How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy S Tams, JB Thatcher, K Craig The Journal of Strategic Information Systems 27 (2), 170-190, 2018 | 102 | 2018 |
The IT identity threat: A conceptual definition and operational measure K Craig, JB Thatcher, V Grover Journal of Management Information Systems 36 (1), 259-288, 2019 | 95 | 2019 |
The grass is always greener on the other side: A test of present and alternative job utility on IT professionals’ turnover M Dinger, JB Thatcher, LP Stepina, K Craig IEEE Transactions on Engineering Management 59 (3), 364-378, 2011 | 67 | 2011 |
The role of basic human values in knowledge sharing: How values shape the postadoptive use of electronic knowledge repositories S Tams, A Dulipovici, JB Thatcher, K Craig, M Srite Journal of the Association for Information Systems 21 (1), 3, 2020 | 17 | 2020 |
The role of user age in task performance: examining curvilinear and interaction effects of user age, expertise, and interface design on mistake making JC Zimmer, S Tams, K Craig, J Thatcher, R Pak Journal of Business Economics 85, 323-348, 2015 | 12 | 2015 |
A historical observation of the intellectual and institutional structures of the field V Grover, J London, K Craig Communications of the Association for Information Systems 38 (1), 25, 2016 | 9 | 2016 |
Integrating trust in technology and computer self-efficacy within the post-adoption context: An empirical examination K Craig, S Tams, P Clay, J Thatcher | 9 | 2010 |
Coping with interruptions in computer-mediated environments: The role of computer self-efficacy S Tams, K Craig, R Murphy | 8 | 2011 |
Perceived social media bias, social identity threat, and conspiracy theory ideation during the COVID-19 pandemic K Craig, V Sadovykh | 4 | 2022 |
The Nerd Effect: Communication and Managerial Self-Image K Craig, V Grover | 1 | 2016 |
Introduction to the Special Section: Blockchain and Nonfungible Tokens in Electronic Commerce K Craig, V Sadovykh, D Sundaram, G Peko International Journal of Electronic Commerce 28 (1), 31-32, 2024 | | 2024 |
Integrating the perceptions that cause Resistance to IT: Expanding the nomological network of the IT identity Threat K Craig, V Grover, JB Thatcher Journal of Information Technology Case and Application Research 26 (1), 35-69, 2024 | | 2024 |
Introduction to the Minitrack on The Social and Economic Dynamics of the Metaverse, Smart Contracts, and Non-Fungible Tokens D Sundaram, V Sadovykh, G Peko, K Craig | | 2023 |
Introduction to the Minitrack on Balancing the Promises and Perils of Artificial Intelligence and Machine Learning: Disruption, Adoption, Dehumanisation, Governance, Risk and … D Sundaram, K Craig, V Sadovykh | | 2022 |
IDENTITY EXPANSION: SUPPORTING GROWTH AFTER DESTRUCTION K Craig Науково-редакційна колегія, 133, 2022 | | 2022 |
Scary Stories: Fear Appeals, Hopelessness and the Role of Response Efficacy in Protective Online Behavior T Stern, K Craig, N Kumar Communications of the Association for Information Systems 51 (1), 38, 2022 | | 2022 |
COPING WITH INTERRUPTIONS IN COMPUTER-MEDIATED ENVIRONMENTS: THE ROLE OF COMPUTER EXPERIENCE S Tams, K Craig, J Thatcher, J Panning | | 2011 |