@proceedings {417, title = {Technology adoption and use: Theory review for studying scientists{\textquoteright} continued use of cyber-infrastructure}, year = {2011}, month = {10/2011}, address = {New Orleans, LA}, abstract = {In this paper, we seek to identify factors that might increase the likelihood of adoption and continued use of cyber-infrastructure by scientists. To do so, we review the main research on Information and Communications Technology (ICT) adoption and use by addressing research problems, theories and models used, findings, and limitations. We focus particularly on the individual user perspective. We categorize previous studies into two groups: Adoption research and post-adoption (continued use) research. In addition, we review studies specifically regarding cyber-infrastructure adoption and use by scientists and other special user groups. We identify the limitations of previous theories, models and research findings appearing in the literature related to our current interest in scientists{\textquoteright} adoption and continued use of cyber-infrastructure. We synthesize the previous theories and models used for ICT adoption and use, and then we develop a theoretical framework for studying scientists{\textquoteright} adoption and use of cyber-infrastructure. We also proposed a research design based on the research model developed. Implications for researchers and practitioners are provided.}, attachments = {https://crowston.syr.edu/sites/crowston.syr.edu/files/ASIST2011-Cyber-infrastructureTheoryReview-FinalVersion-1.pdf}, author = {Kim, Youngseek and Kevin Crowston} }