The IT Identity Threat: A Conceptual Definition and Operational Measure

IF 6.2 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Management Information Systems Pub Date : 2019-01-02 DOI:10.1080/07421222.2018.1550561
Kevin Craig, J. Thatcher, V. Grover
{"title":"The IT Identity Threat: A Conceptual Definition and Operational Measure","authors":"Kevin Craig, J. Thatcher, V. Grover","doi":"10.1080/07421222.2018.1550561","DOIUrl":null,"url":null,"abstract":"Abstract As individuals’ relationships with information technology (IT) grow more complex and personal, our understanding of the problem of resistance to IT continues to evolve. Current approaches to resistance are based on perceived threats to work tasks and social structure. This work enhances our understanding of resistance by developing a definition and measure of the IT Identity Threat, a new construct that integrates social, task-related, and personal factors of resistance. Grounded in identity theory, the IT Identity Threat offers a parsimonious means to explain and predict IT resistance behaviors. Using data from two independent studies conducted among students and faculty at a large university in the Southeastern United States, we validate an operational measure of IT Identity Threat as a second-order construct and demonstrate that it successfully predicts resistance to IT. Our findings provide support for the IT Identity Threat construct as a simple mechanism to study resistance to IT.","PeriodicalId":50154,"journal":{"name":"Journal of Management Information Systems","volume":"36 1","pages":"259 - 288"},"PeriodicalIF":6.2000,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/07421222.2018.1550561","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Management Information Systems","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1080/07421222.2018.1550561","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 27

Abstract

Abstract As individuals’ relationships with information technology (IT) grow more complex and personal, our understanding of the problem of resistance to IT continues to evolve. Current approaches to resistance are based on perceived threats to work tasks and social structure. This work enhances our understanding of resistance by developing a definition and measure of the IT Identity Threat, a new construct that integrates social, task-related, and personal factors of resistance. Grounded in identity theory, the IT Identity Threat offers a parsimonious means to explain and predict IT resistance behaviors. Using data from two independent studies conducted among students and faculty at a large university in the Southeastern United States, we validate an operational measure of IT Identity Threat as a second-order construct and demonstrate that it successfully predicts resistance to IT. Our findings provide support for the IT Identity Threat construct as a simple mechanism to study resistance to IT.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
IT身份威胁:概念定义和操作措施
随着个人与信息技术(IT)的关系变得越来越复杂和个人化,我们对IT抵制问题的理解也在不断发展。目前的抵抗方法是基于对工作任务和社会结构的感知威胁。这项工作通过开发IT身份威胁的定义和测量,增强了我们对阻力的理解,这是一个集成了社会、任务相关和个人阻力因素的新结构。基于身份理论,IT身份威胁提供了一种简洁的方法来解释和预测IT抵抗行为。使用在美国东南部一所大型大学的学生和教师中进行的两项独立研究的数据,我们验证了IT身份威胁的操作度量作为二阶结构,并证明它成功地预测了对IT的抵抗。我们的研究结果为IT身份威胁构建作为研究IT抵抗的简单机制提供了支持。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Management Information Systems
Journal of Management Information Systems 工程技术-计算机:信息系统
CiteScore
10.20
自引率
13.00%
发文量
34
审稿时长
6 months
期刊介绍: Journal of Management Information Systems is a widely recognized forum for the presentation of research that advances the practice and understanding of organizational information systems. It serves those investigating new modes of information delivery and the changing landscape of information policy making, as well as practitioners and executives managing the information resource.
期刊最新文献
Leveraging Large Language Models for Hate Speech Detection: Multi-Agent, Information-Theoretic Prompt Learning for Enhancing Contextual Understanding Dependency Network Structure and Security Vulnerabilities in Software Supply Chains Turning Off Your Better Judgment: Algorithmic Conformity in Artificial Intelligence-Human Collaboration Defending Deep Learning-Based Raw Malware Detectors Against Adversarial Attacks: A Sequence Modeling Approach When Good Intentions Backfire: The Asymmetric Effects of Minority-Ownership Markers for Businesses on Online Platforms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1