{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T16:34:24Z","timestamp":1772814864244,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030344818","type":"print"},{"value":"9783030344825","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34482-5_16","type":"book-chapter","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T12:03:12Z","timestamp":1574251392000},"page":"177-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding WeChat Users\u2019 Herd Behavior in Forwarding Health Information: An Empirical Study in China"],"prefix":"10.1007","author":[{"given":"Juan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kunfeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,2]]},"reference":[{"issue":"1","key":"16_CR1","doi-asserted-by":"publisher","first-page":"275","DOI":"10.25300\/MISQ\/2014\/38.1.13","volume":"38","author":"GC Kane","year":"2014","unstructured":"Kane, G.C., Alavi, M., Labianca, G., et al.: What\u2019s different about social media networks? A framework and research agenda. MIS Q. 38(1), 275\u2013304 (2014)","journal-title":"MIS Q."},{"issue":"3","key":"16_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.bushor.2011.01.007","volume":"54","author":"R Hanna","year":"2011","unstructured":"Hanna, R., Rohm, A., Crittenden, V.L.: We\u2019re all connected: the power of the social media ecosystem. Bus. Horiz. 54(3), 265\u2013273 (2011)","journal-title":"Bus. Horiz."},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","volume":"53","author":"AM Kaplan","year":"2010","unstructured":"Kaplan, A.M., Haenlein, M.: Users of the world, unite! the challenges and opportunities of social media. Bus. Horiz. 53(1), 59\u201368 (2010)","journal-title":"Bus. Horiz."},{"issue":"4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"442","DOI":"10.5860\/crl.75.4.442","volume":"75","author":"KS Kim","year":"2014","unstructured":"Kim, K.S., Sin, S.C.J., Yoo-lee, E.Y.: Undergraduates\u2019 use of social media as information sources. Coll. Res. Libr. 75(4), 442\u2013457 (2014)","journal-title":"Coll. Res. Libr."},{"issue":"4","key":"16_CR5","first-page":"794","volume":"39","author":"C Hu","year":"2017","unstructured":"Hu, C., Xu, W., Hu, Y., et al.: Review of information diffusion in online social networks. J. Electron. Inf. Technol. 39(4), 794\u2013804 (2017). (in Chinese)","journal-title":"J. Electron. Inf. Technol."},{"issue":"1","key":"16_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s13278-017-0462-1","volume":"7","author":"S Pramanik","year":"2017","unstructured":"Pramanik, S., Wang, Q., Danisch, M., et al.: Modeling cascade formation in Twitter amidst mentions and retweets. Soc. Netw. Anal. Min. 7(1), 41 (2017)","journal-title":"Soc. Netw. Anal. Min."},{"key":"16_CR7","unstructured":"Bakshy, E., Hofman, J.M., Mason, W.A., et al.: Everyone\u2019s an Influencer: Quantifying Influence on Twitter. https:\/\/dl.acm.org\/citation.cfm?id=1935845"},{"issue":"2","key":"16_CR8","first-page":"87","volume":"2","author":"I Taxidou","year":"2016","unstructured":"Taxidou, I., Fischer, P.M., Nies, T.D., et al.: Information diffusion and provenance of interactions in twitter: is it only about retweets? Inf. Syst. Res. 2(2), 87\u2013115 (2016)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1177\/0165551511400958","volume":"37","author":"KS Kim","year":"2011","unstructured":"Kim, K.S., Sin, S.C.J.: Selecting quality sources: bridging the gap between the perception and use of information sources. J. Inf. Sci. 37(2), 178\u2013188 (2011)","journal-title":"J. Inf. Sci."},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1002\/asi.21447","volume":"62","author":"O Arazy","year":"2011","unstructured":"Arazy, O., Kopak, R.: On the measurability of information quality. J. Am. Soc. Inf. Sci. Technol. 62(1), 89\u201399 (2011)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"11","key":"16_CR11","doi-asserted-by":"publisher","first-page":"4346","DOI":"10.1177\/1461444818772847","volume":"20","author":"J Ihm","year":"2018","unstructured":"Ihm, J., Kim, E.: The hidden side of news diffusion: understanding online news sharing as an interpersonal behavior. New Media Soc. 20(11), 4346\u20134365 (2018)","journal-title":"New Media Soc."},{"issue":"3","key":"16_CR12","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1037\/h0046408","volume":"51","author":"M Deutsch","year":"1955","unstructured":"Deutsch, M., Gerard, H.B.: A study of normative and informational social influences upon individual judgement. J. Abnorm. Soc. Psychol. 51(3), 629\u2013636 (1955)","journal-title":"J. Abnorm. Soc. Psychol."},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1177\/002200275800200106","volume":"2","author":"HC Kelman","year":"1958","unstructured":"Kelman, H.C.: Compliance, identification, and internalization: three processes of attitude change. J. Conflict Resolut. 2(1), 51\u201360 (1958)","journal-title":"J. Conflict Resolut."},{"issue":"3","key":"16_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.2307\/3090121","volume":"65","author":"Richard P. Bagozzi","year":"2002","unstructured":"Bagozzi, R.P., Lee, K.H.: Multiple routes for social influence: the role of compliance, internalization, and social identity. Soc. Psychol. Q. 65(3), 226 (2002)","journal-title":"Social Psychology Quarterly"},{"issue":"1","key":"16_CR15","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.im.2017.03.006","volume":"55","author":"Kexin Zhao","year":"2018","unstructured":"Zhao, K., Stylianou, A.C., Zheng, Y.: Sources and impacts of social influence from online anonymous user reviews. Inf. Manage. 55(1), 16\u201330 (2017). S1008924400","journal-title":"Information & Management"},{"issue":"7","key":"16_CR16","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1016\/j.im.2003.08.014","volume":"41","author":"Chin-Lung Hsu","year":"2004","unstructured":"Hsu, C.L., Lu, H.P.: Why do people play on-line games? an extended TAM with social influences and flow experience. Inf. Manage. 41(7), 853\u2013868 (2004)","journal-title":"Information & Management"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1086\/266996","volume":"25","author":"HC Kelman","year":"1961","unstructured":"Kelman, H.C.: Processes of opinion change. Publ. Opin. Q. 25(1), 57\u201378 (1961)","journal-title":"Publ. Opin. Q."},{"issue":"3","key":"16_CR18","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., et al.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"3","key":"16_CR19","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ijresmar.2003.12.004","volume":"21","author":"UM Dholakia","year":"2004","unstructured":"Dholakia, U.M., Bagozzi, R.P., Pearo, L.K.: A social influence model of consumer participation in network- and small-group-based virtual communities. Int. J. Res. Mark. 21(3), 241\u2013263 (2004)","journal-title":"Int. J. Res. Mark."},{"issue":"1","key":"16_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.dss.2009.12.006","volume":"49","author":"CMK Cheung","year":"2010","unstructured":"Cheung, C.M.K., Lee, M.K.O.: A theoretical model of intentional social action in online social networks. Decis. Support Syst. 49(1), 24\u201330 (2010)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"16_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2700398","volume":"9","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Tang, J., Li, J., et al.: Who influenced you-predicting retweet via social influence locality. ACM Trans. Knowl. Disc. Data 9(3), 1\u201326 (2015)","journal-title":"ACM Trans. Knowl. Disc. Data"},{"issue":"3","key":"16_CR22","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1016\/j.chb.2011.12.014","volume":"28","author":"Shih-Chih Chen","year":"2012","unstructured":"Chen, S.C., Yen, D.C., Hwang, M.I.: Factors influencing the continuance intention to the usage of web 2.0: an empirical study. Comput. Hum. Behav. 28(3), 933\u2013941 (2012)","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"16_CR23","doi-asserted-by":"publisher","first-page":"143","DOI":"10.25300\/MISQ\/2014\/38.1.07","volume":"38","author":"HT Tsai","year":"2014","unstructured":"Tsai, H.T., Bagozzi, R.P.: Contribution behavior in virtual communities: cognitive, emotional, and social influences. MIS Q. 38(1), 143\u2013163 (2014)","journal-title":"MIS Q."},{"issue":"1","key":"16_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.im.2017.03.006","volume":"55","author":"K Zhao","year":"2018","unstructured":"Zhao, K., Stylianou, A.C., Zheng, Y.: Sources and impacts of social influence from online anonymous user reviews. Inf. Manage. 55(1), 16\u201330 (2018)","journal-title":"Inf. Manage."},{"issue":"10","key":"16_CR25","first-page":"370","volume":"123","author":"N Chung","year":"2016","unstructured":"Chung, N., Han, H.: The relationship among tourists\u2019 persuasion, attachment and behavioral changes in social media. Technol. Forecast. Soc. Change 123(10), 370\u2013380 (2016)","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"3","key":"16_CR26","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.ijinfomgt.2015.02.001","volume":"35","author":"CH Chou","year":"2015","unstructured":"Chou, C.H., Wang, Y.S., Tang, T.I.: Exploring the determinants of knowledge adoption in virtual communities: a social influence perspective. Int. J. Inf. Manage. 35(3), 364\u2013376 (2015)","journal-title":"Int. J. Inf. Manage."},{"issue":"4","key":"16_CR27","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1108\/10662240710828030","volume":"17","author":"HP Lu","year":"2007","unstructured":"Lu, H.P., Hsiao, K.L.: Understanding intention to continuously share information on weblogs. Internet Res. 17(4), 345\u2013361 (2007)","journal-title":"Internet Res."},{"issue":"6","key":"16_CR28","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1089\/cpb.2009.0109","volume":"12","author":"EL Pelling","year":"2009","unstructured":"Pelling, E.L., White, K.M.: The theory of planned behavior applied to young people\u2019s use of social networking web sites. CyberPsychol. Behav. 12(6), 755\u2013759 (2009)","journal-title":"CyberPsychol. Behav."},{"issue":"4","key":"16_CR29","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1016\/j.chb.2010.07.028","volume":"27","author":"CMK Cheung","year":"2011","unstructured":"Cheung, C.M.K., Chiu, P.Y., Lee, M.K.O.: Online social networks: Why do students use facebook? Comput. Hum. Behav. 27(4), 1337\u20131343 (2011)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"16_CR30","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.chb.2017.10.038","volume":"79","author":"X Zha","year":"2018","unstructured":"Zha, X., Yang, H., Yan, Y., et al.: Exploring the effect of social media information quality, source credibility and reputation on informational fit-to-task: moderating role of focused immersion. Comput. Hum. Behav. 79(2), 227\u2013237 (2018)","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"16_CR31","doi-asserted-by":"publisher","first-page":"805","DOI":"10.2307\/25148755","volume":"30","author":"A Bhattacherjee","year":"2006","unstructured":"Bhattacherjee, A., Sanford, C.: Influence processes for information technology acceptance: an elaboration likelihood model. MIS Q. 30(4), 805\u2013825 (2006)","journal-title":"MIS Q."},{"issue":"2","key":"16_CR32","first-page":"73","volume":"9","author":"SA Watts","year":"2008","unstructured":"Watts, S.A., Wei, Z.: Capitalizing on content: information adoption in two online communities. J. Assoc. Inf. Syst. 9(2), 73\u201394 (2008)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"4","key":"16_CR33","doi-asserted-by":"publisher","first-page":"9","DOI":"10.2753\/JEC1086-4415130402","volume":"13","author":"MY Cheung","year":"2009","unstructured":"Cheung, M.Y., Luo, C., Sia, C.L., et al.: Credibility of electronic word-of-mouth: informational and normative determinants of on-line consumer recommendations. Int. J. Electron. Commer. 13(4), 9\u201338 (2009)","journal-title":"Int. J. Electron. Commer."},{"issue":"1","key":"16_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2017.03.005","volume":"55","author":"KZK Zhang","year":"2017","unstructured":"Zhang, K.Z.K., Barnes, S.J., Zhao, S.J., et al.: Can consumers be persuaded on brand microblogs? an empirical study. Inf. Manage. 55(1), 1\u201315 (2017)","journal-title":"Inf. Manage."},{"issue":"1","key":"16_CR35","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1177\/0093650209351512","volume":"37","author":"Y Hu","year":"2010","unstructured":"Hu, Y., Sundar, S.S.: Effects of online health sources on credibility and behavioral intentions. Commun. Res. 37(1), 105\u2013132 (2010)","journal-title":"Commun. Res."},{"issue":"5","key":"16_CR36","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1080\/10410236.2012.700391","volume":"28","author":"JY Lee","year":"2013","unstructured":"Lee, J.Y., Sundar, S.S.: To tweet or to retweet? that is the question for health professionals on twitter. Health Commun. 28(5), 509\u2013524 (2013)","journal-title":"Health Commun."},{"issue":"3","key":"16_CR37","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1108\/10662240810883290","volume":"18","author":"CMK Cheung","year":"2008","unstructured":"Cheung, C.M.K., Lee, M.K.O., Rabjohn, N.: The impact of electronic word-of-mouth. Internet Res. 18(3), 229\u2013247 (2008)","journal-title":"Internet Res."},{"issue":"1","key":"16_CR38","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1086\/209388","volume":"21","author":"D Grewal","year":"1994","unstructured":"Grewal, D., Gotlieb, J., Marmorstein, H.: The moderating effects of message framing and source credibility on the price-perceived risk relationship. J. Consum. Res. 21(1), 145\u2013153 (1994)","journal-title":"J. Consum. Res."},{"issue":"2","key":"16_CR39","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1108\/OIR-11-2012-0210","volume":"38","author":"J Yoo","year":"2014","unstructured":"Yoo, J., Choi, S., Choi, M., et al.: Why people use Twitter: social conformity and social value perspectives. Online Inf. Rev. 38(2), 265\u2013283 (2014)","journal-title":"Online Inf. Rev."},{"issue":"4","key":"16_CR40","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.25300\/MISQ\/2013\/37.4.02","volume":"37","author":"H Sun","year":"2013","unstructured":"Sun, H.: A longitudinal study of herd behavior in the adoption and continued use of technology. MIS Q. 37(4), 1013\u20131041 (2013)","journal-title":"MIS Q."},{"issue":"1","key":"16_CR41","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0305-0483(96)00051-5","volume":"25","author":"AH Segars","year":"1997","unstructured":"Segars, A.H.: Assessing the unidimensionality of measurement: a paradigm and illustration within the context of information systems research. Omega 25(1), 107\u2013121 (1997)","journal-title":"Omega"},{"issue":"1","key":"16_CR42","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39\u201350 (1981)","journal-title":"J. Mark. Res."}],"container-title":["Lecture Notes in Computer Science","Smart Health"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34482-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:45:27Z","timestamp":1709826327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-34482-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030344818","9783030344825"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34482-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Health","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsh2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icshconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conferency.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}