{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:51:55Z","timestamp":1760043115628},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662455258"},{"type":"electronic","value":"9783662455265"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45526-5_2","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T11:07:08Z","timestamp":1417432028000},"page":"14-22","source":"Crossref","is-referenced-by-count":7,"title":["Weibo or Weixin? Gratifications for Using Different Social Media"],"prefix":"10.1007","author":[{"given":"Chunmei","family":"Gan","sequence":"first","affiliation":[]},{"given":"Weijun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","volume":"53","author":"A.M. Kaplan","year":"2010","unstructured":"Kaplan, A.M., Haenlein, M.: Users of the world, unite! The challenges and opportunities of social media. Business Horizons\u00a053(1), 59\u201368 (2010)","journal-title":"Business Horizons"},{"key":"2_CR2","unstructured":"China Internet Network Information Center. Statistical report on Internet development in China, \n                    \n                      http:\/\/www1.cnnic.cn\/IDR\/ReportDownloads\/"},{"key":"2_CR3","unstructured":"China Internet Network Information Center. Research report on user behavior of social applications in China, \n                    \n                      http:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/sqbg\/201312\/t20131225_43545.htm"},{"issue":"4","key":"2_CR4","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1108\/QMR-06-2013-0041","volume":"16","author":"A. Whiting","year":"2013","unstructured":"Whiting, A., Williams, D.: Why people use social media: a uses and gratifications approach. Qualitative Market Research: An International Journal\u00a016(4), 362\u2013369 (2013)","journal-title":"Qualitative Market Research: An International Journal"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.chb.2012.08.009","volume":"29","author":"Y.-C. Ku","year":"2013","unstructured":"Ku, Y.-C., Chu, T.-H., Tseng, C.-H.: Gratifications for using CMC technologies: A comparison among SNS, IM, and e-mail. Computers in Human Behavior\u00a029, 226\u2013234 (2013)","journal-title":"Computers in Human Behavior"},{"key":"2_CR6","first-page":"19","volume-title":"The Uses of Mass Communications: Current Perspectives on Gratifications Research","author":"E. Katz","year":"1974","unstructured":"Katz, E., Blumler, J.G., Gurevitch, M.: Utilization of Mass Communication by the Individual. In: Blumler, J.G., Katz, E. (eds.) The Uses of Mass Communications: Current Perspectives on Gratifications Research, pp. 19\u201332. Sage Publications, Beverly Hills (1974)"},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.4018\/irmj.2001010103","volume":"14","author":"T.F. Stafford","year":"2001","unstructured":"Stafford, T.F., Stafford, M.R.: Identifying motivations for the use of commercial web sites. Information Resources Management Journal\u00a014(1), 22\u201330 (2001)","journal-title":"Information Resources Management Journal"},{"issue":"5","key":"2_CR8","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1177\/0270467610380009","volume":"30","author":"A. Quan-Haase","year":"2010","unstructured":"Quan-Haase, A., Young, A.L.: Uses and gratifications of social media: A comparison of Facebook and instant messaging. Bulletin of Science, Technology and Society\u00a030(5), 350\u2013361 (2010)","journal-title":"Bulletin of Science, Technology and Society"},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1089\/cpb.2007.0056","volume":"11","author":"J. Raacke","year":"2008","unstructured":"Raacke, J., Bonds-Raacke, J.: MySpace and Facebook: Applying the uses and gratifications theory to exploring friend-networking sites. CyberPsychology and Behavior\u00a011(2), 169\u2013174 (2008)","journal-title":"CyberPsychology and Behavior"},{"issue":"2","key":"2_CR10","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.tele.2008.06.001","volume":"26","author":"O.W.Y. Lo","year":"2009","unstructured":"Lo, O.W.Y., Leung, L.: Effects of gratification-opportunities and gratifications-obtained on preferences of instant messaging and e-mail among college students. Telematics and Informatics\u00a026(2), 156\u2013166 (2009)","journal-title":"Telematics and Informatics"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1016\/j.chb.2012.06.025","volume":"29","author":"P. Pai","year":"2013","unstructured":"Pai, P., Arnott, D.C.: User adoption of social networking sites: Eliciting uses and gratifications through a means-end approach. Computers in Human Behavior\u00a029(3), 1039\u20131053 (2013)","journal-title":"Computers in Human Behavior"},{"key":"2_CR12","volume-title":"Naturalistic inquiry","author":"Y. Lincoln","year":"1985","unstructured":"Lincoln, Y., Guba, E.: Naturalistic inquiry. Sage, New York (1985)"},{"issue":"6","key":"2_CR13","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1089\/cpb.2009.0003","volume":"12","author":"N. Park","year":"2009","unstructured":"Park, N., Kee, K.F., Valenzuela, S.: Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes. CyberPsychology and Behavior\u00a012(6), 729\u2013733 (2009)","journal-title":"CyberPsychology and Behavior"}],"container-title":["IFIP Advances in Information and Communication Technology","Digital Services and Information Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45526-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T20:47:15Z","timestamp":1559076435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45526-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662455258","9783662455265"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45526-5_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}