{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:02:28Z","timestamp":1746331348083,"version":"3.40.4"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319072920"},{"type":"electronic","value":"9783319072937"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07293-7_22","type":"book-chapter","created":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T09:31:11Z","timestamp":1401701471000},"page":"221-232","source":"Crossref","is-referenced-by-count":2,"title":["Main Factors for Joining New Social Networking Sites"],"prefix":"10.1007","author":[{"given":"Carlos","family":"Osorio","sequence":"first","affiliation":[]},{"given":"Savvas","family":"Papagiannidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.17705\/1thci.00054","volume":"5","author":"C.K. Coursaris","year":"2013","unstructured":"Coursaris, C.K., Van Osch, W., Sung, J., Yun, Y.: Disentangling Twitter\u2019s Adoption and Use (Dis) Continuance: A Theoretical and Empirical Amalgamation of Uses and Gratifications and Diffusion of Innovations. AIS Transactions on Human-Computer Interaction\u00a05, 57\u201383 (2013)","journal-title":"AIS Transactions on Human-Computer Interaction"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Coursaris, C.K., Yun, Y., Sung, J.: Twitter Users vs. Quitters: A Uses and Gratifications and Diffusion of Innovations approach in understanding the role of mobility in microblogging. In: 2010 Ninth International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), pp. 481\u2013486. IEEE (Year)","DOI":"10.1109\/ICMB-GMR.2010.44"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1111\/j.1083-6101.2007.00396.x","volume":"13","author":"E. Hargittai","year":"2007","unstructured":"Hargittai, E.: Whose space? Differences among users and non\u2010users of social network sites. Journal of Computer-Mediated Communication\u00a013, 276\u2013297 (2007)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"351","DOI":"10.2307\/3250921","volume":"25","author":"A. Bhattacherjee","year":"2001","unstructured":"Bhattacherjee, A.: Understanding information systems continuance: An expectation-confirmation model. MIS Quarterly: Management Information Systems\u00a025, 351\u2013370 (2001)","journal-title":"MIS Quarterly: Management Information Systems"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1057\/ejis.2009.7","volume":"18","author":"C.W. Hsu","year":"2009","unstructured":"Hsu, C.W.: Frame misalignment: Interpreting the implementation of information systems security certification in an organization. European Journal of Information Systems\u00a018, 140\u2013150 (2009)","journal-title":"European Journal of Information Systems"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Al-Debei, M.M., Al-Lozi, E., Papazafeiropoulou, A.: Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective. Decision Support Systems (2013)","DOI":"10.1016\/j.dss.2012.12.032"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1177\/0165551508099088","volume":"35","author":"C.M.K. Cheung","year":"2009","unstructured":"Cheung, C.M.K., Lee, M.K.O.: Understanding the sustainability of a virtual community: model development and empirical test. Journal of Information Science\u00a035, 279\u2013298 (2009)","journal-title":"Journal of Information Science"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1080\/01449290410001669969","volume":"23","author":"M.H. Hsu","year":"2004","unstructured":"Hsu, M.H., Chiu, C.M.: Predicting electronic service continuance with a decomposed theory of planned behaviour. Behav. Inform. Technol.\u00a023, 359\u2013373 (2004)","journal-title":"Behav. Inform. Technol."},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1057\/palgrave.jt.5740191","volume":"14","author":"T.-H. Hsu","year":"2006","unstructured":"Hsu, T.-H., Wang, Y.-S., Wen, S.-C.: Using the decomposed theory of planning behavioural to analyse consumer behavioural intention towards mobile text message coupons. Journal of Targeting, Measurement and analysis for Marketing\u00a014, 309\u2013324 (2006)","journal-title":"Journal of Targeting, Measurement and analysis for Marketing"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S. Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding Information Technology Usage - a Test of Competing Models. Information Systems Research\u00a06, 144\u2013176 (1995)","journal-title":"Information Systems Research"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1348\/014466601164939","volume":"40","author":"C.J. Armitage","year":"2001","unstructured":"Armitage, C.J., Conner, M.: Efficacy of the theory of planned behaviour: A meta\u2010analytic review. British Journal of Social Psychology\u00a040, 471\u2013499 (2001)","journal-title":"British Journal of Social Psychology"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.csi.2004.10.004","volume":"27","author":"S.Y. Hung","year":"2005","unstructured":"Hung, S.Y., Chang, C.M.: User acceptance of WAP services: test of competing theories. Comput. Stand. Inter.\u00a027, 359\u2013370 (2005)","journal-title":"Comput. Stand. Inter."},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.ijhm.2008.06.004","volume":"28","author":"H.J. Huh","year":"2009","unstructured":"Huh, H.J., Kim, T., Law, R.: A comparison of competing theoretical models for understanding acceptance behavior of information systems in upscale hotels. Int. J. Hosp. Manag.\u00a028, 121\u2013134 (2009)","journal-title":"Int. J. Hosp. Manag."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1504\/IJMC.2010.034934","volume":"8","author":"J.H. Lee","year":"2010","unstructured":"Lee, J.H., Kim, J.H., Hong, J.H.: A comparison of adoption models for new mobile media services between high-and low-motive groups. Int. J. Mob. Commun.\u00a08, 487\u2013506 (2010)","journal-title":"Int. J. Mob. Commun."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Ajzen, I.: The Theory of Planned Behavior. Organ. Behav. Hum. Dec. 50,179\u2013211 (1991)","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly: Management Information Systems\u00a013, 319\u2013339 (1989)","journal-title":"MIS Quarterly: Management Information Systems"},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"561","DOI":"10.2307\/249633","volume":"19","author":"S. Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.: Assessing IT usage: The role of prior experience. MIS Quarterly: Management Information Systems\u00a019, 561\u2013568 (1995)","journal-title":"MIS Quarterly: Management Information Systems"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly 319\u2013340 (1989)","DOI":"10.2307\/249008"},{"key":"22_CR19","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2307\/25148830","volume":"32","author":"J.J.P.A. Hsieh","year":"2008","unstructured":"Hsieh, J.J.P.A., Rai, A., Keil, M.: Understanding digital inequality: Comparing continued use behavioral models of the socio-economically advantaged and disadvantaged. Mis. Quart.\u00a032, 97\u2013126 (2008)","journal-title":"Mis. Quart."},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/3468.852435","volume":"30","author":"A. Bhattacherjee","year":"2000","unstructured":"Bhattacherjee, A.: Acceptance of e-commerce services: The case of electronic brokerages. IEEE T. Syst. Man. Cy.A\u00a030, 411\u2013420 (2000)","journal-title":"IEEE T. Syst. Man. Cy.A"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15332860802004162","volume":"7","author":"K.M. Nor","year":"2008","unstructured":"Nor, K.M., Pearson, J.M.: An exploratory study into the adoption of internet banking in a developing country: Malaysia. Journal of Internet Commerce\u00a07, 29\u201373 (2008)","journal-title":"Journal of Internet Commerce"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Merikivi, J., Mantymaki, M.: Explaining the continuous use of social virtual worlds: An applied theory of planned behavior approach. In: 42nd Hawaii International Conference on System Sciences, HICSS 2009, pp. 1\u201310. IEEE (2009)","DOI":"10.1109\/HICSS.2009.207"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Bart, Y., Shankar, V., Sultan, F., Urban, G.L.: Are the drivers and role of online trust the same for all web sites and consumers? A large-scale exploratory empirical study. Journal of Marketing 133\u2013152 (2005)","DOI":"10.1509\/jmkg.2005.69.4.133"},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","volume":"15","author":"T. Dinev","year":"2006","unstructured":"Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., Colautti, C.: Privacy calculus model in e-commerce\u2013a study of Italy and the United States. European Journal of Information Systems\u00a015, 389\u2013402 (2006)","journal-title":"European Journal of Information Systems"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","volume":"103","author":"J.C. Anderson","year":"1988","unstructured":"Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: A review and recommended two-step approach. Psychol Bull.\u00a0103, 411 (1988)","journal-title":"Psychol Bull."},{"key":"22_CR26","unstructured":"Ajzen, I.: Constructing a TPB questionnaire: Conceptual and methodological considerations (2002)"},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1089\/cpb.2006.9.540","volume":"9","author":"H.F. Lin","year":"2006","unstructured":"Lin, H.F.: Understanding behavioral intention to participate in virtual communities. CyberPsychology & Behavior\u00a09, 540\u2013547 (2006)","journal-title":"CyberPsychology & Behavior"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Peslak, A., Ceccucci, W., Sendall, P.: An empirical study of social networking behavior using theory of reasoned action. In: Proc. of CONISAR, vol.\u00a011 (2011)","DOI":"10.21818\/001c.17350"},{"key":"22_CR29","unstructured":"Lorenzo-Romero, C., Del Chiappa, G.: Adoption of social networking sites by Italian. Information Systems and e-Business Management, 1\u201323 (2013)"},{"key":"22_CR30","unstructured":"Field, A.P.: Discovering statistics using SPSS: (and sex and drugs and rock \u2019n\u2019 roll). SAGE (2009)"},{"key":"22_CR31","unstructured":"Hair, J.F., Anderson, R.E.: Multivariate data analysis. Prentice Hall (2010)"},{"key":"22_CR32","unstructured":"Gaskin, J.: Stat tools package - Validiy master (2012), http:\/\/statwiki.kolobkreations.com"},{"key":"22_CR33","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1016\/j.jbusres.2009.03.022","volume":"63","author":"J.-J. Wu","year":"2010","unstructured":"Wu, J.-J., Chen, Y.-H., Chung, Y.-S.: Trust factors influencing virtual community members: A study of transaction communities. Journal of Business Research\u00a063, 1025\u20131032 (2010)","journal-title":"Journal of Business Research"},{"key":"22_CR34","unstructured":"Byrne, B.M.: Structural Equation Modeling With AMOS: Basic Concepts, Applications, and Programming, 2nd edn. Taylor & Francis (2009)"},{"key":"22_CR35","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.iheduc.2008.05.002","volume":"11","author":"H. Ajjan","year":"2008","unstructured":"Ajjan, H., Hartshorne, R.: Investigating faculty decisions to adopt Web 2.0 technologies: Theory and empirical tests. Internet High Educ.\u00a011, 71\u201380 (2008)","journal-title":"Internet High Educ."},{"key":"22_CR36","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1093\/sw\/52.3.221","volume":"52","author":"W. Zhang","year":"2007","unstructured":"Zhang, W., Gutierrez, O.: Information technology acceptance in the social services sector context: An exploration. Soc.Work\u00a052, 221\u2013231 (2007)","journal-title":"Soc.Work"},{"key":"22_CR37","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.elerap.2007.02.002","volume":"6","author":"H.-F. Lin","year":"2008","unstructured":"Lin, H.-F.: Predicting consumer intentions to shop online: An empirical test of competing theories. Electronic Commerce Research and Applications\u00a06, 433\u2013442 (2008)","journal-title":"Electronic Commerce Research and Applications"},{"key":"22_CR38","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.csi.2007.08.019","volume":"30","author":"P.-L. To","year":"2008","unstructured":"To, P.-L., Liao, C., Chiang, J.C., Shih, M.-L., Chang, C.-Y.: An empirical investigation of the factors affecting the adoption of Instant Messaging in organizations. Comput. Stand. Inter.\u00a030, 148\u2013156 (2008)","journal-title":"Comput. Stand. Inter."},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Mantymaki, M., Merikivi, J.: Uncovering the motives for the continuous use of social virtual worlds (2010)","DOI":"10.1109\/HICSS.2010.241"},{"key":"22_CR40","first-page":"155","volume":"47","author":"Y.C. Lee","year":"2013","unstructured":"Lee, Y.C., Hsieh, Y.F., Guo, Y.B.: Construct DTPB model by using DEMATEL: a study of a university library website. Program-Electron Lib.\u00a047, 155\u2013169 (2013)","journal-title":"Program-Electron Lib."},{"key":"22_CR41","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1504\/IJMC.2010.034934","volume":"8","author":"J.H. Lee","year":"2010","unstructured":"Lee, J.H., Kim, J.H., Hong, J.H.: A comparison of adoption models for new mobile media services between high- and low-motive groups. Int. J. Mob. Commun.\u00a08, 487\u2013506 (2010)","journal-title":"Int. J. Mob. Commun."},{"key":"22_CR42","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s10796-008-9096-1","volume":"10","author":"S.J. Hong","year":"2008","unstructured":"Hong, S.J., Thong, J.Y.L., Moon, J.Y., Tam, K.Y.: Understanding the behavior of mobile data services consumers. Inform. Syst. Front.\u00a010, 431\u2013445 (2008)","journal-title":"Inform. Syst. Front."}],"container-title":["Lecture Notes in Computer Science","HCI in Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07293-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T05:52:06Z","timestamp":1746251526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07293-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319072920","9783319072937"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07293-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}