• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4698324)   Today's Articles (7157)
For: Nach H, Lejeune A. Coping with information technology challenges to identity: A theoretical framework. Computers in Human Behavior 2010;26:618-29. [DOI: 10.1016/j.chb.2009.12.015] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
Number Cited by Other Article(s)
1
Marsh E, Vallejos EP, Spence A. The digital workplace and its dark side: An integrative review. COMPUTERS IN HUMAN BEHAVIOR 2022. [DOI: 10.1016/j.chb.2021.107118] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/11/2022]
2
Chiu YT, Zhu YQ, Corbett J. In the hearts and minds of employees: A model of pre-adoptive appraisal toward artificial intelligence in organizations. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102379] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
3
Bui S, Kettinger WJ, Park I. Identity Sharing and Adaptive Personalization Influencing Online Repurchases. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2021.1919939] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
4
Qiao L, Song M, Wang N(T. Virtual Brand Community Experience, Identification, and Electronic Word-of-mouth. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2019. [DOI: 10.1080/08874417.2019.1661805] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
5
Craig K, Thatcher JB, Grover V. The IT Identity Threat: A Conceptual Definition and Operational Measure. J MANAGE INFORM SYST 2019. [DOI: 10.1080/07421222.2018.1550561] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
6
Damaged identities: Examining identity regulation and identity work of Gulf project managers. INTERNATIONAL JOURNAL OF PROJECT MANAGEMENT 2015. [DOI: 10.1016/j.ijproman.2015.06.009] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
7
Tansley C, Huang J, Foster C. Identity ambiguity and the promises and practices of hybrid e-HRM project teams. JOURNAL OF STRATEGIC INFORMATION SYSTEMS 2013. [DOI: 10.1016/j.jsis.2013.01.002] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA