
7.8 Appendix
8 Transgressive Use of Technology
8.1 Introduction
8.2 Background
8.3 Research Method
8.3.1 Method Selection
8.3.2 Case Design
8.3.3 Pilot Study
8.3.4 Case Selection
8.3.5 Data Collection
8.3.6 Data Analysis
8.4 Findings
8.4.1 The Nature of Transgressive Use
8.4.2 Dimensions of Transgressive Use
8.5 Theorizing with Transgressive Use
8.5.1 Conceptualizing Transgressive Use
8.5.2 Propositions on Transgressive Use
8.6 Discussion and Outlook
8.7 Conclusion and Outlook
8.8 Acknowledgements
8.9 References
9 IT Work Autonomy
9.1 Introduction
9.2 Towards IT Work Autonomy
9.3 Future Work and Expected Contributions
9.4 References
10 Choice Self-Efficacy
10.1 Introduction
10.2 Related Work
10.2.1 Background on IT Consumerization
10.2.2 Background on IT Satisfaction
10.3 Theoretical Development
10.3.1 Research Model
10.3.2 Why Choice Self-Efficacy Is Necessary
10.4 Hypothesis Development
10.5 Methodology
10.5.1 Research Design and Procedure
10.5.2 Measurement Instrument
10.6 Data Analysis and Results
10.6.1 Method Selection
10.6.2 Model Fit
10.6.3 Internal Consistency Reliability and Convergent Validity
10.6.4 Structural Model
10.6.5 Effect Analysis
10.6.6 Post Hoc and Mediation Analysis
10.6.7 Control Variables
10.7 Discussion
10.7.1 Major Findings
10.7.2 Implications for Theory and Practice
10.7.3 Limitations and Future Research
10.8 Acknowledgments
10.9 References
10.10 Appendix: PLSc Results
11 Psychological Ownership of IT
11.1 Introduction
11.2 Related Work
11.3 Methodology
11.4 Findings
11.4.1 Psychological Ownership of IT
11.4.2 Antecedents of Psychological Ownership of IT
11.4.3 Effects of psychological ownership of IT
11.5 Theory Development
11.6 Discussion
11.7 Acknowledgements
11.8 References
12 IT Mind Wandering
12.1 Introduction
12.2 Theoretical Background
12.3 Research Model
12.4 Methodology
12.5 Discussion
12.6 Limitations and Outlook
12.7 References
12.8 Appendix A
13 Individual Boundary Management
13.1 Introduction
13.2 Related Work
13.2.1 Boundary theory
13.2.2 Boundary management – preferences, tactics and styles
13.3 Research Method
13.4 Findings
13.5 Conceptualization of Individual Tactics
13.6 Discussion
13.7 References
14 IT Resilience
14.1 Introduction
14.2 Related Work
14.3 Scale Development Procedure
14.3.1 Review of existing scales
14.4 Preliminary Measurement Instrument for IT Resilience
14.5 Research Methodology
14.5.1 Data collection and descriptive statistics
14.6 Discussion
14.7 Outlook and Limitations
14.8 Acknowledgements
14.9 References
15 How to Design Information Technology to Detach from Work
15.1 Introduction
15.2 Background
15.3 Theoretical foundation
15.3.1 Boundary Management
15.3.2 Nudge Theory
15.4 Methodology
15.4.1 Data collection
15.4.2 Data analysis
15.5 Results
15.5.1 Means and standard deviation
15.5.2 Multilevel analysis
15.6 Discussion
15.6.1 Discussion of the results
15.6.2 Contributions for theory
15.6.3 Implications for practice
15.6.4 Limitations and Outlook
15.7 References
16 A Test for Multigroup Analysis in PLS-PM
16.1 Introduction
16.2 Multigroup Analysis in PLS-PM
16.3 A Test to Compare Multiple Groups
16.3.1 Measuring heterogeneity across groups
16.3.2 Permutation tests
16.4 Monte Carlo Simulation
16.4.1 Simulation design
16.4.2 Simulation results
16.5 Discussion
16.6 Limitations and Outlook
16.7 Acknowledgements
16.8 References
16.9 Appendix: FWER in Multiple Comparison Scenarios