default search action
Stefan Tams
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Stefan Tams, Alina Dulipovici:
The creativity model of age and innovation with IT: why older users are less innovative and what to do about it. Eur. J. Inf. Syst. 33(3): 287-314 (2024) - 2023
- [c16]Christine Rzepka, Benedikt Berger, Stefan Tams:
AI-based Technologies for Everyone: How and Why to Adapt Voice Assistants' Complexity to Older Adults. ICIS 2023 - 2022
- [j16]Stefan Tams, Varun Grover, Jason Thatcher, Manju Ahuja:
Grappling with modern technology: interruptions mediated by mobile devices impact older workers disproportionately. Inf. Syst. E Bus. Manag. 20(4): 635-655 (2022) - [j15]Stefan Tams:
Helping Older Workers Realize Their Full Organizational Potential: A Moderated Mediation Model of Age and IT-Enabled Task Performance. MIS Q. 46(1): 1-34 (2022) - [c15]Saeed Amirabdolahian, Stefan Tams, Guy Paré:
Innovative Use of EKRs by Older Workers: The Mediating Role of Job Crafting. AMCIS 2022 - [c14]Christine Rzepka, Benedikt Berger, Stefan Tams, Thomas Hess:
The Complex Role of Complexity in the Use of AI-based Technologies: Evidence from Voice Assistants. Wirtschaftsinformatik 2022 - 2020
- [j14]Stefan Tams, Alina Dulipovici, Jason Bennett Thatcher, Kevin Craig, Mark Srite:
The Role of Basic Human Values in Knowledge Sharing: How Values Shape the Postadoptive Use of Electronic Knowledge Repositories. J. Assoc. Inf. Syst. 21(1): 3 (2020) - [j13]Stefan Tams, Manju Ahuja, Jason Thatcher, Varun Grover:
Worker stress in the age of mobile technology: The combined effects of perceived interruption overload and worker control. J. Strateg. Inf. Syst. 29(1): 101595 (2020) - [c13]Daniel A. Pienta, Stefan Tams, Jason Thatcher:
Can Trust be Trusted in Cybersecurity? HICSS 2020: 1-10
2010 – 2019
- 2019
- [c12]Stefan Tams, Alina Dulipovici:
The Creativity Model of Age and Innovation with IT: How to Counteract the Effects of Age Stereotyping on User Innovation. HICSS 2019: 1-10 - [c11]Fenne große Deters, Stefan Tams, Allen C. Johnston, Jason Thatcher:
Designing Experimental Studies. ICIS 2019 - 2018
- [j12]Stefan Tams, Renaud Legoux, Pierre-Majorique Léger:
Smartphone withdrawal creates stress: A moderated mediation model of nomophobia, social threat, and phone withdrawal context. Comput. Hum. Behav. 81: 1-9 (2018) - [j11]Stefan Tams, Jason Bennett Thatcher, Varun Grover:
Concentration, Competence, Confidence, and Capture: An Experimental Study of Age, Interruption-based Technostress, and Task Performance. J. Assoc. Inf. Syst. 19(9): 2 (2018) - [j10]Stefan Tams, Jason Bennett Thatcher, Kevin Craig:
How and why trust matters in post-adoptive usage: The mediating roles of internal and external self-efficacy. J. Strateg. Inf. Syst. 27(2): 170-190 (2018) - 2017
- [j9]Michelle Carter, Stefan Tams, Varun Grover:
When do I profit? Uncovering boundary conditions on reputation effects in online auctions. Inf. Manag. 54(2): 256-267 (2017) - [j8]Achita (Mi) Muthitcharoen, Stefan Tams:
The Role of Auction Duration in Bidder Strategies and Auction Prices. Int. J. Electron. Commer. 21(1): 71-102 (2017) - [c10]Stefan Tams:
Linking User Age and Stress in the Interruption Era: The Role of Computer Experience. HICSS 2017: 1-8 - [c9]Stefan Tams, Varun Grover, Jason Thatcher, Manju Ahuja:
When Modern Technologies Meet Ageing Workforces: Older Workers are more affected by Demands from Mobile Interruptions than their Younger Counterparts. HICSS 2017: 1-10 - 2015
- [j7]Stefan Tams, Kevin Hill:
Information Systems Project Management Risk: Does it Matter for Firm Performance? J. Organ. End User Comput. 27(4): 43-60 (2015) - [c8]Kevin Hill, Stefan Tams, Jason Bennett Thatcher:
Contextual Factors in Post-adoption: Applying the Model of Proactive Work Behavior to the Study of End-User innovation. AMCIS 2015 - [c7]Stefan Tams:
Challenges in Technostress Research: Guiding Future Work. AMCIS 2015 - 2014
- [j6]Stefan Tams, Kevin Hill, Ana Ortiz de Guinea, Jason Bennett Thatcher, Varun Grover:
NeuroIS - Alternative or Complement to Existing Methods? Illustrating the Holistic Effects of Neuroscience and Self-Reported Data in the Context of Technostress Research. J. Assoc. Inf. Syst. 15(10): 1 (2014) - [j5]Stefan Tams:
Teaching Tip: Cultivating and Nurturing Undergraduate IS Research. J. Inf. Syst. Educ. 25(3): 173-180 (2014) - [j4]Stefan Tams, Varun Grover, Jason Bennett Thatcher:
Modern information technology in an old workforce: Toward a strategic research agenda. J. Strateg. Inf. Syst. 23(4): 284-304 (2014) - 2013
- [j3]Stefan Tams:
Moving cultural information systems research toward maturity: A review of definitions of the culture construct. Inf. Technol. People 26(4): 383-400 (2013) - 2012
- [j2]Stefan Tams:
Toward holistic insights into trust in electronic markets: examining the structure of the relationship between vendor trust and its antecedents. Inf. Syst. E Bus. Manag. 10(1): 149-160 (2012) - [c6]Achita Muthitacharoen, Stefan Tams:
Examining Interdependencies between Seller's and Buyer's Strategies in Online Auctions: (The Case of Seller's Choice of Auction Duration). AMCIS 2012 - [c5]Stefan Tams, Jason Bennett Thatcher, Mark Srite:
Examining the influence of cultural values on the post-adoptive use of knowledge management systems. CPR 2012: 131-136 - 2011
- [c4]Stefan Tams, Kevin Craig, Jason Bennett Thatcher, Jonathan Panning:
Coping with interruptions in Computer-Mediated Environments: the Role of Computer Experience. AMCIS 2011 - 2010
- [j1]Stefan Tams, Varun Grover:
The Effect of an IS Article's Structure on Its Impact. Commun. Assoc. Inf. Syst. 27: 10 (2010) - [c3]Kevin Craig, Stefan Tams, Paul F. Clay, Jason Bennett Thatcher:
Integrating Trust in technology and Computer Self- Efficacy within the Post-Adoption Context: An Empirical Examination. AMCIS 2010: 425
2000 – 2009
- 2009
- [c2]Stefan Tams:
Trust-Building in Electronic Markets: Relative Importance and Interaction Effects of Trust-Building Mechanisms. AMCIS/SIGeBIZ 2009: 143-154 - [c1]Stefan Tams:
Trust Building in Electronic Markets: Relative Importance and Interaction Effects of Trust Building Mechanisms. AMCIS 2009: 506
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint