Line 36: |
Line 36: |
| *[[Administrative behavior, theory of]] | | *[[Administrative behavior, theory of]] |
| *[[Adaptive enterprise architecture theory]] | | *[[Adaptive enterprise architecture theory]] |
| + | *[[Affordance-actualization theory|Affordance-actualization Theory]] |
| *[[Agency theory]] | | *[[Agency theory]] |
| *[[Appraisal Theory]] | | *[[Appraisal Theory]] |
| *[[Argumentation theory]] | | *[[Argumentation theory]] |
| + | *[[Attachment-Theory]] |
| *[[Behavioral decision theory]] | | *[[Behavioral decision theory]] |
| *[[Belief Action Outcome Model|Belief Action Outcome Framework]] | | *[[Belief Action Outcome Model|Belief Action Outcome Framework]] |
| + | *[[Big Five Model of Personality]] |
| *[[Boundary object theory]] | | *[[Boundary object theory]] |
| *[[Chaos theory]] | | *[[Chaos theory]] |
Line 57: |
Line 60: |
| *[[Customer based Discrepancy Theory]] | | *[[Customer based Discrepancy Theory]] |
| *[[Customer Focus Theory]] | | *[[Customer Focus Theory]] |
− | *[[CYNEFIN Framework]] | + | *[[CYNEFIN framework]] |
| *[[Deferred action, theory of]] | | *[[Deferred action, theory of]] |
| *[[Delone and McLean IS success model]] | | *[[Delone and McLean IS success model]] |
| *[[Design Theory]] | | *[[Design Theory]] |
| *[[Diffusion of innovations theory]] | | *[[Diffusion of innovations theory]] |
| + | *[[Distributed Cognition Theory]] |
| *[[Dynamic capabilities]] | | *[[Dynamic capabilities]] |
| *[[Elaboration likelihood model]] | | *[[Elaboration likelihood model]] |
Line 88: |
Line 92: |
| *[[Innovation Resistance Theory]] | | *[[Innovation Resistance Theory]] |
| *[[Kellers Motivational Model |Keller's Motivational Model]] | | *[[Kellers Motivational Model |Keller's Motivational Model]] |
| + | *[[Kohlberg’s theory of Moral Development|Kohlberg's theory of Moral Development]] |
| *[[Knowledge-based theory of the firm]] | | *[[Knowledge-based theory of the firm]] |
| *[[Knowledge Security Theory]] | | *[[Knowledge Security Theory]] |
Line 98: |
Line 103: |
| *[[Multi-attribute utility theory]] | | *[[Multi-attribute utility theory]] |
| *[[Multi-motive information systems continuance model (MISC)]] | | *[[Multi-motive information systems continuance model (MISC)]] |
| + | *[[Norm Activation Theory]] |
| *[[Organizational culture theory]] | | *[[Organizational culture theory]] |
| *[[Organizational information processing theory]] | | *[[Organizational information processing theory]] |
Line 135: |
Line 141: |
| *[[Social network theory]] | | *[[Social network theory]] |
| *[[Social Penetration Theory]] | | *[[Social Penetration Theory]] |
| + | *[[Social Presence Theory#Concise description of theory|Social Presence Theory]] |
| *[[Social shaping of technology]] | | *[[Social shaping of technology]] |
| *[[Sociomaterialism Theory]] | | *[[Sociomaterialism Theory]] |
Line 161: |
Line 168: |
| *[[Theory of slack resources (TSR)|Theory of slack resources]] | | *[[Theory of slack resources (TSR)|Theory of slack resources]] |
| *[[Theory of Swift Trust|Theory of swift trust]] | | *[[Theory of Swift Trust|Theory of swift trust]] |
| + | *[[Theory of Network Externalities]] |
| *[[Transaction cost economics]] | | *[[Transaction cost economics]] |
| *[[Transactive memory theory]] | | *[[Transactive memory theory]] |