Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure

Identifieur interne : 000042 ( Istex/Corpus ); précédent : 000041; suivant : 000043

Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure

Auteurs : Youngseek Kim ; Kevin Crowston

Source :

RBID : ISTEX:7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8

Abstract

In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.

Url:
DOI: 10.1002/meet.2011.14504801197

Links to Exploration step

ISTEX:7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
<author>
<name sortKey="Kim, Youngseek" sort="Kim, Youngseek" uniqKey="Kim Y" first="Youngseek" last="Kim">Youngseek Kim</name>
<affiliation>
<mods:affiliation>School of Information Studies, Syracuse University, 221 Hinds Hall, Syracuse, NY 13244</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ykim58@syr.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Crowston, Kevin" sort="Crowston, Kevin" uniqKey="Crowston K" first="Kevin" last="Crowston">Kevin Crowston</name>
<affiliation>
<mods:affiliation>School of Information Studies, Syracuse University, 348 Hinds Hall, Syracuse, NY 13244</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: crowston@syr.edu</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.1002/meet.2011.14504801197</idno>
<idno type="url">https://api.istex.fr/document/7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000042</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
<author>
<name sortKey="Kim, Youngseek" sort="Kim, Youngseek" uniqKey="Kim Y" first="Youngseek" last="Kim">Youngseek Kim</name>
<affiliation>
<mods:affiliation>School of Information Studies, Syracuse University, 221 Hinds Hall, Syracuse, NY 13244</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ykim58@syr.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Crowston, Kevin" sort="Crowston, Kevin" uniqKey="Crowston K" first="Kevin" last="Crowston">Kevin Crowston</name>
<affiliation>
<mods:affiliation>School of Information Studies, Syracuse University, 348 Hinds Hall, Syracuse, NY 13244</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: crowston@syr.edu</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Proceedings of the American Society for Information Science and Technology</title>
<title level="j" type="abbrev">Proc. Am. Soc. Info. Sci. Tech.</title>
<idno type="ISSN">0044-7870</idno>
<idno type="eISSN">1550-8390</idno>
<imprint>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<date type="published" when="2011">2011</date>
<biblScope unit="volume">48</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="1">1</biblScope>
<biblScope unit="page" to="10">10</biblScope>
</imprint>
<idno type="ISSN">0044-7870</idno>
</series>
<idno type="istex">7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8</idno>
<idno type="DOI">10.1002/meet.2011.14504801197</idno>
<idno type="ArticleID">MEET14504801197</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0044-7870</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.</div>
</front>
</TEI>
<istex>
<corpusName>wiley</corpusName>
<author>
<json:item>
<name>Youngseek Kim</name>
<affiliations>
<json:string>School of Information Studies, Syracuse University, 221 Hinds Hall, Syracuse, NY 13244</json:string>
<json:string>E-mail: ykim58@syr.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Kevin Crowston</name>
<affiliations>
<json:string>School of Information Studies, Syracuse University, 348 Hinds Hall, Syracuse, NY 13244</json:string>
<json:string>E-mail: crowston@syr.edu</json:string>
</affiliations>
</json:item>
</author>
<articleId>
<json:string>MEET14504801197</json:string>
</articleId>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>article</json:string>
</originalGenre>
<abstract>In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.</abstract>
<qualityIndicators>
<score>6.98</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>612 x 792 pts (letter)</pdfPageSize>
<refBibsNative>true</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>1173</abstractCharCount>
<pdfWordCount>8981</pdfWordCount>
<pdfCharCount>62223</pdfCharCount>
<pdfPageCount>14</pdfPageCount>
<abstractWordCount>165</abstractWordCount>
</qualityIndicators>
<title>Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
<genre>
<json:string>article</json:string>
</genre>
<host>
<volume>48</volume>
<publisherId>
<json:string>MEET</json:string>
</publisherId>
<pages>
<total>10</total>
<last>10</last>
<first>1</first>
</pages>
<issn>
<json:string>0044-7870</json:string>
</issn>
<issue>1</issue>
<subject>
<json:item>
<value>Cyber‐infrastructure</value>
</json:item>
<json:item>
<value>eScience</value>
</json:item>
<json:item>
<value>adoption</value>
</json:item>
<json:item>
<value>acceptance</value>
</json:item>
<json:item>
<value>use</value>
</json:item>
<json:item>
<value>Paper</value>
</json:item>
</subject>
<genre>
<json:string>journal</json:string>
</genre>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1550-8390</json:string>
</eissn>
<title>Proceedings of the American Society for Information Science and Technology</title>
<doi>
<json:string>10.1002/(ISSN)1550-8390</json:string>
</doi>
</host>
<publicationDate>2011</publicationDate>
<copyrightDate>2011</copyrightDate>
<doi>
<json:string>10.1002/meet.2011.14504801197</json:string>
</doi>
<id>7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8</id>
<score>0.46592286</score>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<availability>
<p>Copyright © 2011 by American Society for Information Science and Technology</p>
</availability>
<date>2011</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
<author xml:id="author-1">
<persName>
<forename type="first">Youngseek</forename>
<surname>Kim</surname>
</persName>
<email>ykim58@syr.edu</email>
<affiliation>School of Information Studies, Syracuse University, 221 Hinds Hall, Syracuse, NY 13244</affiliation>
</author>
<author xml:id="author-2">
<persName>
<forename type="first">Kevin</forename>
<surname>Crowston</surname>
</persName>
<email>crowston@syr.edu</email>
<affiliation>School of Information Studies, Syracuse University, 348 Hinds Hall, Syracuse, NY 13244</affiliation>
</author>
</analytic>
<monogr>
<title level="j">Proceedings of the American Society for Information Science and Technology</title>
<title level="j" type="abbrev">Proc. Am. Soc. Info. Sci. Tech.</title>
<idno type="pISSN">0044-7870</idno>
<idno type="eISSN">1550-8390</idno>
<idno type="DOI">10.1002/(ISSN)1550-8390</idno>
<imprint>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<pubPlace>Hoboken</pubPlace>
<date type="published" when="2011"></date>
<biblScope unit="volume">48</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="1">1</biblScope>
<biblScope unit="page" to="10">10</biblScope>
</imprint>
</monogr>
<idno type="istex">7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8</idno>
<idno type="DOI">10.1002/meet.2011.14504801197</idno>
<idno type="ArticleID">MEET14504801197</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2011</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.</p>
</abstract>
<textClass>
<keywords scheme="Journal Subject">
<list>
<head>index-terms</head>
<item>
<term>Cyber‐infrastructure</term>
</item>
<item>
<term>eScience</term>
</item>
<item>
<term>adoption</term>
</item>
<item>
<term>acceptance</term>
</item>
<item>
<term>use</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Journal Subject">
<list>
<head>article-category</head>
<item>
<term>Paper</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2011">Published</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Wiley, elements deleted: body">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8" standalone="yes"</istex:xmlDeclaration>
<istex:document>
<component version="2.0" type="serialArticle" xml:lang="en">
<header>
<publicationMeta level="product">
<publisherInfo>
<publisherName>Wiley Subscription Services, Inc., A Wiley Company</publisherName>
<publisherLoc>Hoboken</publisherLoc>
</publisherInfo>
<doi registered="yes">10.1002/(ISSN)1550-8390</doi>
<issn type="print">0044-7870</issn>
<issn type="electronic">1550-8390</issn>
<idGroup>
<id type="product" value="MEET"></id>
</idGroup>
<titleGroup>
<title type="main" xml:lang="en" sort="PROCEEDINGS OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY">Proceedings of the American Society for Information Science and Technology</title>
<title type="short">Proc. Am. Soc. Info. Sci. Tech.</title>
</titleGroup>
</publicationMeta>
<publicationMeta level="part" position="10">
<doi origin="wiley" registered="yes">10.1002/meet.145.v48:1</doi>
<numberingGroup>
<numbering type="journalVolume" number="48">48</numbering>
<numbering type="journalIssue">1</numbering>
</numberingGroup>
<coverDate startDate="2011">2011</coverDate>
</publicationMeta>
<publicationMeta level="unit" type="article" position="97" status="forIssue">
<doi origin="wiley" registered="yes">10.1002/meet.2011.14504801197</doi>
<idGroup>
<id type="unit" value="MEET14504801197"></id>
</idGroup>
<countGroup>
<count type="pageTotal" number="10"></count>
</countGroup>
<titleGroup>
<title type="articleCategory">Paper</title>
<title type="tocHeading1">Papers</title>
</titleGroup>
<copyright ownership="thirdParty">Copyright © 2011 by American Society for Information Science and Technology</copyright>
<eventGroup>
<event type="xmlConverted" agent="Converter:JWSART34_TO_WML3G version:3.0.1 mode:FullText" date="2012-01-10"></event>
<event type="firstOnline" date="2012-01-11"></event>
<event type="publishedOnlineFinalForm" date="2012-01-11"></event>
<event type="xmlConverted" agent="Converter:WILEY_ML3G_TO_WILEY_ML3GV2 version:3.8.8" date="2014-02-02"></event>
<event type="xmlConverted" agent="Converter:WML3G_To_WML3G version:4.1.7 mode:FullText,remove_FC" date="2014-11-03"></event>
</eventGroup>
<numberingGroup>
<numbering type="pageFirst">1</numbering>
<numbering type="pageLast">10</numbering>
</numberingGroup>
<subjectInfo>
<subject href="psi.asis.org/digital/Cyber‐infrastructure">Cyber‐infrastructure</subject>
<subject href="psi.asis.org/digital/eScience">eScience</subject>
<subject href="psi.asis.org/digital/adoption">adoption</subject>
<subject href="psi.asis.org/digital/acceptance">acceptance</subject>
<subject href="psi.asis.org/digital/use">use</subject>
</subjectInfo>
<linkGroup>
<link type="toTypesetVersion" href="file:MEET.MEET14504801197.pdf"></link>
</linkGroup>
</publicationMeta>
<contentMeta>
<countGroup>
<count type="figureTotal" number="2"></count>
<count type="tableTotal" number="1"></count>
<count type="referenceTotal" number="94"></count>
</countGroup>
<titleGroup>
<title type="main" xml:lang="en">Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
<title type="short" xml:lang="en">Technology Adoption and Use Theory Review for Studying Scientists' Continued Use of Cyber‐infrastructure</title>
</titleGroup>
<creators>
<creator xml:id="au1" creatorRole="author" affiliationRef="#af1">
<personName>
<givenNames>Youngseek</givenNames>
<familyName>Kim</familyName>
</personName>
<contactDetails>
<email>ykim58@syr.edu</email>
</contactDetails>
</creator>
<creator xml:id="au2" creatorRole="author" affiliationRef="#af2">
<personName>
<givenNames>Kevin</givenNames>
<familyName>Crowston</familyName>
</personName>
<contactDetails>
<email>crowston@syr.edu</email>
</contactDetails>
</creator>
</creators>
<affiliationGroup>
<affiliation xml:id="af1" countryCode="US" type="organization">
<unparsedAffiliation>School of Information Studies, Syracuse University, 221 Hinds Hall, Syracuse, NY 13244</unparsedAffiliation>
</affiliation>
<affiliation xml:id="af2" countryCode="US" type="organization">
<unparsedAffiliation>School of Information Studies, Syracuse University, 348 Hinds Hall, Syracuse, NY 13244</unparsedAffiliation>
</affiliation>
</affiliationGroup>
<abstractGroup>
<abstract type="main" xml:lang="en">
<title type="main">Abstract</title>
<p>In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.</p>
</abstract>
</abstractGroup>
</contentMeta>
</header>
</component>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
</titleInfo>
<titleInfo type="abbreviated" lang="en">
<title>Technology Adoption and Use Theory Review for Studying Scientists' Continued Use of Cyber‐infrastructure</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure</title>
</titleInfo>
<name type="personal">
<namePart type="given">Youngseek</namePart>
<namePart type="family">Kim</namePart>
<affiliation>School of Information Studies, Syracuse University, 221 Hinds Hall, Syracuse, NY 13244</affiliation>
<affiliation>E-mail: ykim58@syr.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Kevin</namePart>
<namePart type="family">Crowston</namePart>
<affiliation>School of Information Studies, Syracuse University, 348 Hinds Hall, Syracuse, NY 13244</affiliation>
<affiliation>E-mail: crowston@syr.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="article" displayLabel="article"></genre>
<originInfo>
<publisher>Wiley Subscription Services, Inc., A Wiley Company</publisher>
<place>
<placeTerm type="text">Hoboken</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2011</dateIssued>
<copyrightDate encoding="w3cdtf">2011</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
<extent unit="figures">2</extent>
<extent unit="tables">1</extent>
<extent unit="references">94</extent>
</physicalDescription>
<abstract lang="en">In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber‐infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post‐adoption (continued use) research. In addition, we review studies specifically regarding cyber‐infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists' adoption and continued use of cyber‐infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists' adoption and use of cyber‐infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Proceedings of the American Society for Information Science and Technology</title>
</titleInfo>
<titleInfo type="abbreviated">
<title>Proc. Am. Soc. Info. Sci. Tech.</title>
</titleInfo>
<genre type="journal">journal</genre>
<subject>
<genre>index-terms</genre>
<topic authorityURI="psi.asis.org/digital/Cyber‐infrastructure">Cyber‐infrastructure</topic>
<topic authorityURI="psi.asis.org/digital/eScience">eScience</topic>
<topic authorityURI="psi.asis.org/digital/adoption">adoption</topic>
<topic authorityURI="psi.asis.org/digital/acceptance">acceptance</topic>
<topic authorityURI="psi.asis.org/digital/use">use</topic>
</subject>
<subject>
<genre>article-category</genre>
<topic>Paper</topic>
</subject>
<identifier type="ISSN">0044-7870</identifier>
<identifier type="eISSN">1550-8390</identifier>
<identifier type="DOI">10.1002/(ISSN)1550-8390</identifier>
<identifier type="PublisherID">MEET</identifier>
<part>
<date>2011</date>
<detail type="volume">
<caption>vol.</caption>
<number>48</number>
</detail>
<detail type="issue">
<caption>no.</caption>
<number>1</number>
</detail>
<extent unit="pages">
<start>1</start>
<end>10</end>
<total>10</total>
</extent>
</part>
</relatedItem>
<identifier type="istex">7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8</identifier>
<identifier type="DOI">10.1002/meet.2011.14504801197</identifier>
<identifier type="ArticleID">MEET14504801197</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Copyright © 2011 by American Society for Information Science and Technology</accessCondition>
<recordInfo>
<recordContentSource>WILEY</recordContentSource>
<recordOrigin>Wiley Subscription Services, Inc., A Wiley Company</recordOrigin>
</recordInfo>
</mods>
</metadata>
<serie></serie>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000042 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000042 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:7BD9EEE4E12E0E220830AAC4C6ED651B37F71EE8
   |texte=   Technology adoption and use theory review for studying scientists' continued use of cyber‐infrastructure
}}

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024